Results 31 to 40 of about 52,803 (214)
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M. +2 more
core +1 more source
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin +7 more
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs +7 more
doaj +1 more source
Quantification of the Impact of Cyber Attack in Critical Infrastructures [PDF]
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of complex industrial systems. We describe our approach to building a hybrid model consisting of both the system under study and an Adversary, and we demonstrate ...
Netkachov, A., Popov, P. T., Salako, K.
core +1 more source
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Controller Cyber-Attack Detection and Isolation
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Anna Sztyber-Betley +3 more
openaire +3 more sources
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye +16 more
wiley +1 more source

