Results 21 to 30 of about 14,082 (218)

IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System

open access: yesIEEE Access, 2020
The introduction of the cyber-physical system (CPS) into power systems has created a variety of communication requirements and functions that existing legacy systems do not support.
Sungmoon Kwon, Hyunguk Yoo, Taeshik Shon
doaj   +1 more source

Survivability and Vulnerability Analysis of Cloud RAID Systems under Disk Faults and Attacks [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2021
In this paper we model and analyze survivability and vulnerability of a cloud RAID (Redundant Array of Independent Disks) storage system subject to disk faults and cyber-attacks.
Qisi Liu, Liudong Xing
doaj   +1 more source

Increase vigilance against cyberattacks

open access: yesNature Biotechnology, 2022
The biotech sector must devote more resources to cybersecurity — especially those companies that are manufacturers of essential medical products.
openaire   +2 more sources

Cyberattack detection model using community detection and text analysis on social media

open access: yesICT Express, 2022
Online social media such as Twitter has been used as an important source for predicting, detecting, or analyzing critical social phenomena such as elections, disease outbreaks, and cyberattacks.
Jeong-Ha Park, Hyuk-Yoon Kwon
doaj   +1 more source

A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America

open access: yesInformatics, 2023
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services ...
Omar Flor-Unda   +5 more
doaj   +1 more source

A Systematic Review of Data-Driven Attack Detection Trends in IoT

open access: yesSensors, 2023
The Internet of Things is perhaps a concept that the world cannot be imagined without today, having become intertwined in our everyday lives in the domestic, corporate and industrial spheres.
Safwana Haque   +3 more
doaj   +1 more source

Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

open access: yes, 2018
The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks ...
Ginter, Andrew   +4 more
core   +1 more source

Fileless cyberattacks: Analysis and classification

open access: yesETRI Journal, 2020
With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To combat
GyungMin Lee   +4 more
doaj   +1 more source

Cyber Inference System for Substation Anomalies Against Alter-and-Hide Attacks [PDF]

open access: yes, 2016
Alarms reported to energy control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies.
Ginter, A, Hou, Y, Ten, CW, Wang, C
core   +1 more source

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth [PDF]

open access: yes, 2013
Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order.
Clark David D.   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy