Search

Your search keyword '"Cyber-attacks"' showing total 68 results

Search Constraints

Start Over You searched for: Descriptor "Cyber-attacks" Remove constraint Descriptor: "Cyber-attacks" Publisher mdpi ag Remove constraint Publisher: mdpi ag
68 results on '"Cyber-attacks"'

Search Results

1. D3S: A Drone Security Scoring System

2. Improving Vulnerability Management Through Process Mining

3. Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains

4. A Real-Time and Online Dynamic Reconfiguration against Cyber-Attacks to Enhance Security and Cost-Efficiency in Smart Power Microgrids Using Deep Learning

5. Enhancing Reliability and Performance of Load Frequency Control in Aging Multi-Area Power Systems under Cyber-Attacks

6. Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application

7. Understanding Local Government Cybersecurity Policy: A Concept Map and Framework

8. Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework

9. Assessment of Cyber-Physical Inverter-Based Microgrid Control Performance under Communication Delay and Cyber-Attacks

10. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis

11. A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids

12. A Hybrid Physical Co-Simulation Smart Grid Testbed for Testing and Impact Analysis of Cyber-Attacks on Power Systems: Framework and Attack Scenarios

13. Transfer Learning-Based Anomaly Detection System for Autonomous Vehicle

14. Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography

15. Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

16. Prospects of Cybersecurity in Smart Cities

17. Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study

18. Hybrid Fuzzy Rule Algorithm and Trust Planning Mechanism for Robust Trust Management in IoT-Embedded Systems Integration

19. Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey

20. Optimizing BiLSTM Network Attack Prediction Based on Improved Gray Wolf Algorithm

21. Abstracts of the 1st International Conference on Trends and Innovations in Smart Technologies (ICTIST’22)

22. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis

23. Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection

24. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems

25. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System’s State and Operating Mode

26. A Survey on Load Frequency Control of Multi-Area Power Systems: Recent Challenges and Strategies

27. An Ensemble-Based Machine Learning Approach for Cyber-Attacks Detection in Wireless Sensor Networks

28. Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System

29. Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges

30. A Causality-Inspired Approach for Anomaly Detection in a Water Treatment Testbed

31. Design of a Wide-Area Power System Stabilizer to Tolerate Multiple Permanent Communication Failures

32. An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions

33. Secure Healthcare Record Sharing Mechanism with Blockchain

34. A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids

35. IEC 61850-Based Communication Networks of Distribution System against Cyber and Physical Failures

36. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways

37. Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework

38. Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review

39. Cyber-Security of Smart Microgrids: A Survey

40. Microgrid Cyber-Security: Review and Challenges toward Resilience

41. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection

42. A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems

43. Detecting and Handling Cyber-Attacks in Model Predictive Control of Chemical Processes

44. A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments

45. Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model

46. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

47. A Multi-Layer Security Scheme for Mitigating Smart Grid Vulnerability against Faults and Cyber-Attacks

48. A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids

49. Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis

50. An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence

Catalog

Books, media, physical & digital resources