Results 261 to 270 of about 1,363,692 (325)
Some of the next articles are maybe not open access.

Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks

IEEE Transactions on Reliability
With the further development of the smart grid, the modern power system has evolved into a cyber-physical power system (CPPS). In order to accurately quantify the resilience of a CPPS under cyber attacks, in this article, a resilience evaluation method ...
Xiangxing Kong   +4 more
semanticscholar   +1 more source

Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning

Computers & electrical engineering, 2021
Smart Grid uses electricity and information flows to set up a highly developed, fully automated, and distributed electricity grid system. To identify the reliability of work and availability, cyber attacks detection in the smart grids play a significant ...
Sudhakar Sengan   +4 more
semanticscholar   +1 more source

Robust and Resilient Distributed Optimal Frequency Control for Microgrids Against Cyber Attacks

IEEE Transactions on Industrial Informatics, 2022
The optimal frequency control of autonomous microgrids (MGs), i.e., to achieve fast frequency recovery and dynamic power adjustment of the distributed generators in proportion to predefined participation factors, can be achieved in a fully distributed ...
Yun Liu   +5 more
semanticscholar   +1 more source

Discussing cyber attack

Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire   +1 more source

Security Sliding Mode Control of Interval Type-2 Fuzzy Systems Subject to Cyber Attacks: The Stochastic Communication Protocol Case

IEEE transactions on fuzzy systems, 2021
This article addresses the security control problem of a class of interval type-2 fuzzy systems via the sliding mode control strategy. A stochastic communication scheduling protocol is utilized to govern the transmission from the sensors to the ...
Zhina Zhang, Y. Niu, Z. Cao, Jun Song
semanticscholar   +1 more source

Best ways computation intelligent of face cyber attacks

, 2021
The rising of information and communication technologies brought about new challenges that need to be dealt with is the citizens' security is considered.
Bilal S. A. Alhayani   +3 more
semanticscholar   +1 more source

Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks

IEEE Systems Journal, 2022
In this article, the output consensus problem is investigated for a class of switched nonlinear multiagent systems, where denial-of-service attacks and faults are considered in communication channels and agents’ actuators, respectively. The cyber attacks
Sheng Li   +3 more
semanticscholar   +1 more source

Futuristic cyber-attacks

International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
Sibi Chakkaravarthy, S.   +4 more
openaire   +1 more source

Detecting Cyber-Attacks

New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire   +1 more source

Cyber Security to Safeguard Cyber Attacks

International Journal of Information Security and Cybercrime, 2022
A virtual world or an online world is referred to as cyberspace. It is a communication-enabled artificial world created by computers or internet-enabled devices or components. It is a web-based platform that allows users to interact and communicate with one another. Cybercrime is an area of crime that is rapidly expanding around the world.
openaire   +1 more source

Home - About - Disclaimer - Privacy