Results 31 to 40 of about 52,803 (214)

Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation

open access: yes, 2010
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M.   +2 more
core   +1 more source

Cyber attacks in smart grid – dynamic impacts, analyses and recommendations

open access: yesIET Cyber-Physical Systems, 2020
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin   +7 more
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

open access: yesSensors, 2023
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs   +7 more
doaj   +1 more source

Quantification of the Impact of Cyber Attack in Critical Infrastructures [PDF]

open access: yes, 2014
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of complex industrial systems. We describe our approach to building a hybrid model consisting of both the system under study and an Adversary, and we demonstrate ...
Netkachov, A., Popov, P. T., Salako, K.
core   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Deception in Cyber Attacks

open access: yes, 2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

Controller Cyber-Attack Detection and Isolation

open access: yesSensors, 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Anna Sztyber-Betley   +3 more
openaire   +3 more sources

Unilateral Ankle‐Foot Exoneuromusculoskeleton with Balance‐Sensing Feedback for Self‐Help Telerehabilitation after Stroke

open access: yesAdvanced Robotics Research, EarlyView.
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye   +16 more
wiley   +1 more source

Home - About - Disclaimer - Privacy