Results 81 to 90 of about 1,279,940 (244)
Distributed Hierarchical Controller Resilience Analysis in Islanded Microgrid Under Cyber-Attacks
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links.
Abdollah Mirzabeigi +2 more
doaj +1 more source
Contemporary Trends in Economic Cybersecurity
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj +1 more source
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the
Noubir, Guevara, Sanatinia, Amirali
core +1 more source
Cyber Attacks and Combat Behavior [PDF]
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina +2 more
doaj
The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors [PDF]
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use
DeLuca, Christopher D.
core +1 more source
Resort to Self-Defense Against Cyber Attacks by Non-State Actors in International Law10.22133/mtlj.2025.424362.1265 [PDF]
In the discussion of resorting to Self defenseSelf-defense against cyber attackscyber-attacks by non-State actors, at first it must be determined that for what type of cyber attackcyber-attack the right to Self defenseSelf-defense is allowed.
parviz farshasaid, Mahmoud Jalali
doaj +1 more source
Defending Against Firmware Cyber Attacks on Safety-Critical Systems [PDF]
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to ‘rip and replace’ obsolete components.
Barker, Tom +5 more
core
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde +4 more
openaire +1 more source
RTAP: A Real-Time Model for Attack Detection and Prediction in Smart Grid Systems
One main challenge of smart grid systems is the cascading failures caused by cyber-attacks, which can affect the power and communication networks. Many testbeds have been proposed to model the impact of cyber-attacks on these two networks; however, many ...
Ali Salehpour, Irfan Al-Anbagi
doaj +1 more source
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core +1 more source

