Results 1 to 10 of about 4,611 (148)

ZigBee Cyberattacks Simulation

open access: yesEngineering Proceedings
ZigBee technology is well-known for wireless network communication and enables low-cost devices operating at low transmission speed and low power consumption in IoT networks.
Marieta Haka   +3 more
doaj   +2 more sources

Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy

open access: yesSensors, 2022
Connected and automated vehicles (CAVs) present significant potential for improving road safety and mitigating traffic congestion for the future mobility system. However, cooperative driving vehicles are more vulnerable to cyberattacks when communicating
Ting Wang   +6 more
doaj   +1 more source

Study on Cyber Attack Damage Assessment Framework

open access: yesIEEE Access, 2022
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim   +4 more
doaj   +1 more source

From self-affirmation to national security threat

open access: yesRevista Científica General José María Córdova, 2022
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars.
Yuriy Yu. Nizovtsev   +2 more
doaj   +1 more source

A Review of Denial of Service Attack and Mitigation in the Smart Grid Using Reinforcement Learning

open access: yesEnergies, 2023
The smart grid merges cyber-physical systems (CPS) infrastructure with information and communication technologies (ICT) to ensure efficient power generation, smart energy distribution in real-time, and optimisation, and it is rapidly becoming the current
Ines Ortega-Fernandez   +1 more
doaj   +1 more source

Cyber-Physical Cloud Battery Management Systems: Review of Security Aspects

open access: yesBatteries, 2023
Battery management systems (BMSs) are critical to ensure the efficiency and safety of high-power battery energy storage systems (BESSs) in vehicular and stationary applications.
Farshid Naseri   +4 more
doaj   +1 more source

Human Cognition Through the Lens of Social Engineering Cyberattacks

open access: yesFrontiers in Psychology, 2020
Social engineering cyberattacks are a major threat because they often prelude sophisticated and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological attack that exploits weaknesses in human cognitive functions.
Rosana Montañez   +2 more
doaj   +1 more source

Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach

open access: yesMathematics, 2023
Cyberattacks are increasing in number and diversity in nature daily, and the tendency for them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) assets and networks not being an exception to this trend. As time goes
Mario Aragonés Lozano   +2 more
doaj   +1 more source

Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection

open access: yesApplied Sciences, 2023
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles.
Ammar Odeh, Anas Abu Taleb
doaj   +1 more source

Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method

open access: yesIEEE Access, 2023
Unmanned aerial vehicles (UAVs) are getting more popular for deployment in surveillance related operations owing to their flexibility and ability to reach hazardous areas.
Arslan Shafique   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy