Results 61 to 70 of about 30,706 (186)

Cyber Attacks

open access: yes, 2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire   +2 more sources

Cyber-Attacks, Cryptocurrencies and Cyber Security

open access: yes, 2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +5 more sources

Simulating a Cyber-Attack on the Mass Thruster Controllers at Low-Speed Motion

open access: yesPromet (Zagreb)
The aim of this paper is to highlight the vulnerability of Maritime Autonomous Surface Ships (MASS) to cyber-attack and to illustrate, through a simulation experiment on a testbed, how to mitigate a cyber-attack on the MASS thruster controllers during ...
Igor ASTROV, Sanja BAUK
doaj   +1 more source

Pattern Analysis of Topological Attacks in Cyber-Physical Power Systems Considering Cascading Outages

open access: yesIEEE Access, 2020
Modern cyber-physical power systems are vulnerable to cyber attacks. Given that cyber and physical networks are coupled tightly, attacks in the cyber layer can penetrate the physical layer, causing the outage of transmission lines and other physical ...
Zhimei Zhang   +3 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde   +4 more
openaire   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A Review

open access: yesIEEE Open Journal of Power Electronics
This paper presents a systematic overview of the resilience framework for power electronics converter-based cyber-physical systems (CPSs), emphasizing end-to-end responses to the emerging challenges posed by cyber-physical attacks.
Chang Liu   +5 more
doaj   +1 more source

Malicious Cyber Attacks

open access: yesJournal of Danubian Studies and Research, 2022
Information plays a vital role in the development of human society, an element that cannot be neglected in interpersonal relationships. The use of information technologies in all fields has proven its effectiveness through the speed and efficiency with which activities are carried out.
Luca Iamandi   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy