Results 21 to 30 of about 1,279,940 (244)

Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects

open access: yesElectronics, 2022
Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of exchanging data with other devices using the cloud or wireless networks.
Usman Inayat   +4 more
semanticscholar   +1 more source

Attributing Cyber Attacks [PDF]

open access: yesJournal of Strategic Studies, 2014
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence.
Rid, Thomas, Buchanan, Benjamin
openaire   +2 more sources

Early-Stage Detection of Cyber Attacks

open access: yesInformation, 2020
Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the attacks.
Martina Pivarníková   +2 more
doaj   +1 more source

Double-Edged Defense: Thwarting Cyber Attacks and Adversarial Machine Learning in IEC 60870-5-104 Smart Grids

open access: yesIEEE Open Journal of the Industrial Electronics Society, 2023
Smart grids (SGs), a cornerstone of modern power systems, facilitate efficient management and distribution of electricity. Despite their advantages, increased connectivity and reliance on communication networks expand their susceptibility to cyber ...
Hadir Teryak   +4 more
doaj   +1 more source

A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks

open access: yesSensors, 2023
Complex cyber–physical networks combine the prominent features of complex networks and cyber–physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal operation. Many vital
Ying Wan, Jinde Cao
doaj   +1 more source

The effect of cyber-attacks on stock returns [PDF]

open access: yes, 2018
A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms.
Arcuri, Maria Cristina   +2 more
core   +1 more source

A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids

open access: yesEnergies, 2023
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks.
Omar A. Beg   +3 more
doaj   +1 more source

The hidden threat of cyber-attacks – undermining public confidence in government

open access: yesJournal of Information Technology & Politics, 2022
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical destruction - but rather more insidious societal risks such as reduced trust in government.
Ryan Shandler, M. A. Gomez
semanticscholar   +1 more source

Cyber-Security of Smart Microgrids: A Survey

open access: yesEnergies, 2020
In this paper, the cyber-security of smart microgrids is thoroughly discussed. In smart grids, the cyber system and physical process are tightly coupled.
Farzam Nejabatkhah   +3 more
doaj   +1 more source

Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]

open access: yes, 2019
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari   +17 more
core   +9 more sources

Home - About - Disclaimer - Privacy