Journal articles on the topic 'Control-oriented attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Control-oriented attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cheng, Long, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, and Danfeng (Daphne) Yao. "Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–36. http://dx.doi.org/10.1145/3462699.
Full textPisu, Pierluigi, Jim Martin, and Zoleikha Abdollahi Biron. "A Control Oriented Perspective for Security in Connected and Automated Vehicles." Mechanical Engineering 139, no. 12 (December 1, 2017): S17—S20. http://dx.doi.org/10.1115/1.2017-dec-10.
Full textSánchez, Helem S., Damiano Rotondo, Teresa Escobet, Vicenç Puig, and Joseba Quevedo. "Bibliographical review on cyber attacks from a control oriented perspective." Annual Reviews in Control 48 (2019): 103–28. http://dx.doi.org/10.1016/j.arcontrol.2019.08.002.
Full textMa, Jian Hong, and Li Xia Ji. "Shrew Attack on Internet Congestion Control Protocol in Control Engineering." Advanced Materials Research 648 (January 2013): 277–80. http://dx.doi.org/10.4028/www.scientific.net/amr.648.277.
Full textBhardwaj, Akashdeep, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, and Leonardo Mostarda. "Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems." IEEE Access 8 (2020): 104956–66. http://dx.doi.org/10.1109/access.2020.2998983.
Full textTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Full textDelgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.
Full textWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Full textBaig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (September 6, 2021): 5967. http://dx.doi.org/10.3390/s21175967.
Full textGenge, Béla, Piroska Haller, Adrian-Vasile Duka, and Hunor Sándor. "A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 417–28. http://dx.doi.org/10.1515/auto-2019-0017.
Full textMuria, Risky Mezi, Arif Muntasa, Muhammad Yusuf, and Ardi Hamzah. "Studi Litelatur: Peningkatan Kinerja Digital Forensik Dan Pencegahan Cyber Crime." Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) 3, no. 1 (April 30, 2022): 12–20. http://dx.doi.org/10.31102/jatim.v3i1.1422.
Full textZafar, Faheem, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, and Adeel Anjum. "MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus." Sensors 21, no. 15 (July 28, 2021): 5096. http://dx.doi.org/10.3390/s21155096.
Full textMadrid, Antonio, Mar Joanpere, Lena de Botton, and Roger Campdepadrós. "Media Manipulation Against Social Justice Researchers: Second-Order Sexual Harassment." Qualitative Inquiry 26, no. 8-9 (July 10, 2020): 983–88. http://dx.doi.org/10.1177/1077800420938853.
Full textGupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, and Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids." Energies 14, no. 16 (August 12, 2021): 4941. http://dx.doi.org/10.3390/en14164941.
Full textPark, SeongJu, and Nam-Ho Kim. "Manufacture artificial intelligence education kit using Jetson Nano and 3D printer." Korean Institute of Smart Media 11, no. 11 (December 31, 2022): 40–48. http://dx.doi.org/10.30693/smj.2022.11.11.40.
Full textNOONAN, ALEXANDER. "“What Must Be the Answer of the United States to Such a Proposition?” Anarchist Exclusion and National Security in the United States, 1887–1903." Journal of American Studies 50, no. 2 (February 16, 2016): 347–76. http://dx.doi.org/10.1017/s0021875816000451.
Full textTsoupidi, Rodothea Myrsini, Roberto Castañeda Lozano, and Benoit Baudry. "Constraint-based Diversification of JOP Gadgets." Journal of Artificial Intelligence Research 72 (December 29, 2021): 1471–505. http://dx.doi.org/10.1613/jair.1.12848.
Full textLiagkou, Vasiliki, Vasileios Kavvadas, Spyridon K. Chronopoulos, Dionysios Tafiadis, Vasilis Christofilakis, and Kostas P. Peppas. "Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture." Computation 7, no. 2 (May 5, 2019): 24. http://dx.doi.org/10.3390/computation7020024.
Full textKosmowski, Kazimierz T., Emilian Piesik, Jan Piesik, and Marcin Śliwiński. "Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management." Energies 15, no. 10 (May 15, 2022): 3610. http://dx.doi.org/10.3390/en15103610.
Full textUstun, Taha Selim, S. M. Suhail Hussain, Ahsen Ulutas, Ahmet Onen, Muhammad M. Roomi, and Daisuke Mashima. "Machine Learning-Based Intrusion Detection for Achieving Cybersecurity in Smart Grids Using IEC 61850 GOOSE Messages." Symmetry 13, no. 5 (May 8, 2021): 826. http://dx.doi.org/10.3390/sym13050826.
Full textHuang, Ning, Shuguang Huang, and Chao Chang. "Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 57–76. http://dx.doi.org/10.4018/ijdcf.2021030104.
Full textNewman, Lena. "Nicholas S. Paliewicz and Marouf Hasian Jr. The Securitization of Memorial Space: Rhetoric and Public Memory." RBM: A Journal of Rare Books, Manuscripts, and Cultural Heritage 21, no. 1 (May 29, 2020): 42. http://dx.doi.org/10.5860/rbm.21.1.42.
Full textLee, Yongsoo, Eungyu Lee, and Taejin Lee. "Human-Centered Efficient Explanation on Intrusion Detection Prediction." Electronics 11, no. 13 (July 2, 2022): 2082. http://dx.doi.org/10.3390/electronics11132082.
Full textLee, Sungbin, and Jeonghun Cho. "ACE-M: Automated Control Flow Integrity Enforcement Based on MPUs at the Function Level." Electronics 11, no. 6 (March 15, 2022): 912. http://dx.doi.org/10.3390/electronics11060912.
Full textQiao, Yanchen, Bin Zhang, Weizhe Zhang, Arun Kumar Sangaiah, and Hualong Wu. "DGA Domain Name Classification Method Based on Long Short-Term Memory with Attention Mechanism." Applied Sciences 9, no. 20 (October 9, 2019): 4205. http://dx.doi.org/10.3390/app9204205.
Full textNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Full textEllemor, Heidi, and Jon Barnett. "National Security and Emergency Management after September 11." International Journal of Mass Emergencies & Disasters 23, no. 3 (November 2005): 5–26. http://dx.doi.org/10.1177/028072700502300301.
Full textElbez, Ghada, Hubert B. Keller, Atul Bohara, Klara Nahrstedt, and Veit Hagenmeyer. "Detection of DoS Attacks Using ARFIMA Modeling of GOOSE Communication in IEC 61850 Substations." Energies 13, no. 19 (October 5, 2020): 5176. http://dx.doi.org/10.3390/en13195176.
Full textAdler, Aaron, Peter Samouelian, Michael Atighetchi, and Yat Fu. "Remote Management of Boundary Protection Devices with Information Restrictions." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9398–403. http://dx.doi.org/10.1609/aaai.v33i01.33019398.
Full textFarooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (July 1, 2019): 2536. http://dx.doi.org/10.3390/en12132536.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textSemenykhina, Olena V., and Yuliia О. Rudenko. "ПРОБЛЕМИ НАВЧАННЯ ПРОГРАМУВАТИ УЧНІВ СТАРШИХ КЛАСІВ ТА ШЛЯХИ ЇХ ПОДОЛАННЯ." Information Technologies and Learning Tools 66, no. 4 (September 30, 2018): 54. http://dx.doi.org/10.33407/itlt.v66i4.2149.
Full textLi, Song, Qian Zou, and Wei Huang. "VPN Packet Loss-Oriented Dynamic Control." Applied Mechanics and Materials 340 (July 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amm.340.710.
Full textLi, Shudong, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, and Zhihong Tian. "Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors." Journal of Sensors 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/8820413.
Full textLubkin, Ivan, and Vyacheslav Zolotarev. "Comprehensive Defense System against Vulnerabilities Based on Return-Oriented Programming." Informatics and Automation 21, no. 2 (November 16, 2021): 275–310. http://dx.doi.org/10.15622/ia.21.2.3.
Full textSuryawardani, I. Gusti Ayu Oka, and Agung Suryawan Wiranatha. "DIGITAL MARKETING IN PROMOTING EVENTS AND FESTIVITIES. A CASE OF SANUR VILLAGE FESTIVAL." Journal of Business on Hospitality and Tourism 2, no. 1 (January 6, 2017): 159. http://dx.doi.org/10.22334/jbhost.v2i1.51.
Full textVijayalakshmi, R., and N. Duraipandian. "Service oriented architecture and privacy preserving mashup of healthcare data." International Journal of Engineering & Technology 3, no. 3 (July 9, 2014): 337. http://dx.doi.org/10.14419/ijet.v3i3.2139.
Full textKolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.
Full textShafae, Mohammed S., Lee J. Wells, and Gregory T. Purdy. "Defending against product-oriented cyber-physical attacks on machining systems." International Journal of Advanced Manufacturing Technology 105, no. 9 (May 24, 2019): 3829–50. http://dx.doi.org/10.1007/s00170-019-03805-z.
Full textShafae, Mohammed S., Lee J. Wells, and Gregory T. Purdy. "Correction to: Defending against product-oriented cyber-physical attacks on machining systems." International Journal of Advanced Manufacturing Technology 105, no. 9 (November 22, 2019): 3851–52. http://dx.doi.org/10.1007/s00170-019-04576-3.
Full textVillagrá, Victor A. "Advanced Cybersecurity Services Design." Electronics 11, no. 18 (September 6, 2022): 2803. http://dx.doi.org/10.3390/electronics11182803.
Full textBartoli, A., A. De Lorenzo, E. Medvet, M. Faraguna, and F. Tarlao. "A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration." Cybernetics and Information Technologies 18, no. 4 (November 1, 2018): 94–110. http://dx.doi.org/10.2478/cait-2018-0050.
Full textLubkin, I. A. "Application security metrics when using defense system against vulnerabilities based on return-oriented programming." Proceedings of Tomsk State University of Control Systems and Radioelectronics 24, no. 4 (2021): 46–51. http://dx.doi.org/10.21293/1818-0442-2021-24-4-46-51.
Full textMankovskyi, D. "Leading morphological dominants of stroke as a basis for the morbid psychotype in cardiosurgical patients with postoperative hypoxic-ischemic injuries." Journal of Education, Health and Sport 11, no. 10 (October 29, 2021): 423–34. http://dx.doi.org/10.12775/jehs.2021.11.10.039.
Full textFelson, Richard B., and James T. Tedeschi. "A Social Interactionist Approach to Violence: Cross-cultural Applications." Violence and Victims 8, no. 3 (January 1993): 295–310. http://dx.doi.org/10.1891/0886-6708.8.3.295.
Full textHusam Mahdi, Miaad, and Ibrahim Adel Ibrahim. "Enhancing the security of quality of service-oriented distributed routing protocol for hybrid wireless network." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (April 1, 2023): 121. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp121-128.
Full textCorke, Thomas C., Patrick O. Bowles, Chuan He, and Eric H. Matlis. "Sensing and control of flow separation using plasma actuators." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1940 (April 13, 2011): 1459–75. http://dx.doi.org/10.1098/rsta.2010.0356.
Full textPoddubnyi, V. O., R. Y. Gvozdov, О. V. Sievierinov, and V. M. Fedorchenko. "Object-oriented model of a formal description of an information and communication system." Radiotekhnika, no. 209 (June 24, 2022): 110–17. http://dx.doi.org/10.30837/rt.2022.2.209.11.
Full textWan, Kaifang, Dingwei Wu, Yiwei Zhai, Bo Li, Xiaoguang Gao, and Zijian Hu. "An Improved Approach towards Multi-Agent Pursuit–Evasion Game Decision-Making Using Deep Reinforcement Learning." Entropy 23, no. 11 (October 29, 2021): 1433. http://dx.doi.org/10.3390/e23111433.
Full textJones, J. G., G. D. Padfield, and M. T. Charlton. "Wavelet analysis of pilot workload in helicopter low-level flying tasks." Aeronautical Journal 103, no. 1019 (January 1999): 55–63. http://dx.doi.org/10.1017/s0001924000065106.
Full text