Results 21 to 30 of about 74,403 (290)

Evaluating Resilience of Electricity Distribution Networks via A Modification of Generalized Benders Decomposition Method

open access: yes, 2020
This paper presents a computational approach to evaluate the resilience of electricity Distribution Networks (DNs) to cyber-physical failures. In our model, we consider an attacker who targets multiple DN components to maximize the loss of the DN ...
Amin, Saurabh   +2 more
core   +1 more source

STUDY OF THE INFLUENCE OF LEGAL SECURITY AND CYBER INTELLIGENCE CAPACITY ON STRENGTHENING GOVERNANCE OF CYBER DEFENSE IN INDONESIA [PDF]

open access: yesRussian Journal of Agricultural and Socio-Economic Sciences, 2023
Stakeholders in cyber intelligence and cyber defense systems are believed to play a significant role in enhancing national resilience. The involvement of intelligence entities in the cyber domain, along with institutional and governance aspects of cyber ...
Purnomo W.P.   +3 more
doaj   +1 more source

Cyber-Resilience Evaluation of Cyber-Physical Systems [PDF]

open access: yes2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), 2020
11 pages, 2 figures, 6 ...
Segovia, Mariana   +3 more
openaire   +2 more sources

STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats [PDF]

open access: yes, 2018
Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world.
Bonet Gil, Enrique   +2 more
core   +1 more source

Cyber Resilience Evaluation Using Cyber Resilience Review Framework at University XYZ

open access: yesInternational Journal of Educational Management and Innovation, 2022
Cyber resilience is about protecting data and information owned by University XYZ and adapting business processes at University XYZ to ensure service continuity when cyber threats occur. However, University XYZ never evaluates its practices to implement security and data management.
Ahmad Maulana Fikri   +2 more
openaire   +1 more source

When organisational effectiveness fails: business continuity management and the paradox of performance [PDF]

open access: yes, 2017
Purpose: The aim of the paper is to consider the nature of the business continuity management (BCM) process and to frame it within wider literature on the performance of socio-technical systems.
Fischbacher-Smith, Denis
core   +1 more source

Cyber resilience in industrial networks: A state of the art, challenges, and future directions

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Industrial networks, and more particularly, industrial control systems (ICSs) and industrial Internet of things (IIoT), are no longer isolated environments.
Thuraya N.I. Alrumaih   +4 more
doaj   +1 more source

Resilience Assessment of the State Estimation Software under Cyber Attacks

open access: yesE3S Web of Conferences, 2018
Taking into account Smart Grid creation, cyber security appears as critical problem. In spite of wide set of technical tools and organisational decisions, which use for protection of electrical objects against cyber attacks, it is impossible to prevent ...
Voropai Nikolai   +2 more
doaj   +1 more source

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

A Feedback-Driven Federated Zero-Shot Learning Framework for Adaptive Detection of Evolving Banking Malware

open access: yesIEEE Access
The rise of digital banking has increased the frequency and sophistication of banking malware attacks, highlighting the need for privacy-preserving and adaptive detection frameworks.
Nahid Ferdous Aurna   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy