Browsing by Subject "Network security"
Now showing items 1-20 of 53
-
A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems
( MDPI AG , 2020 , Article Review)Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable ... -
A cost-aware model for risk mitigation in Cloud computing systems
( IEEE Computer Society , 2016 , Conference Paper)Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ... -
A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and ... -
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ... -
An autonomic detection and protection system for denial of service attack
( ACTA Press , 2012 , Conference Paper)This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ... -
Application of data-driven attack detection framework for secure operation in smart buildings
( Elsevier Ltd , 2021 , Article)With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the ... -
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core ... -
Blockchain-Based Automated System for Identification and Storage of Networks
( Hindawi , 2021 , Article)Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ... -
Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW)
( IGI Global , 2016 , Book chapter)With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ... -
A Collaboration Incentive Exploiting the Primary-Secondary Systems' Cross Interference for PHY Security Enhancement
( IEEE , 2016 , Article)We investigate the spectrum sharing possibility as an incentive to enhance the physical layer security. The concept behind is that a legitimate source-destination pair, communicating in the presence of a passive eavesdropper, ... -
Comprehensive review of cybercrime detection techniques
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ... -
Covert attack in load frequency control of power systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The purpose of this work is to design a covert agent structure that can create a non-zero frequency deviation in the load frequency control (LFC) system and illustrate the necessity of a secure communication network for ... -
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ... -
Cybersecurity for industrial control systems: A survey
( Elsevier Ltd , 2020 , Article Review)Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic ... -
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild
( Association for Computing Machinery , 2019 , Conference Paper)The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric ... -
Deep learning based identification of DDoS attacks in industrial application
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Denial of Service (DoS) attacks are very common type of computer attack in the world of internet today. Automatically detecting such type of DDoS attack packets dropping them before passing through is the best prevention ... -
Denial-of-service attack on iec 61850-based substation automation system: A crucial cyber threat towards smart substation pathways
( MDPI , 2021 , Article)The generation of the mix-based expansion of modern power grids has urged the utilization of digital infrastructures. The introduction of Substation Automation Systems (SAS), advanced networks and communication technologies ... -
Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we are mainly concerned with formulation and computation of security indices for linear cyber-physical systems (CPS), where both input and output channels are subjected to malicious cyber attacks. The ... -
Development of a remote lab for electrical engineering program
( IEEE Computer Society , 2009 , Conference Paper)A remote lab for electrical engineering experiments has been designed and implemented. This has been intended as a platform that supports existing traditional labs by offering lab experiments that serve some of the student ... -
Development of a remote lab for electrical engineering program
( IEEE Computer Society , 2009 , Conference Paper)A remote lab for electrical engineering experiments has been designed and implemented. This has been intended as a platform that supports existing traditional labs by offering lab experiments that serve some of the student ...