Results 1 to 10 of about 4,611 (148)
ZigBee Cyberattacks Simulation
ZigBee technology is well-known for wireless network communication and enables low-cost devices operating at low transmission speed and low power consumption in IoT networks.
Marieta Haka +3 more
doaj +2 more sources
Connected and automated vehicles (CAVs) present significant potential for improving road safety and mitigating traffic congestion for the future mobility system. However, cooperative driving vehicles are more vulnerable to cyberattacks when communicating
Ting Wang +6 more
doaj +1 more source
Study on Cyber Attack Damage Assessment Framework
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim +4 more
doaj +1 more source
From self-affirmation to national security threat
This paper aims to study the main stages of cyberattacks’ evolution in terms of the danger they pose, from the first hooligan cyberattacks to modern cyberwars.
Yuriy Yu. Nizovtsev +2 more
doaj +1 more source
A Review of Denial of Service Attack and Mitigation in the Smart Grid Using Reinforcement Learning
The smart grid merges cyber-physical systems (CPS) infrastructure with information and communication technologies (ICT) to ensure efficient power generation, smart energy distribution in real-time, and optimisation, and it is rapidly becoming the current
Ines Ortega-Fernandez +1 more
doaj +1 more source
Cyber-Physical Cloud Battery Management Systems: Review of Security Aspects
Battery management systems (BMSs) are critical to ensure the efficiency and safety of high-power battery energy storage systems (BESSs) in vehicular and stationary applications.
Farshid Naseri +4 more
doaj +1 more source
Human Cognition Through the Lens of Social Engineering Cyberattacks
Social engineering cyberattacks are a major threat because they often prelude sophisticated and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological attack that exploits weaknesses in human cognitive functions.
Rosana Montañez +2 more
doaj +1 more source
Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach
Cyberattacks are increasing in number and diversity in nature daily, and the tendency for them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) assets and networks not being an exception to this trend. As time goes
Mario Aragonés Lozano +2 more
doaj +1 more source
Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection
Cybersecurity finds widespread applications across diverse domains, encompassing intelligent industrial systems, residential environments, personal gadgets, and automobiles.
Ammar Odeh, Anas Abu Taleb
doaj +1 more source
Unmanned aerial vehicles (UAVs) are getting more popular for deployment in surveillance related operations owing to their flexibility and ability to reach hazardous areas.
Arslan Shafique +5 more
doaj +1 more source

