Results 41 to 50 of about 30,706 (186)

Research on Game Theory of Air Traffic Management Cyber Physical System Security

open access: yesAerospace, 2022
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences.
Zhijun Wu, Ruochen Dong, Peng Wang
doaj   +1 more source

Deception in Cyber Attacks

open access: yes, 2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study

open access: yesInformation, 2020
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators ...
Raid W. Amin   +4 more
doaj   +1 more source

False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes

open access: yesFrontiers in Energy Research, 2021
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu   +10 more
doaj   +1 more source

Cyber Security’s Influence on Modern Society [PDF]

open access: yes, 2020
The world of cyber security is evolving every day, and cyber-criminals are trying to take advantage of it to gain as much money and power as possible. As the Internet continues to grow, more people around the world join the Internet.
Vallarelli, Nicholas
core   +1 more source

Non-linearities, cyber attacks and cryptocurrencies [PDF]

open access: yesFinance Research Letters, 2019
Abstract This paper uses a Markov-switching non-linear specification to analyse the effects of cyber attacks on returns in the case of four cryptocurrencies (Bitcoin, Ethernam, Litecoin and Stellar) over the period 8/8/2015 - 28/2/2019. The analysis considers both cyber attacks in general and those targeting cryptocurrencies in particular, and also ...
Caporale, Guglielmo Maria   +3 more
openaire   +4 more sources

D4I - Digital forensics framework for reviewing and investigating cyber attacks

open access: yesArray, 2020
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation.
Athanasios Dimitriadis   +3 more
doaj   +1 more source

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

Cyber-Attack Attributes [PDF]

open access: yesTechnology Innovation Management Review, 2014
Senior corporate executives, government officials, and academics have become aware that there are: i) serious financial and regulatory costs arising from cyber-attacks (Pearson, 2014; Sugarman, 2014; US Securities and Exchange Commission, 2014); ii) vulnerabilities in high-value assets such as supervisory-control and dataacquisition systems (Ashford ...
openaire   +1 more source

A holistic and proactive approach to forecasting cyber threats

open access: yesScientific Reports, 2023
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures.
Zaid Almahmoud   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy