Searched for: subject%3A%22security%22
(61 - 80 of 557)

Pages

document
Agiollo, A. (author), Bardhi, Enkeleda (author), Conti, M. (author), Lazzeretti, Riccardo (author), Losiouk, Eleonora (author), Omicini, Andrea (author)
In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a new and dangerous sort of distributed denial of service. Since existing proposals targeting IFAs mainly focus on local information, in this paper we propose GNN4IFA as the first mechanism exploiting complex non-local knowledge for IFA detection by...
conference paper 2023
document
Bugaje, A.-.A.B. (author), Cremer, Jochen (author), Strbac, Goran (author)
This paper presents a novel, unified approach for generating high-quality datasets for training machine-learned models for real-time security assessment in power systems. Synthetic data generation methods that extrapolate beyond historical data can be inefficient in generating feasible and rare operating conditions (OCs). The proposed...
journal article 2023
document
Chen, Yi Hsien (author), Lin, Si Chen (author), Huang, S. (author), Lei, Chin Laung (author), Huang, Chun Ying (author)
Malicious binaries have caused data and monetary loss to people, and these binaries keep evolving rapidly nowadays. With tons of new unknown attack binaries, one essential daily task for security analysts and researchers is to analyze and effectively identify malicious parts and report the critical behaviors within the binaries. While manual...
journal article 2023
document
Oomens, E.C. (author), van Wegberg, R.S. (author), Klievink, A. J. (author), van Eeten, M.J.G. (author)
In recent years, the intelligence domain has transformed and become more cyber-oriented. This has been accompanied by governance reforms of intelligence agencies’ powers and oversight mechanisms. However, opinions on key points of these reforms diverge and diverging professional opinions may affect how reforms achieve intended goals. Using Q...
journal article 2023
document
Parkin, S.E. (author), Kuhn, Kristen (author), Shaikh, Siraj A. (author)
The executive leadership in corporate organizations is increasingly challenged with managing cyber-risks, as an important part of wider business risk management. Cyber-risks are complex, with the threat landscape evolving, including digital infrastructure issues such as trust in networked supply chains, and emerging technologies. Moreover,...
journal article 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
Xie, H. (author), Bellizio, Federica (author), Cremer, Jochen (author), Strbac, Goran (author)
Due to the increasing system stability issues caused by the technological revolutions of power system equipment, the assessment of the dynamic security of the systems for changing operating conditions (OCs) is nowadays crucial. To address the computational time problem of conventional dynamic security assessment tools, many machine learning ...
conference paper 2023
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Grishkov, I. (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner’s identity into the...
conference paper 2023
document
Brosinsky, Christoph (author), Karaçelebi, M. (author), Cremer, Jochen (author)
The reader of the chapter will be able to connect techniques from machine learning (ML) and digital twins (DTs) to gain insights for monitoring and control of (dynamic) security for electrical power systems. DTs are validated and verified high-fidelity (hf) models providing high simulation accuracy. DTs can be used for simulation of the...
book chapter 2023
document
Akbari, Amirhossein (author), Alavi-Koosha, Ahmadreza (author), Moradi Sepahvand, M. (author), Toulabi, Mohammadreza (author), Amraee, Turaj (author), Bathaee, Seyyed Mohammad Taghi (author)
This article presents an electric vehicle (EV)-integrated security constrained unit commitment (EV-SCUC) based on N−1 criteria for single line outage contingency under intermittency of load and renewable energy sources (RESs). Two EV control mechanisms are proposed. In first, EV balance control, financial targets are prioritized while...
journal article 2023
document
Zhang, J. (author), Gallo, A.J. (author), Ferrari, Riccardo M.G. (author)
Multiplicative watermarking (MWM) is an active diagnosis technique for the detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eaves-dropped data to identify and then remove or replicate the watermark. In this work, we propose a scheme to protect the parameters of MWM, by proposing a design strategy based...
conference paper 2023
document
Spolaor, Riccardo (author), Liu, Hao (author), Turrin, Federico (author), Conti, M. (author), Cheng, Xiuzhen (author)
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB) devices as attack tools for malware injections and private data exfiltration. To protect against such attacks, security researchers proposed different solutions to verify the identity of a USB device via side-channel information (e.g., timing or...
conference paper 2023
document
di Angelo, Monika (author), Durieux, T. (author), Ferreira, João F. (author), Salzer, Gernot (author)
Smart contracts are blockchain programs that often handle valuable assets. Writing secure smart contracts is far from trivial, and any vulnerability may lead to significant financial losses. To support developers in identifying and eliminating vulnerabilities, methods and tools for the automated analysis of smart contracts have been proposed....
conference paper 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
The cyber attacks in Ukraine in 2015 and 2016 demonstrated the vulnerability of electrical power grids to cyber threats. They highlighted the significance of Operational Technology (OT) communication-based anomaly detection. Many anomaly detection methods are based on real-time traffic monitoring, i.e., Intrusion Detection Systems (IDS) that may...
conference paper 2023
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The solar industry in residential areas has been witnessing an astonishing growth worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside smart inverters (SIs). These IoT-enabled devices aim to introduce a certain degree of intelligence to conventional inverters by integrating various grid support...
journal article 2023
document
Bugaje, A.-.A.B. (author), Cremer, Jochen (author), Strbac, Goran (author)
Machine learning (ML) for real-time security assessment requires a diverse training database to be accurate for scenarios beyond historical records. Generating diverse operating conditions is highly relevant for the uncertain future of emerging power systems that are completely different to historical power systems. In response, for the first...
journal article 2023
document
Gonzato, Sebastian (author), Bruninx, K. (author), Delarue, Erik (author)
The potential contribution of short term storage technologies such as batteries to resource adequacy is becoming increasingly important in power systems with high penetrations of Variable Renewable Energy Sources (VRES). However, unlike generators, there are multiple ways in which storage may be operated to contribute to resource adequacy. We...
journal article 2023
document
Fernandes, Maria (author), Decouchant, Jérémie (author), Couto, Francisco M. (author)
DNA computing is an emerging field that aims at enabling more efficient data storage and processing. One principle of DNA computing is to encode some information (e.g., image, video, programming scripts) into a digital DNA-like sequence and then synthesize the corresponding DNA molecule. Synthesizing this molecule using digital or real human...
book chapter 2023
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
Searched for: subject%3A%22security%22
(61 - 80 of 557)

Pages