Results 41 to 50 of about 4,651 (188)

Decentralized Cyberattack Attribution [PDF]

open access: yesSSRN Electronic Journal, 2018
Attribution of state-sponsored cyberattacks can be difficult, but the significant uptick in attributions in recent years shows that attribution is far from impossible. After several years of only sporadic attributions, Western governments in 2017 began attributing cyberattacks to other governments more frequently and in a more coordinated fashion.
openaire   +2 more sources

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

Evaluation of Machine Learning Algorithms for Malware Detection

open access: yesSensors, 2023
This research study mainly focused on the dynamic malware detection. Malware progressively changes, leading to the use of dynamic malware detection techniques in this research study. Each day brings a new influx of malicious software programmes that pose
Muhammad Shoaib Akhtar, Tao Feng
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

open access: yesIEEE Access, 2019
The smart grid (SG) paradigm is the next technological leap of the conventional electrical grid, contributing to the protection of the physical environment and providing multiple advantages such as increased reliability, better service quality, and the ...
Panagiotis I. Radoglou-Grammatikis   +1 more
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

A Systems Engineering Methodology for System of Autonomous Systems: Architecture and Integration

open access: yesSystems Engineering, EarlyView.
ABSTRACT Artificial intelligence and machine learning (AI/ML) rapidly transform systems by providing autonomous capabilities. This new class of systems can become a constituent system in a system of systems (SoS) to evolve it into a system of autonomous systems (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy