Searched for: subject%3A%22cyberattacks%22
(1 - 6 of 6)
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Communication-based distributed secondary control is deemed necessary to restore the state of islanding AC microgrids to set points. As its limited global information, the microgrids become vulnerable to cyber-attacks, which by falsifying the communicating singles, like the angular frequency, can disturb the power dispatch in the microgrids...
journal article 2024
document
Perez, Nestor Rodriguez (author), Domingo, Javier Matanza (author), Sigrist, Lukas (author), Rueda, José L. (author), López, Gregorio López (author)
The increasing penetration of Internet of Things (IoT) devices at the consumer level of power systems also increases the surface of attack for the so-called Manipulation of Demand through IoT (MaDIoT) attacks. This paper provides a comparison of the impact that MaDIoT attacks could have on power systems with different characteristics, such as...
journal article 2023
document
Keijzer, T. (author), Ferrari, Riccardo M.G. (author), Sandberg, Henrik (author)
Interconnections in modern systems make them vulnerable to adversarial attackers both by corrupting communication channels and compromising entire subsystems. The field of secure state estimation (SSE) aims to provide correct state estimation even when an unknown part of the measurement signals is corrupted. In this letter, we propose a...
journal article 2023
document
Wagner, Daniel (author), Kopp, Daniel (author), Wichtlhuber, Matthias (author), DIetzel, Christoph (author), Hohlfeld, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)
Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time high. To defend against such attacks, distributed attack mitigation platforms, such as traffic scrubbing centers that operate in peering locations, e.g., Internet Exchange Points (IXP), have been deployed in the Internet over the years. These...
conference paper 2021
document
Pieters, W. (author), Barendse, Jeroen (author), Ford, Margaret (author), Heath, Claude P R (author), Probst, Christian W. (author), Verbij, Ruud (author)
The navigation metaphor for cybersecurity merges security architecture models and security economics. By identifying the most efficient routes for gaining access to assets from an attacker's viewpoint, an organization can optimize its defenses along these routes. The well-understood concept of navigation makes it easier to motivate and...
journal article 2016
document
Schmidt, A. (author)
Open source and peer production have been praised as organisational models that could change the world for the better. It is commonly asserted that almost any societal activity could benefit from distributed, bottom-up collaboration — by making societal interaction more open, more social, and more democratic. However, we also need to be mindful...
doctoral thesis 2014
Searched for: subject%3A%22cyberattacks%22
(1 - 6 of 6)