Results 21 to 30 of about 61,083 (243)
Cyber attacks can disrupt the digital protection relays and change their output command to the circuit breaker. The aim of this research is to provide new condition monitoring for overcurrent relays during cyber treatments. This research is modeled three
Mohammad Yousefi kia +2 more
doaj +1 more source
Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu +3 more
doaj +1 more source
Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj +1 more source
Early-Stage Detection of Cyber Attacks [PDF]
Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the attacks.
Martina Pivarníková +2 more
openaire +2 more sources
Cyber Physical Defense Framework for Distributed Smart Grid Applications
Cyber-Physical Systems (CPS) is the amalgamation of highly sophisticated sensors with physical spaces. These close conjunctions of sensors with communication infrastructure intrinsically linking to society’s Critical Infrastructures (C.I.) are being ...
Ayush Sinha +3 more
doaj +1 more source
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash +3 more
core +2 more sources
A holistic and proactive approach to forecasting cyber threats
Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures.
Zaid Almahmoud +4 more
doaj +1 more source
State estimation and attack detection of food picking robot oriented to cyber-physical system
Objective: In order to deal with the impact of cyber attack on the cyber-physical system of food picking robot. Methods: A method for states estimation and attacks detection of food picking robot system based on interval observer was proposed.
DONG Xu
doaj +1 more source
Cyber Attack Detection Dataset: A Review
Abstract As cyber attack become more complicated, it becomes more difficult to identify breaches successfully. The inability to identify intrusions might jeopardize security services’ confidence, compromising data confidentiality, integrity, and availability. Cyber attacks like, Ping of Death, Botnets, also IP spoofing, as well as Social
Nur Nadiah Mohd Yusof +1 more
openaire +1 more source
Machine Learning-Based Cyber-Attack Detection in Photovoltaic Farms
In this article, a machine learning technique is proposed for the detection of cyber-attacks in Photovoltaic (PV) farms using point of common coupling (PCC) sensors alone.
Jinan Zhang +8 more
doaj +1 more source

