Results 41 to 50 of about 1,279,940 (244)

Military objectives in cyber warfare [PDF]

open access: yes, 2017
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers   +21 more
core   +1 more source

Resilient Synchronization Strategy for AC Microgrids Under Cyber Attacks

open access: yesIEEE transactions on power electronics, 2021
Although distributed control in microgrids is well known for reliability and scalability, the absence of a global monitoring entity makes it highly vulnerable to cyber attacks.
Subham S. Sahoo   +2 more
semanticscholar   +1 more source

Monitoring and Defense of Industrial Cyber-Physical Systems Under Typical Attacks: From a Systems and Control Perspective

open access: yesIEEE Transactions on Industrial Cyber-Physical Systems, 2023
In the new industrial environment, the safe and reliable operation of Industrial Cyber-Physical Systems (ICPSs) is being threatened by new types of attacks: Attackers carefully tamper with the measurement and control data transmitted over the network ...
Yuchen Jiang   +5 more
semanticscholar   +1 more source

Cyber attacks in smart grid – dynamic impacts, analyses and recommendations

open access: yesIET Cyber-Physical Systems, 2020
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin   +7 more
doaj   +1 more source

Securing Modern Power Systems: Implementing Comprehensive Strategies to Enhance Resilience and Reliability Against Cyber-Attacks

open access: yesResults in Engineering
. By thoroughly analyzing the various cyber-attacks and effective defence strategies, it is evident that cybersecurity plays a crucial role in maintaining a continuous power supply and reducing the impact of potential contin-gencies.
S. Abdelkader   +8 more
semanticscholar   +1 more source

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

open access: yesSensors, 2023
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs   +7 more
doaj   +1 more source

Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation

open access: yes, 2010
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M.   +2 more
core   +1 more source

Quantification of the Impact of Cyber Attack in Critical Infrastructures [PDF]

open access: yes, 2014
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of complex industrial systems. We describe our approach to building a hybrid model consisting of both the system under study and an Adversary, and we demonstrate ...
Netkachov, A., Popov, P. T., Salako, K.
core   +1 more source

Deception in Cyber Attacks

open access: yes, 2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

Controller Cyber-Attack Detection and Isolation

open access: yesSensors, 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Anna Sztyber-Betley   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy