Results 31 to 40 of about 14,082 (218)

Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research

open access: yesFrontiers in Psychology, 2019
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research in traffic safety. Because human failure is the most common reason for a successful cyberattack, human-factor researchers and psychologists might improve AV ...
Václav Linkov   +3 more
doaj   +1 more source

Evasive attacks against autoencoder-based cyberattack detection systems in power systems

open access: yesEnergy and AI
The digital transformation process of power systems towards smart grids is resulting in improved reliability, efficiency and situational awareness at the expense of increased cybersecurity vulnerabilities. Given the availability of large volumes of smart
Yew Meng Khaw   +3 more
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Always in control? Sovereign states in cyberspace [PDF]

open access: yes, 2020
For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live.
Mainwaring, Sarah
core   +1 more source

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

Class imbalanced data handling with cyberattack classification using Hybrid Salp Swarm Algorithm with deep learning approach

open access: yesAlexandria Engineering Journal
Cyberattack classification involves applying deep learning (DL) and machine learning (ML) models to categorize digital threats based on their features and behaviors.
Bayan Alabduallah   +7 more
doaj   +1 more source

Cyberattack and Fraud Detection Using Ensemble Stacking

open access: yesAI, 2022
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information ...
Raha Soleymanzadeh   +3 more
doaj   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Comprehensive Cyberattack Chain

open access: yesSSRN Electronic Journal, 2023
“Where you stand depends on where you sit”, is also applicable to the appreciation of models which analyse cyberattacks. The most widely known models (e.g. Lockheed Martin’s Cyber Kill Chain) are of a technological nature. They focus on cybersecurity and are mainly reactive, whilst certain aspects, such as the dissemination of (false) information ...
Arnold, K.L.   +2 more
openaire   +3 more sources

Dual Entropy Source Physical Unclonable Functions of Reconfigurable Feedback Field‐Effect Transistors with Polycrystalline Silicon Channels

open access: yesAdvanced Intelligent Systems, EarlyView.
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy