تصفح Academic حسب الموضوع "Computer crime"
السجلات المعروضة 1 -- 17 من 17
-
A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems
( MDPI AG , 2020 , Article Review)Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable ... -
A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and ... -
An online signature verification system for forgery and disguise detection
( Springer , 2012 , Conference Paper)Online signatures are acquired using a digital tablet which provides all the trajectory of the signature as well as the variation in pressure with respect to time. Therefore, online signature verification achieves higher ... -
Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW)
( IGI Global , 2016 , Book chapter)With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ... -
Comprehensive review of cybercrime detection techniques
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ... -
Covert attack in load frequency control of power systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The purpose of this work is to design a covert agent structure that can create a non-zero frequency deviation in the load frequency control (LFC) system and illustrate the necessity of a secure communication network for ... -
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ... -
Cybersecurity for industrial control systems: A survey
( Elsevier Ltd , 2020 , Article Review)Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic ... -
Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)This paper studies the data-driven implementation of stealthy cyber-attacks for a class of nonlinear cyber-physical systems (CPS). In particular, we consider and study zero dynamics and covert cyber-attacks. By utilizing ... -
Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we are mainly concerned with formulation and computation of security indices for linear cyber-physical systems (CPS), where both input and output channels are subjected to malicious cyber attacks. The ... -
Mitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is ... -
Mobile application security: Malware threats and defenses
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ... -
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
( Hindawi , 2020 , Article)Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ... -
Monitoring and detection of malicious adversarial zero dynamics attacks in cyber-physical systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper is mainly concerned with monitoring and detection of zero dynamics (ZD) cyber attacks that are injected by malicious hackers and adversaries to safety critical cyber-physical systems (CPS). We consider a CPS ... -
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions
( Hindawi , 2020 , Article)Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive ... -
Towards Privacy Preserving Consensus Control in Multi-Agent Cyber-Physical Systems Subject to Cyber Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Multi-agent systems (MAS) require sharing their information with their neighboring agents to reach a consensus in a distributed manner. In this paper, a transformation-based consensus control methodology is developed and ... -
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks ...