Impact assessment and defense for smart grids with FDIA against AMI

J Bi, F Luo, G Liang, X Yang, S He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cyber-physical security has been becoming an important issue for many critical
infrastructures in human society, including electrical power grids. This paper proposes an …

MineHunter: A practical Cryptomining traffic detection algorithm based on time series tracking

S Zhang, Z Wang, J Yang, X Cheng, XQ Ma… - Proceedings of the 37th …, 2021 - dl.acm.org
With the development of cryptocurrencies' market, the problem of cryptojacking, which is an
unauthorized control of someone else's computer to mine cryptocurrency, has been more …

Defending against internet worms using honeyfarm

P Jain, A Sardana - Proceedings of the CUBE International Information …, 2012 - dl.acm.org
With new worms appearing at fast pace off late, conventional classification and defense
techniques are not adequate to cover wide spectrum of recent worm attacks like stuxnet …

[PDF][PDF] Framework to manage information security for Malaysian academic environment

Z Ismail, M Masrom, Z Sidek… - Information Assurance & …, 2010 - ibimapublishing.com
Among the ICT challenges of most organizations including those from the academic sector is
securing their information. Apart from technological aspect, Higher Education Institutions …

[PDF][PDF] The information security behavior of home users: Exploring a user's risk tolerance and past experiences in the context of backing up information

M Dupuis, R Crossler… - The Dewald Roode …, 2012 - researchgate.net
Research examining the information security behavior of individuals with respect to risk has
focused primarily on only a handful of constructs; most of which have their roots in Protection …

Object-based checkpoints in distributed systems

K Tanaka, H Higaki, M Takizawa - … Third International Workshop …, 1997 - ieeexplore.ieee.org
In distributed applications, multiple objects are cooperated to achieve some objective. The
objects may suffer from certain kinds of faults. If some object o is faulty, it is rolled back to the …

Privacy in the digital age: Implications for clinical practice.

A Drummond, P Cromarty… - … Psychology: Science and …, 2015 - psycnet.apa.org
In 2012, privacy breaches exposed the confidential health data of 22.5 million US citizens.
Ensuring clients' privacy is essential in clinical psychology, and a task that has become …

Ransomware Threat Mitigation Techniques: Past, Present, and Future

MS Arman, N Jannat, SS Khan… - Ransomware Evolution, 2025 - taylorfrancis.com
Over the past few years, ransomware as a crypto-virological malware has received much
media attention through multiple assaults on prominent corporate organizations. In general …

[PDF][PDF] The Future of Cyber Attacks and Defense is in the Cloud

E Galinkin, AS Jenko Hwong, C Estep… - Proceedings-IEEE …, 2019 - researchgate.net
This paper surveys malicious cloud service use and considers both the underlying
motivation and the likelihood of increased adoption by attackers. We look to market research …

A hybrid honeyfarm based technique for defense against worm attacks

P Jain, A Sardana - 2011 World Congress on Information and …, 2011 - ieeexplore.ieee.org
The threat of Internet worms is increasing with increase in network application. The recent
attack of 'stuxnet'worm on the SCADA systems and nuclear power plants has posed a very …