Results 31 to 40 of about 1,171,713 (299)
Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both the economy and human life. Hence, these systems have become an attractive target for physical and cyber attacks alike.
Moshe Kravchik, A. Shabtai
semanticscholar +1 more source
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis +5 more
doaj +1 more source
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen +4 more
doaj +1 more source
Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J. +4 more
core +2 more sources
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj +1 more source
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great ...
Xin-Rui Liu, Yuan Meng, Peng Chang
doaj +1 more source
Algorithm Selection Framework for Cyber Attack Detection
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman +15 more
core +1 more source
Physical indicators of cyber attacks against a rescue robot [PDF]
Responding to an emergency situation is a challenging and time critical procedure. The primary goal is to save lives and this is directly related to the speed and efficiency at which help is provided to the victims.
Filippoupolitis, Avgoustinos +3 more
core +1 more source
Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features
The internetworking of grid-connected power electronics converters (PECs) in photovoltaic (PV) farms has inevitably expanded the cyber-attack surfaces. This paper presents a comprehensive study on cyber-attack detection and diagnosis for PEC-enabled PV ...
Lulu Guo +4 more
semanticscholar +1 more source
Cyber-attack Detection Strategy Based on Distribution System State Estimation
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE).
Huan Long +5 more
doaj +1 more source

