Results 11 to 20 of about 31,297 (287)
Controller Cyber-Attack Detection and Isolation. [PDF]
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Sztyber-Betley A +3 more
europepmc +4 more sources
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang +6 more
doaj +1 more source
IEEE Conference on Visual Analytics Science and Technology (VAST) Challenge Workshop ...
Luyu Cheng +4 more
openaire +2 more sources
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and ...
Agnieszka A. Tubis +4 more
doaj +1 more source
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan +5 more
doaj +1 more source
Cyber-attacks and the right of self-defense: a case study of the Netherlands
Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-
Ferry Oorsprong +2 more
doaj +1 more source
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis +5 more
doaj +1 more source
Weaponized AI for cyber attacks
Abstract Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies for offensive purposes has begun to appear in the world.
Muhammad Mudassar Yamin +3 more
openaire +2 more sources
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen +4 more
doaj +1 more source
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj +1 more source

