Emulating and Evaluating Virtual Remote Laboratories for Cybersecurity
Our society is nowadays evolving towards a digital era, due to the extensive use of computer technologies and their interconnection mechanisms, i.e., social networks, Internet resources, IoT services, etc. This way, new threats and vulnerabilities appear.
Antonio Robles-Gómez +4 more
doaj +1 more source
Hardware Trojan vulnerability assessment in digital integrated circuits using learnable classifiers [PDF]
- In the current distributed integrated circuits (IC) industry, the possibility of adversarial hardware attacks cannot be ignored. Hardware Trojans (HT) attacks may lead to information leakage or failure in security-critical systems. The wide range of HT
Hadi Jahanirad, Mohammad Fathi
doaj +1 more source
OBPSO Kullanılarak Dağıtık Güneş Enerji Sistemlerinin Optimum Bağlantı Gücü ve Yerinin Belirlenmesi
Bu çalışmada, dağıtık üretim (DÜ) sistemlerinin optimum şebeke entegrasyonu probleminin çözümü için zıtlık tabanlı parçacık sürü optimizasyonu (OBPSO) kullanımı önerilmektedir.
Cenk Yavuz, Mehmet Çeçen
doaj +1 more source
On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy attacks in cyber-physical systems, which are modeled as a stochastic linear time invariant (LTI) system equipped with a Kalman filter, an LQG controller, and
Takumi Shinohara, Toru Namerikawa
doaj +1 more source
Firmware vulnerability analysis based on formal verification of software and hardware
In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software
Peng-hui ZHANG,Xi TIAN,Kang-wei LOU
doaj +3 more sources
Vulnerability analysis of natural gas pipeline networks based on risk theory
At present, the analysis of natural gas pipeline network safety mainly focuses on the risk assessment, reliability analysis and vulnerability analysis.
Wuchang WANG +4 more
doaj +1 more source
Conventional power systems are developing into cyber-physical power systems (CPPS) with wide applications of communication, computer and control technologies.
Jia Guo +4 more
doaj +1 more source
A system approach toward comprehensive analysis of the vulnerability of Yazd-Ardakan plain environment; challenges and solutions [PDF]
Introduction: Yazd-Ardakan plain consists of political, economic, social, and ecological systems. It has valuable agricultural products, cultural background, various industries of steel, tile, glass, textile, lime kiln, asphalt, brick, and sand ...
Vahid Moosavi +3 more
doaj +1 more source
Relevance of vulnerability analysis and environmental premises for comprehensive planning : Pomen analize ranljivosti prostora in okoljskih izhodišč za celovito prostorsko načrtovanje [PDF]
Upoštevanje in usklajevanje interesov v procesu prostorskega načrtovanja spremlja vrsta konfliktnih položajev, ki so med drugim posledica togih varstvenih sektorskih izhodišč in odsotnosti celovitega prostorskega načrtovanja.
Aleš Mlakar
doaj
Address Space Layout Randomization Next Generation
Systems that are built using low-power computationally-weak devices, which force developers to favor performance over security; which jointly with its high connectivity, continuous and autonomous operation makes those devices specially appealing to ...
Hector Marco-Gisbert +1 more
doaj +1 more source

