Results 31 to 40 of about 162,443 (304)
Watermarking for Social Networks Images With Improved Robustness Through Polar Codes
Protecting ownership of digital content is challenging in today’s online world, especially when sharing content through social networks and instant messengers.
Oleg Evsutin +2 more
doaj +1 more source
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
Analysis of Information-Physical Coordinated Attack Paths Based on Vulnerability of Critical Nodes in Cyber-Physical Power System [PDF]
[Objective] Traditional power systems have evolved into more efficient and controllable cyber-physical systems (CPS) with the integration of advanced digital information technology and power physical systems. However,this also increases the risk of cyber-
LIU Wei, LI Ke, WEI Xingshen, WANG Qi
doaj +1 more source
Game based cyber security training: are serious games suitable for cyber security training? [PDF]
Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance.
Al-Sherbaz, Ali +2 more
core +2 more sources
Security in Cyber-Physical Systems [PDF]
In this manuscript, we explore the network and cyber security challenges furthermore, issues of cyber or digital physical frameworks. (1) We epitomize the general work process of cyber or digital physical frameworks, (2) identify the conceivable vulnerabilities, assault issues, foes qualities and an arrangement of difficulties that are required to be ...
Joanita Dsouza +3 more
openaire +1 more source
MOBIUS: Model-Oblivious Binarized Neural Networks
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ...
Hiromasa Kitai +9 more
doaj +1 more source
Optimization Models in Cyber-Physical Power Systems: A Review
The growing interconnection between information networks and power grids enables a more efficient and economical operation, but also introduces significant challenges in modern cyber-physical power systems, such as malicious cyber-attacks.
Shahab Karamdel +3 more
doaj +1 more source
An n-sided polygonal model to calculate the impact of cyber security events
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens +6 more
core +1 more source
A Threat-Vulnerability Based Risk Analysis Model for Cyber Physical System Security [PDF]
The ability to network machinery and devices that are otherwise isolated is highly attractive to industry. This has led to growth in the use of cyber-physical systems (CPSs) with existing infrastructure.
Ledwaba, Lehlogonolo, Venter, H.S.
core +2 more sources
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source

