Results 41 to 50 of about 62,210 (284)

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link

open access: yesFrontiers in Energy Research, 2021
Existing coordinated cyber-attack detection methods have low detection accuracy and efficiency and poor generalization ability due to difficulties dealing with unbalanced attack data samples, high data dimensionality, and noisy data sets.
Lei Wang   +11 more
doaj   +1 more source

Support Vector Machine for Network Intrusion and Cyber-Attack Detection [PDF]

open access: yes, 2017
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-security threats are a growing concern in networked environments.
Aparicio-Navarro, Francisco J.   +4 more
core   +2 more sources

Cyber Attack Detection Dataset: A Review

open access: yesJournal of Physics: Conference Series, 2022
Abstract As cyber attack become more complicated, it becomes more difficult to identify breaches successfully. The inability to identify intrusions might jeopardize security services’ confidence, compromising data confidentiality, integrity, and availability. Cyber attacks like, Ping of Death, Botnets, also IP spoofing, as well as Social
Nur Nadiah Mohd Yusof   +1 more
openaire   +1 more source

Performance evaluation of cyber-physical intrusion detection on a robotic vehicle [PDF]

open access: yes, 2015
Intrusion detection systems designed for con- ventional computer systems and networks are not necessarily suitable for mobile cyber-physical systems, such as robots, drones and automobiles.
Gan, Diane   +2 more
core   +2 more sources

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

open access: yes, 2018
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming   +5 more
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Analysis of intrusion detection systems

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2019
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusions,
NAZYM KENZHEGALIYEVNA ZHUMANGALIYEVA   +3 more
doaj   +1 more source

CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures

open access: yesJournal of Cybersecurity and Privacy, 2021
Water CIs are exposed to a wide number of IT challenges that go from the cooperation and alignment between physical and cyber security teams to the proliferation of new vulnerabilities and complex cyber-attacks with potential disastrous consequences ...
Gustavo Gonzalez-Granadillo   +3 more
doaj   +1 more source

Counteractive control against cyber-attack uncertainties on frequency regulation in the power system

open access: yesIET Cyber-Physical Systems, 2020
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj   +1 more source

Home - About - Disclaimer - Privacy