Results 1 to 10 of about 62,111 (186)

Controller Cyber-Attack Detection and Isolation [PDF]

open access: yesSensors, 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively
Anna Sztyber-Betley   +3 more
doaj   +4 more sources

Algorithm Selection Framework for Cyber Attack Detection [PDF]

open access: yesProceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +3 more sources

A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection

open access: yesInformation, 2023
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce ...
Yang Lyu, Yaokai Feng, Kouichi Sakurai
doaj   +3 more sources

On specification-based cyber-attack detection in smart grids

open access: yesEnergy Informatics, 2022
The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures.
Ömer Sen   +7 more
doaj   +4 more sources

Cyber-attack Detection Strategy Based on Distribution System State Estimation

open access: yesJournal of Modern Power Systems and Clean Energy, 2020
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE).
Huan Long   +5 more
doaj   +3 more sources

Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be ...
Romuald Hoffmann
doaj   +1 more source

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +2 more sources

Early-Stage Detection of Cyber Attacks [PDF]

open access: yesInformation, 2020
Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the attacks.
Martina Pivarníková   +2 more
openaire   +2 more sources

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy