Results 71 to 80 of about 121,838 (272)

Contagion in cyber security attacks [PDF]

open access: yesJournal of the Operational Research Society, 2017
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Baldwin, Adrian   +4 more
openaire   +2 more sources

Cyber–physical risk modeling with imperfect cyber-attackers

open access: yesElectric Power Systems Research, 2022
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and ...
Efthymios Karangelos, Louis Wehenkel
openaire   +3 more sources

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks

open access: yesIEEE Access, 2019
With the developing cyber physical power systems and emerging threat of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber infrastructure can be exploited to cause physical damage ...
Qi Wang, Mengya Li, Yi Tang, Ming Ni
doaj   +1 more source

Research on FDIAs localization and traceability techniques for substation networks

open access: yesZhejiang dianli, 2022
With the wide application of ubiquitous sensing, real-time communication and precise control technologies in power grids, intelligent substations are enhancing their state sensing and business decision-making capabilities.
YE Wei   +5 more
doaj   +1 more source

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

On specification-based cyber-attack detection in smart grids

open access: yesEnergy Informatics, 2022
The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for cyber-attacks, demanding appropriate countermeasures.
Ömer Sen   +7 more
doaj   +1 more source

Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum

open access: yes, 2018
In this paper, we introduce a strong adversarial attack, referred to as the flipping attack, on Direct-Sequence Spread Spectrum (DSSS) systems. In this attack, the attacker, which is appropriately positioned between the transmitter and the receiver ...
Harshan, J., Hu, Yih-Chun
core   +1 more source

Cyber Attacks

open access: yes, 2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire   +2 more sources

Using Deep Learning Conditional Value‐at‐Risk Based Utility Function in Cryptocurrency Portfolio Optimisation

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT One of the critical risks associated with cryptocurrency assets is the so‐called downside risk, or tail risk. Conditional Value‐at‐Risk (CVaR) is a measure of tail risks that is not normally considered in the construction of a cryptocurrency portfolio.
Xinran Huang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy