Results 21 to 30 of about 141,441 (275)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Resilience Assessment of the State Estimation Software under Cyber Attacks

open access: yesE3S Web of Conferences, 2018
Taking into account Smart Grid creation, cyber security appears as critical problem. In spite of wide set of technical tools and organisational decisions, which use for protection of electrical objects against cyber attacks, it is impossible to prevent ...
Voropai Nikolai   +2 more
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]

open access: yes, 2014
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core   +1 more source

Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis

open access: yesEnergies, 2018
The subject of cyber-security and therefore cyber-attacks on smart grid (SG) has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (
Denise Tellbach, Yan-Fu Li
doaj   +1 more source

Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review

open access: yesEnergies, 2021
In this paper, a brief survey of measurable factors affecting the adoption of cybersecurity enhancement methods in the smart grid is provided. From a practical point of view, it is a key point to determine to what degree the cyber resilience of power ...
Fazel Mohammadi
doaj   +1 more source

Modeling and Simulation of Cyber Battlefield [PDF]

open access: yesJournal of Information Technology Management, 2017
In order to protect cyberspace against cyber-attacks we need cyber situation awareness framework for the implementation of our cyber maneuvers. This article allows execution cyber maneuvers with dynamic cyber battlefield simulator.
AliJabar Rashidi, Mohammad Shakibazad
doaj   +1 more source

Cyber Attacks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire   +1 more source

Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]

open access: yes, 2019
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari   +17 more
core   +9 more sources

On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach

open access: yes, 2018
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based
Feng, Shaohan   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy