Results 21 to 30 of about 1,175,680 (325)

IMIDS: An Intelligent Intrusion Detection System against Cyber Threats in IoT

open access: yesElectronics, 2022
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for us; on the other hand, the devices are susceptible to various ...
Kim-Hung Le   +3 more
semanticscholar   +1 more source

Challenges and Threats of the Digital Economy to the Sustainability of the National Banking System

open access: yesФинансы: теория и практика, 2022
The goal of the study – development of specific methodical reasoned proposals on improvement of the mechanism for ensuring sustainable development of the national banking system and its security against external challenges and threats to cyberspace.
M. N. Dudin, S. V. Shkodinsky
doaj   +1 more source

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

open access: yesElectronics, 2023
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process.
Ömer Aslan   +4 more
semanticscholar   +1 more source

Modeling scenarios of extreme situations in the energy sector caused by cyber threats [PDF]

open access: yesE3S Web of Conferences, 2021
The paper considers the violation of cybersecurity as a possibility of a real impact (intentional or accidental) from cyberspace on the physical infrastructure of a digital energy facility.
Gaskova Daria A., Massel Aleksei G.
doaj   +1 more source

Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions

open access: yesEnergies, 2022
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastructure. However, compromised cybersecurity of the smart grid not only affects the security of existing energy systems but also directly impacts national ...
Jianguo Ding   +4 more
semanticscholar   +1 more source

SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT

open access: yesElectronics, 2021
The Internet of Things (IoT) has proven to be a billion-dollar industry. Despite offering numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for the development of cyber-attacks.
Danish Javeed, Tianhan Gao, M. Khan
semanticscholar   +1 more source

Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

open access: yesIoT, 2021
In today’s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data ...
Konstantinos G. Tsiknas   +3 more
semanticscholar   +1 more source

Classifying resilience approaches for protecting smart grids against cyber threats

open access: yesInternational Journal of Information Security, 2022
Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication technologies and their distributed nature.
Andrew D. Syrmakesis   +2 more
semanticscholar   +1 more source

Securing the IoT System of Smart City against Cyber Threats Using Deep Learning

open access: yesDiscrete Dynamics in Nature and Society, 2022
The idea of a smart city is to connect physical objects or things with sensors, software, electronics, and Internet connectivity for data communication through the Internet of Things (IoT) devices.
T. Saba   +3 more
semanticscholar   +1 more source

European security strategy and cyber threats: Importance for Serbia [PDF]

open access: yesВојно дело, 2015
Cyber threats are among the greatest threats in modern conflicts, because relatively small forces and so-called unknown attackers may inflict huge losses to the more powerful, especially in the field of the information technology use.
Nedeljković Slobodan, Forca Božidar
doaj   +1 more source

Home - About - Disclaimer - Privacy