-
61
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method
Published 2025-01-01“…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
Get full text
Article -
62
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01“…The proposed approaches can be used by network administrators and cyber security specialists to develop effective strategies for protecting information systems. …”
Get full text
Article -
63
Dynamical Modeling, Analysis, and Control of Information Diffusion over Social Networks
Published 2021-01-01Get full text
Article -
64
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01“…The study presents a framework that strategically improves cyber security defenses through a classification of countermeasures. …”
Get full text
Article -
65
Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges
Published 2012-09-01“…In order to build a reliable wireless sensor network for smart grid, an application review and taxonomy of relevant cyber security and privacy issues is presented in this paper. …”
Get full text
Article -
66
Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment
Published 2024-12-01“…Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. …”
Get full text
Article -
67
A Novel Computer Virus Propagation Model under Security Classification
Published 2017-01-01Get full text
Article -
68
Reducing Judicial Inconsistency through AI: A Review of Legal Judgement Prediction Models
Published 2025-01-01Get full text
Article -
69
-
70
Tenchi warfare – modern military operations based on the “tenchijin” philosophy
Published 2025-01-01Get full text
Article -
71
Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants
Published 2013-01-01“…The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
Get full text
Article -
72
-
73
Formation of the TNI Cyber Force: A Strategic and Policy Analysis
Published 2024-11-01“…This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing increasingly complex threats. …”
Get full text
Article -
74
-
75
Numerical Study on the Characteristics of Hydrogen Leakage, Diffusion and Ventilation in Ships
Published 2025-01-01Get full text
Article -
76
Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate
Published 2021-01-01“…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
Get full text
Article -
77
A tensor compression algorithm using Tucker decomposition and dictionary dimensionality reduction
Published 2020-04-01Get full text
Article -
78
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01Get full text
Article -
79
Personal OAuth authorization server and push OAuth for Internet of Things
Published 2017-06-01Get full text
Article -
80
Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact
Published 2024-08-01“…The proposed comprehensive digital transformation addresses this gap by implementing a cloud-based Customer Relationship Management (CRM) System, integration of Artificial Intelligence (AI) for data handling, Case Analysis and Management Software, Legal Research Software, and enhancement of cyber security measures. Furthermore, the article proposes using advanced video conferencing tools to enhance client communication. …”
Get full text
Article