Results 81 to 90 of about 30,706 (186)
To date, the detection of cyberattacks is a very important task. Network monitoring is used for this purpose. Moreover, there is a need for rapid analytical processing of information, which requires the use of methods of data mining. Data mining helps to extract knowledge from acquired data.
openaire +1 more source
Automatic Verification and Execution of Cyber Attack on IoT Devices. [PDF]
Færøy FL, Yamin MM, Shukla A, Katt B.
europepmc +1 more source
Cyber attack evaluation dataset for deep packet inspection and analysis. [PDF]
Shandilya SK +3 more
europepmc +1 more source
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source
Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa +4 more
doaj +1 more source
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. [PDF]
Le TD +6 more
europepmc +1 more source
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms. [PDF]
Alsaade FW, Al-Adhaileh MH.
europepmc +1 more source
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. [PDF]
Zhou B +5 more
europepmc +1 more source
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks. [PDF]
Baek Y, Shin S.
europepmc +1 more source
Real‐Time Cyberattack Detection for SCADA in Power System
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi +2 more
doaj +1 more source

