Results 61 to 70 of about 141,441 (275)
Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical
Ferdowsi, Aidin +3 more
core +1 more source
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source
Contagion in cyber security attacks [PDF]
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Baldwin, Adrian +4 more
openaire +2 more sources
Cyber–physical risk modeling with imperfect cyber-attackers
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and ...
Efthymios Karangelos, Louis Wehenkel
openaire +3 more sources
Likelihood of Cyber Data Injection Attacks to Power Systems
Cyber data attacks are the worst-case interacting bad data to power system state estimation and cannot be detected by existing bad data detectors. In this paper, we for the first time analyze the likelihood of cyber data attacks by characterizing the ...
Chow, Joe, Hao, Yingshuai, Wang, Meng
core +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS [PDF]
Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged.
Dan-Iulian VOITAŞEC
doaj
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source

