Counterplanning Deceptions to Foil Cyber-Attack Plans [PDF]
Proceedings of the 2003 IEEE Workshop in Information Assurance, West Point, NY, June 2003Tactics involving deception are important in military strategies. We have been exploring deliberate deception in defensive tactics by information systems under cyber-
Rowe, Neil C.
core
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj +1 more source
Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core +1 more source
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage ...
Changyin Dong +7 more
doaj +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core
Cyber Attack Challenges and Resilience for Smart Grids [PDF]
Date of Acceptance: 31/08/2015Peer ...
Alzubi, Jafar +2 more
core
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced ...
Shenjian Qiu +4 more
doaj +1 more source
A resilient workforce: patient safety and the workforce response to a cyber-attack on the ICT systems of the national health service in Ireland. [PDF]
Moore G +4 more
europepmc +2 more sources
Healthcare’s Biggest Cyber Attacks
Abstract Frank Plummer MBCS, cyber security consultant, explores the CIA triad – confidentiality, integrity and availability – and its impact on three recent cyber attacks in healthcare.
openaire +1 more source
Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study. [PDF]
Zarzycki K +7 more
europepmc +1 more source

