Journal articles on the topic 'Cyber-attack mitigation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber-attack mitigation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bentley, Mark, Alec Stephenson, Peter Toscas, and Zili Zhu. "A Multivariate Model to Quantify and Mitigate Cybersecurity Risk." Risks 8, no. 2 (2020): 61. http://dx.doi.org/10.3390/risks8020061.
Full textBeg, Omar, Asad Khan, Waqas Rehman, and Ali Hassan. "A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids." Energies 16, no. 22 (2023): 7644. http://dx.doi.org/10.3390/en16227644.
Full textSangeetha, Prabhu, and P. S. Nethravathi. "A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model." International Journal of Applied Engineering and Management Letters (IJAEML) 6, no. 1 (2022): 149–59. https://doi.org/10.5281/zenodo.6349848.
Full textPermana, Agus. "Indonesia's Cyber Defense Strategy in Mitigating The Risk of Cyber Warfare Threats." Syntax Idea 3, no. 1 (2021): 1. http://dx.doi.org/10.36418/syntax-idea.v3i1.860.
Full textPermana, Agus. "Indonesia's Cyber Defense Strategy in Mitigating The Risk of Cyber Warfare Threats." Syntax Idea 3, no. 1 (2021): 1–11. http://dx.doi.org/10.46799/syntax-idea.v3i1.860.
Full textMerz, Terry, and Romarie Morales Rosado. "Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control Systems." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 577–80. http://dx.doi.org/10.34190/iccws.18.1.1063.
Full textDonald, L. Buresh Ph.D. Esq. "The Federal Acquisition Supply Chain Act, the Solarwinds Cyber-Attack, and What Might Have Been Different Had FASCA Been Federal Law at the Time of the Attack." International Journal of Social Science and Human Research 05, no. 07 (2022): 2906–13. https://doi.org/10.5281/zenodo.6800881.
Full textLi, Wenpei, Han Fu, Shun Wu, Bin Yang, and Zhixiong Liu. "A Kalman Filter-Based Distributed Cyber-Attack Mitigation Strategy for Distributed Generator Units in Meshed DC Microgrids." Energies 16, no. 24 (2023): 7959. http://dx.doi.org/10.3390/en16247959.
Full textK, Aswin. "ENHANCING POWER SYSTEM SECURITY THROUGH RESILIENT FREQUENCY REGULATION IN THE FACE OF HYBRID CYBER-ATTACKS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34210.
Full textASTROV, Igor, and Sanja BAUK. "Simulating a Cyber-Attack on the Mass Thruster Controllers at Low-Speed Motion." Promet - Traffic&Transportation 36, no. 6 (2024): 1006–21. https://doi.org/10.7307/ptt.v36i6.797.
Full textPanchamia, Virti, Archita Harchwani, and Tirath Momaya. "Cybersecurity Renaissance: Navigating Threats, Ethical Hacking, and Risk Mitigation in the Digital Era." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28181.
Full textZhu, Jiawei, and Bhuvana Ramachandran. "An Advanced Optimization Based Simulation Model to Study the Impact of Cyber-Physical Attacks on Power Systems." International Journal of Electronics and Electrical Engineering 8, no. 4 (2020): 74–81. http://dx.doi.org/10.18178/ijeee.8.4.74-81.
Full textRamadhan, Umar Fitra, Jaehyeong Lee, and Minhan Yoon. "A Comprehensive Study of Cyber Attack Mitigation with the Exchange of Frequency Containment Reserves Control in a Multi-Infeed Direct Current Power System." Sensors 23, no. 4 (2023): 1964. http://dx.doi.org/10.3390/s23041964.
Full textKwon, Cheolhyeon, and Inseok Hwang. "Cyber attack mitigation for cyber–physical systems: hybrid system approach to controller design." IET Control Theory & Applications 10, no. 7 (2016): 731–41. http://dx.doi.org/10.1049/iet-cta.2014.1013.
Full textLi, Wenpei, Han Fu, Shun Wu, Bin Yang, and Zhixiong Liu. "RETRACTED: Li et al. A Kalman Filter-Based Distributed Cyber-Attack Mitigation Strategy for Distributed Generator Units in Meshed DC Microgrids. Energies 2023, 16, 7959." Energies 17, no. 23 (2024): 6075. https://doi.org/10.3390/en17236075.
Full textDamalla, Jyothi. "Enhancing Cyber Attack detection using Deep Learning." International Journal of Research and Applications 10, no. 40 (2023): 3001–7. https://doi.org/10.5281/zenodo.15251861.
Full textYousef Alshunaifi, Sulaiman, Shailendra Mishra, and Mohammed Abdul Rahman AlShehri. "Cyber-Attack Detection and Mitigation Using SVM for 5G Network." Intelligent Automation & Soft Computing 31, no. 1 (2022): 13–28. http://dx.doi.org/10.32604/iasc.2022.019121.
Full textSree Varshini, G. Y., and S. Latha. "Detection and mitigation of coordinated cyber-physical attack in CPPS." Heliyon 10, no. 4 (2024): e26332. http://dx.doi.org/10.1016/j.heliyon.2024.e26332.
Full textEL-Ebiary, Ahmed H., Mohamed Mokhtar, Atef M. Mansour, Fathy H. Awad, Mostafa I. Marei, and Mahmoud A. Attia. "Distributed Mitigation Layers for Voltages and Currents Cyber-Attacks on DC Microgrids Interfacing Converters." Energies 15, no. 24 (2022): 9426. http://dx.doi.org/10.3390/en15249426.
Full textManish Rana. "Fortifying Cyber Defenses: Leveraging Honeypots for Proactive Threat Mitigation and DoS Attack Prevention." Journal of Information Systems Engineering and Management 10, no. 19s (2025): 443–52. https://doi.org/10.52783/jisem.v10i19s.3056.
Full textGupta, Shaveta, Dinesh Grover, and Abhinav Bhandari. "Vulnerability Analysis of Existing Distributed Denial of Service (DDoS) Defense Frameworks." Asian Journal of Computer Science and Technology 7, no. 3 (2018): 62–67. http://dx.doi.org/10.51983/ajcst-2018.7.3.1895.
Full textIslam, M. Mattah, Saifullah Shahid, Khush Bakhat Awar, Rashid Khan, and Muhammad Sohail. "Cyber-Security: Dos Attack Outcomes are Dangerous." European Journal of Electrical Engineering and Computer Science 5, no. 3 (2021): 54–59. http://dx.doi.org/10.24018/ejece.2021.5.3.297.
Full textMr.Edukondalu Simhadati. "Behavioral Profiling of Cyber Attackers: Identifying Patterns and Mitigating Threats." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 96–100. https://doi.org/10.46647/ijetms.2025.v09si01.015.
Full textPendyala, Shamili Srimani. "Securing the Internet of Things: Predictive Defense Algorithm for Attack Mitigation." International Journal of Scientific Methods in Engineering and Management 02, no. 03 (2024): 47–53. http://dx.doi.org/10.58599/ijsmem.2024.2305.
Full textXu, Lezhong, Yupeng Zhu, Zhuoyu Li, and Quanqi Zhang. "Safety Control for Cyber–Physical Systems Under False Data Injection Attacks." Electronics 14, no. 6 (2025): 1103. https://doi.org/10.3390/electronics14061103.
Full textJiang, Yuning, Wei Wang, Jianguo Ding, Xin Lu, and Yanguo Jing. "Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems." Future Internet 16, no. 4 (2024): 134. http://dx.doi.org/10.3390/fi16040134.
Full textMerkebaiuly, Medet. "Overview of Distributed Denial of Service (DDoS) attack types and mitigation methods." InterConf, no. 43(193) (March 20, 2024): 494–508. http://dx.doi.org/10.51582/interconf.19-20.03.2024.048.
Full textKela, Rushabh, Abhinav Chawla, Pratishtha Gaur, and Dr Manikandan K. "IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS." international journal of advanced research in computer science 13, no. 4 (2022): 28–34. http://dx.doi.org/10.26483/ijarcs.v13i4.6890.
Full textSaxena, Sahaj, Sajal Bhatia, and Rahul Gupta. "Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey." Designs 5, no. 3 (2021): 52. http://dx.doi.org/10.3390/designs5030052.
Full textGia Anisa and Fitria Widianingsih. "SolarWinds Attack: Stages, Implications, and Mitigation Strategies in the Cyber Age." Electronic Integrated Computer Algorithm Journal 2, no. 1 (2024): 47–52. http://dx.doi.org/10.62123/enigma.v2i1.31.
Full textSándor, Hunor, Béla Genge, Zoltán Szántó, Lőrinc Márton, and Piroska Haller. "Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems." International Journal of Critical Infrastructure Protection 25 (June 2019): 152–68. http://dx.doi.org/10.1016/j.ijcip.2019.04.002.
Full textDevi, Savita, and Taran Singh Bharti. "A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud." International Journal of Cloud Applications and Computing 12, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijcac.311036.
Full textSeid, Elias, Oliver Popov, and Fredrik Blix. "Security Attack Behavioural Pattern Analysis for Critical Service Providers." Journal of Cybersecurity and Privacy 4, no. 1 (2024): 55–75. http://dx.doi.org/10.3390/jcp4010004.
Full textShankaramma and G. S. Nagaraj. "Methods for Storage Intrusion Mitigation with Data Transport Security Tunnels." International Journal of Microsystems and IoT 1, no. 5 (2023): 335–41. https://doi.org/10.5281/zenodo.10254103.
Full textQuader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Full textRiggs, Hugo, Shahid Tufail, Imtiaz Parvez, et al. "Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure." Sensors 23, no. 8 (2023): 4060. http://dx.doi.org/10.3390/s23084060.
Full textAli, Mohd Hasan, and Sultana Razia Akhter. "Nonlinear Controller-Based Mitigation of Adverse Effects of Cyber-Attacks on the DC Microgrid System." Electronics 13, no. 6 (2024): 1057. http://dx.doi.org/10.3390/electronics13061057.
Full textFarrar, Nathan, and Mohd Hasan Ali. "Cyber-Resilient Converter Control System for Doubly Fed Induction Generator-Based Wind Turbine Generators." Electronics 13, no. 3 (2024): 492. http://dx.doi.org/10.3390/electronics13030492.
Full textRahim, Md Jawadur, Muhammad Ihsan Ibn Rahim, Ahlina Afroz, and Omolola Akinola. "Cybersecurity Threats in Healthcare IT: Challenges, Risks, and Mitigation Strategies." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 438–62. https://doi.org/10.60087/jaigs.v6i1.268.
Full textWosah, Peace Nmachi, and Win Thomas. "PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY." International Journal of Network Security & Its Applications (IJNSA) 13, no. 2 (2021): 63–72. https://doi.org/10.5281/zenodo.4708611.
Full textChoi, In-Sun, Junho Hong, and Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System." IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Full textLakshminarayana, Subhash, Jabir Shabbir Karachiwala, Teo Zhan Teng, Rui Tan, and David K. Y. Yau. "Performance and Resilience of Cyber-Physical Control Systems With Reactive Attack Mitigation." IEEE Transactions on Smart Grid 10, no. 6 (2019): 6640–54. http://dx.doi.org/10.1109/tsg.2019.2909357.
Full textRahman, M. A., M. S. Rana, and H. R. Pota. "Mitigation of Frequency and Voltage Disruptions in Smart Grid During Cyber-Attack." Journal of Control, Automation and Electrical Systems 31, no. 2 (2020): 412–21. http://dx.doi.org/10.1007/s40313-020-00574-z.
Full textGonzalez-Granadillo, Gustavo, Rodrigo Diaz, Juan Caubet, and Ignasi Garcia-Milà. "CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures." Journal of Cybersecurity and Privacy 1, no. 2 (2021): 365–86. http://dx.doi.org/10.3390/jcp1020020.
Full textBehera, Bibhuti Bhusana, Rajani Kanta Mohanty, and Binod Kumar Pattanayak. "A Deep Fusion Model For Automated Industrial Iot Cyber Attack Detection And Mitigation." International Journal of Electrical and Electronics Research 10, no. 3 (2022): 604–13. http://dx.doi.org/10.37391/ijeer.100332.
Full textSavitri, Fania Mutiara, Savira Maghfiratul Fadhilah, Nilta Fidya Silva, Saniya Ovin Neha, Hifni Syauqi Albana, and M. Aufa Taqiyyudin. "Risk Analysis of Information Technology Using Si Semar Layak in Online Umrah Passport Registration." Munazzama: Journal of Islamic Management and Pilgrimage 4, no. 1 (2024): 27–37. http://dx.doi.org/10.21580/mz.v4i1.21118.
Full textLi, Bo, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, and Zhiming Gu. "Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks." Energies 18, no. 12 (2025): 3145. https://doi.org/10.3390/en18123145.
Full textHan-Mei Liu. "AI-Enabled Adaptive Cybersecurity Response Using Reinforcement Learning." Frontiers in Artificial Intelligence Research 2, no. 1 (2025): 1–12. https://doi.org/10.71465/gwa30h81.
Full textNejabatkhah, Farzam, Yun Wei Li, Hao Liang, and Rouzbeh Reza Ahrabi. "Cyber-Security of Smart Microgrids: A Survey." Energies 14, no. 1 (2020): 27. http://dx.doi.org/10.3390/en14010027.
Full textMehedy, Hasan MD. "Combating Evolving Threats: A Signature-Anomaly Based Hybrid Intrusion Detection System for Smart Homes with False Positive Mitigation." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 403–11. http://dx.doi.org/10.22214/ijraset.2024.61393.
Full text