Results 21 to 30 of about 144,780 (287)
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa +2 more
core +1 more source
Contagion in cyber security attacks [PDF]
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Adrian Baldwin +4 more
openaire +2 more sources
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis
The subject of cyber-security and therefore cyber-attacks on smart grid (SG) has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (
Denise Tellbach, Yan-Fu Li
doaj +1 more source
Modeling and Simulation of Cyber Battlefield [PDF]
In order to protect cyberspace against cyber-attacks we need cyber situation awareness framework for the implementation of our cyber maneuvers. This article allows execution cyber maneuvers with dynamic cyber battlefield simulator.
AliJabar Rashidi, Mohammad Shakibazad
doaj +1 more source
Weaponized AI for cyber attacks
Abstract Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies for offensive purposes has begun to appear in the world.
Muhammad Mudassar Yamin +3 more
openaire +2 more sources
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
HARMer: Cyber-Attacks Automation and Evaluation [PDF]
Con el creciente crecimiento de las incidencias de ciberataques, es importante desarrollar técnicas innovadoras y efectivas para evaluar y defender los sistemas en red contra los ciberataques. Una de las técnicas más conocidas para ello es la realización de pruebas de penetración que lleva a cabo un grupo de profesionales de la seguridad (es decir, el ...
Simon Yusuf Enoch +5 more
openaire +5 more sources
Information plays a vital role in the development of human society, an element that cannot be neglected in interpersonal relationships. The use of information technologies in all fields has proven its effectiveness through the speed and efficiency with
Luca Iamandi +3 more
doaj
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin +7 more
doaj +1 more source

