Results 71 to 80 of about 1,279,940 (244)
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj +1 more source
Power System Security With Cyber-Physical Power System Operation
Cyber-attacks on a cyber-physical power system could lead to significant data failure, false data injection and cascading failure of physical power system components.
Peju Adesina Oyewole, Dilan Jayaweera
doaj +1 more source
Utilising Flow Aggregation to Classify Benign Imitating Attacks
Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable ...
Hanan Hindy +5 more
doaj +1 more source
Power System Stability Analysis From Cyber Attacks Perspective
Power grid digitalization introduces new vulnerabilities and cyber security threats. The impact of cyber attacks on power system stability is a topic of growing concern, which is yet to be comprehensively analyzed.
Ioannis Semertzis +5 more
doaj +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
Studying Ransomware Attacks Using Web Search Logs
Cyber attacks are increasingly becoming prevalent and causing significant damage to individuals, businesses and even countries. In particular, ransomware attacks have grown significantly over the last decade.
Bansal, Chetan +3 more
core +1 more source
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper) [PDF]
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and
Brosset D. +5 more
core +3 more sources
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
Wireless ICS Training Platform [PDF]
Indiana University - Purdue University IndianapolisEssential public services, such as Electric, Water and Gas Utilities, are becoming increasingly reliant on network connected devices to control their processes. Wireless control systems are becoming more
Cassandra Boman, Nick Pohlman
core
Cyber-Attacks, Cryptocurrencies and Cyber Security
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM +3 more
openaire +5 more sources

