配电网用户侧异构电力物联设备安全研究综述及展望.
严康, 陆艺丹, 于宗超, 覃芳璐… - … /Dianli Zidonghua Shebei, 2023 - search.ebscohost.com
随着配电网用户侧异构电力物联设备(简称为“配电网用户侧物联设备”) 接入电力系统,
电力系统的安全防护边界变得日益模糊, 使得基于物理隔离装置的安全防护体系无法成为保护 …
电力系统的安全防护边界变得日益模糊, 使得基于物理隔离装置的安全防护体系无法成为保护 …
Network Intrusion Detection to Mitigate Jamming and Spoofing Attacks Using Federated Leading: A Comprehensive Survey
Network intrusions through jamming and spoofing attacks have become increasingly
prevalent. The ability to detect such threats at early stages is necessary for preventing a …
prevalent. The ability to detect such threats at early stages is necessary for preventing a …
Security threats in wireless network communication-status, challenges, and future trends
AN Kadhim, SB Sadkhan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The wireless air interface is open and accessible to both authorized and unauthorized users
due to the broadcast nature of radio propagation. In a wired network, communication …
due to the broadcast nature of radio propagation. In a wired network, communication …
Internet scale reverse traceroute
Knowledge of Internet paths allows operators and researchers to better understand the
Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the …
Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the …
Ddos cyber-incident detection in smart grids
The smart grid (SG) offers potential benefits for utilities, electric generators, and customers
alike. However, the prevalence of cyber-attacks targeting the SG emphasizes its dark side. In …
alike. However, the prevalence of cyber-attacks targeting the SG emphasizes its dark side. In …
Key Observation to Prevent IP Spoofing in DDoS Attack on Cloud Environment
T Sunitha, V Vijayashanthi… - … : Proceedings of SoCTA …, 2023 - Springer
The utilization of Cloud to put together and execute Distributed Denial of Service (DDoS)
assaults is well-known among programmers in the current scenario. In the existing …
assaults is well-known among programmers in the current scenario. In the existing …
An optimized machine learning model for the detection of man-in-the-middle attack in mobile edge computing
RL Moila, M Velempini - 2024 IST-Africa Conference (IST …, 2024 - ieeexplore.ieee.org
Edge computing has gained significance in processing data near the source. However, its
distributed and resource-constrained nature is prone to security challenges, particularly the …
distributed and resource-constrained nature is prone to security challenges, particularly the …
An Empirical Characterization of Anycast Convergence Time
B Degen, M Jonker, R van Rijswijk-Deij… - Proceedings of the 2024 …, 2024 - dl.acm.org
BGP convergence time is an important aspect of Internet operations and research alike. As
an example, traffic steering during DDoS attacks necessitates swift topological changes …
an example, traffic steering during DDoS attacks necessitates swift topological changes …
MITRE ATT&CK-based analysis of cyber-attacks in intelligent transportation
K Sadrazamis - 2022 - repository.ihu.edu.gr
Abstract Intelligent Transportation Systems (ITS) is featured in an emerging field with various
complex data models, strict time requirements, and dynamic requirements. On the other …
complex data models, strict time requirements, and dynamic requirements. On the other …
[PDF][PDF] Automatic Inference of BGP Community Semantics
BA da Silva Junior - 2024 - repositorio.ufms.br
Abstract The Border Gateway Protocol (BGP) orchestrates Internet communications between
Autonomous Systems (ASes). BGP's flexibility allows operators to express complex policies …
Autonomous Systems (ASes). BGP's flexibility allows operators to express complex policies …