Results 11 to 20 of about 345,903 (245)

Emulating and Evaluating Virtual Remote Laboratories for Cybersecurity

open access: yesSensors, 2020
Our society is nowadays evolving towards a digital era, due to the extensive use of computer technologies and their interconnection mechanisms, i.e., social networks, Internet resources, IoT services, etc. This way, new threats and vulnerabilities appear.
Antonio Robles-Gómez   +4 more
doaj   +1 more source

Hardware Trojan vulnerability assessment in digital integrated circuits using learnable classifiers [PDF]

open access: yesAUT Journal of Electrical Engineering
- In the current distributed integrated circuits (IC) industry, the possibility of adversarial hardware attacks cannot be ignored. Hardware Trojans (HT) attacks may lead to information leakage or failure in security-critical systems. The wide range of HT
Hadi Jahanirad, Mohammad Fathi
doaj   +1 more source

OBPSO Kullanılarak Dağıtık Güneş Enerji Sistemlerinin Optimum Bağlantı Gücü ve Yerinin Belirlenmesi

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2022
Bu çalışmada, dağıtık üretim (DÜ) sistemlerinin optimum şebeke entegrasyonu probleminin çözümü için zıtlık tabanlı parçacık sürü optimizasyonu (OBPSO) kullanımı önerilmektedir.
Cenk Yavuz, Mehmet Çeçen
doaj   +1 more source

On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems

open access: yesSICE Journal of Control, Measurement, and System Integration, 2017
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy attacks in cyber-physical systems, which are modeled as a stochastic linear time invariant (LTI) system equipped with a Kalman filter, an LQG controller, and
Takumi Shinohara, Toru Namerikawa
doaj   +1 more source

Firmware vulnerability analysis based on formal verification of software and hardware

open access: yes网络与信息安全学报, 2016
In order to analyze the potential vulnerabilities in the firmware systematically and effectively,a formal verification method based on TLA,in a collaborated form of software and hardware was proposed.With this method,the interaction mechanism of software
Peng-hui ZHANG,Xi TIAN,Kang-wei LOU
doaj   +3 more sources

Vulnerability analysis of natural gas pipeline networks based on risk theory

open access: yesYou-qi chuyun, 2022
At present, the analysis of natural gas pipeline network safety mainly focuses on the risk assessment, reliability analysis and vulnerability analysis.
Wuchang WANG   +4 more
doaj   +1 more source

Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties

open access: yesEnergies, 2017
Conventional power systems are developing into cyber-physical power systems (CPPS) with wide applications of communication, computer and control technologies.
Jia Guo   +4 more
doaj   +1 more source

A system approach toward comprehensive analysis of the vulnerability of Yazd-Ardakan plain environment; challenges and solutions [PDF]

open access: yesعلوم محیطی, 2021
Introduction: Yazd-Ardakan plain consists of political, economic, social, and ecological systems. It has valuable agricultural products, cultural background, various industries of steel, tile, glass, textile, lime kiln, asphalt, brick, and sand ...
Vahid Moosavi   +3 more
doaj   +1 more source

Relevance of vulnerability analysis and environmental premises for comprehensive planning : Pomen analize ranljivosti prostora in okoljskih izhodišč za celovito prostorsko načrtovanje [PDF]

open access: yesGeodetski Vestnik, 2009
Upoštevanje in usklajevanje interesov v procesu prostorskega načrtovanja spremlja vrsta konfliktnih položajev, ki so med drugim posledica togih varstvenih sektorskih izhodišč in odsotnosti celovitega prostorskega načrtovanja.
Aleš Mlakar
doaj  

Address Space Layout Randomization Next Generation

open access: yesApplied Sciences, 2019
Systems that are built using low-power computationally-weak devices, which force developers to favor performance over security; which jointly with its high connectivity, continuous and autonomous operation makes those devices specially appealing to ...
Hector Marco-Gisbert   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy