Results 51 to 60 of about 118,316 (239)
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah +4 more
core +1 more source
Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia +13 more
wiley +1 more source
Cyber–physical risk modeling with imperfect cyber-attackers
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and ...
Efthymios Karangelos, Louis Wehenkel
openaire +3 more sources
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu +6 more
wiley +1 more source
The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators ...
Raid W. Amin +4 more
doaj +1 more source
False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu +10 more
doaj +1 more source
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source

