Results 21 to 30 of about 31,297 (287)
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa +2 more
core +1 more source
HARMer: Cyber-Attacks Automation and Evaluation [PDF]
Con el creciente crecimiento de las incidencias de ciberataques, es importante desarrollar técnicas innovadoras y efectivas para evaluar y defender los sistemas en red contra los ciberataques. Una de las técnicas más conocidas para ello es la realización de pruebas de penetración que lleva a cabo un grupo de profesionales de la seguridad (es decir, el ...
Simon Yusuf Enoch +5 more
openaire +5 more sources
Cyber-attack Detection Strategy Based on Distribution System State Estimation
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE).
Huan Long +5 more
doaj +1 more source
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great ...
Xin-Rui Liu, Yuan Meng, Peng Chang
doaj +1 more source
Algorithm Selection Framework for Cyber Attack Detection
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman +15 more
core +1 more source
Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J. +4 more
core +2 more sources
Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Broadly speaking an individual can invest time and effort to avoid becoming victim to a cyber attack and/or
A Cartwright +19 more
core +2 more sources
Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
Modern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration.
Woogeun Ahn +3 more
doaj +1 more source
Research on active defense based on multi-stage cyber deception game
In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber ...
Yongjin HU +3 more
doaj +2 more sources
Smart grids are one of the most important structures based on cyber–physical devices. Therefore, these grids should be more reliable and efficient when increasing consumption.
Xiang Zhong, Guang xin Li, Chuyan Zhng
doaj +1 more source

