Results 71 to 80 of about 30,706 (186)

Counterplanning Deceptions to Foil Cyber-Attack Plans [PDF]

open access: yes, 2003
Proceedings of the 2003 IEEE Workshop in Information Assurance, West Point, NY, June 2003Tactics involving deception are important in military strategies. We have been exploring deliberate deception in defensive tactics by information systems under cyber-
Rowe, Neil C.
core  

Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems

open access: yesIEEE Open Access Journal of Power and Energy
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj   +1 more source

Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]

open access: yes, 2017
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core   +1 more source

Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles

open access: yesDigital Communications and Networks
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage ...
Changyin Dong   +7 more
doaj   +1 more source

Investigating the tension between cloud-related actors and individual privacy rights [PDF]

open access: yes, 2019
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob   +2 more
core  

Cyber Attack Challenges and Resilience for Smart Grids [PDF]

open access: yes, 2015
Date of Acceptance: 31/08/2015Peer ...
Alzubi, Jafar   +2 more
core  

Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge

open access: yesApplied Sciences
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced ...
Shenjian Qiu   +4 more
doaj   +1 more source

Healthcare’s Biggest Cyber Attacks

open access: yesITNOW, 2023
Abstract Frank Plummer MBCS, cyber security consultant, explores the CIA triad – confidentiality, integrity and availability – and its impact on three recent cyber attacks in healthcare.
openaire   +1 more source

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study. [PDF]

open access: yesSensors (Basel), 2023
Zarzycki K   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy