Results 101 to 110 of about 1,279,940 (244)

Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology

open access: yesIEEE Access
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa   +4 more
doaj   +1 more source

Cyber Attacks on Commercial Drones: A Review

open access: yesIEEE Access
s, also known as drones, are increasingly used in several applications and a variety of cyber attacks can be performed on them using several tools. Some examples of these attacks include breaking the connection between the drone and the controller with ...
Bruno Branco   +2 more
doaj   +1 more source

Real-Time Co-Simulation for the Analysis of Cyber Attacks Impact on Distance Relay Backup Protection

open access: yesEAI Endorsed Transactions on Energy Web
Smart Grid is a cyber-physical system that incorporates Information and Communication Technologies (ICT) into the physical power system, which introduces vulnerabilities to the grid and opens the door to cyber attacks.
Nadia Boumkheld   +2 more
doaj   +1 more source

Cybersecurity: mapping the ethical terrain [PDF]

open access: yes
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau   +5 more
core  

Cyber attack monitoring

open access: yes, 2021
To date, the detection of cyberattacks is a very important task. Network monitoring is used for this purpose. Moreover, there is a need for rapid analytical processing of information, which requires the use of methods of data mining. Data mining helps to extract knowledge from acquired data.
openaire   +1 more source

Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

open access: yesObrana a Strategie, 2012
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no ...
Cezar Vasilescu
doaj  

A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems

open access: yesIEEE Access
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration in various fields because of their emergent applications. Though the robust dependence on communication networks creates cyber-physical systems susceptible to ...
Shivani Gaba   +8 more
doaj   +1 more source

Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains

open access: yesInformation
The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents.
Maria Valentina Clavijo Mesa   +2 more
doaj   +1 more source

Analisis Dan Mitigasi Celah Keamanan Website SIMPKN Informatika Menggunakan Metode Owasp Zed Attack Proxy (ZAP) [PDF]

open access: yes
In today's technological developments, there are a variety of conveniences in processing information data that make it easier for every individual to build a website.
Perdhana, Helmi Indra
core  

Home - About - Disclaimer - Privacy