Results 31 to 40 of about 8,269 (263)
Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis
As the cyberattack subject has expanded from individual to group, attack patterns have become a complicated form of cyber campaigns. Although detecting the attack groups that operated the cyber campaigns is an important issue, complex methods such as ...
Insup Lee, Changhee Choi
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Impact of Cyber Attacks on High Voltage DC Transmission Damping Control
Hybrid AC/HVDC (AC-HVDC) grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication ...
Rui Fan +3 more
doaj +1 more source
Attack-resilient control for converter-based DC microgrids
In light of the growing integration of renewable energy sources in power systems, the adoption of DC microgrids has become increasingly popular, due to its simple structure, having no frequency, power factor concerns.
Sen Tan +2 more
doaj +1 more source
Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks.
Yingjun Wu +7 more
doaj +1 more source
Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao +5 more
doaj +1 more source
Research on Game Theory of Air Traffic Management Cyber Physical System Security
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences.
Zhijun Wu, Ruochen Dong, Peng Wang
doaj +1 more source
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye +16 more
wiley +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators ...
Raid W. Amin +4 more
doaj +1 more source

