Showing 61 - 80 results of 120 for search '"cyber security"', query time: 0.05s Refine Results
  1. 61

    Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method by Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly

    Published 2025-01-01
    “…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
    Get full text
    Article
  2. 62

    Prediction of Network Threats and Attacks by Mathematical Simulation by Daniil Doroshenko

    Published 2024-11-01
    “…The proposed approaches can be used by network administrators and cyber security specialists to develop effective strategies for protecting information systems. …”
    Get full text
    Article
  3. 63
  4. 64

    Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems by Ijaz Ahmed, Ali M. El-Rifaie, Fazia Akhtar, Hasnain Ahmad, Zuhair Alaas, M.M.R. Ahmed

    Published 2025-03-01
    “…The study presents a framework that strategically improves cyber security defenses through a classification of countermeasures. …”
    Get full text
    Article
  5. 65

    Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges by Yide Liu

    Published 2012-09-01
    “…In order to build a reliable wireless sensor network for smart grid, an application review and taxonomy of relevant cyber security and privacy issues is presented in this paper. …”
    Get full text
    Article
  6. 66

    Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment by Rofiq Fauzi, Puspa Ira Dewi Candra Wulan, Danis Putra Perdana

    Published 2024-12-01
    “…Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. …”
    Get full text
    Article
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71

    Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants by Tae Ho Woo

    Published 2013-01-01
    “…The physical protection system (PPS) is constructed by the cyber security evaluation tool (CSET) for the nuclear security assessment. …”
    Get full text
    Article
  12. 72
  13. 73

    Formation of the TNI Cyber Force: A Strategic and Policy Analysis by Aris Sarjito

    Published 2024-11-01
    “…This study focuses on the formation of the Indonesian National Army (TNI) Cyber Force as part of efforts to strengthen the country's cyber security in facing increasingly complex threats. …”
    Get full text
    Article
  14. 74
  15. 75
  16. 76

    Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate by Rui Hu, Qingwu Gao, Bairong Wang

    Published 2021-01-01
    “…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
    Get full text
    Article
  17. 77
  18. 78
  19. 79
  20. 80

    Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact by Dulanjani Dissanayake, Kajini Pasadika Hapuarachchi Hapuarachchige, Yogesh Jindal

    Published 2024-08-01
    “…The proposed comprehensive digital transformation addresses this gap by implementing a cloud-based Customer Relationship Management (CRM) System, integration of Artificial Intelligence (AI) for data handling, Case Analysis and Management Software, Legal Research Software, and enhancement of cyber security measures. Furthermore, the article proposes using advanced video conferencing tools to enhance client communication. …”
    Get full text
    Article