Results 51 to 60 of about 14,082 (218)

A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity

open access: yesIEEE Access
The use of artificial intelligence (AI) technology signifies a significant milestone in the swiftly evolving domain of cybersecurity. This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical
Abdullah Al Siam   +3 more
doaj   +1 more source

Deep Reinforcement Learning-Driven Mitigation of Adverse Effects of Cyber-Attacks on Electric Vehicle Charging Station

open access: yesEnergies, 2023
An electric vehicle charging station (EVCS) infrastructure is the backbone of transportation electrification; however, the EVCS has various vulnerabilities in software, hardware, supply chain, and incumbent legacy technologies such as network ...
Manoj Basnet, Mohd. Hasan Ali
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

Refining the PoinTER “human firewall” pentesting framework [PDF]

open access: yes, 2019
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core   +3 more sources

Ambient technology in epilepsy clinical practice

open access: yesEpilepsia Open, EarlyView.
Abstract The utilization of large language model‐based artificial intelligence (AI) in the field of neurology has gained attention as a viable tool to enhance and assist providers with processes ranging from scheduling patients to providing preliminary interpretations of testing results, pending orders, and documenting encounters. Epileptologists could
Haania Kakwan   +3 more
wiley   +1 more source

An Advanced Accurate Intrusion Detection System for Smart Grid Cybersecurity Based on Evolving Machine Learning

open access: yesFrontiers in Energy Research, 2022
Smart grids, the next generation of electricity systems, would be intelligent and self-aware of physical and cyber activity in the control area. As a cyber-embedded infrastructure, it must be capable of detecting cyberattacks and responding appropriately
Tong Yu   +6 more
doaj   +1 more source

Cyberattacks on critical infrastructure: an economic perspective [PDF]

open access: yes, 2019
The aim of this article is to analyze the economic aspects of cybersecurity of critical infrastructure defined as physical or virtual systems and assets that are vital to a country’s functioning and whose incapacitation or destruction would have a ...
Lis, Piotr, Mendel, Jacob
core   +2 more sources

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

The threat of zero‐dynamics attack on non‐linear cyber‐physical systems

open access: yesIET Cyber-Physical Systems
Zero‐dynamics attack (ZDA) is a destructive stealthy cyberattack that threatens cyber‐physical systems (CPS). The authors have warned about the risk of a cyberattack by introducing a new general ZDA that can be effective and robust in non‐linear multiple‐
Amir Norouzi Mobarakeh   +2 more
doaj   +1 more source

Automatic Discovery of Cyberattacks

open access: yes2024 IEEE International Conference on Cyber Security and Resilience (CSR)
We present a method for the automatic discovery of cyberattacks within distributed information systems under abstract cost constraints. It is based on a formal model of cyberattack propagation generated from the specification of software and hardware architecture enriched with access control information.
Hutzler, Guillaume   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy