Results 121 to 130 of about 1,171,713 (299)

Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A Review

open access: yesIEEE Open Journal of Power Electronics
This paper presents a systematic overview of the resilience framework for power electronics converter-based cyber-physical systems (CPSs), emphasizing end-to-end responses to the emerging challenges posed by cyber-physical attacks.
Chang Liu   +5 more
doaj   +1 more source

Counterplanning Deceptions to Foil Cyber-Attack Plans [PDF]

open access: yes, 2003
Proceedings of the 2003 IEEE Workshop in Information Assurance, West Point, NY, June 2003Tactics involving deception are important in military strategies. We have been exploring deliberate deception in defensive tactics by information systems under cyber-
Rowe, Neil C.
core  

Malicious Cyber Attacks

open access: yesJournal of Danubian Studies and Research, 2022
Information plays a vital role in the development of human society, an element that cannot be neglected in interpersonal relationships. The use of information technologies in all fields has proven its effectiveness through the speed and efficiency with which activities are carried out.
Luca Iamandi   +3 more
openaire   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems

open access: yesIEEE Open Access Journal of Power and Energy
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj   +1 more source

Cyber Attack Challenges and Resilience for Smart Grids [PDF]

open access: yes, 2015
Date of Acceptance: 31/08/2015Peer ...
Alzubi, Jafar   +2 more
core  

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles

open access: yesDigital Communications and Networks
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage ...
Changyin Dong   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy