Results 11 to 20 of about 4,651 (188)
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Smart grids have emerged as a transformative technology in the power sector, enabling efficient energy management. However, the increased reliance on digital technologies also exposes smart grids to various cybersecurity threats and attacks. This article
Ayat-Allah Bouramdane
doaj +1 more source
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop.
Tehseen Mazhar +6 more
doaj +1 more source
An Intrusion Detection System Using BoT-IoT
The rapid growth of the Internet of Things (IoT) has led to an increased automation and interconnectivity of devices without requiring user intervention, thereby enhancing the quality of our lives.
Shema Alosaimi, Saad M. Almutairi
doaj +1 more source
Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastructure. However, compromised cybersecurity of the smart grid not only affects the security of existing energy systems but also directly impacts national ...
Jianguo Ding +4 more
doaj +1 more source
The article discusses an approach to the construction and operation of a proactive system for protecting smart power grids against cyberattacks on service data transfer protocols.
Igor Kotenko +3 more
doaj +1 more source
Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses
iBeacon systems have been increasingly established in public areas to assist users in terms of indoor location navigation and positioning. People receive the services through the Bluetooth Low Energy (BLE) installed on their mobile phones.
Chi-Jan Huang +2 more
doaj +1 more source
A bad data detection approach to EPS state estimation based on fuzzy sets and wavelet analysis [PDF]
The paper offers an algorithm for detection of erroneous measurements (bad data) that occur at cyberattacks against systems for data acquisition, processing and transfer and cannot be detected by conventional methods of measurement validation at EPS ...
Kolosok Irina, Gurina Liudmila
doaj +1 more source
Die monetären Kosten, die jährlich weltweit durch Cyberattacken entstehen, wachsen stetig und bewegen sich in Dimensionen, die mit öffentlichen Haushalten ganzer Staaten verglichen werden können. Cyberattacken treffen Individuen, Unternehmen, öffentliche
Karsten Weber +2 more
doaj +1 more source
Assessing and mitigating cybersecurity risks of traffic light systems in smart cities
Intelligent traffic lights are critical cyber-physical systems that help smart cities to cut road congestion and vehicle emissions. However, they also open a new frontier of cybersecurity.
Zhiyi Li +4 more
doaj +1 more source

