Results 11 to 20 of about 1,171,713 (299)

A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection

open access: yesInf., 2023
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce ...
Yang Lyu, Yaokai Feng, K. Sakurai
semanticscholar   +1 more source

WAMS-Based HVDC Damping Control for Cyber Attack Defense

open access: yesIEEE Transactions on Power Systems, 2023
Owing to the fast and large power regulating the capacity of the HVDC system, the wide-area measurement system (WAMS) based high voltage direct current (HVDC) system has been regarded as a prospective solution to deal with the low-frequency oscillation ...
Kaiqi Sun   +6 more
semanticscholar   +1 more source

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

open access: yesJournal of Cloud Computing, 2023
Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also leaves them open to cyber threats.
Surjeet Dalal   +6 more
semanticscholar   +1 more source

A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids

open access: yesEnergies, 2023
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks.
O. Beg, A. Khan, W. Rehman, Ali Hassan
semanticscholar   +1 more source

Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be ...
Romuald Hoffmann
doaj   +1 more source

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

open access: yesJournal of Cloud Computing, 2023
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with the problem of identifying new, complicated threats and the appropriate countermeasures.
Surjeet Dalal   +7 more
semanticscholar   +1 more source

Cyber attack taxonomy for digital environment in nuclear power plants

open access: yesNuclear Engineering and Technology, 2020
With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead ...
Seungmin Kim   +4 more
doaj   +1 more source

A multi-stage coordinated cyber-physical topology attack method based on deep reinforcement learning

open access: yes电力工程技术, 2023
With the development of smart grid and the continuous introduction of communication equipments into cyber physical system (CPS), CPS is confronted with a new attack mode with more destructive—coordinated cyber physical attack (CCPA).
YI Na, XU Jianjun, CHEN Yue, SUN Dikang
doaj   +1 more source

Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network

open access: yesProcesses, 2023
Internet of Health Things plays a vital role in day-to-day life by providing electronic healthcare services and has the capacity to increase the quality of patient care.
K. Vijayakumar   +3 more
semanticscholar   +1 more source

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Home - About - Disclaimer - Privacy