Results 31 to 40 of about 121,838 (272)
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng +4 more
doaj +1 more source
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire +1 more source
STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique +2 more
core +1 more source
A Cyber Security Approach Using Multilayer Cryptographic System
The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose.
Kamaran Adil Ibrahim +4 more
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj +1 more source
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross +2 more
core +1 more source
Algorithm Selection Framework for Cyber Attack Detection
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman +15 more
core +1 more source
Attack-resilient control for converter-based DC microgrids
In light of the growing integration of renewable energy sources in power systems, the adoption of DC microgrids has become increasingly popular, due to its simple structure, having no frequency, power factor concerns.
Sen Tan +2 more
doaj +1 more source
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper) [PDF]
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and
Brosset D. +5 more
core +3 more sources

