Results 41 to 50 of about 61,083 (243)

Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link

open access: yesFrontiers in Energy Research, 2021
Existing coordinated cyber-attack detection methods have low detection accuracy and efficiency and poor generalization ability due to difficulties dealing with unbalanced attack data samples, high data dimensionality, and noisy data sets.
Lei Wang   +11 more
doaj   +1 more source

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles [PDF]

open access: yes, 2015
Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks. This is a challenge because intrusion detection systems built for conventional computer systems tend to be ...
Bezemskij, Anatolij   +3 more
core   +2 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures

open access: yesJournal of Cybersecurity and Privacy, 2021
Water CIs are exposed to a wide number of IT challenges that go from the cooperation and alignment between physical and cyber security teams to the proliferation of new vulnerabilities and complex cyber-attacks with potential disastrous consequences ...
Gustavo Gonzalez-Granadillo   +3 more
doaj   +1 more source

Proposed Approach for Targeted Attacks Detection [PDF]

open access: yes, 2015
For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise
Ghafir Ibrahim, Přenosil Václav
core   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Analysis of intrusion detection systems

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2019
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions,
NAZYM KENZHEGALIYEVNA ZHUMANGALIYEVA   +3 more
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Counteractive control against cyber-attack uncertainties on frequency regulation in the power system

open access: yesIET Cyber-Physical Systems, 2020
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Home - About - Disclaimer - Privacy