Results 81 to 90 of about 1,363,692 (325)

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Contagion in cyber security attacks [PDF]

open access: yesJournal of the Operational Research Society, 2017
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s ...
Baldwin, Adrian   +4 more
openaire   +2 more sources

Cyber–physical risk modeling with imperfect cyber-attackers

open access: yesElectric Power Systems Research, 2022
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and ...
Efthymios Karangelos, Louis Wehenkel
openaire   +3 more sources

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Power System Security With Cyber-Physical Power System Operation

open access: yesIEEE Access, 2020
Cyber-attacks on a cyber-physical power system could lead to significant data failure, false data injection and cascading failure of physical power system components.
Peju Adesina Oyewole, Dilan Jayaweera
doaj   +1 more source

Utilising Flow Aggregation to Classify Benign Imitating Attacks

open access: yesSensors, 2021
Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable ...
Hanan Hindy   +5 more
doaj   +1 more source

Studying Ransomware Attacks Using Web Search Logs

open access: yes, 2020
Cyber attacks are increasingly becoming prevalent and causing significant damage to individuals, businesses and even countries. In particular, ransomware attacks have grown significantly over the last decade.
Bansal, Chetan   +3 more
core   +1 more source

The Relationship Between Premorbid Weight Status and Eating Disorder Onset in Adolescents: A Longitudinal Study

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella   +5 more
wiley   +1 more source

Power System Stability Analysis From Cyber Attacks Perspective

open access: yesIEEE Access
Power grid digitalization introduces new vulnerabilities and cyber security threats. The impact of cyber attacks on power system stability is a topic of growing concern, which is yet to be comprehensively analyzed.
Ioannis Semertzis   +5 more
doaj   +1 more source

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

open access: yes, 2013
As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems.
Baltatu, Madalina   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy