Results 201 to 210 of about 118,316 (239)
Some of the next articles are maybe not open access.
Staying ahead of cyber-attacks
Network Security, 2015As organisations become more dependent on technology as a business enabler, the security and reliability of their connectivity is growing in importance. Connected businesses are reliant on the Internet and networks to function, take advantage of opportunities and empower an increasingly mobile workforce.
openaire +1 more source
The challenge of cyber attack deterrence
Computer Law & Security Review, 2010Abstract National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them ...
openaire +1 more source
Cryptanalytical attacks on cyber-physical systems
2016 5th Mediterranean Conference on Embedded Computing (MECO), 2016Abstract Cryptography finds its application in various objects used in our everyday life. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. However, many such objects are vulnerable to certain cryptanalytic attacks. In this review
openaire +1 more source
Cyber Security and Frameworks: A Study of Cyber Attacks and Methods of Prevention of Cyber Attacks
2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 2023Sourabh Purkait, Madhavi Damle
openaire +1 more source
Cyber Attack! Is a Counter Attack Warranted?
Information Security Journal: A Global Perspective, 2011Organizations are under constant attack by developers and users of worms, botnets, and malware. These attacks are designed to do bring down an organization's systems with denial of service attacks, install rootkits, steal intellectual or financial data, ruin an organization's reputation, and so forth.
openaire +1 more source
Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems
IEEE Transactions on Smart Grid, 2022Qi Li, Jinan Zhang, Junbo Zhao
exaly
Cyber attack estimation and detection for cyber-physical power systems
Applied Mathematics and Computation, 2021WenTing Wang, Jian Li
exaly

