Results 21 to 30 of about 118,316 (239)
Cyber-attack Detection Strategy Based on Distribution System State Estimation
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system. This paper proposes a cyber-attack detection strategy based on distribution system state estimation (DSSE).
Huan Long +5 more
doaj +1 more source
Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading
The study of cyber-attacks, and in particular the spread of attack on the power cyber-physical system, has recently attracted considerable attention. Identifying and evaluating the important nodes under the cyber-attack propagation scenario are of great ...
Xin-Rui Liu, Yuan Meng, Peng Chang
doaj +1 more source
Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq +2 more
core +1 more source
Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
Modern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration.
Woogeun Ahn +3 more
doaj +1 more source
Is the responsibilization of the cyber security risk reasonable and judicious? [PDF]
Cyber criminals appear to be plying their trade without much hindrance. Home computer users are particularly vulnerable to attack by an increasingly sophisticated and globally dispersed hacker group.
Cockshott, Paul +4 more
core +3 more sources
Research on active defense based on multi-stage cyber deception game
In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber ...
Yongjin HU +3 more
doaj +2 more sources
Smart grids are one of the most important structures based on cyber–physical devices. Therefore, these grids should be more reliable and efficient when increasing consumption.
Xiang Zhong, Guang xin Li, Chuyan Zhng
doaj +1 more source
Contagion in cyber security attacks [PDF]
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Adrian Baldwin +4 more
openaire +2 more sources
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
CYBER-ATTACK IN ESTONIA: A NEW CHALLENGE IN THE APPLICABILITY OF INTERNATIONAL HUMANITARIAN LAW
This article aimed to analyze the classification of armed conflict in Estonia's cyber-attack and how the existing IHL are answering this problem, and whether those regulations are enough for future cases of cyber-attack.
Iradhati Zahra +2 more
doaj +1 more source

