Results 71 to 80 of about 121,838 (272)
Contagion in cyber security attacks [PDF]
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Baldwin, Adrian +4 more
openaire +2 more sources
Cyber–physical risk modeling with imperfect cyber-attackers
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and ...
Efthymios Karangelos, Louis Wehenkel
openaire +3 more sources
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks
With the developing cyber physical power systems and emerging threat of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber infrastructure can be exploited to cause physical damage ...
Qi Wang, Mengya Li, Yi Tang, Ming Ni
doaj +1 more source
Research on FDIAs localization and traceability techniques for substation networks
With the wide application of ubiquitous sensing, real-time communication and precise control technologies in power grids, intelligent substations are enhancing their state sensing and business decision-making capabilities.
YE Wei +5 more
doaj +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source
On specification-based cyber-attack detection in smart grids
The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures.
Ömer Sen +7 more
doaj +1 more source
Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum
In this paper, we introduce a strong adversarial attack, referred to as the flipping attack, on Direct-Sequence Spread Spectrum (DSSS) systems. In this attack, the attacker, which is appropriately positioned between the transmitter and the receiver ...
Harshan, J., Hu, Yih-Chun
core +1 more source
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources
ABSTRACT One of the critical risks associated with cryptocurrency assets is the so‐called downside risk, or tail risk. Conditional Value‐at‐Risk (CVaR) is a measure of tail risks that is not normally considered in the construction of a cryptocurrency portfolio.
Xinran Huang +3 more
wiley +1 more source

