Results 11 to 20 of about 52,803 (214)
At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out ...
Yuchong Li, Qinghui Liu
doaj +1 more source
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
This paper is concerned with the issue of the diagnostics of process faults and the detection of cyber-attacks in industrial control systems. This problem is of significant importance to energy production and distribution, which, being part of critical ...
Michał Syfert +5 more
doaj +1 more source
Attributing Cyber Attacks [PDF]
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence.
Rid, Thomas, Buchanan, Benjamin
openaire +2 more sources
Early-Stage Detection of Cyber Attacks
Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the attacks.
Martina Pivarníková +2 more
doaj +1 more source
Smart grids (SGs), a cornerstone of modern power systems, facilitate efficient management and distribution of electricity. Despite their advantages, increased connectivity and reliance on communication networks expand their susceptibility to cyber ...
Hadir Teryak +4 more
doaj +1 more source
Complex cyber–physical networks combine the prominent features of complex networks and cyber–physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal operation. Many vital
Ying Wan, Jinde Cao
doaj +1 more source
Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari +17 more
core +9 more sources
A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks.
Omar A. Beg +3 more
doaj +1 more source
Cyber-Security of Smart Microgrids: A Survey
In this paper, the cyber-security of smart microgrids is thoroughly discussed. In smart grids, the cyber system and physical process are tightly coupled.
Farzam Nejabatkhah +3 more
doaj +1 more source
The effect of cyber-attacks on stock returns [PDF]
A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms.
Arcuri, Maria Cristina +2 more
core +1 more source

