-
101
An Event Causality Identification Framework Using Ensemble Learning
Published 2025-01-01Get full text
Article -
102
-
103
A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0
Published 2024-03-01“…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
Get full text
Article -
104
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01Get full text
Article -
105
-
106
-
107
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01Get full text
Article -
108
Analyzing Key Features of Open Source Software Survivability with Random Forest
Published 2025-01-01Get full text
Article -
109
Learning Automata Based Incremental Learning Method for Deep Neural Networks
Published 2019-01-01Get full text
Article -
110
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method
Published 2025-01-01“…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
Get full text
Article -
111
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01“…The proposed approaches can be used by network administrators and cyber security specialists to develop effective strategies for protecting information systems. …”
Get full text
Article -
112
Dynamical Modeling, Analysis, and Control of Information Diffusion over Social Networks
Published 2021-01-01Get full text
Article -
113
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01“…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
Get full text
Article -
114
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01“…The study presents a framework that strategically improves cyber security defenses through a classification of countermeasures. …”
Get full text
Article -
115
Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges
Published 2012-09-01“…In order to build a reliable wireless sensor network for smart grid, an application review and taxonomy of relevant cyber security and privacy issues is presented in this paper. …”
Get full text
Article -
116
Analysis of the situation and problem on the legislation of cyberspace in China
Published 2015-12-01“…The internet governance and legislation have experienced the free development,the exploration and the comprehensive stages.There are some problems about the current legislation,such as the law level is low,the high-level law is lack,the legislation is relatively scattered,legislation is lagging far behind the technology,the cur-rent law is principle and lack of the operability,legislation is heavy duty,light-rights,and so on.According to these conditions,accelerating the basic legislation,such as the cyber security law,the personal information protection act,the internet service administration law,the act of e-commerce,the e-government law,the telecommunications act,and so on was suggested,so as to build a relatively complete cyber law system.…”
Get full text
Article -
117
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01“…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
Get full text
Article -
118
Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment
Published 2024-12-01“…Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. …”
Get full text
Article -
119
A Novel Computer Virus Propagation Model under Security Classification
Published 2017-01-01Get full text
Article -
120
Reducing Judicial Inconsistency through AI: A Review of Legal Judgement Prediction Models
Published 2025-01-01Get full text
Article