Showing 101 - 120 results of 195 for search '"cyber security"', query time: 0.06s Refine Results
  1. 101
  2. 102
  3. 103

    A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0 by Ali Memarpour Ghiaci, Jafar Gheidar-Kheljani

    Published 2024-03-01
    “…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
    Get full text
    Article
  4. 104
  5. 105
  6. 106
  7. 107
  8. 108
  9. 109
  10. 110

    Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method by Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly

    Published 2025-01-01
    “…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
    Get full text
    Article
  11. 111

    Prediction of Network Threats and Attacks by Mathematical Simulation by Daniil Doroshenko

    Published 2024-11-01
    “…The proposed approaches can be used by network administrators and cyber security specialists to develop effective strategies for protecting information systems. …”
    Get full text
    Article
  12. 112
  13. 113

    Mechanism and implementation of Rootkit attack and defense by Fujuan LI, Qun WANG

    Published 2018-12-01
    “…Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.…”
    Get full text
    Article
  14. 114

    Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems by Ijaz Ahmed, Ali M. El-Rifaie, Fazia Akhtar, Hasnain Ahmad, Zuhair Alaas, M.M.R. Ahmed

    Published 2025-03-01
    “…The study presents a framework that strategically improves cyber security defenses through a classification of countermeasures. …”
    Get full text
    Article
  15. 115

    Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges by Yide Liu

    Published 2012-09-01
    “…In order to build a reliable wireless sensor network for smart grid, an application review and taxonomy of relevant cyber security and privacy issues is presented in this paper. …”
    Get full text
    Article
  16. 116

    Analysis of the situation and problem on the legislation of cyberspace in China by Yong-jiang XIE, Shu-li JIANG

    Published 2015-12-01
    “…The internet governance and legislation have experienced the free development,the exploration and the comprehensive stages.There are some problems about the current legislation,such as the law level is low,the high-level law is lack,the legislation is relatively scattered,legislation is lagging far behind the technology,the cur-rent law is principle and lack of the operability,legislation is heavy duty,light-rights,and so on.According to these conditions,accelerating the basic legislation,such as the cyber security law,the personal information protection act,the internet service administration law,the act of e-commerce,the e-government law,the telecommunications act,and so on was suggested,so as to build a relatively complete cyber law system.…”
    Get full text
    Article
  17. 117

    Construction contemplation of cloud platform for domestic password service based on quantum secret communication by Dong WANG, Guochun LI, Xuehao YU, Zhiyu CHEN, Bingyu GE, Lei XIE, Jing TAN

    Published 2018-07-01
    “…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
    Get full text
    Article
  18. 118

    Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment by Rofiq Fauzi, Puspa Ira Dewi Candra Wulan, Danis Putra Perdana

    Published 2024-12-01
    “…Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. …”
    Get full text
    Article
  19. 119
  20. 120