Results 41 to 50 of about 1,171,713 (299)

Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

open access: yesIEEE Access, 2021
Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security.
M. Dehghani   +6 more
semanticscholar   +1 more source

Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Modern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration.
Woogeun Ahn   +3 more
doaj   +1 more source

False data injection in power smart grid and identification of the most vulnerable bus; a case study 14 IEEE bus network

open access: yesEnergy Reports, 2021
Smart grids are one of the most important structures based on cyber–physical devices. Therefore, these grids should be more reliable and efficient when increasing consumption.
Xiang Zhong, Guang xin Li, Chuyan Zhng
doaj   +1 more source

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Broadly speaking an individual can invest time and effort to avoid becoming victim to a cyber attack and/or
A Cartwright   +19 more
core   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Research on active defense based on multi-stage cyber deception game

open access: yesTongxin xuebao, 2020
In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber ...
Yongjin HU   +3 more
doaj   +2 more sources

Cyber Attack Detection Dataset: A Review

open access: yesJournal of Physics: Conference Series, 2022
As cyber attack become more complicated, it becomes more difficult to identify breaches successfully. The inability to identify intrusions might jeopardize security services’ confidence, compromising data confidentiality, integrity, and availability ...
Nur Nadiah Mohd Yusof, N. Sulaiman
semanticscholar   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Cyber Attacks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire   +1 more source

Home - About - Disclaimer - Privacy