We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack

    Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...

    Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, ... Rafael Mayo-García in International Journal of Information Security
    Article Open access 04 April 2024
  2. Grou** and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks

    Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate...

    Keith S. Jones, Natalie R. Lodinger, ... Miriam Armstrong in Journal on Multimodal User Interfaces
    Article 01 November 2022
  3. Blockchain-oriented approach for detecting cyber-attack transactions

    With the high-speed development of decentralized applications, account-based blockchain platforms have become a hotbed of various financial scams and...

    Zhiqi Feng, Yongli Li, **aochen Ma in Financial Innovation
    Article Open access 02 May 2023
  4. Impact analysis of cyber-attack on MMC–HVDC control system with countermeasures

    With the involvement of cyber-infrastructure, the power grids are susceptible to cyber-attacks, whose consequences can be alarming, especially during...

    Anupom Devnath, M. A. Rahman, M. S. Rana in International Journal of Dynamics and Control
    Article 09 October 2023
  5. Enhancing attack resilience of cyber-physical systems through state dependency graph models

    This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...

    Konstantinos Adamos, George Stergiopoulos, ... Dimitris Gritzalis in International Journal of Information Security
    Article Open access 22 July 2023
  6. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things

    With rapid development and deployment of artificial intelligence methods, the Industrial Internet of Things (IIoT) has highly developed to fast...

    Alireza Souri, Monire Norouzi, Yousef Alsenani in Cluster Computing
    Article 02 November 2023
  7. Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

    Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also...

    Surjeet Dalal, Umesh Kumar Lilhore, ... Amel Ksibi in Journal of Cloud Computing
    Article Open access 29 September 2023
  8. Reliable feature selection for adversarially robust cyber-attack detection

    The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis,...

    João Vitorino, Miguel Silva, ... Isabel Praça in Annals of Telecommunications
    Article Open access 07 June 2024
  9. Coordinated cyber-physical attack considering false overload of lines

    The application of many sensor devices and complex information communication networks in a power system brings new potential threats to the...

    Jun Yang, Guanhang Sun, Jianshu Yin in Protection and Control of Modern Power Systems
    Article Open access 11 November 2022
  10. On specification-based cyber-attack detection in smart grids

    The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for...

    Ömer Sen, Dennis van der Velde, ... Martin Henze in Energy Informatics
    Article Open access 07 September 2022
  11. A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm

    Cybersecurity is critical in today’s digitally linked and networked society. There is no way to overestimate the importance of cyber security as...

    Koganti Krishna Jyothi, Subba Reddy Borra, ... Baseem Khan in Scientific Reports
    Article Open access 07 March 2024
  12. Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

    There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with...

    Surjeet Dalal, Poongodi Manoharan, ... Kaamran Raahemifar in Journal of Cloud Computing
    Article Open access 23 January 2023
  13. A resilient workforce: patient safety and the workforce response to a cyber-attack on the ICT systems of the national health service in Ireland

    Background

    In May 2021, the Irish public health service was the target of a cyber-attack. The response by the health service resulted in the...

    Gemma Moore, Zuneera Khurshid, ... Orla Healy in BMC Health Services Research
    Article Open access 17 October 2023
  14. Socio Cyber-Physical System for Cyber-Attack Detection in Brand Marketing Communication Network

    Brand truthfulness, consumer trust, and economic security are all seriously dangerous from sophisticated cyberattacks targeting brand communication...

    SiFan Yang, Haiming Long in Wireless Personal Communications
    Article 18 June 2024
  15. MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement

    Develo** technologies over digitalization have become more popular and become a threat to society and cybersecurity. Generally, the phishing method...

    Anil Kumar Yamarthy, Ch Koteswararao in Cluster Computing
    Article 29 February 2024
  16. Cyber-Attack Detection Using Machine Learning Technique

    Cybersecurity is crucial for protecting users of the internet on various electronic devices in everyday life. It is crucial for safeguarding some...
    Karan Singh, Surbhi Singh, ... Ravi Shankar Jha in Cyber Security and Digital Forensics
    Conference paper 2024
  17. Cyber Attack Modeling Recent Approaches: A Review

    The advancement in cyber technology has enhanced user convenience tremendously hence accelerated its uses. But at the same time, cyber frauds,...
    Conference paper 2023
  18. Cyber-Attack in ICT Cloud Computing System

    Nowadays, cloud system is laid low with cyber-attack that underpin a great deal of today’s social group options and monetary development. To grasp...
    Pranjal Chowdhury, Sourav Paul, ... Rajdeep Ghosh in Information and Communication Technology for Competitive Strategies (ICTCS 2021)
    Conference paper 2023
  19. Cascaded fractional order automatic generation control of a PV-reheat thermal power system under a comprehensive nonlinearity effect and cyber-attack

    The integration of renewable energy systems into the existing power grid has become a global necessity. While there are numerous advantages to this...

    Bora Cavdar, Erdinc Sahin, ... F. Mehmet Nuroglu in Electrical Engineering
    Article 05 August 2023
  20. An island detection methodology with protection against cyber attack

    Unplanned islanding of micro-grids is a significant barrier to supplying continuous power to key customers. The identification of the islanding...

    Apoorva Shukla, Soham Dutta, ... Bishwajit Dey in Microsystem Technologies
    Article Open access 22 January 2024
Did you find what you were looking for? Share feedback.