Results 81 to 90 of about 1,279,940 (244)

Distributed Hierarchical Controller Resilience Analysis in Islanded Microgrid Under Cyber-Attacks

open access: yesInternational Transactions on Electrical Energy Systems
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links.
Abdollah Mirzabeigi   +2 more
doaj   +1 more source

Contemporary Trends in Economic Cybersecurity

open access: yesМир новой экономики, 2019
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj   +1 more source

OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

open access: yes, 2015
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the
Noubir, Guevara, Sanatinia, Amirali
core   +1 more source

Cyber Attacks and Combat Behavior [PDF]

open access: yesOvidius University Annals: Economic Sciences Series, 2017
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina   +2 more
doaj  

The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors [PDF]

open access: yes, 2013
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use
DeLuca, Christopher D.
core   +1 more source

Resort to Self-Defense Against Cyber Attacks by Non-State Actors in International Law10.22133/mtlj.2025.424362.1265 [PDF]

open access: yesحقوق فناوریهای نوین
In the discussion of resorting to Self defenseSelf-defense against cyber attackscyber-attacks by non-State actors, at first it must be determined that for what type of cyber attackcyber-attack the right to Self defenseSelf-defense is allowed.
parviz farshasaid, Mahmoud Jalali
doaj   +1 more source

Defending Against Firmware Cyber Attacks on Safety-Critical Systems [PDF]

open access: yes, 2017
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to ‘rip and replace’ obsolete components.
Barker, Tom   +5 more
core  

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde   +4 more
openaire   +1 more source

RTAP: A Real-Time Model for Attack Detection and Prediction in Smart Grid Systems

open access: yesIEEE Access
One main challenge of smart grid systems is the cascading failures caused by cyber-attacks, which can affect the power and communication networks. Many testbeds have been proposed to model the impact of cyber-attacks on these two networks; however, many ...
Ali Salehpour, Irfan Al-Anbagi
doaj   +1 more source

Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

open access: yes, 2017
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core   +1 more source

Home - About - Disclaimer - Privacy