Results 31 to 40 of about 60,976 (288)

Cyber attacks in smart grid – dynamic impacts, analyses and recommendations

open access: yesIET Cyber-Physical Systems, 2020
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin   +7 more
doaj   +1 more source

Malware in the Future? Forecasting of Analyst Detection of Cyber Events

open access: yes, 2018
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi   +51 more
core   +1 more source

Applying the Full Protection and Security Standard of International Investment Law to Digital Assets [PDF]

open access: yes, 2011
This article considers the possibility that digital assets of foreign investors such as websites and computer systems could be protected by the full protection and security (‘FPS’) standard common to many bilateral investment treaties.
Collins, D. A.
core   +1 more source

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

open access: yesSensors, 2023
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs   +7 more
doaj   +1 more source

Quantification of the Impact of Cyber Attack in Critical Infrastructures [PDF]

open access: yes, 2014
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of complex industrial systems. We describe our approach to building a hybrid model consisting of both the system under study and an Adversary, and we demonstrate ...
Netkachov, A., Popov, P. T., Salako, K.
core   +1 more source

Deception in Cyber Attacks

open access: yes, 2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

Controller Cyber-Attack Detection and Isolation

open access: yesSensors, 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Anna Sztyber-Betley   +3 more
openaire   +3 more sources

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy