Results 81 to 90 of about 1,175,680 (325)
Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Arikkat, Dincy R +5 more
openaire +2 more sources
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen +4 more
wiley +1 more source
The challenges and threats from cyber security are increasing every day in the world. All this has a significant impact on international relations. When we are dealing with such a revolutionary development of technology as in the 21st century, it is ...
Alika Guchua, Thornike Zedelashvili
doaj +1 more source
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity. After an attack has occurred, digital forensic investigation is conducted to collect evidence from network/system logs.
Ehtsham Irshad, Abdul Basit Siddiqui
openaire +2 more sources
Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19
This research work is conducted to make the analysis of digital technology is one of the most admired and effective technologies that has been applied in the global context for faster data management.
Dr.S.Senthil kumar +5 more
semanticscholar +1 more source
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang +6 more
wiley +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David +2 more
core +1 more source
A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0
A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0.
Sidi Boubacar ElMamy +4 more
semanticscholar +1 more source
A Scoping Review and Bibliometric Analysis on Smart Firefighting in Buildings and Infrastructures
ABSTRACT Smart Firefighting is a concept that has emerged within the fire engineering and fire science disciplines in recent years. It can enable informed decision making and improved fire safety. However, its scope, definition, outcomes, and value to emergency management remain unclear. To investigate this, a scoping review and a bibliometric analysis
José Antonio Morales Mere +2 more
wiley +1 more source

