Results 51 to 60 of about 14,082 (218)
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
The use of artificial intelligence (AI) technology signifies a significant milestone in the swiftly evolving domain of cybersecurity. This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical
Abdullah Al Siam +3 more
doaj +1 more source
An electric vehicle charging station (EVCS) infrastructure is the backbone of transportation electrification; however, the EVCS has various vulnerabilities in software, hardware, supply chain, and incumbent legacy technologies such as network ...
Manoj Basnet, Mohd. Hasan Ali
doaj +1 more source
Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core +1 more source
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core +3 more sources
Ambient technology in epilepsy clinical practice
Abstract The utilization of large language model‐based artificial intelligence (AI) in the field of neurology has gained attention as a viable tool to enhance and assist providers with processes ranging from scheduling patients to providing preliminary interpretations of testing results, pending orders, and documenting encounters. Epileptologists could
Haania Kakwan +3 more
wiley +1 more source
Smart grids, the next generation of electricity systems, would be intelligent and self-aware of physical and cyber activity in the control area. As a cyber-embedded infrastructure, it must be capable of detecting cyberattacks and responding appropriately
Tong Yu +6 more
doaj +1 more source
Cyberattacks on critical infrastructure: an economic perspective [PDF]
The aim of this article is to analyze the economic aspects of cybersecurity of critical infrastructure defined as physical or virtual systems and assets that are vital to a country’s functioning and whose incapacitation or destruction would have a ...
Lis, Piotr, Mendel, Jacob
core +2 more sources
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
The threat of zero‐dynamics attack on non‐linear cyber‐physical systems
Zero‐dynamics attack (ZDA) is a destructive stealthy cyberattack that threatens cyber‐physical systems (CPS). The authors have warned about the risk of a cyberattack by introducing a new general ZDA that can be effective and robust in non‐linear multiple‐
Amir Norouzi Mobarakeh +2 more
doaj +1 more source
Automatic Discovery of Cyberattacks
We present a method for the automatic discovery of cyberattacks within distributed information systems under abstract cost constraints. It is based on a formal model of cyberattack propagation generated from the specification of software and hardware architecture enriched with access control information.
Hutzler, Guillaume +4 more
openaire +2 more sources

