Results 11 to 20 of about 1,171,713 (299)
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce ...
Yang Lyu, Yaokai Feng, K. Sakurai
semanticscholar +1 more source
WAMS-Based HVDC Damping Control for Cyber Attack Defense
Owing to the fast and large power regulating the capacity of the HVDC system, the wide-area measurement system (WAMS) based high voltage direct current (HVDC) system has been regarded as a prospective solution to deal with the low-frequency oscillation ...
Kaiqi Sun +6 more
semanticscholar +1 more source
Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also leaves them open to cyber threats.
Surjeet Dalal +6 more
semanticscholar +1 more source
A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks.
O. Beg, A. Khan, W. Rehman, Ali Hassan
semanticscholar +1 more source
Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability [PDF]
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be ...
Romuald Hoffmann
doaj +1 more source
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with the problem of identifying new, complicated threats and the appropriate countermeasures.
Surjeet Dalal +7 more
semanticscholar +1 more source
Cyber attack taxonomy for digital environment in nuclear power plants
With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead ...
Seungmin Kim +4 more
doaj +1 more source
A multi-stage coordinated cyber-physical topology attack method based on deep reinforcement learning
With the development of smart grid and the continuous introduction of communication equipments into cyber physical system (CPS), CPS is confronted with a new attack mode with more destructive—coordinated cyber physical attack (CCPA).
YI Na, XU Jianjun, CHEN Yue, SUN Dikang
doaj +1 more source
Internet of Health Things plays a vital role in day-to-day life by providing electronic healthcare services and has the capacity to increase the quality of patient care.
K. Vijayakumar +3 more
semanticscholar +1 more source
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj +1 more source

