Academic literature on the topic 'Cybernetic attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybernetic attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybernetic attacks"

1

Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile, and Nurettin Erginoz. "Massive Cyber-Attacks Patterns Implemented with BDI Agents." Applied Mechanics and Materials 811 (November 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.

Full text
Abstract:
This paper treats the new phenomenon of cyber-war as a new form of human violence between states. The concept of cyber-attack is a particular form of cybernetic war and it is one expensive in terms of cost. We tried to achieve a uniform approach of technological and sociological type using BDI agents and thus making the step to addressing computational sociology of cyberspace. We present two patterns of massive type attacks applicable in cyber space using BDI agents. The approach using BDI agents turned to be flexible and capable to model complex forms of cyber bullying that can occur between
APA, Harvard, Vancouver, ISO, and other styles
2

Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu, and Ramona Lile. "Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures." Applied Mechanics and Materials 841 (June 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.

Full text
Abstract:
This work aims to assess how the infrastructure of production & transport of the electric energy can be annihilated in a nation-state through a cyber attack, as a particular form of manifestation of cybernetic warfare. In this study we consider that the purpose of the cyber attack is only to remove servers from service, logically or physically. There are several standards that integrate the business side of a company with the level of supervision of industrial infrastructure and with the level of control engineering. These levels are integrated and are using different protocols. To simulat
APA, Harvard, Vancouver, ISO, and other styles
3

Kubanov, E. V. "Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration." Public administration aspects 6, no. 8 (2018): 49–55. http://dx.doi.org/10.15421/151846.

Full text
Abstract:
The article analyzed the scientific approaches to the concept of «cybersecurity». The author defined the concept of «cybersecurity of the public administration system», which is understood as the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. The article identified internal and external threats. The author highlighted the main elements of the cybersecurity system
APA, Harvard, Vancouver, ISO, and other styles
4

Atif, Ali. "Cyberspace and Organized Crime: The New Challenges of the 21st Century." International Journal of advanced humanities Research 2, no. 2 (2022): 22–37. https://doi.org/10.21608/ijahr.2022.256386.

Full text
Abstract:
The Occidental Societies are becoming increasingly vulnerable to cybernetic attacks due to their heavy reliance on computer and electronic systems and network fraud. Additionally, the Internet is an easily accessible medium through which any individual, while maintaining their anonymity, can perform a difficult act of linking virtually undetectable and difficult to smuggle, let alone achieve high-impact, striking directly and surprising the adversary. Therefore, the network is becoming “that ideal place” for delinquents and terrorists to carry out their official actions and activit
APA, Harvard, Vancouver, ISO, and other styles
5

Dudek, Wojciech, and Wojciech Szynkiewicz. "Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.

Full text
Abstract:
A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are pr
APA, Harvard, Vancouver, ISO, and other styles
6

Osak, Alexey, Daniil Panasetsky, and Elena Buzina. "Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization." E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.

Full text
Abstract:
Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecurity of automatic control systems, such as relay protection devices (RP), devices of regime control (RC) and emergency control (EC), automated control systems. At the same time, the issues of cybersecurity include not only the problem of hacker attacks, but also the whole complex of problems relating to adequate functioning of cybernetic systems in the power industry. The authors consider two of the most acute aspects of cybersecurity in the energy systems of the future in the era of total digital
APA, Harvard, Vancouver, ISO, and other styles
7

Akhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova, and Sh Sagyndykova. "Decision support system for assessing the consequences of cyber attacks." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, no. 1 (2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.

Full text
Abstract:
The architecture of the Bayesian_Net decision support system (DSS) is described, which was developed to analyze data on signs of anomalies and cyberattacks based on the use of Bayesian Networks (BN) for this task. The proposed DSS is distinguished by the use of object-oriented programming and has a modular architecture. The Bayesian_Net DSS is designed to solve data mining problems, in particular, to analyze weakly structured problems related to cybernetic security (CS) of informatization objects (IO), and to assess the consequences of cyber attacks in conditions of weakly structured data on s
APA, Harvard, Vancouver, ISO, and other styles
8

Laktionov, Illia, Andrii Kmit, Ivan Opirskyy, and Oleh Harasymchuk. "RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR." Cybersecurity: Education, Science, Technique 1, no. 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.

Full text
Abstract:
To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets
APA, Harvard, Vancouver, ISO, and other styles
9

Shukla, Prashant Kumar. "An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things." International Journal of Wireless and Ad Hoc Communication 7, no. 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.

Full text
Abstract:
The Internet of Things (IoT) is a cutting-edge piece of cybernetic infrastructure that will eventually link all manner of previously disconnected physical objects to the web. The IoT is rapidly expanding into many facets of human life. IoT's attack surface has grown as a result of the technology's hyper-connectivity and inherent heterogeneity. In addition, IoT devices are used in both managed and unmanaged settings, leaving them open to innovative attacks. Fog computing is used in the proposed intrusion detection system for IoT applications to implement intrusion detection in a decentralised m
APA, Harvard, Vancouver, ISO, and other styles
10

Yuyukin, I. V. "Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness." Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, no. 3 (2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.

Full text
Abstract:
A hypothesis about the possibility of using a spline standard of mapped informativeness of correlation-extreme navigation as a potential for cybernetic awareness is put forward. The expediency of understanding cybernetic awareness as an ontological engineering of the geometric implementation of a spline fragment of mapping to ensure the principle of alternative positioning is revealed. The forecast of the achievability of the effect of the vessel location predictability in the local environment of the satellite signals incapacity in the practical realization of the potential of situational awa
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybernetic attacks"

1

Amoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication." Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.

Full text
Abstract:
Les réseaux sans-fil sont de plus en plus utilisés. La popularité de ces réseaux est due au fait que ces réseaux permettent de créer, modifier et étendre facilement un réseau informatique. Les réseaux sans-fil sont également particulièrement nécessaires pour relier des équipements mobiles tels que des montres connectées, voitures connectées, drones. Les réseaux sans-fil sont également utilisés dans le secteur du transport et de la sécurité pour relier les trains avec le centre de contrôle ou les caméras avec le centre d'enregistrement. Toutefois, contrairement aux réseaux filaires, dans les ré
APA, Harvard, Vancouver, ISO, and other styles
2

Hložanka, Filip. "Simulace správy informační bezpečnosti ve fakultním prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417806.

Full text
Abstract:
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network usi
APA, Harvard, Vancouver, ISO, and other styles
3

Chabak, Kelson D. "Conceptual study of rotary-wing microrobotics." Wright-Patterson: Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA487086.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybernetic attacks"

1

Department of Defense. Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cybernetic attacks"

1

Sokolov, Sergei, Anatoly Nyrkov, Tatiana Knysh, and Yaroslav Demakov. "Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare." In Lecture Notes in Civil Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-6208-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gao, Jian, and Yingjun Chen. "Detecting DOS/DDOS Attacks Under Ipv6." In Proceedings of the 2012 International Conference on Cybernetics and Informatics. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3872-4_110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cholakoska, Ana, Martina Karanfilovska, and Danijela Efnusheva. "Survey of Security Issues, Requirements, Challenges and Attacks in Internet of Things." In Informatics and Cybernetics in Intelligent Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ng, Wing W. Y., Aki P. F. Chan, Daniel S. Yeung, and Eric C. C. Tsang. "Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure." In Advances in Machine Learning and Cybernetics. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11739685_89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "Detecting DDoS Attacks on Multiple Network Hosts." In Developments in Information Security and Cybernetic Wars. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch006.

Full text
Abstract:
The proliferation of low security internet of things devices has widened the range of weapons that malevolent users can utilize in order to attack legitimate services in new ways. In the recent years, apart from very large volumetric distributed denial of service attacks, low and slow attacks initiated from intelligent bot networks have been detected to target multiple hosts in a network in a timely fashion. However, even if the attacks seem to be “innocent” at the beginning, they generate huge traffic in the network without practically been detected by the traditional DDoS attack detection me
APA, Harvard, Vancouver, ISO, and other styles
6

Hotchkiss, Michael Bennett. "Russian Information Warfare and 9/11 Conspiracism." In Developments in Information Security and Cybernetic Wars. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch010.

Full text
Abstract:
Following the September 11, 2001 (9/11) attacks, several “prophecies” circulated on the internet claiming the 16th century French seer Nostradamus predicted the crisis, leading to “Nostradamus” being the top search on Google and other search engines in 2001. Considering Nostradamus prophecies as popular eschatology, a dimension of political conspiracism, it is observed that while the hoaxes have never been attributed to a specific actor(s), the provenance of the prophecies which circulated on 9/11 are connected to a legacy of Russian Cold War-era propaganda. Additionally, several other conspir
APA, Harvard, Vancouver, ISO, and other styles
7

Sallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, and Majdi Ben Saad. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework." In Privacy Solutions and Security Frameworks in Information Protection. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch016.

Full text
Abstract:
While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and more flexible to conceal the crime evidences. Although people are in an unsafe digital environment, they often feel safe. Being aware of this fact and this fiction, the authors draw in this paper a security framework aiming to build real-time security solutions in the very narrow context of high speed networks. This framework is called (f|p) since
APA, Harvard, Vancouver, ISO, and other styles
8

Farouk, Amr. "Critical Infrastructure Protection in Developing Countries." In Cyber Law, Privacy, and Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch054.

Full text
Abstract:
Not all infrastructures are critical. In most countries' definitions, a critical infrastructure (CI) is a collection of indispensable assets that provide an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. CI assets can be classified into three broad categories: Physical, Cybernetic and Human. In the present era, Information and Communication Technology sector (e.g., Cloud Computing, Big Data, Internet of Things) can be regarded as the backbone of the economies of developed and the developing countries worldwide
APA, Harvard, Vancouver, ISO, and other styles
9

Farouk, Amr. "Critical Infrastructure Protection in Developing Countries." In Advances in Finance, Accounting, and Economics. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2361-1.ch002.

Full text
Abstract:
Not all infrastructures are critical. In most countries' definitions, a critical infrastructure (CI) is a collection of indispensable assets that provide an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. CI assets can be classified into three broad categories: Physical, Cybernetic and Human. In the present era, Information and Communication Technology sector (e.g., Cloud Computing, Big Data, Internet of Things) can be regarded as the backbone of the economies of developed and the developing countries worldwide
APA, Harvard, Vancouver, ISO, and other styles
10

Gil, Daniel Juan. "Epilogue: Resurrection and Zombies." In Fate of the Flesh. Fordham University Press, 2021. http://dx.doi.org/10.5422/fordham/9780823290048.003.0007.

Full text
Abstract:
This chapter examines the current pop culture fascination with the undead body visible in the explosion of TV shows and films about zombies. Emmanuel Carrère’s The Kingdom tells the story of the well-known French writer’s brief but intense conversion to Christianity, in the grip of which he was involved in developing the French TV series Les Revenants, which was the model for A&E’s The Returned. Carrère’s account of his relationship to the Christian theology of resurrection as an inspiration for Les Revenants reveals the truth of the “undead” genres more generally, namely as a culture-wide
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybernetic attacks"

1

Simpson, Lachlan, Federico Costanza, Kyle Millar, Adriel Cheng, Cheng-Chew Lim, and Hong Gunn Chew. "Algebraic Adversarial Attacks on Integrated Gradients." In 2024 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2024. https://doi.org/10.1109/icmlc63072.2024.10935253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soniya, Phil Munz, and Apurva Narayan. "Are ViTs Weak Against Patch Attacks?" In 2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2024. https://doi.org/10.1109/smc54092.2024.10831775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Wei, Ambra Demontis, Maura Plntor, Patrick P. K. Chan, and Battista Biggio. "LFPD: Local-Feature-Powered Defense Against Adaptive Backdoor Attacks." In 2024 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2024. https://doi.org/10.1109/icmlc63072.2024.10935153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dora, Jean Rosemond, and Ladislav Hluchy. "Attacks on Active Directory - Resource-based Constrained Delegation and New Patches." In 2025 Cybernetics & Informatics (K&I). IEEE, 2025. https://doi.org/10.1109/ki64036.2025.10916465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Shujuan, Panpan Wang, Yunpeng Sun, Zhichao Lian, and Shuohao Li. "RPID: Boosting Transferability of Adversarial Attacks on Vision Transformers." In 2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2024. https://doi.org/10.1109/smc54092.2024.10831175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zou, Yiwen, Wing W. Y. Ng, Xueli Zhang, Brick Loo, Xingfu Yan, and Ran Wang. "MCD: Defense Against Query-Based Black-Box Surrogate Attacks." In 2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2024. https://doi.org/10.1109/smc54092.2024.10832063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dzaky, Julian Daffa, Jason Adrianto Saputra, Nicodemus Nathanael Singale, Hanis Amalia Saputri, and Azani Cempaka Sari. "Improving DNS Server Resilience Against DDoS Attacks Through Anycast Routing." In 2024 6th International Conference on Cybernetics and Intelligent System (ICORIS). IEEE, 2024. https://doi.org/10.1109/icoris63540.2024.10903731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qiao, Yuanxin, Ruilin Xie, Songcheng Xie, and Zhanqi Cui. "Perturbing and Backtracking Based Textual Adversarial Attack." In 2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2024. https://doi.org/10.1109/smc54092.2024.10831550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rao, K. Srinivasa, and D. Manoz Reddy. "Comprehensive Intrusion Detection for Investigating Network Traffic and Botnet Attacks." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tendean, Mariano Joseph, Charles Lim, and Kalpin Erlangga Silaen. "Leveraging Honeypot to Uncover Attack Behaviors on Redis." In 2024 International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA). IEEE, 2024. https://doi.org/10.1109/icicyta64807.2024.10912950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!