Results 51 to 60 of about 30,706 (186)

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers

open access: yes, 2016
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not) been taken by their packets.
Schiff, Liron   +2 more
core   +1 more source

Cyber Physical Defense Framework for Distributed Smart Grid Applications

open access: yesFrontiers in Energy Research, 2021
Cyber-Physical Systems (CPS) is the amalgamation of highly sophisticated sensors with physical spaces. These close conjunctions of sensors with communication infrastructure intrinsically linking to society’s Critical Infrastructures (C.I.) are being ...
Ayush Sinha   +3 more
doaj   +1 more source

Hacking the market: Systemic contagion from cybersecurity breaches [PDF]

open access: yes, 2017
The average stock market reaction in the 10 days after a cyber attack has become increasingly negative, write Constantin Gurdgiev and Shaen ...
Vieira, Helena
core  

New Wave Cyber Attacks

open access: yesInternational Conference on Cyber Warfare and Security, 2022
There is increasing enthusiasm for, and recognition of, the benefits that artificial intelligence (AI) can provide to society.  The emphasis has been on the positive, but AI and deep learning can be used for negative purposes. Modular Neural Networks (MNN) are capable of independent learning and have been targeted at evolutionary, complex financial ...
Angela Mison, Gareth Davies, Peter Eden
openaire   +2 more sources

A novel approach for analyzing the nuclear supply chain cyber-attack surface

open access: yesNuclear Engineering and Technology, 2021
The nuclear supply chain attack surface is a large, complex network of interconnected stakeholders and activities. The global economy has widened and deepened the supply chain, resulting in larger numbers of geographically dispersed locations and ...
Shannon Eggers
doaj   +1 more source

On specification-based cyber-attack detection in smart grids

open access: yesEnergy Informatics, 2022
The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures.
Ömer Sen   +7 more
doaj   +1 more source

Research on FDIAs localization and traceability techniques for substation networks

open access: yesZhejiang dianli, 2022
With the wide application of ubiquitous sensing, real-time communication and precise control technologies in power grids, intelligent substations are enhancing their state sensing and business decision-making capabilities.
YE Wei   +5 more
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks

open access: yesIEEE Access, 2019
With the developing cyber physical power systems and emerging threat of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber infrastructure can be exploited to cause physical damage ...
Qi Wang, Mengya Li, Yi Tang, Ming Ni
doaj   +1 more source

Home - About - Disclaimer - Privacy