We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 279 results
  1. Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacks

    This paper addresses the design problem of sampled-data controllers for the synchronization of complex dynamical networks under controller attack....

    Tae H. Lee, Ju H. Park in Advances in Difference Equations
    Article Open access 14 May 2019
  2. Lattice-Based Cryptography: A Survey

    Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers...

    **aoyun Wang, Guangwu Xu, Yang Yu in Chinese Annals of Mathematics, Series B
    Article 30 November 2023
  3. Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A Survey

    This paper presents a survey of different artificial intelligence (AI) applications in the modern electric grid known as smart grid from security...
    Conference paper 2024
  4. Cyber Crises and Disaster Preparation in Austria: A Survey of Research Projects

    In this paper, we survey some recent applied research and development projects dealing with threat analysis and disaster scenario generation,...
    Bernhard Garn, Klaus Kieseberg, ... Dimitris E. Simos in Dynamics of Disasters
    Chapter 2021
  5. Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users

    Cyber hygiene measures are often recommended for strengthening an organization’s security posture, especially for protecting against social...
    Sakshyam Panda, Emmanouil Panaousis, ... Christos Laoudias in From Lambda Calculus to Cybersecurity Through Program Analysis
    Chapter 2020
  6. Preface to the Focused Issue on Dynamic Games in Cyber Security

    Saurabh Amin, Karl Henrik Johansson in Dynamic Games and Applications
    Article 01 November 2019
  7. Survey: Intrusion Detection for IoT

    Internet of Things (IoT) is a concept that has evolved into a wonderful technology in the creation of smart surroundings to improve the quality of...
    B R Chandavarkar, Joshitha Reddy D., ... Reshma Tresa Antony in Advances in Data Science and Artificial Intelligence
    Conference paper 2023
  8. False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure

    The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically...

    Mohiuddin Ahmed, Al-Sakib Khan Pathan in Complex Adaptive Systems Modeling
    Article Open access 23 April 2020
  9. Using Machine Learning to Detect Botnets in Network Traffic

    With the changing times, the faces of dangers have also changed. The way is still through disguise, but the medium is now digital. And out of all the...
    Shambhavi Rai, S. A. Sajidha, ... B. Mahalakshmi in Machine Learning and Big Data Analytics
    Conference paper 2023
  10. Dynamic Games in Cyber-Physical Security: An Overview

    Due to complex dependencies between multiple layers and components of emerging cyber-physical systems, security and vulnerability of such systems...

    S. Rasoul Etesami, Tamer Başar in Dynamic Games and Applications
    Article 01 January 2019
  11. Cascading failures in complex networks caused by overload attacks

    Complex networks are known to be vulnerable to the failure of components in terms of structural robustness. An as yet less researched topic is...

    Volker Turau, Christoph Weyer in Journal of Heuristics
    Article 02 May 2019
  12. A Location-Based Cryptographic Suite for Underwater Acoustic Networks

    Communication in underwater acoustic networks (UANs) is plagued by resource constraints and environmental issues. In this chapter, we present a novel...
    Thota Sree Harsha, Venkata Sravani Katasani, ... B R Chandavarkar in Advances in Data Science and Artificial Intelligence
    Conference paper 2023
  13. Hack Investigation and Probing Using BEOS

    Cybercrimes are increasing at a very rapid rate and becoming very heinous on account of the use of growing technological adoption in executing them....
    Sridevi Kotari, Saroja Roy Grandhi, ... Fahmina Taranum in Accelerating Discoveries in Data Science and Artificial Intelligence II
    Conference paper 2024
  14. Optimal Switching Integrity Attacks on Sensors in Industrial Control Systems

    In this article, an optimal switching integrity attack problem is investigated to study the response of feedback control systems under attack. The...

    Article 04 January 2019
  15. Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment

    The Internet of Things (IoT), which has had a revolutionary influence on human existence, has become a topic of significant attention among the...

    Pandit Byomokesha Dash, Manas Ranjan Senapati, ... S. Vimal in Journal of Engineering Mathematics
    Article 18 December 2023
  16. Deterrence Pointer for Distributed Denial-of-Service (DDoS) Attack by Utilizing Watchdog Timer and Hybrid Routing Protocol

    Multiprocessor webwork is disciplined to an unrivaled amount and diversity of hacks, the preponderance of which is distributed denial of service....
    Sandya J. K., Ashwanth S., ... V. Ceronmani Sharmila in Advances in Data Science and Artificial Intelligence
    Conference paper 2023
  17. Achieving optimal adversarial accuracy for adversarial deep learning using Stackelberg games

    The purpose of adversarial deep learning is to train robust DNNs against adversarial attacks, and this is one of the major research focuses of deep...

    **ao-shan Gao, Shuang Liu, Lijia Yu in Acta Mathematica Scientia
    Article 30 August 2022
  18. Observation-assisted heuristic synthesis of covert attackers against unknown supervisors

    In this work, we address the problem of synthesis of covert attackers in the setup where the model of the plant is available, but the model of the...

    Liyong Lin, Ruochen Tai, ... Rong Su in Discrete Event Dynamic Systems
    Article 09 March 2022
  19. Social learning for resilient data fusion against data falsification attacks

    Background

    Internet of Things (IoT) suffers from vulnerable sensor nodes, which are likely to endure data falsification attacks following physical or...

    Fernando Rosas, Kwang-Cheng Chen, Deniz Gündüz in Computational Social Networks
    Article Open access 25 October 2018
  20. Supervisory Control of Discrete-Event Systems Under Attacks

    We consider a multi-adversary version of the supervisory control problem for discrete-event systems (DES), in which an adversary corrupts the...

    Masashi Wakaiki, Paulo Tabuada, João P. Hespanha in Dynamic Games and Applications
    Article 08 September 2018
Did you find what you were looking for? Share feedback.