Results 31 to 40 of about 30,706 (186)

Cyber Attacks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire   +1 more source

Risk assessment method of security and stability control system considering the impact of cyber attacks

open access: yes电力工程技术, 2022
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng   +4 more
doaj   +1 more source

A Cyber Security Approach Using Multilayer Cryptographic System

open access: yesProceedings of the International Conference on Applied Innovations in IT
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim   +4 more
doaj   +1 more source

Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis

open access: yesICT Express, 2023
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj   +1 more source

Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

open access: yesEnergies, 2018
Hybrid AC/HVDC (AC-HVDC) grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication ...
Rui Fan   +3 more
doaj   +1 more source

Attack-resilient control for converter-based DC microgrids

open access: yesGlobal Energy Interconnection, 2023
In light of the growing integration of renewable energy sources in power systems, the adoption of DC microgrids has become increasingly popular, due to its simple structure, having no frequency, power factor concerns.
Sen Tan   +2 more
doaj   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Cyber-Attack Modeling Analysis Techniques: An Overview [PDF]

open access: yes, 2016
YesCyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data.
Al-Mohannadi, Hamad   +5 more
core   +1 more source

A cyber‐attack detection method for load control system based on cyber and physical layer crosscheck mechanism

open access: yesIET Generation, Transmission & Distribution, 2022
Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks.
Yingjun Wu   +7 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy