Results 31 to 40 of about 14,082 (218)
Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research in traffic safety. Because human failure is the most common reason for a successful cyberattack, human-factor researchers and psychologists might improve AV ...
Václav Linkov +3 more
doaj +1 more source
Evasive attacks against autoencoder-based cyberattack detection systems in power systems
The digital transformation process of power systems towards smart grids is resulting in improved reliability, efficiency and situational awareness at the expense of increased cybersecurity vulnerabilities. Given the availability of large volumes of smart
Yew Meng Khaw +3 more
doaj +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Always in control? Sovereign states in cyberspace [PDF]
For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live.
Mainwaring, Sarah
core +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Cyberattack classification involves applying deep learning (DL) and machine learning (ML) models to categorize digital threats based on their features and behaviors.
Bayan Alabduallah +7 more
doaj +1 more source
Cyberattack and Fraud Detection Using Ensemble Stacking
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and reliable access to services. IoT technology can recognize comprehensive information, reliably deliver information, and intelligently process that information ...
Raha Soleymanzadeh +3 more
doaj +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
Comprehensive Cyberattack Chain
“Where you stand depends on where you sit”, is also applicable to the appreciation of models which analyse cyberattacks. The most widely known models (e.g. Lockheed Martin’s Cyber Kill Chain) are of a technological nature. They focus on cybersecurity and are mainly reactive, whilst certain aspects, such as the dissemination of (false) information ...
Arnold, K.L. +2 more
openaire +3 more sources
Physically unclonable functions (PUFs) of reconfigurable feedback field‐effect transistors (R‐FBFETs) with polycrystalline silicon channels are designed for dual entropy sources. The uniqueness and reliability of the dual entropy source PUF are verified by inter‐ and intra‐Hamming distances of 49.13% and 3.47%, respectively, as well as NIST statistical
Taeho Park +4 more
wiley +1 more source

