Results 1 to 10 of about 121,838 (272)

Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression [PDF]

open access: yesSensors, 2023
Cyber threats to industrial control systems (ICSs) have increased as information and communications technology (ICT) has been incorporated. In response to these cyber threats, we are implementing a range of security equipment and specialized training ...
Ju Hyeon Lee   +3 more
doaj   +2 more sources

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants [PDF]

open access: yesNuclear Engineering and Technology, 2019
With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious ...
Jong Woo Park, Seung Jun Lee
doaj   +3 more sources

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +3 more sources

Cyber-attack research for integrated energy systems by the correlated matrix based object-oriented modeling method

open access: yesFrontiers in Energy Research, 2022
The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their
Heqin Tong   +11 more
doaj   +1 more source

Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be ...
Romuald Hoffmann
doaj   +1 more source

Cyber attack taxonomy for digital environment in nuclear power plants

open access: yesNuclear Engineering and Technology, 2020
With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead ...
Seungmin Kim   +4 more
doaj   +1 more source

A multi-stage coordinated cyber-physical topology attack method based on deep reinforcement learning

open access: yes电力工程技术, 2023
With the development of smart grid and the continuous introduction of communication equipments into cyber physical system (CPS), CPS is confronted with a new attack mode with more destructive—coordinated cyber physical attack (CCPA).
YI Na, XU Jianjun, CHEN Yue, SUN Dikang
doaj   +1 more source

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Cyber-attack-tolerant Frequency Control of Power Systems

open access: yesJournal of Modern Power Systems and Clean Energy, 2021
Cyber attacks are emerging threats in the Internet of Things applications, and power systems are typical cyber attack targets. As one of the most essential operation functions, frequency control is threatened by cyber intrusions, and the existing ...
Chunyu Chen   +3 more
doaj   +1 more source

Cyber-Attacks, Cryptocurrencies and Cyber Security

open access: yes, 2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy