Results 41 to 50 of about 121,838 (272)

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

open access: yesEnergies, 2018
Hybrid AC/HVDC (AC-HVDC) grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication ...
Rui Fan   +3 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

A cyber‐attack detection method for load control system based on cyber and physical layer crosscheck mechanism

open access: yesIET Generation, Transmission & Distribution, 2022
Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks.
Yingjun Wu   +7 more
doaj   +1 more source

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

Cyber-Deception and Attribution in Capture-the-Flag Exercises

open access: yes, 2015
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish   +4 more
core   +1 more source

Unilateral Ankle‐Foot Exoneuromusculoskeleton with Balance‐Sensing Feedback for Self‐Help Telerehabilitation after Stroke

open access: yesAdvanced Robotics Research, EarlyView.
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye   +16 more
wiley   +1 more source

The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study

open access: yesInformation, 2020
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators ...
Raid W. Amin   +4 more
doaj   +1 more source

Research on Game Theory of Air Traffic Management Cyber Physical System Security

open access: yesAerospace, 2022
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences.
Zhijun Wu, Ruochen Dong, Peng Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy