Results 21 to 30 of about 144,780 (287)

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Contagion in cyber security attacks [PDF]

open access: yesJournal of the Operational Research Society, 2017
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Adrian Baldwin   +4 more
openaire   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis

open access: yesEnergies, 2018
The subject of cyber-security and therefore cyber-attacks on smart grid (SG) has become subject of many publications in the last years, emphasizing its importance in research, as well as in practice. One especially vulnerable part of SG are smart meters (
Denise Tellbach, Yan-Fu Li
doaj   +1 more source

Modeling and Simulation of Cyber Battlefield [PDF]

open access: yesJournal of Information Technology Management, 2017
In order to protect cyberspace against cyber-attacks we need cyber situation awareness framework for the implementation of our cyber maneuvers. This article allows execution cyber maneuvers with dynamic cyber battlefield simulator.
AliJabar Rashidi, Mohammad Shakibazad
doaj   +1 more source

Weaponized AI for cyber attacks

open access: yesJournal of Information Security and Applications, 2021
Abstract Artificial intelligence (AI)-based technologies are actively used for purposes of cyber defense. With the passage of time and with decreasing complexity in implementing AI-based solutions, the usage of AI-based technologies for offensive purposes has begun to appear in the world.
Muhammad Mudassar Yamin   +3 more
openaire   +2 more sources

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

HARMer: Cyber-Attacks Automation and Evaluation [PDF]

open access: yesIEEE Access, 2020
Con el creciente crecimiento de las incidencias de ciberataques, es importante desarrollar técnicas innovadoras y efectivas para evaluar y defender los sistemas en red contra los ciberataques. Una de las técnicas más conocidas para ello es la realización de pruebas de penetración que lleva a cabo un grupo de profesionales de la seguridad (es decir, el ...
Simon Yusuf Enoch   +5 more
openaire   +5 more sources

Malicious Cyber Attacks

open access: yesJournal of Danubian Studies and Research, 2022
Information plays a vital role in the development of human society, an element that cannot be neglected in interpersonal relationships. The use of information technologies in all fields has proven its effectiveness through the speed and efficiency with
Luca Iamandi   +3 more
doaj  

Cyber attacks in smart grid – dynamic impacts, analyses and recommendations

open access: yesIET Cyber-Physical Systems, 2020
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy