Results 11 to 20 of about 8,269 (263)
A Hybrid Cyber Attack Model for Cyber-Physical Power Systems
Over the past decade, the cyber security of power systems has been widely studied. Most previous studies have focused on cyber physical attacks, and barely considered one typical cyber attack: availability attack.
Haicheng Tu +3 more
doaj +1 more source
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and ...
Agnieszka A. Tubis +4 more
doaj +1 more source
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan +5 more
doaj +1 more source
Cyber-attacks and the right of self-defense: a case study of the Netherlands
Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-
Ferry Oorsprong +2 more
doaj +1 more source
Attributing Cyber Attacks [PDF]
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence.
Rid, Thomas, Buchanan, Benjamin
openaire +2 more sources
Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis +5 more
doaj +1 more source
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen +4 more
doaj +1 more source
Counteractive control against cyber-attack uncertainties on frequency regulation in the power system
In this study, an observer based control strategy is proposed for load frequency control (LFC) scheme against cyber-attack uncertainties. Most of research work focused on detection scheme or delay estimation scheme in presence of cyber-attack ...
Sheetla Prasad
doaj +1 more source
Cyber-attack Detection Strategy Based on Distribution System State Estimation
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE).
Huan Long +5 more
doaj +1 more source
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great ...
Xin-Rui Liu, Yuan Meng, Peng Chang
doaj +1 more source

