A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure and private smart grid: the SPEAR project
2021
The project repository journal : prj 9
Secure and private smart grid: the SPEAR project The rapid evolution of the smart technologies has digitised the electrical grid into a new paradigm called smart grid (SG). ...
SPEAR provides a global cybersecurity solution, which (a) detects SG-related cyberthreats, (b) provides an advanced forensic readiness framework; and (c) introduces an SG cyber hygiene framework. ...
there is no current EU-wide consensus on the minimum range of capabilities required for smart devices and meters. ...
doi:10.54050/prj10014017
fatcat:rorhchkp2ra6ppr6sipjiqbh64
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures
2018
EAI Endorsed Transactions on Security and Safety
Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping. ...
In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity ...
SCADA system is the core of smart grid decision making. This interconnection between SCADA system and smart grid creates new possibilities and threats. ...
doi:10.4108/eai.15-10-2018.155856
fatcat:vfxzvkj2irad7jbllg235shqja
A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network
2022
International Journal of Intelligent Engineering and Systems
an edge-of-things solution smart grid for real time data collection. ...
smart meters and the ones they shall have available to
applications that comprise of Advanced Metering solve the threats smart grids provide. ...
doi:10.22266/ijies2022.0228.11
fatcat:bjwkk7bhobbptcs3rcwaasxju4
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures
[article]
2019
arXiv
pre-print
Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping ...
In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity ...
SCADA system is the core of smart grid decision making. This interconnection between SCADA system and smart grid creates new possibilities and threats. ...
arXiv:1901.03899v1
fatcat:ibrinwuagffalnd3dqko55ro44
MITRE ATT&CK Based Evaluation on In-Network Deception Technology for Modernized Electrical Substation Systems
2022
Sustainability
In this paper, we pick one concrete design and implementation of in-network deception technology for IEC 61850 standard compliant smart substation systems in smart grid, named DecIED, and discuss its effectiveness ...
The evaluation is conducted based on the MITRE ATT&CK Matrix for industrial control systems, which tabulates phases and tactics of cyberattack against industrial control systems. ...
threat intelligence. ...
doi:10.3390/su14031256
fatcat:5yjnojkg4jbujgbl5iyi4zcpee
Cyber Hygiene Maturity Assessment Framework for Smart Grid Scenarios
2021
Frontiers in Computer Science
It can be applied for the assessment of the CHL of Smart Grids operating organizations with respect to a number of recommended good practices in cyber hygiene. ...
In an attempt to achieve high resilience of Smart Grids against negative impacts caused by different types of common, predictable but also uncommon, unexpected, and uncertain threats and keep entities ...
ACKNOWLEDGMENTS The authors acknowledge all the SPEAR Consortium for their valuable help in this work. ...
doi:10.3389/fcomp.2021.614337
fatcat:zzky6lijjbfv3nx5j3gasfmqay
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
[article]
2021
arXiv
pre-print
It provides a taxonomy and extensive analysis of the existing honeypots and honeynets, states key design factors for the state-of-the-art honeypot/honeynet research and outlines open issues for future ...
This paper provides a comprehensive survey of the research that has been carried out on honeypots and honeynets for IoT, IIoT, and CPS. ...
Moreover, we outlined and discussed the key design factors for honeypots and honeynets for IoT, IIoT, and CPS applications. ...
arXiv:2108.02287v1
fatcat:l4b23mylyfd6xjtfhrtsrin3zq
Game Theoretic Honeypot Deployment in Smart Grid
2020
Sensors
In this paper, we investigate the use of honeypots, which are considered to mimic the common services of the smart grid and are able to detect unauthorized accesses, collect evidence, and help hide the ...
More specifically, the interaction of an attacker and a defender is considered, who both optimize the number of attacks and the defending system configuration, i.e., the number of real devices and honeypots ...
The honeypots are designed to mimic common services of the smart grid, including Industrial Control System (ICS) devices, smart meters, and smart appliances, among others [7] . ...
doi:10.3390/s20154199
pmid:32731595
pmcid:PMC7435919
fatcat:jmsiklehnbh2rkialftwlmrt3e
Demystifying Deception Technology:A Survey
[article]
2018
arXiv
pre-print
Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. ...
In this work an extensive overview of the deception technology environment is presented. ...
The authors alone are responsible for the content of the paper. ...
arXiv:1804.06196v1
fatcat:72zhe65le5hstovras43caqzdq
A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights
2022
ACM Computing Surveys
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed which has the ability of monitoring and capturing various types of threats, analyzing ...
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis ...
ACKNOWLEDGMENTS This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment ( ...
doi:10.1145/3530809
fatcat:cwk5bp56ere5re2frzgzox56ka
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
[article]
2021
arXiv
pre-print
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing ...
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and ...
ACKNOWLEDGEMENT This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment ( ...
arXiv:2110.15747v1
fatcat:zboddcg4a5gdxmq5hqmo5cpj34
Study Investigation of the Internet of Vehicle (IoV) Security
2021
International Journal of Computer Applications
Cybersecurity is the protection of the things connected to the Internet in one way or the other with a lot of things and millions of connections involved, the Internet connection becomes the target for ...
of vehicle security, and lastly provide a security mitigation recommendation for the Internet of vehicle users. ...
The tremendous increase in the number of IoV devices and vehicles directly shows the need for safety features needed in vehicles.Furthermore, the Internet on its own since invention has enhanced various ...
doi:10.5120/ijca2021921738
fatcat:nhtufvd575bpnjengfa66qleva
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
2020
IEEE Access
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). ...
., Internet which opens the gates for various types of attacks on them. ...
In the IoT based Grid system, machine learning techniques are applied for proper analysis of the large volumes of data and thus aids in decision making to run the grid (smart). ...
doi:10.1109/access.2020.3022842
fatcat:ifkplk2lsjhupkt4c42fovqpta
CAVs Cybersecurity threats digest and analysis
2019
Zenodo
research relating to the particular topic of cybersecurity in CAVs, autonomous vehicles, and smart-city infrastructures.Moreover, the limitations of state-of-the-art cybersecurity systems and the constantly ...
This effort will start as a systemic in-depth literature review of cybersecurity environment aiming to provide explicit, reproducible and auditable methodology for evaluating and interpreting all available ...
Mobile honeypots are honeypots, which runs on a mobile device including smart phones,
tablets, (2009)[42], which
demonstrated the practical use of mobile honeypots. ...
doi:10.5281/zenodo.4728214
fatcat:fonojcfo6fdzbnc7oz6w66zoh4
A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid
2020
IEEE Access
HONEYPOTS It is a recommended practice to have honeypots as part of SG systems. Honyepots are specifically designed devices that mimic the target of malicious attacks. ...
An important enabler of the Smart Grid initiatives is the enhanced use of sensing and measurement capabilities. ...
doi:10.1109/access.2020.3026923
fatcat:cpdqhwe2era6hmewqvmmja7dny
« Previous
Showing results 1 — 15 out of 195 results