Search
Search Results
-
Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacks
This paper addresses the design problem of sampled-data controllers for the synchronization of complex dynamical networks under controller attack....
-
Lattice-Based Cryptography: A Survey
Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers...
-
Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A Survey
This paper presents a survey of different artificial intelligence (AI) applications in the modern electric grid known as smart grid from security... -
Cyber Crises and Disaster Preparation in Austria: A Survey of Research Projects
In this paper, we survey some recent applied research and development projects dealing with threat analysis and disaster scenario generation,... -
Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, especially for protecting against social... -
Survey: Intrusion Detection for IoT
Internet of Things (IoT) is a concept that has evolved into a wonderful technology in the creation of smart surroundings to improve the quality of... -
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure
The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically...
-
Using Machine Learning to Detect Botnets in Network Traffic
With the changing times, the faces of dangers have also changed. The way is still through disguise, but the medium is now digital. And out of all the... -
Dynamic Games in Cyber-Physical Security: An Overview
Due to complex dependencies between multiple layers and components of emerging cyber-physical systems, security and vulnerability of such systems...
-
Cascading failures in complex networks caused by overload attacks
Complex networks are known to be vulnerable to the failure of components in terms of structural robustness. An as yet less researched topic is...
-
A Location-Based Cryptographic Suite for Underwater Acoustic Networks
Communication in underwater acoustic networks (UANs) is plagued by resource constraints and environmental issues. In this chapter, we present a novel... -
Hack Investigation and Probing Using BEOS
Cybercrimes are increasing at a very rapid rate and becoming very heinous on account of the use of growing technological adoption in executing them.... -
Optimal Switching Integrity Attacks on Sensors in Industrial Control Systems
In this article, an optimal switching integrity attack problem is investigated to study the response of feedback control systems under attack. The...
-
Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment
The Internet of Things (IoT), which has had a revolutionary influence on human existence, has become a topic of significant attention among the...
-
Deterrence Pointer for Distributed Denial-of-Service (DDoS) Attack by Utilizing Watchdog Timer and Hybrid Routing Protocol
Multiprocessor webwork is disciplined to an unrivaled amount and diversity of hacks, the preponderance of which is distributed denial of service.... -
Achieving optimal adversarial accuracy for adversarial deep learning using Stackelberg games
The purpose of adversarial deep learning is to train robust DNNs against adversarial attacks, and this is one of the major research focuses of deep...
-
Observation-assisted heuristic synthesis of covert attackers against unknown supervisors
In this work, we address the problem of synthesis of covert attackers in the setup where the model of the plant is available, but the model of the...
-
Social learning for resilient data fusion against data falsification attacks
BackgroundInternet of Things (IoT) suffers from vulnerable sensor nodes, which are likely to endure data falsification attacks following physical or...
-
Supervisory Control of Discrete-Event Systems Under Attacks
We consider a multi-adversary version of the supervisory control problem for discrete-event systems (DES), in which an adversary corrupts the...