Threat Analysis of Power System Case Study via STRIDE Threat Model in Digital Twin Real-time Platform [PDF]
Threat modeling is a pivotal analytical procedure employed to specify the potential threats and select the appropriate security measures. It helps reduce the risk of cyber-attacks that may target several components of the cyber-physical power systems ...
Muhsen Hani +5 more
doaj +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Bayesian Stackelberg game approach for cyber mission impact assessment
Cyber threats increasingly target mission-critical systems in the military and private sectors. CMIA has emerged to mitigate such cyber threats and assure the resilience of critical missions.
Donghwan Lee +3 more
doaj +1 more source
The Australian Cyber Security Centre threat report 2015 [PDF]
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core
Securing the Participation of Safety-Critical SCADA Systems in the Industrial Internet of Things [PDF]
In the past, industrial control systems were ‘air gapped’ and isolated from more conventional networks. They used specialist protocols, such as Modbus, that are very different from TCP/IP.
Johnson, Chris
core
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Cyber threats are becoming increasingly diverse, sophisticated, and intelligent, posing significant challenges in various domains. Among these threats, advanced persistent threat (APT) attacks are particularly concerning because of sustained and ...
Hyoungjun Kim +2 more
doaj +1 more source
An Iterative Review Inspired Adaptive Cyber Threat Detection Model with Context Awareness & Meta-Learning with Generative Hybrid Anomaly Detection [PDF]
Al-driven cyber security frameworks must adapt to more sophisticated threats and context-based detections. We can improve interpretability, flexibility, and resilience in data-scarce and hostile settings in the current model.
Rajurkar Jayant, Jogekar Ravindra
doaj +1 more source
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core

