Results 11 to 20 of about 31,297 (287)

Controller Cyber-Attack Detection and Isolation. [PDF]

open access: yesSensors (Basel), 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Sztyber-Betley A   +3 more
europepmc   +4 more sources

Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation

open access: yesIEEE Access, 2020
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang   +6 more
doaj   +1 more source

CA2: Cyber Attacks Analytics

open access: yesCoRR, 2023
IEEE Conference on Visual Analytics Science and Technology (VAST) Challenge Workshop ...
Luyu Cheng   +4 more
openaire   +2 more sources

Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use

open access: yesSensors, 2020
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and ...
Agnieszka A. Tubis   +4 more
doaj   +1 more source

DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments

open access: yesEnergy Reports, 2023
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan   +5 more
doaj   +1 more source

Cyber-attacks and the right of self-defense: a case study of the Netherlands

open access: yesPolicy Design and Practice, 2023
Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-
Ferry Oorsprong   +2 more
doaj   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Weaponized AI for cyber attacks

open access: yesJournal of Information Security and Applications, 2021
Abstract Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies for offensive purposes has begun to appear in the world.
Muhammad Mudassar Yamin   +3 more
openaire   +2 more sources

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

open access: yesIEEE Access, 2022
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen   +4 more
doaj   +1 more source

Counteractive control against cyber-attack uncertainties on frequency regulation in the power system

open access: yesIET Cyber-Physical Systems, 2020
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj   +1 more source

Home - About - Disclaimer - Privacy