Results 21 to 30 of about 14,082 (218)
The introduction of the cyber-physical system (CPS) into power systems has created a variety of communication requirements and functions that existing legacy systems do not support.
Sungmoon Kwon, Hyunguk Yoo, Taeshik Shon
doaj +1 more source
Survivability and Vulnerability Analysis of Cloud RAID Systems under Disk Faults and Attacks [PDF]
In this paper we model and analyze survivability and vulnerability of a cloud RAID (Redundant Array of Independent Disks) storage system subject to disk faults and cyber-attacks.
Qisi Liu, Liudong Xing
doaj +1 more source
Increase vigilance against cyberattacks
The biotech sector must devote more resources to cybersecurity — especially those companies that are manufacturers of essential medical products.
openaire +2 more sources
Cyberattack detection model using community detection and text analysis on social media
Online social media such as Twitter has been used as an important source for predicting, detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and cyberattacks.
Jeong-Ha Park, Hyuk-Yoon Kwon
doaj +1 more source
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services ...
Omar Flor-Unda +5 more
doaj +1 more source
A Systematic Review of Data-Driven Attack Detection Trends in IoT
The Internet of Things is perhaps a concept that the world cannot be imagined without today, having become intertwined in our everyday lives in the domestic, corporate and industrial spheres.
Safwana Haque +3 more
doaj +1 more source
Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems
The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks ...
Ginter, Andrew +4 more
core +1 more source
Fileless cyberattacks: Analysis and classification
With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To combat
GyungMin Lee +4 more
doaj +1 more source
Cyber Inference System for Substation Anomalies Against Alter-and-Hide Attacks [PDF]
Alarms reported to energy control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies.
Ginter, A, Hou, Y, Ten, CW, Wang, C
core +1 more source
The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth [PDF]
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order.
Clark David D. +8 more
core +1 more source

