Results 21 to 30 of about 141,441 (275)
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Resilience Assessment of the State Estimation Software under Cyber Attacks
Taking into account Smart Grid creation, cyber security appears as critical problem. In spite of wide set of technical tools and organisational decisions, which use for protection of electrical objects against cyber attacks, it is impossible to prevent ...
Voropai Nikolai +2 more
doaj +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core +1 more source
Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis
The subject of cyber-security and therefore cyber-attacks on smart grid (SG) has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (
Denise Tellbach, Yan-Fu Li
doaj +1 more source
Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review
In this paper, a brief survey of measurable factors affecting the adoption of cybersecurity enhancement methods in the smart grid is provided. From a practical point of view, it is a key point to determine to what degree the cyber resilience of power ...
Fazel Mohammadi
doaj +1 more source
Modeling and Simulation of Cyber Battlefield [PDF]
In order to protect cyberspace against cyber-attacks we need cyber situation awareness framework for the implementation of our cyber maneuvers. This article allows execution cyber maneuvers with dynamic cyber battlefield simulator.
AliJabar Rashidi, Mohammad Shakibazad
doaj +1 more source
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire +1 more source
Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari +17 more
core +9 more sources
On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based
Feng, Shaohan +5 more
core +1 more source

