Results 11 to 20 of about 14,082 (218)
Spatiotemporal Patterns and Predictability of Cyberattacks [PDF]
Y.C.L. was supported by Air Force Office of Scientific Research (AFOSR) under grant no. FA9550-10-1-0083 and Army Research Office (ARO) under grant no. W911NF-14-1-0504. S.X. was supported by Army Research Office (ARO) under grant no.
Chen, Y Z +3 more
core +5 more sources
Study on Cyber Attack Damage Assessment Framework
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim +4 more
doaj +1 more source
Confronting the Threat: Analysis of the Impact of MaDIoT Attacks in Two Power System Models
The increasing penetration of Internet of Things (IoT) devices at the consumer level of power systems also increases the surface of attack for the so-called Manipulation of Demand through IoT (MaDIoT) attacks.
Néstor Rodríguez-Pérez +4 more
doaj +1 more source
The article introduces a new meaning of the acronym M.A.D. (Mutually Assured Destruction) in the field of security. From the original connection with nuclear issues, its use is moving to the area of cyberspace.
Aleš Tesař +2 more
doaj +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Technique for IoT malware detection based on control flow graph analysis
The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats.
Kira Bobrovnikova +4 more
doaj +1 more source
A Nonlinear Systems Framework for Cyberattack Prevention for Chemical Process Control Systems †
Recent cyberattacks against industrial control systems highlight the criticality of preventing future attacks from disrupting plants economically or, more critically, from impacting plant safety.
Helen Durand
doaj +1 more source
Information-extreme machine learning of a cyber attack detection system
The study aims to increase the functional efficiency of a machine learning cyber attack detection system. An information-extreme machine learning method of the cyberattack detection system with optimization of control tolerances for recognition features ...
Anatoliy Dovbysh +4 more
doaj +1 more source
Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection ...
In Lee
doaj +1 more source
Toward Network-based DDoS Detection in Software-defined Networks [PDF]
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez +4 more
core +1 more source

