Results 51 to 60 of about 121,838 (272)
Likelihood of Cyber Data Injection Attacks to Power Systems
Cyber data attacks are the worst-case interacting bad data to power system state estimation and cannot be detected by existing bad data detectors. In this paper, we for the first time analyze the likelihood of cyber data attacks by characterizing the ...
Chow, Joe, Hao, Yingshuai, Wang, Meng
core +1 more source
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah +4 more
core +1 more source
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu +10 more
doaj +1 more source
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire +2 more sources
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi +6 more
wiley +1 more source
Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash +3 more
core +1 more source
Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen +10 more
wiley +1 more source

