Results 41 to 50 of about 1,175,680 (325)

A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems

open access: yesElectronics, 2023
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical components. CPS has experienced rapid growth over the past decade in fields as disparate as telemedicine, smart manufacturing, autonomous vehicles, the Internet of ...
Nicholas Jeffrey, Qing Tan, J. Villar
semanticscholar   +1 more source

Possibilities of modelling the impact of cyber threats in cyber risk insurance

open access: yesMATEC Web of Conferences, 2018
In the last few years, we could see that a lot of world organizations are contested by different ways, which we are called as cyber threats or cyber risks.
Pavlik Lukas
doaj   +1 more source

Proactive threat detection for connected cars using recursive Bayesian estimation [PDF]

open access: yes, 2017
Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber ...
al-Khateeb, Haider   +4 more
core   +3 more sources

Cyber Threats and Cyber Deception in Hybrid Warfare

open access: yesActa Polytechnica Hungarica, 2021
: Paper deals with the design of the model of hybrid threats and cyber deception platform and solution for cyber threat detection. National networks face a broad range of cyber threats.
W. Steingartner, D. Galinec
semanticscholar   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

Attack-Resilient Lateral Stability Control for Four-Wheel-Driven EVs Considering Changed Driver Behavior Under Cyber Threats

open access: yesIEEE Transactions on Transportation Electrification, 2021
This article presents an attack-resilient lateral stability control design approach for four-wheel-driven electric vehicles to enhance the cyber-physical security of the steering system. Specifically, this work examines cyberattacks on the steering angle,
Lulu Guo   +4 more
semanticscholar   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Navigating Cyber Threats

open access: yesARO-The Scientific Journal of Koya University
The high-speed development of Fifth Generation technologies announces a new era for the internet of things (IoT), distinguished by high-rate connectivity, speed, and low latency.
Umed H. Jader   +2 more
doaj   +1 more source

Fast Detection for Cyber Threats in Electric Vehicle Traction Motor Drives

open access: yesIEEE Transactions on Transportation Electrification, 2021
While cyber-physical security of electric vehicles (EVs) is gaining increased concerns due to the fast development of vehicle onboard communication networks, the existing literature focuses on the vehicle level and it does not explicitly address cyber ...
Bowen Yang, Jin Ye, Lulu Guo
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy