Results 11 to 20 of about 121,838 (272)

Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation

open access: yesIEEE Access, 2020
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang   +6 more
doaj   +1 more source

A Hybrid Cyber Attack Model for Cyber-Physical Power Systems

open access: yesIEEE Access, 2020
Over the past decade, the cyber security of power systems has been widely studied. Most previous studies have focused on cyber physical attacks, and barely considered one typical cyber attack: availability attack.
Haicheng Tu   +3 more
doaj   +1 more source

Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use

open access: yesSensors, 2020
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and ...
Agnieszka A. Tubis   +4 more
doaj   +1 more source

DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments

open access: yesEnergy Reports, 2023
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan   +5 more
doaj   +1 more source

Attributing Cyber Attacks [PDF]

open access: yesJournal of Strategic Studies, 2014
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence.
Rid, Thomas, Buchanan, Benjamin
openaire   +2 more sources

Cyber-attacks and the right of self-defense: a case study of the Netherlands

open access: yesPolicy Design and Practice, 2023
Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-
Ferry Oorsprong   +2 more
doaj   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]

open access: yes, 2018
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul   +4 more
core   +3 more sources

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

open access: yesIEEE Access, 2022
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen   +4 more
doaj   +1 more source

Counteractive control against cyber-attack uncertainties on frequency regulation in the power system

open access: yesIET Cyber-Physical Systems, 2020
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj   +1 more source

Home - About - Disclaimer - Privacy