Results 11 to 20 of about 121,838 (272)
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang +6 more
doaj +1 more source
A Hybrid Cyber Attack Model for Cyber-Physical Power Systems
Over the past decade, the cyber security of power systems has been widely studied. Most previous studies have focused on cyber physical attacks, and barely considered one typical cyber attack: availability attack.
Haicheng Tu +3 more
doaj +1 more source
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and ...
Agnieszka A. Tubis +4 more
doaj +1 more source
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan +5 more
doaj +1 more source
Attributing Cyber Attacks [PDF]
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence.
Rid, Thomas, Buchanan, Benjamin
openaire +2 more sources
Cyber-attacks and the right of self-defense: a case study of the Netherlands
Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-
Ferry Oorsprong +2 more
doaj +1 more source
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis +5 more
doaj +1 more source
Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul +4 more
core +3 more sources
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen +4 more
doaj +1 more source
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj +1 more source

