Results 51 to 60 of about 1,171,713 (299)
APT Cyber-attack Modelling: Building a General Model
The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other ...
M. Lehto
semanticscholar +1 more source
CYBER-ATTACK IN ESTONIA: A NEW CHALLENGE IN THE APPLICABILITY OF INTERNATIONAL HUMANITARIAN LAW
This article aimed to analyze the classification of armed conflict in Estonia's cyber-attack and how the existing IHL are answering this problem, and whether those regulations are enough for future cases of cyber-attack.
Iradhati Zahra +2 more
doaj +1 more source
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng +4 more
doaj +1 more source
Simultaneous Cyber-Attack Detection and Radar Sensor Health Monitoring in Connected ACC Vehicles
This paper focuses on the detection of cyber-attacks on a wireless communication channel and simultaneous radar sensor health monitoring for a connected vehicle.
Woongsun Jeon +3 more
semanticscholar +1 more source
A Cyber Security Approach Using Multilayer Cryptographic System
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim +4 more
doaj +1 more source
Cyber-Attack Modeling Analysis Techniques: An Overview [PDF]
YesCyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data.
Al-Mohannadi, Hamad +5 more
core +1 more source
Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems
Smart manufacturing (SM) systems utilize run-time data to improve productivity via intelligent decision-making and analysis mechanisms on both machine and system levels.
Efe C. Balta +4 more
semanticscholar +1 more source
An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [PDF]
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes.
Abdulrahman Al-Abassi +3 more
semanticscholar +1 more source
Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source

