Results 81 to 90 of about 1,175,680 (325)

Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence

open access: yesJournal of Computer Virology and Hacking Techniques
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Arikkat, Dincy R   +5 more
openaire   +2 more sources

Data‐Driven Dual‐Channel Dynamic Event‐Triggered Load Frequency Control for Multiarea Power Systems Under DoS Attacks

open access: yesEnergy Science &Engineering, EarlyView.
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen   +4 more
wiley   +1 more source

Challenges arising from cyber security in the dimension of modern global security (on the example of the Russia-Ukraine war)

open access: yesEastern Review, 2023
The challenges and threats from cyber security are increasing every day in the world. All this has a significant impact on international relations. When we are dealing with such a revolutionary development of technology as in the 21st century, it is ...
Alika Guchua, Thornike Zedelashvili
doaj   +1 more source

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity. After an attack has occurred, digital forensic investigation is conducted to collect evidence from network/system logs.
Ehtsham Irshad, Abdul Basit Siddiqui
openaire   +2 more sources

Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19

open access: yesInternational journal of electrical and electronics research, 2022
This research work is conducted to make the analysis of digital technology is one of the most admired and effective technologies that has been applied in the global context for faster data management.
Dr.S.Senthil kumar   +5 more
semanticscholar   +1 more source

The Role of Digital Twin Technology in Enhancing Energy Efficiency in Buildings: A Systematic Literature Review

open access: yesEnergy Science &Engineering, EarlyView.
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang   +6 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]

open access: yes, 2011
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David   +2 more
core   +1 more source

A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0

open access: yesSustainability, 2020
A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0.
Sidi Boubacar ElMamy   +4 more
semanticscholar   +1 more source

A Scoping Review and Bibliometric Analysis on Smart Firefighting in Buildings and Infrastructures

open access: yesFire and Materials, EarlyView.
ABSTRACT Smart Firefighting is a concept that has emerged within the fire engineering and fire science disciplines in recent years. It can enable informed decision making and improved fire safety. However, its scope, definition, outcomes, and value to emergency management remain unclear. To investigate this, a scoping review and a bibliometric analysis
José Antonio Morales Mere   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy