Advanced Search Results For "CYBERTERRORISM"
Your filters
Securing the Network: A Red and Blue Cybersecurity Competition Case Study.
Publication Type: Academic Journal
Source(s): Information (2078-2489). Nov2023, Vol. 14 Issue 11, p587. 24p.
Abstract: In today's dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readi...
Post-Quantum Security: Opportunities and Challenges.
Publication Type: Academic Journal
Source(s): Sensors (14248220). Nov2023, Vol. 23 Issue 21, p8744. 26p.
Abstract: Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everythi...
Improved Gorilla Troops Optimizer-Based Fuzzy PD-(1+PI) Controller for Frequency Regulation of Smart Grid under Symmetry and Cyber Attacks.
Publication Type: Academic Journal
Source(s): Symmetry (20738994). Nov2023, Vol. 15 Issue 11, p2013. 20p.
Abstract: In a smart grid (SG) system with load uncertainties and the integration of variable solar and wind energies, an effective frequency control strategy is necessary for generation and load balancing. Cyberattacks are emerging threats, and SG systems are t...
Security-Oriented Cyber-Physical Risk Assessment for Cyberattacks on Distribution System.
Publication Type: Academic Journal
Source(s): Applied Sciences (2076-3417). Oct2023, Vol. 13 Issue 20, p11569. 19p.
Abstract: With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology,...
Community Structure and Resilience of the City Logistics Networks in China.
Publication Type: Academic Journal
Source(s): Mathematics (2227-7390). Oct2023, Vol. 11 Issue 20, p4352. 15p.
Abstract: Logistics security, as the lifeline of the economy connecting production, distribution, and consumption, holds a pivotal position in the modern economic system, where any potential threats like natural disasters or cyber attacks could have far-reaching...
The Effectiveness of Deploying Machine Learning Techniques in Information Security to Detect Nine Attacks: UNSW-NB15 Dataset as a Case Study.
Publication Type: Academic Journal
Source(s): Mathematical Modelling of Engineering Problems. Oct2023, Vol. 10 Issue 5, p1557-1565. 9p.
Abstract: The expanding landscape of cyber threats, alongside the diminished effectiveness of traditional detection methods, has necessitated the exploration of machine learning (ML) techniques in information security. This study investigates the potential of va...
Protective Factors for Developing Cognitive Skills against Cyberattacks.
Publication Type: Academic Journal
Source(s): Electronics (2079-9292). Oct2023, Vol. 12 Issue 19, p4007. 20p.
Abstract: Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online platforms and shifts in their psychological dynamics due to the pandemic'...
Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study.
Publication Type: Academic Journal
Source(s): Information (2078-2489). Oct2023, Vol. 14 Issue 10, p561. 23p.
Abstract: As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by a ...
A Deep Learning Methodology for Predicting Cybersecurity Attacks on the Internet of Things.
Publication Type: Academic Journal
Source(s): Information (2078-2489). Oct2023, Vol. 14 Issue 10, p550. 19p.
Abstract: With the increasing severity and frequency of cyberattacks, the rapid expansion of smart objects intensifies cybersecurity threats. The vast communication traffic data between Internet of Things (IoT) devices presents a considerable challenge in defend...
Honeypot Game Theory against DoS Attack in UAV Cyber.
Publication Type: Academic Journal
Source(s): Computers, Materials & Continua. 2023, Vol. 76 Issue 3, p2745-2762. 18p.
Abstract: A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking...