Results 41 to 50 of about 1,363,692 (325)

Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]

open access: yes, 2014
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core   +1 more source

Cyber Attacks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire   +1 more source

Resilient Synchronization Strategy for AC Microgrids Under Cyber Attacks

open access: yesIEEE transactions on power electronics, 2021
Although distributed control in microgrids is well known for reliability and scalability, the absence of a global monitoring entity makes it highly vulnerable to cyber attacks.
Subham S. Sahoo   +2 more
semanticscholar   +1 more source

A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper) [PDF]

open access: yes, 2018
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and
Brosset D.   +5 more
core   +3 more sources

Monitoring and Defense of Industrial Cyber-Physical Systems Under Typical Attacks: From a Systems and Control Perspective

open access: yesIEEE Transactions on Industrial Cyber-Physical Systems, 2023
In the new industrial environment, the safe and reliable operation of Industrial Cyber-Physical Systems (ICPSs) is being threatened by new types of attacks: Attackers carefully tamper with the measurement and control data transmitted over the network ...
Yuchen Jiang   +5 more
semanticscholar   +1 more source

Cyber attacks in smart grid – dynamic impacts, analyses and recommendations

open access: yesIET Cyber-Physical Systems, 2020
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin   +7 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach

open access: yes, 2018
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based
Feng, Shaohan   +5 more
core   +1 more source

Securing Modern Power Systems: Implementing Comprehensive Strategies to Enhance Resilience and Reliability Against Cyber-Attacks

open access: yesResults in Engineering
. By thoroughly analyzing the various cyber-attacks and effective defence strategies, it is evident that cybersecurity plays a crucial role in maintaining a continuous power supply and reducing the impact of potential contin-gencies.
S. Abdelkader   +8 more
semanticscholar   +1 more source

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

open access: yesSensors, 2023
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy