Results 21 to 30 of about 60,976 (288)

Stuxnet: What Has Changed?

open access: yesFuture Internet, 2012
This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends.
Dorothy E. Denning
doaj   +1 more source

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Resilience Assessment of the State Estimation Software under Cyber Attacks

open access: yesE3S Web of Conferences, 2018
Taking into account Smart Grid creation, cyber security appears as critical problem. In spite of wide set of technical tools and organisational decisions, which use for protection of electrical objects against cyber attacks, it is impossible to prevent ...
Voropai Nikolai   +2 more
doaj   +1 more source

Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review

open access: yesEnergies, 2021
In this paper, a brief survey of measurable factors affecting the adoption of cybersecurity enhancement methods in the smart grid is provided. From a practical point of view, it is a key point to determine to what degree the cyber resilience of power ...
Fazel Mohammadi
doaj   +1 more source

The effect of cyber-attacks on stock returns [PDF]

open access: yes, 2018
A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms.
Arcuri, Maria Cristina   +2 more
core   +1 more source

Modeling and Simulation of Cyber Battlefield [PDF]

open access: yesJournal of Information Technology Management, 2017
In order to protect cyberspace against cyber-attacks we need cyber situation awareness framework for the implementation of our cyber maneuvers. This article allows execution cyber maneuvers with dynamic cyber battlefield simulator.
AliJabar Rashidi, Mohammad Shakibazad
doaj   +1 more source

Cyber Attacks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire   +1 more source

Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis

open access: yesEnergies, 2018
The subject of cyber-security and therefore cyber-attacks on smart grid (SG) has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (
Denise Tellbach, Yan-Fu Li
doaj   +1 more source

Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]

open access: yes, 2014
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Home - About - Disclaimer - Privacy