Results 11 to 20 of about 141,441 (275)

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +2 more sources

A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

open access: yesEnergy Reports, 2021
At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out ...
Yuchong Li, Qinghui Liu
doaj   +1 more source

Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems

open access: yesEnergies, 2022
This paper is concerned with the issue of the diagnostics of process faults and the detection of cyber-attacks in industrial control systems. This problem is of significant importance to energy production and distribution, which, being part of critical ...
Michał Syfert   +5 more
doaj   +1 more source

Early-Stage Detection of Cyber Attacks

open access: yesInformation, 2020
Nowadays, systems around the world face many cyber attacks every day. These attacks consist of numerous steps that may occur over an extended period of time. We can learn from them and use this knowledge to create tools to predict and prevent the attacks.
Martina Pivarníková   +2 more
doaj   +1 more source

Double-Edged Defense: Thwarting Cyber Attacks and Adversarial Machine Learning in IEC 60870-5-104 Smart Grids

open access: yesIEEE Open Journal of the Industrial Electronics Society, 2023
Smart grids (SGs), a cornerstone of modern power systems, facilitate efficient management and distribution of electricity. Despite their advantages, increased connectivity and reliance on communication networks expand their susceptibility to cyber ...
Hadir Teryak   +4 more
doaj   +1 more source

Attributing Cyber Attacks [PDF]

open access: yesJournal of Strategic Studies, 2014
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence.
Rid, Thomas, Buchanan, Benjamin
openaire   +2 more sources

A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks

open access: yesSensors, 2023
Complex cyber–physical networks combine the prominent features of complex networks and cyber–physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal operation. Many vital
Ying Wan, Jinde Cao
doaj   +1 more source

A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids

open access: yesEnergies, 2023
In this paper, the application and future vision of Artificial Intelligence (AI)-based techniques in microgrids are presented from a cyber-security perspective of physical devices and communication networks.
Omar A. Beg   +3 more
doaj   +1 more source

Cyber-Security of Smart Microgrids: A Survey

open access: yesEnergies, 2020
In this paper, the cyber-security of smart microgrids is thoroughly discussed. In smart grids, the cyber system and physical process are tightly coupled.
Farzam Nejabatkhah   +3 more
doaj   +1 more source

Stuxnet: What Has Changed?

open access: yesFuture Internet, 2012
This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends.
Dorothy E. Denning
doaj   +1 more source

Home - About - Disclaimer - Privacy