[HTML][HTML] Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation

T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng… - Computers & …, 2023 - Elsevier
This study investigated the potential of Generative Pre-trained Transformers (GPTs), a state-
of-the-art large language model, in generating cybersecurity policies to deter and mitigate …

A Comprehensive Review on Cyber-attacks in Power Systems: Impact Analysis, Detection and Cyber security

N Tatipatri, SL Arun - IEEE Access, 2024 - ieeexplore.ieee.org
Continuous communication and information technology advancements facilitate the
modernization of the conventional energy grid into an integrated platform. Internet-of-Things …

A Systematic Mapping Study on Intrusion Response Systems

A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …

Securing IoT devices running PureOS from ransomware attacks: leveraging hybrid machine learning techniques

TA Ahanger, U Tariq, F Dahan, SA Chaudhry, Y Malik - Mathematics, 2023 - mdpi.com
Internet-enabled (IoT) devices are typically small, low-powered devices used for sensing
and computing that enable remote monitoring and control of various environments through …

Optimal Defense Strategy Selection Algorithm Based on Reinforcement Learning and Opposition-Based Learning

Y Yue, Y Zhou, L Xu, D Zhao - Applied Sciences, 2022 - mdpi.com
Industrial control systems (ICS) are facing increasing cybersecurity issues, leading to
enormous threats and risks to numerous industrial infrastructures. In order to resist such …

[HTML][HTML] Development of a method for securing the operator's situation awareness from manipulation attacks on NPP process data

C Lee, JG Song, CK Lee, PH Seong - Nuclear Engineering and Technology, 2022 - Elsevier
According to the defense-in-depth concept, not only a preventive strategy but also an
integrated cyberattack response strategy for NPPs should be established. However, there …

The ways to improve nuclear cybersecurity for zero emission

S Yüksel, EN Atasoy, E Vatandaş… - Circular Economy and the …, 2022 - Springer
Cybersecurity is another important issue for nuclear power plants. Modification of data by
unauthorized persons can cause serious problems in nuclear power plants. In this context, it …

A prognostic decision-making approach under uncertainty for an electric vehicle fleet routing problem

DG Troncoso Kurtovic - 2023 - repositorio.uchile.cl
Electric Vehicles (EVs) have gained popularity over the past few years, given their potential
to reduce the emission of Greenhouse Gases, which contribute to Climate Change …

எதிர்கால அணுசக்தி தேவைகளை கணிப்பது எவ்வாறு?

H Udhay - dailykathir.com
எதிர்காலத்தில் கார்பனை பெறுவதற்கு அணு
உலைகள் முக்கிய பங்குவகிக்க போகின்றன …