Results 11 to 20 of about 1,363,692 (325)

How does the Goverment Legally Respond to the Cyber Attack? Cases in Australia, People's Republic of China, and India

open access: yesNegrei, 2021
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India.
Edho Aqmal Hakim
doaj   +1 more source

SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS

open access: yesJournal of Social Political Sciences, 2021
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki   +1 more
doaj   +1 more source

CYBER DIMENSION OF HYBRID WARS: ESCAPING A ‘GREY ZONE’ OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES

open access: yesBaltic Journal of Economic Studies, 2022
The subject of the article is the international and national legal aspects of compensation for economic damages caused by cyber attacks. The purpose of the article is to contribute to the ongoing debate on attribution and liability for malicious and ...
Nataliia Mazaraki, Yulia Goncharova
doaj   +1 more source

Optimization Models in Cyber-Physical Power Systems: A Review

open access: yesIEEE Access, 2022
The growing interconnection between information networks and power grids enables a more efficient and economical operation, but also introduces significant challenges in modern cyber-physical power systems, such as malicious cyber-attacks.
Shahab Karamdel   +3 more
doaj   +1 more source

Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework

open access: yesJournal of Network and Systems Management, 2023
The widespread use of smart devices and the numerous security weaknesses of networks has dramatically increased the number of cyber-attacks in the internet of things (IoT).
Olivia Jullian   +5 more
semanticscholar   +1 more source

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

open access: yesElectronics, 2023
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process.
Ömer Aslan   +4 more
semanticscholar   +1 more source

Cyber Attacks on Power Grids: Causes and Propagation of Cascading Failures

open access: yesIEEE Access, 2023
Cascading effects in the power grid involve an uncontrolled, successive failure of elements. The root cause of such failures is the combined occurrence of multiple, statistically rare events that may result in a blackout.
V. Rajkumar   +4 more
semanticscholar   +1 more source

Cyber-Attacks, Cryptocurrencies and Cyber Security

open access: yes, 2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +5 more sources

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +2 more sources

Cyber Attacks in Cyber-Physical Microgrid Systems: A Comprehensive Review

open access: yesEnergies, 2023
The importance of and need for cyber security have increased in the last decade. The critical infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming vulnerable because of a lack of efficient safety measures.
Sriranga Suprabhath Koduru   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy