Searched for: subject:"Cyber%5C-attacks"
(1 - 10 of 10)
document
Patel, Abhilash (author), Roy, Spandan (author), Baldi, S. (author)
By increasingly relying on network-based operation for control, monitoring, and protection functionalities, modern wide-area power systems have also become vulnerable to cyber-attacks aiming to damage system performance and/or stability. Resilience in state-of-the-art methods mostly relies on known characteristics of the attacks and static...
journal article 2021
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
Bijmans, Hugo (author)
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power from others to be used in illicit cryptomining. While first observed as host-based infections with low activity, the release of an efficient browser-based cryptomining application -- as introduced by Coinhive in 2017 -- has skyrocketed...
master thesis 2019
document
Charalambous, Georgia (author)
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the...
master thesis 2018
document
Jahanshahi, N. (author), Ferrari, Riccardo M.G. (author)
Platoons of autonomous vehicles are currently being investigated by academic and industrial researchers as a way to increase road capacity and fuel efficiency. In order to fully reach such goals, a platoon must be endowed with cooperative capabilities, such as Cooperative Adaptive Cruise Control (CACC). This technique is based on the vehicles’...
journal article 2018
document
Tzanakou, Eleni (author)
Nowadays, by using the new ICT technologies the functional efficiency of the Smart Grid is increased but at the same time leads to a more vulnerable system and makes the Smart Grid a potential target for cyber-attacks. In fact, cyber-attacks are becoming one of the most serious threats in critical infrastructures. More than 80% of energy...
master thesis 2017
document
Zhu, Y. (author)
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks. This understanding can be obtained through sharing attack pattern. However, in the existing researches the consideration about information sharing is not...
master thesis 2015
document
Serracino Inglott, P. (author)
Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition...
journal article 2013
Searched for: subject:"Cyber%5C-attacks"
(1 - 10 of 10)