Search
Search Results
-
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...
-
Grou** and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate...
-
Blockchain-oriented approach for detecting cyber-attack transactions
With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and...
-
Impact analysis of cyber-attack on MMC–HVDC control system with countermeasures
With the involvement of cyber-infrastructure, the power grids are susceptible to cyber-attacks, whose consequences can be alarming, especially during...
-
Enhancing attack resilience of cyber-physical systems through state dependency graph models
This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...
-
A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
With rapid development and deployment of artificial intelligence methods, the Industrial Internet of Things (IIoT) has highly developed to fast...
-
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also...
-
Reliable feature selection for adversarially robust cyber-attack detection
The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis,...
-
Coordinated cyber-physical attack considering false overload of lines
The application of many sensor devices and complex information communication networks in a power system brings new potential threats to the...
-
On specification-based cyber-attack detection in smart grids
The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for...
-
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm
Cybersecurity is critical in today’s digitally linked and networked society. There is no way to overestimate the importance of cyber security as...
-
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with...
-
A resilient workforce: patient safety and the workforce response to a cyber-attack on the ICT systems of the national health service in Ireland
BackgroundIn May 2021, the Irish public health service was the target of a cyber-attack. The response by the health service resulted in the...
-
Socio Cyber-Physical System for Cyber-Attack Detection in Brand Marketing Communication Network
Brand truthfulness, consumer trust, and economic security are all seriously dangerous from sophisticated cyberattacks targeting brand communication...
-
MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement
Develo** technologies over digitalization have become more popular and become a threat to society and cybersecurity. Generally, the phishing method...
-
Cyber-Attack Detection Using Machine Learning Technique
Cybersecurity is crucial for protecting users of the internet on various electronic devices in everyday life. It is crucial for safeguarding some... -
Cyber Attack Modeling Recent Approaches: A Review
The advancement in cyber technology has enhanced user convenience tremendously hence accelerated its uses. But at the same time, cyber frauds,... -
Cyber-Attack in ICT Cloud Computing System
Nowadays, cloud system is laid low with cyber-attack that underpin a great deal of today’s social group options and monetary development. To grasp... -
Cascaded fractional order automatic generation control of a PV-reheat thermal power system under a comprehensive nonlinearity effect and cyber-attack
The integration of renewable energy systems into the existing power grid has become a global necessity. While there are numerous advantages to this...
-
An island detection methodology with protection against cyber attack
Unplanned islanding of micro-grids is a significant barrier to supplying continuous power to key customers. The identification of the islanding...