咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 12 篇 cyber-attack
  • 2 篇 data breach
  • 2 篇 vulnerability
  • 2 篇 cybersecurity
  • 1 篇 threats
  • 1 篇 distributed netw...
  • 1 篇 advanced persist...
  • 1 篇 blockchain taxon...
  • 1 篇 service importan...
  • 1 篇 resilient distri...
  • 1 篇 end user computi...
  • 1 篇 computer emergen...
  • 1 篇 antivirus
  • 1 篇 lightweight dire...
  • 1 篇 threat model ana...
  • 1 篇 phishing attack
  • 1 篇 smart contract
  • 1 篇 countermeasures
  • 1 篇 distributed obse...
  • 1 篇 comprehensive ba...

机构

  • 1 篇 the department o...
  • 1 篇 ecole normale su...
  • 1 篇 faculty of compu...
  • 1 篇 university resea...
  • 1 篇 department of ma...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 computer enginee...
  • 1 篇 the school of el...
  • 1 篇 tsinghua-berkele...
  • 1 篇 departement of c...
  • 1 篇 department of ph...
  • 1 篇 the school of cy...
  • 1 篇 the college of e...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 the nari group c...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 virginia state u...

作者

  • 1 篇 jun’e li
  • 1 篇 hongbin sun
  • 1 篇 mehedi masud
  • 1 篇 walumbuka ilundu...
  • 1 篇 akinjide a. akin...
  • 1 篇 jianguo zhou
  • 1 篇 hoda alkhzaimi
  • 1 篇 gengyin li
  • 1 篇 therence niyonsa...
  • 1 篇 luo baofeng zhen...
  • 1 篇 pankaj mukhija
  • 1 篇 jianxiao wang
  • 1 篇 baozhong ti
  • 1 篇 qi wang
  • 1 篇 norjihan binti a...
  • 1 篇 manli li
  • 1 篇 yingjun wu
  • 1 篇 kritika bansal
  • 1 篇 shailendra mishr...
  • 1 篇 abiodun ayodeji

语言

  • 11 篇 英文
  • 1 篇 中文
检索条件"主题词=cyber-attack"
12 条 记 录,以下是1-10 订阅
排序:
Operational Risk-averse Routing Optimization for cyber-physical Power Systems
收藏 引用
CSEE Journal of Power and Energy Systems 2022年 第3期8卷 801-811页
作者: Baozhong Ti Jianxiao Wang Gengyin Li Ming Zhou State Key Laboratory of Alternate Electrical Power System with Renew-able Energy Sources North China Electric Power UniversityBeijing 102206China
The extensive application of modern information and communication technology in the power system through the in-depth integration of the information system and the power system has led to the gradual development of th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identity Governance Framework for Privileged Users
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 995-1005页
作者: Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
attack-resilient Distributed Control for Islanded Single-/three-phase Microgrids Based on Distributed Adaptive Observers
收藏 引用
Journal of Modern Power Systems and Clean Energy 2022年 第1期10卷 109-119页
作者: Jianguo Zhou Yinliang Xu Lun Yang Hongbin Sun Tsinghua-Berkeley Shenzhen Institute(TBSI) Tsinghua Shenzhen International Graduate School(TsinghuaSIGS)Tsinghua UniversityShenzhen 518055China Department of Electrical Engineering State Key Laboratory of Power SystemsTsinghua UniversityBeijing 100084China
This paper investigates the power sharing and voltage regulation issues of islanded single-/three-phase microgrids(S/T-MGs)where both sources and loads are unbalanced and the presence of adversarial cyber-attacks agai... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Organizational Data Breach:Building Conscious Care Behavior in Incident Response
收藏 引用
Computer Systems Science & Engineering 2022年 第2期40卷 505-515页
作者: Adlyn Adam Teoh Norjihan Binti Abdul Ghani Muneer Ahmad Nz Jhanjhi Mohammed A.Alzain Mehedi Masud Department of Information Systems Faculty of Computer Science&Information TechnologyUniversiti Malaya50603Kuala LumpurMalaysia School of Computer Science and Engineering SCE Taylor’s UniversitySubang Jaya47500Malaysia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Aperiodic Sampled-Data Control of Distributed Networked Control Systems Under Stochastic cyber-attacks
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2020年 第4期7卷 1064-1073页
作者: Kritika Bansal Pankaj Mukhija the Department of Electrical and Electronics Engineering National Institute of Technology DelhiDelhi 110040India
This paper examines the stabilization problem of a distributed networked control system under the effect of cyberattacks by employing a hybrid aperiodic triggering mechanism.The cyber-attack considered in the paper is... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Concept and Research Framework for Coordinated Situation Awareness and Active Defense of cyber-physical Power Systems Against cyber-attacks
收藏 引用
Journal of Modern Power Systems and Clean Energy 2021年 第3期9卷 477-484页
作者: Ming Ni Manli Li Jun’e Li Yingjun Wu Qi Wang the NARI Group Corporation(State Grid Electric Power Research Institute) NARI Technology Co.Ltd.and the State Key Laboratory of Smart Grid Protection and ControlNanjing 211106China the School of cyber Science and Engineering Wuhan Universityand the Key Laboratory of Aerospace Information Security and Trusted Computing of the Ministry of EducationWuhan 430072China the College of Energy and Electrical Engineering Hohai UniversityNanjing 211100China the School of Electrical Engineering Southeast UniversityNanjing 210096China
Due to the tight coupling between the cyber and physical sides of a cyber-physical power system(CPPS),the safe and reliable operation of CPPSs is being increasingly impacted by cyber security.This situation poses a ch... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model
收藏 引用
Computer Systems Science & Engineering 2023年 第11期47卷 2625-2641页
作者: A.Aldo Tenis R.Santhosh Department of Computer Science and Engineering Faculty of EngineeringKarpagam Academy of Higher EducationCoimbatoreTamil NaduIndia
The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called phishing.The deep learning approaches and the machine learn... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A cyber Kill Chain Approach for Detecting Advanced Persistent Threats
收藏 引用
Computers, Materials & Continua 2021年 第5期67卷 2497-2513页
作者: Yussuf Ahmed A.Taufiq Asyhari Md Arafatur Rahman School of Computing and Digital Technology Birmingham City UniversityBirminghamUK Faculty of Computing IBM CoEERASUniversity Malaysia PahangPahangMalaysia
The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Knowledge of cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
收藏 引用
Journal of Computer and Communications 2023年 第4期11卷 12-32页
作者: Dominique Wasso Kiseki Vincent Havyarimana Therence Niyonsaba Désiré Lumonge Zabagunda Walumbuka Ilundu Wail Thabo Semong Computer Engineering University of Burundi (UB) Bujumbura Burundi Ecole Normale Supérieure (ENS) Bujumbura Burundi University Research Laboratory in Modeling and Applied Statistical Engineering (LURMISTA) Nyamugerera Bujumbura Department of Physics and Technology ISP Bukavu Democratic Republic of Congo Department of Management Computer Science ISP Bukavu Democratic Republic of Congo Departement of Computer science and Information System Bostwana International University of Science and Technology Palapye Bostwana
This study pursues the objective of analyzing and verifying the knowledge of the agents of the Institut Supérieur Pédagogique/ISP-Bukavu (TTC = Teachers’ training College) in relation to the practical flaws resulti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantitative Evaluation of cyber-attacks on a Hypothetical School Computer Network
收藏 引用
Journal of Information Security 2019年 第3期10卷 103-116页
作者: Akinjide A. Akinola Adeyemi A. Adekoya Ayoade O. Kuye Abiodun Ayodeji University of Lagos Lagos Nigeria Virginia State University Petersburg VA USA University of Port Harcourt Port Harcourt Nigeria Nuclear Power Plant Development Directorate Nigeria Atomic Energy Commission Abuja Nigeria
This paper presents the attack tree modeling technique of quantifying cyber-attacks on a hypothetical school network system. attack trees are constructed by decomposing the path in the network system where attacks are... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论