Results 81 to 90 of about 30,706 (186)

Cyber attack monitoring

open access: yes, 2021
To date, the detection of cyberattacks is a very important task. Network monitoring is used for this purpose. Moreover, there is a need for rapid analytical processing of information, which requires the use of methods of data mining. Data mining helps to extract knowledge from acquired data.
openaire   +1 more source

Automatic Verification and Execution of Cyber Attack on IoT Devices. [PDF]

open access: yesSensors (Basel), 2023
Færøy FL, Yamin MM, Shukla A, Katt B.
europepmc   +1 more source

Cyber attack evaluation dataset for deep packet inspection and analysis. [PDF]

open access: yesData Brief, 2023
Shandilya SK   +3 more
europepmc   +1 more source

Cyber threat intelligence for smart grids using knowledge graphs, digital twins, and hybrid machine learning in SCADA networks

open access: yesInternational Journal of Engineering Business Management
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim   +3 more
doaj   +1 more source

Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology

open access: yesIEEE Access
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa   +4 more
doaj   +1 more source

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. [PDF]

open access: yesSensors (Basel), 2022
Le TD   +6 more
europepmc   +1 more source

Real‐Time Cyberattack Detection for SCADA in Power System

open access: yesIET Energy Systems Integration
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy