Results 51 to 60 of about 1,171,713 (299)

APT Cyber-attack Modelling: Building a General Model

open access: yesInternational Conference on Cyber Warfare and Security, 2022
The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other ...
M. Lehto
semanticscholar   +1 more source

CYBER-ATTACK IN ESTONIA: A NEW CHALLENGE IN THE APPLICABILITY OF INTERNATIONAL HUMANITARIAN LAW

open access: yesYustisia, 2021
This article aimed to analyze the classification of armed conflict in Estonia's cyber-attack and how the existing IHL are answering this problem, and whether those regulations are enough for future cases of cyber-attack.
Iradhati Zahra   +2 more
doaj   +1 more source

Risk assessment method of security and stability control system considering the impact of cyber attacks

open access: yes电力工程技术, 2022
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng   +4 more
doaj   +1 more source

Simultaneous Cyber-Attack Detection and Radar Sensor Health Monitoring in Connected ACC Vehicles

open access: yesIEEE Sensors Journal, 2021
This paper focuses on the detection of cyber-attacks on a wireless communication channel and simultaneous radar sensor health monitoring for a connected vehicle.
Woongsun Jeon   +3 more
semanticscholar   +1 more source

A Cyber Security Approach Using Multilayer Cryptographic System

open access: yesProceedings of the International Conference on Applied Innovations in IT
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim   +4 more
doaj   +1 more source

Cyber-Attack Modeling Analysis Techniques: An Overview [PDF]

open access: yes, 2016
YesCyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data.
Al-Mohannadi, Hamad   +5 more
core   +1 more source

Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems

open access: yesIEEE Transactions on Automation Science and Engineering
Smart manufacturing (SM) systems utilize run-time data to improve productivity via intelligent decision-making and analysis mechanisms on both machine and system levels.
Efe C. Balta   +4 more
semanticscholar   +1 more source

An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [PDF]

open access: yesIEEE Access, 2020
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes.
Abdulrahman Al-Abassi   +3 more
semanticscholar   +1 more source

Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis

open access: yesICT Express, 2023
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Home - About - Disclaimer - Privacy