Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced ...
Shenjian Qiu +4 more
doaj +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core
The article presents current threats and examples of malware which can be used to disrupt the infrastructure. Next, a classification of current threats and attacks which occur in cyberspace is proposed. Finally, the publication also presents examples of attacks which disrupted the smooth functioning of networks and systems.
Marek WITKOWSKI, Anna WOJACZEK
openaire +1 more source
Renewable Energy‐Driven Green Electricity Supplement for Empowering Blue Economy
In order to support the blue economy to expand to the distant sea, this work proposes the framework driven by renewable energy. It integrates flexible perovskite solar cells, triboelectric nanogenerator‐supercapacitors, grid‐forming control strategies, and AI‐driven digital engines.
Ruibo Fan +5 more
wiley +1 more source
Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley +1 more source
Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha +9 more
wiley +1 more source
A resilient workforce: patient safety and the workforce response to a cyber-attack on the ICT systems of the national health service in Ireland. [PDF]
Moore G +4 more
europepmc +2 more sources
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source

