Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures

V Desnitsky, I Kotenko - Simulation Modelling Practice and Theory, 2021 - Elsevier
The article discusses the problem of simulation and assessment of battery depletion attacks
on unmanned aerial vehicles (UAVs) in crisis management systems. These devices operate …

Approach to detection of denial-of-sleep attacks in wireless sensor networks on the base of machine learning

A Balueva, V Desnitsky, I Ushakov - Intelligent Distributed Computing XIII, 2020 - Springer
The paper analyzes possible types of attacks in the areas of information security of cyber-
physical systems and surveys available literature in the field. We address a problem of the …

Modeling and evaluation of battery depletion attacks on unmanned aerial vehicles in crisis management systems

V Desnitsky, N Rudavin, I Kotenko - Intelligent Distributed Computing XIII, 2020 - Springer
The paper comprises issues of modeling and evaluation of battery depletion attacks aimed
at unmanned aerial vehicles (UAV, drone) being elements of crisis management systems in …

Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks

V Desnitsky - Security, Trust and Privacy Models, and Architectures …, 2022 - Springer
The chapter encompasses issues of modeling and detection of Denial-of-Sleep attacks in
wireless sensor networks. Such attacks are applicable to IoT devices functioning …

Noisy Operations on the Silent Battlefield

F Hare, W Diehl - The Cyber Defense Review, 2020 - JSTOR
Cyber weapons can be divided into intrusive and unintrusive capabilities. Intrusive attacks,
which require first gaining privileged access, have earned notoriety in the popular media …

[HTML][HTML] Метод обнаружения DoS-атак на прикладном уровне в сетях «издатель-подписчик»

ДИ Дикий - Информационно-управляющие системы, 2020 - cyberleninka.ru
Введение: для развития киберфизических систем разрабатываются новые технологии
и протоколы передачи данных, которые призваны сократить энергетические затраты …

Intelligent task scheduling of distributed wireless sensor network to monitor building environment

Y Wang - Internet Technology Letters, 2021 - Wiley Online Library
A wireless sensor network (WSN) is constructed based on the distributed cyber‐physical
system for the indoor environment of smart buildings. The task allocation strategy in WSN is …

Подход к моделированию атак в самоорганизующихся беспроводных сенсорных сетях цифрового города

АВ Мелешко, ВА Десницкий - … и дизайна. Серия 1: Естественные и …, 2020 - elibrary.ru
В настоящее время все большее развитие и распространение получают беспроводные
самоорганизующиеся сенсорные сети для решения задач организации операционных …

IMPLEMENTATION OF A MITIGATION STRATEGY FOR DENIAL OF SLEEP ATTACK AT NETWORK ORGANIZATION LEVEL IN WIRELESS SENSOR NETWORKS

M Shua'ibu, IR Saidu, A Jegede… - Journal of Advanced …, 2022 - jacta.utem.edu.my
Wireless sensor networks are special types of networks which use wireless interfaces to
connect mobile nodes. These networks do not need fixed infrastructure. Due to high mobility …

МОДЕЛИРОВАНИЕ И ВИЗУАЛЬНЫЙ АНАЛИЗ АТАК ТИПА DENIAL-OF-SLEEP В БЕСПРОВОДНЫХ СЕНСОРНЫХ СЕТЯХ

ВА Десницкий - … университета технологии и дизайна. Серия 1 …, 2022 - elibrary.ru
В работе проведено моделирование атакующих воздействий типа Denial-of-Sleep,
препятствующих нормальному функционированию автономно работающих узлов …