Results 41 to 50 of about 1,363,692 (325)
Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core +1 more source
Malware may be a threat to the users WHO are victimization pc regardless that in operation systems and hardware platforms that they're victimization. Ms Windows is that the hottest software package and {also the} quality also create it the foremost favorite platform to be attacked by the adversaries.
null Srivalli, Laxmi Prasanna
openaire +1 more source
Resilient Synchronization Strategy for AC Microgrids Under Cyber Attacks
Although distributed control in microgrids is well known for reliability and scalability, the absence of a global monitoring entity makes it highly vulnerable to cyber attacks.
Subham S. Sahoo +2 more
semanticscholar +1 more source
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper) [PDF]
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and
Brosset D. +5 more
core +3 more sources
In the new industrial environment, the safe and reliable operation of Industrial Cyber-Physical Systems (ICPSs) is being threatened by new types of attacks: Attackers carefully tamper with the measurement and control data transmitted over the network ...
Yuchen Jiang +5 more
semanticscholar +1 more source
Cyber attacks in smart grid – dynamic impacts, analyses and recommendations
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems.
B.M. Ruhul Amin +7 more
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach
Open-access blockchains based on proof-of-work protocols have gained tremendous popularity for their capabilities of providing decentralized tamper-proof ledgers and platforms for data-driven autonomous organization. Nevertheless, the proof-of-work based
Feng, Shaohan +5 more
core +1 more source
. By thoroughly analyzing the various cyber-attacks and effective defence strategies, it is evident that cybersecurity plays a crucial role in maintaining a continuous power supply and reducing the impact of potential contin-gencies.
S. Abdelkader +8 more
semanticscholar +1 more source
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures.
Hugo Riggs +7 more
doaj +1 more source

