ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Technology
Agronomy and forestry
Computing
Architecture and Urbanism
Computing
Research
Biology
Communication
all records (74)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
Ukraine
Spain
South Africa
Romania
Canada
Germany
Turkey, Turkish Republic
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
7.804  Articles
1 of 781 pages  |  10  records  |  more records»
Impacts of frequency and voltage disturbance on an isolated power system caused by cyber-attack have been discussed, and a neural network-based protective approach has been proposed in this research work. Adaptive PID controllers for both load frequency c... see more

Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. Ho... see more

Saudi Aramco is the largest oil production company in the entire world. It supplies almost almost 1/10th of the oil in the world. The economy of Saudi Arabia is highly dependent on the production of oil. Aramco got attacked by a virus named Shamoon on 15t... see more

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding o... see more

In this paper, a failure model of Cyber-Physical systems and an attack model are proposed. We divide the attacks into three kinds: simultaneous attack, sequential attack and composite attack. Through numerical simulations, we find that: (1) the sequential... see more

This paper tries to discuss the development of cyberwar that threatens many countries by referring to the example of the North Korean cyberattack against the United States (US). Cyberattack is a relatively new phenomenon that many countries have not been ... see more

The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare. Excessive dependence on information and communication technologies, cloud infrastructures, big data an... see more

To protect informational systems against cyber threats (attacks) risks must be constantly evaluated and assessed their existence in the global information space affect the confidentiality, integrity and availability of information resources. Upon the anal... see more

1 of 781 pages  |  10  records  |  more records»