Results 1 to 10 of about 141,441 (275)

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants [PDF]

open access: yesNuclear Engineering and Technology, 2019
With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious ...
Jong Woo Park, Seung Jun Lee
doaj   +3 more sources

Malicious Cyber Attacks

open access: yesJournal of Danubian Studies and Research, 2022
Information plays a vital role in the development of human society, an element that cannot be neglected in interpersonal relationships. The use of information technologies in all fields has proven its effectiveness through the speed and efficiency with
Luca Iamandi   +3 more
doaj   +1 more source

Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework

open access: yesApplied Sciences, 2021
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal ...
Kyounggon Kim   +2 more
doaj   +1 more source

Risk assessment method of security and stability control system considering the impact of cyber attacks

open access: yes电力工程技术, 2022
The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system.
QIAN Sheng   +4 more
doaj   +1 more source

How does the Goverment Legally Respond to the Cyber Attack? Cases in Australia, People's Republic of China, and India

open access: yesNegrei, 2021
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India.
Edho Aqmal Hakim
doaj   +1 more source

SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS

open access: yesJournal of Social Political Sciences, 2021
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki   +1 more
doaj   +1 more source

CYBER DIMENSION OF HYBRID WARS: ESCAPING A ‘GREY ZONE’ OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES

open access: yesBaltic Journal of Economic Studies, 2022
The subject of the article is the international and national legal aspects of compensation for economic damages caused by cyber attacks. The purpose of the article is to contribute to the ongoing debate on attribution and liability for malicious and ...
Nataliia Mazaraki, Yulia Goncharova
doaj   +1 more source

Optimization Models in Cyber-Physical Power Systems: A Review

open access: yesIEEE Access, 2022
The growing interconnection between information networks and power grids enables a more efficient and economical operation, but also introduces significant challenges in modern cyber-physical power systems, such as malicious cyber-attacks.
Shahab Karamdel   +3 more
doaj   +1 more source

Stress-Testing Alternative Water Quality Sensor Designs under Cyber-Physical Attack Scenarios

open access: yesEnvironmental Sciences Proceedings, 2022
Water systems are rapidly transforming into cyber-physical systems. Despite the benefits of remote control and monitoring, autonomous operation and connectivity, there is an expanded threat surface, which includes cyber-physical attacks.
Dionysios Nikolopoulos   +4 more
doaj   +1 more source

Cyber-Attacks, Cryptocurrencies and Cyber Security

open access: yes, 2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy