Results 41 to 50 of about 1,279,940 (244)
Military objectives in cyber warfare [PDF]
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers +21 more
core +1 more source
Resilient Synchronization Strategy for AC Microgrids Under Cyber Attacks
Although distributed control in microgrids is well known for reliability and scalability, the absence of a global monitoring entity makes it highly vulnerable to cyber attacks.
Subham S. Sahoo +2 more
semanticscholar +1 more source
In the new industrial environment, the safe and reliable operation of Industrial Cyber-Physical Systems (ICPSs) is being threatened by new types of attacks: Attackers carefully tamper with the measurement and control data transmitted over the network ...
Yuchen Jiang +5 more
semanticscholar +1 more source
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin +7 more
doaj +1 more source
. By thoroughly analyzing the various cyber-attacks and effective defence strategies, it is evident that cybersecurity plays a crucial role in maintaining a continuous power supply and reducing the impact of potential contin-gencies.
S. Abdelkader +8 more
semanticscholar +1 more source
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs +7 more
doaj +1 more source
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M. +2 more
core +1 more source
Quantification of the Impact of Cyber Attack in Critical Infrastructures [PDF]
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of complex industrial systems. We describe our approach to building a hybrid model consisting of both the system under study and an Adversary, and we demonstrate ...
Netkachov, A., Popov, P. T., Salako, K.
core +1 more source
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Controller Cyber-Attack Detection and Isolation
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Anna Sztyber-Betley +3 more
openaire +3 more sources

