Results 31 to 40 of about 60,976 (288)
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin +7 more
doaj +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
Applying the Full Protection and Security Standard of International Investment Law to Digital Assets [PDF]
This article considers the possibility that digital assets of foreign investors such as websites and computer systems could be protected by the full protection and security (‘FPS’) standard common to many bilateral investment treaties.
Collins, D. A.
core +1 more source
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs +7 more
doaj +1 more source
Quantification of the Impact of Cyber Attack in Critical Infrastructures [PDF]
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of complex industrial systems. We describe our approach to building a hybrid model consisting of both the system under study and an Adversary, and we demonstrate ...
Netkachov, A., Popov, P. T., Salako, K.
core +1 more source
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Controller Cyber-Attack Detection and Isolation
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Anna Sztyber-Betley +3 more
openaire +3 more sources
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis +5 more
doaj +1 more source
Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia +13 more
wiley +1 more source

