Results 201 to 210 of about 118,316 (239)
Some of the next articles are maybe not open access.

Staying ahead of cyber-attacks

Network Security, 2015
As organisations become more dependent on technology as a business enabler, the security and reliability of their connectivity is growing in importance. Connected businesses are reliant on the Internet and networks to function, take advantage of opportunities and empower an increasingly mobile workforce.
openaire   +1 more source

The challenge of cyber attack deterrence

Computer Law & Security Review, 2010
Abstract National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them ...
openaire   +1 more source

Cryptanalytical attacks on cyber-physical systems

2016 5th Mediterranean Conference on Embedded Computing (MECO), 2016
Abstract Cryptography finds its application in various objects used in our everyday life. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. However, many such objects are vulnerable to certain cryptanalytic attacks. In this review
openaire   +1 more source

Cyber Security and Frameworks: A Study of Cyber Attacks and Methods of Prevention of Cyber Attacks

2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 2023
Sourabh Purkait, Madhavi Damle
openaire   +1 more source

Cyber Attack! Is a Counter Attack Warranted?

Information Security Journal: A Global Perspective, 2011
Organizations are under constant attack by developers and users of worms, botnets, and malware. These attacks are designed to do bring down an organization's systems with denial of service attacks, install rootkits, steal intellectual or financial data, ruin an organization's reputation, and so forth.
openaire   +1 more source

Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems

IEEE Transactions on Smart Grid, 2022
Qi Li, Jinan Zhang, Junbo Zhao
exaly  

Cyber Attacks

Computers & Security, 2012
openaire   +1 more source

Profiles of Cyber-Attackers and Attacks

2021
Dimitrios Kavallieros   +2 more
openaire   +1 more source

Cyber attack estimation and detection for cyber-physical power systems

Applied Mathematics and Computation, 2021
WenTing Wang, Jian Li
exaly  

Home - About - Disclaimer - Privacy