Results 51 to 60 of about 121,838 (272)

Likelihood of Cyber Data Injection Attacks to Power Systems

open access: yes, 2015
Cyber data attacks are the worst-case interacting bad data to power system state estimation and cannot be detected by existing bad data detectors. In this paper, we for the first time analyze the likelihood of cyber data attacks by characterizing the ...
Chow, Joe, Hao, Yingshuai, Wang, Meng
core   +1 more source

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes

open access: yesFrontiers in Energy Research, 2021
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu   +10 more
doaj   +1 more source

Deception in Cyber Attacks

open access: yes, 2007
Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and ...
Rowe, Neil C., Custy, E. John
openaire   +2 more sources

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

open access: yes, 2017
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash   +3 more
core   +1 more source

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy