Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station

V Mahor, B Garg, S Telang, K Pachlasiya… - … Conference on Network …, 2021 - Springer
Cyber security issues relating to thermal power stations (TPS) are the major focus of concern
towards the development of digital computing equipment. Stuxnet, the computer virus that …

[HTML][HTML] Cyber attack taxonomy for digital environment in nuclear power plants

S Kim, G Heo, E Zio, J Shin, J Song - Nuclear Engineering and Technology, 2020 - Elsevier
With the development of digital instrumentation and control (I&C) devices, cyber security at
nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's …

A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems

D Du, M Zhu, X Li, M Fei, S Bu, L Wu… - Journal of Modern …, 2022 - ieeexplore.ieee.org
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

[HTML][HTML] Toward a sustainable cybersecurity ecosystem

S Sadik, M Ahmed, LF Sikos, AKMN Islam - Computers, 2020 - mdpi.com
Cybersecurity issues constitute a key concern of today's technology-based economies.
Cybersecurity has become a core need for providing a sustainable and safe society to …

Analysis of cyber-attacks on smart grid applications

MZ Gunduz, R Das - 2018 international conference on artificial …, 2018 - ieeexplore.ieee.org
Cyber-security is the whole process of preventing damage to the confidentiality, integrity,
and availability of information assets as a result of the use of vulnerabilities in information …

An analysis of cyber security attack taxonomies

R Derbyshire, B Green, D Prince… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Taxonomies have been developed as a mechanism for cyber attack categorisation.
However, when one considers the recent and rapid evolution of attacker techniques and …

Smart grid: Cyber attacks, critical defense approaches, and digital twin

T Zheng, M Liu, D Puthal, P Yi, Y Wu, X He - arXiv preprint arXiv …, 2022 - arxiv.org
As a national critical infrastructure, the smart grid has attracted widespread attention for its
cybersecurity issues. The development towards an intelligent, digital, and Internetconnected …

Cyber security: A review of cyber crimes, security challenges and measures to control

A Verma, C Shri - Vision, 2022 - journals.sagepub.com
The proliferation of the Internet's interconnections has led to a substantial increase in
cyberattack incidents, often with devastating and grave consequences for the organizations …

Security assessment for cyber physical distribution power system under intrusion attacks

R Fu, X Huang, Y Xue, Y Wu, Y Tang, D Yue - IEEE Access, 2018 - ieeexplore.ieee.org
A cyber physical distribution power system (CPDS) is a large and complex infrastructure that
coordinates the cyber communication system and the physical distribution power system …