Results 31 to 40 of about 1,171,713 (299)

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA

open access: yesIEEE Transactions on Dependable and Secure Computing, 2021
Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both the economy and human life. Hence, these systems have become an attractive target for physical and cyber attacks alike.
Moshe Kravchik, A. Shabtai
semanticscholar   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

open access: yesIEEE Access, 2022
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen   +4 more
doaj   +1 more source

Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]

open access: yes, 2017
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J.   +4 more
core   +2 more sources

Counteractive control against cyber-attack uncertainties on frequency regulation in the power system

open access: yesIET Cyber-Physical Systems, 2020
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj   +1 more source

Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading

open access: yesComplexity, 2021
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great ...
Xin-Rui Liu, Yuan Meng, Peng Chang
doaj   +1 more source

Algorithm Selection Framework for Cyber Attack Detection

open access: yes, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +1 more source

Physical indicators of cyber attacks against a rescue robot [PDF]

open access: yes, 2014
Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims.
Filippoupolitis, Avgoustinos   +3 more
core   +1 more source

Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features

open access: yesIEEE Transactions on Smart Grid, 2022
The internetworking of grid-connected power electronics converters (PECs) in photovoltaic (PV) farms has inevitably expanded the cyber-attack surfaces. This paper presents a comprehensive study on cyber-attack detection and diagnosis for PEC-enabled PV ...
Lulu Guo   +4 more
semanticscholar   +1 more source

Cyber-attack Detection Strategy Based on Distribution System State Estimation

open access: yesJournal of Modern Power Systems and Clean Energy, 2020
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE).
Huan Long   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy