You are currently viewing a new version of our website. To view the old version click .

167 Results Found

  • Article
  • Open Access
1 Citations
2,049 Views
15 Pages

An Attacker–Defender Game Model with Constrained Strategies

  • Jiaqi Ren,
  • Jin Liu,
  • Yibo Dong,
  • Zhe Li and
  • Weili Li

24 July 2024

Recently, research interest in the field of infrastructure attack and defense scenarios has increased. Numerous methods have been proposed for studying strategy interactions that combine complex network theory and game theory. However, the unavoidabl...

  • Article
  • Open Access
1,650 Views
24 Pages

16 August 2024

The field of infrastructure security has garnered significant research attention. By integrating complex network theory with game theory, researchers have proposed many methods for studying the interactions between the attacker and the defender from...

  • Article
  • Open Access
1 Citations
2,521 Views
21 Pages

29 August 2024

Cybercriminals have become an imperative threat because they target the most valuable resource on earth, data. Organizations prepare against cyber attacks by creating Cyber Security Incident Response Teams (CSIRTs) that use various technologies to mo...

  • Review
  • Open Access
16 Citations
6,398 Views
18 Pages

31 December 2022

Cybersecurity risks have become obstinate problems for critical water infrastructure management in Australia and worldwide. Water management in Australia involves a vast complex of smart technical control systems interconnected with several networks,...

  • Proceeding Paper
  • Open Access
1 Citations
1,031 Views
10 Pages

Traditional security detection methods struggle to identify zero-day attacks in Industrial Control Systems (ICSs), particularly within critical infrastructures (CIs) integrated with the Industrial Internet of Things (IIoT). These attacks exploit unkn...

  • Article
  • Open Access
108 Citations
31,649 Views
29 Pages

An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System

  • Halima Ibrahim Kure,
  • Shareeful Islam and
  • Mohammad Abdur Razzaque

30 May 2018

A cyber-physical system (CPS) is a combination of physical system components with cyber capabilities that have a very tight interconnectivity. CPS is a widely used technology in many applications, including electric power systems, communications, and...

  • Article
  • Open Access
8 Citations
7,431 Views
28 Pages

THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity

  • Sebastian Chlup,
  • Korbinian Christl,
  • Christoph Schmittner,
  • Abdelkader Magdy Shaaban,
  • Stefan Schauer and
  • Martin Latzenhofer

27 December 2022

The automotive domain is moving away from simple isolated vehicles to interconnected networks of heterogeneous systems forming a complex transportation infrastructure. The additional means of communication result in increased attack surfaces which ca...

  • Review
  • Open Access
9 Citations
3,427 Views
24 Pages

15 April 2023

Complex cyber–physical networks combine the prominent features of complex networks and cyber–physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal opera...

  • Article
  • Open Access
3 Citations
8,453 Views
22 Pages

Water CIs are exposed to a wide number of IT challenges that go from the cooperation and alignment between physical and cyber security teams to the proliferation of new vulnerabilities and complex cyber-attacks with potential disastrous consequences....

  • Article
  • Open Access
7 Citations
4,885 Views
22 Pages

Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified Platforms

  • Nikitha Donekal Chandrashekar,
  • Anthony Lee,
  • Mohamed Azab and
  • Denis Gracanin

18 December 2024

In modern digital infrastructure, cyber systems are foundational, making resilience against sophisticated attacks essential. Traditional cybersecurity defenses primarily address technical vulnerabilities; however, the human element, particularly deci...

  • Article
  • Open Access
7 Citations
3,600 Views
27 Pages

Cyber5Gym: An Integrated Framework for 5G Cybersecurity Training

  • Muhammad Ali Hamza,
  • Usama Ejaz and
  • Hyun-chul Kim

26 February 2024

The rapid evolution of 5G technology, while offering substantial benefits, concurrently presents complex cybersecurity challenges. Current cybersecurity systems often fall short in addressing challenges such as the lack of realism of the 5G network,...

  • Feature Paper
  • Article
  • Open Access
34 Citations
13,019 Views
21 Pages

GridAttackSim: A Cyber Attack Simulation Framework for Smart Grids

  • Tan Duy Le,
  • Adnan Anwar,
  • Seng W. Loke,
  • Razvan Beuran and
  • Yasuo Tan

The smart grid system is one of the key infrastructures required to sustain our future society. It is a complex system that comprises two independent parts: power grids and communication networks. There have been several cyber attacks on smart grid s...

  • Article
  • Open Access
5 Citations
3,075 Views
19 Pages

GOOSE Secure: A Comprehensive Dataset for In-Depth Analysis of GOOSE Spoofing Attacks in Digital Substations

  • Oscar A. Tobar-Rosero,
  • Omar A. Roa-Romero,
  • Germán D. Rueda-Carvajal,
  • Alexánder Leal-Piedrahita,
  • Juan F. Botero-Vega,
  • Sergio A. Gutierrez-Betancur,
  • John W. Branch-Bedoya and
  • Germán D. Zapata-Madrigal

4 December 2024

Cybersecurity in Critical Infrastructures, especially Digital Substations, has garnered significant attention from both the industrial and academic sectors. A commonly adopted approach to support research in this area involves the use of datasets, wh...

  • Article
  • Open Access
1 Citations
4,013 Views
30 Pages

Physics-Informed Graph Neural Networks for Attack Path Prediction

  • Marin François,
  • Pierre-Emmanuel Arduin and
  • Myriam Merad

The automated identification and evaluation of potential attack paths within infrastructures is a critical aspect of cybersecurity risk assessment. However, existing methods become impractical when applied to complex infrastructures. While machine le...

  • Article
  • Open Access
16 Citations
4,298 Views
33 Pages

A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller

  • Alberto Mozo,
  • Amit Karamchandani,
  • Luis de la Cal,
  • Sandra Gómez-Canaval,
  • Antonio Pastor and
  • Lluis Gifre

13 April 2023

The rapid evolution of network infrastructure through the softwarization of network elements has led to an exponential increase in the attack surface, thereby increasing the complexity of threat protection. In light of this pressing concern, European...

  • Article
  • Open Access
17 Citations
3,087 Views
10 Pages

Optimal Disintegration Strategy in Multiplex Networks under Layer Node-Based Attack

  • Mingze Qi,
  • Yu Bai,
  • Xiaohan Li,
  • Hongzhong Deng and
  • Tao Wang

21 September 2019

From social networks to complex infrastructures, many systems could be described by multiplex networks formed by a set of nodes connected via more than one type of links. Network disintegration, which is the problem of identifying a set of nodes or e...

  • Article
  • Open Access
9 Citations
4,898 Views
25 Pages

12 July 2022

Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastr...

  • Article
  • Open Access
38 Citations
19,341 Views
21 Pages

Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework

  • Kyounggon Kim,
  • Faisal Abdulaziz Alfouzan and
  • Huykang Kim

23 August 2021

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal perso...

  • Review
  • Open Access
88 Citations
15,305 Views
21 Pages

Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight

  • Sharyar Wani,
  • Mohammed Imthiyas,
  • Hamad Almohamedh,
  • Khalid M Alhamed,
  • Sultan Almotairi and
  • Yonis Gulzar

29 January 2021

Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate requests on any network. Although the first DDoS attack was reported in 1996, the complexity and sophistication of these attacks has been ever increasing. A...

  • Article
  • Open Access
11 Citations
3,860 Views
21 Pages

13 April 2023

The protection of critical infrastructure such as water treatment and water distribution systems is crucial for a functioning economy. The use of cyber-physical systems in these systems presents numerous vulnerabilities to attackers. To enhance secur...

  • Article
  • Open Access
13 Citations
4,683 Views
20 Pages

Ensemble Learning Framework for DDoS Detection in SDN-Based SCADA Systems

  • Saadin Oyucu,
  • Onur Polat,
  • Muammer Türkoğlu,
  • Hüseyin Polat,
  • Ahmet Aksöz and
  • Mehmet Tevfik Ağdaş

27 December 2023

Supervisory Control and Data Acquisition (SCADA) systems play a crucial role in overseeing and controlling renewable energy sources like solar, wind, hydro, and geothermal resources. Nevertheless, with the expansion of conventional SCADA network infr...

  • Article
  • Open Access
3 Citations
4,531 Views
17 Pages

Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory

  • Tze Uei Chai,
  • Hock Guan Goh,
  • Soung-Yue Liew and
  • Vasaki Ponnusamy

20 April 2023

Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to Smart Factory solutions and delivers insights. As a result, a complex and dynamic network with a vulnerability inherited from the Internet becomes an attrac...

  • Article
  • Open Access
8 Citations
2,351 Views
19 Pages

An Ensemble Transfer Learning Spiking Immune System for Adaptive Smart Grid Protection

  • Konstantinos Demertzis,
  • Dimitrios Taketzis,
  • Vasiliki Demertzi and
  • Charalabos Skianis

16 June 2022

The rate of technical innovation, system interconnection, and advanced communications undoubtedly boost distributed energy networks’ efficiency. However, when an additional attack surface is made available, the possibility of an increase in att...

  • Review
  • Open Access
108 Citations
17,703 Views
22 Pages

The existing power grid is going through a massive transformation. Smart grid technology is a radical approach for improvisation in prevailing power grid. Integration of electrical and communication infrastructure is inevitable for the deployment of...

  • Review
  • Open Access
5 Citations
4,459 Views
45 Pages

A Survey of Advanced Border Gateway Protocol Attack Detection Techniques

  • Ben A. Scott,
  • Michael N. Johnstone and
  • Patryk Szewczyk

3 October 2024

The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training,...

  • Article
  • Open Access
4 Citations
3,832 Views
16 Pages

This article is devoted to the problem of information security in complexes with unmanned aerial vehicles (UAV). Science knows a new promising method of information protection: moving target defense (MTD). The essence of this method is that due to pe...

  • Article
  • Open Access
512 Views
16 Pages

14 October 2025

The study of attack–defense game decision making in critical infrastructure systems confronting intelligent adversaries, grounded in complex network theory, has emerged as a prominent topic in the field of network security. Most existing resear...

  • Article
  • Open Access
87 Citations
14,321 Views
19 Pages

A DDoS Attack Mitigation Scheme in ISP Networks Using Machine Learning Based on SDN

  • Nguyen Ngoc Tuan,
  • Pham Huy Hung,
  • Nguyen Danh Nghia,
  • Nguyen Van Tho,
  • Trung Van Phan and
  • Nguyen Huu Thanh

Keeping Internet users protected from cyberattacks and other threats is one of the most prominent security challenges for network operators nowadays. Among other critical threats, distributed denial-of-service (DDoS) becomes one of the most widesprea...

  • Article
  • Open Access
15 Citations
8,373 Views
20 Pages

DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures

  • Cesar Giovanni Chaves,
  • Siavoosh Payandeh Azad,
  • Thomas Hollstein and
  • Johanna Sepúlveda

Denial of Service (DoS) attacks are an increasing threat for Multiprocessor System-on-Chip (MPSoC) architectures. By exploiting the shared resources on the chip, an attacker is able to prevent completion or degrade the performance of a task. This is...

  • Article
  • Open Access
14 Citations
7,838 Views
20 Pages

Cyber Attack and Defense Emulation Agents

  • Jeong Do Yoo,
  • Eunji Park,
  • Gyungmin Lee,
  • Myung Kil Ahn,
  • Donghwa Kim,
  • Seongyun Seo and
  • Huy Kang Kim

21 March 2020

As the scale of the system and network grows, IT infrastructure becomes more complex and hard to be managed. Many organizations have a serious problem to manage their system and network security. In addition, vulnerabilities of hardware and software...

  • Article
  • Open Access
1,630 Views
23 Pages

21 July 2025

The development of 5G environments has several advantages, including accelerated data transfer speeds, reduced latency, and improved energy efficiency. Nevertheless, it also increases the risk of severe cybersecurity issues, including a complex and e...

  • Article
  • Open Access
2 Citations
2,113 Views
32 Pages

1 September 2025

The recent worldwide turbulence of events from the pandemic lockdown through increased industrial digitization to geopolitical unease shifted towards new primary targets for the latest generation of DDoS threats. Although certain characteristics of c...

  • Article
  • Open Access
35 Citations
5,948 Views
16 Pages

Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features

  • Yussuf Ahmed,
  • Muhammad Ajmal Azad and
  • Taufiq Asyhari

11 January 2024

In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigati...

  • Review
  • Open Access
18 Citations
6,386 Views
33 Pages

25 May 2023

In today’s world, the safety, economic prosperity, and social well-being of nations depend heavily on highly interconnected critical infrastructures. These infrastructures encompass power networks, natural gas systems, communication networks, w...

  • Article
  • Open Access
15 Citations
5,420 Views
24 Pages

Cache Misses and the Recovery of the Full AES 256 Key

  • Samira Briongos,
  • Pedro Malagón,
  • Juan-Mariano de Goyeneche and
  • Jose M. Moya

6 March 2019

The CPU cache is a hardware element that leaks significant information about the software running on the CPU. Particularly, any application performing sequences of memory access that depend on sensitive information, such as private keys, is susceptib...

  • Article
  • Open Access
3,084 Views
28 Pages

How Does AI Transform Cyber Risk Management?

  • Sander Zeijlemaker,
  • Yaphet K. Lemiesa,
  • Saskia Laura Schröer,
  • Abhishta Abhishta and
  • Michael Siegel

23 September 2025

Digital transformation embeds smart cities, e-health, and Industry 4.0 into critical infrastructures, thereby increasing reliance on digital systems and exposure to cyber threats and boosting complexity and dependency. Research involving over 200 exe...

  • Article
  • Open Access
2,349 Views
19 Pages

13 October 2021

Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process...

  • Article
  • Open Access
57 Citations
7,379 Views
19 Pages

26 September 2021

The generation of the mix-based expansion of modern power grids has urged the utilization of digital infrastructures. The introduction of Substation Automation Systems (SAS), advanced networks and communication technologies have drastically increased...

  • Article
  • Open Access
56 Citations
8,197 Views
22 Pages

16 March 2023

This paper proposes a hybrid deep learning algorithm for detecting and defending against DoS/DDoS attacks in software-defined networks (SDNs). SDNs are becoming increasingly popular due to their centralized control and flexibility, but this also make...

  • Article
  • Open Access
3 Citations
4,771 Views
22 Pages

As the Industrial Internet of Things (IIoT) increasingly integrates with traditional networks, advanced persistent threats (APTs) pose significant risks to critical infrastructure. Traditional Intrusion Detection Systems (IDSs) and Anomaly Detection...

  • Article
  • Open Access
5 Citations
3,535 Views
23 Pages

The increased interest in autonomous vehicles has led to the development of novel networking protocols in VANETs In such a widespread safety-critical application, security is paramount to the implementation of the networks. We view new autonomous veh...

  • Article
  • Open Access
4 Citations
2,448 Views
31 Pages

Efficient Communication Protection of Many-Core Systems against Active Attackers

  • Sadia Moriam,
  • Elke Franz,
  • Paul Walther,
  • Akash Kumar,
  • Thorsten Strufe and
  • Gerhard Fettweis

Many-core system-on-chips, together with their established communication infrastructures, Networks-on-Chip (NoC), are growing in complexity, which encourages the integration of third-party components to simplify and accelerate production processes. H...

  • Article
  • Open Access
21 Citations
6,765 Views
20 Pages

Securing Optical Networks Using Quantum-Secured Blockchain: An Overview

  • Purva Sharma,
  • Kwonhue Choi,
  • Ondrej Krejcar,
  • Pavel Blazek,
  • Vimal Bhatia and
  • Shashi Prakash

20 January 2023

The deployment of optical network infrastructure and development of new network services are growing rapidly for beyond 5/6G networks. However, optical networks are vulnerable to several types of security threats, such as single-point failure, wormho...

  • Article
  • Open Access
1,084 Views
18 Pages

15 August 2025

As Industrial Control Systems (ICSs) increasingly adopt cloud–edge collaborative architectures, they face escalating risks from complex cross-domain cyber threats. To address this challenge, we propose a novel threat assessment framework specif...

  • Review
  • Open Access

17 December 2025

The deep integration of digital technologies has significantly improved the operational efficiency of electricity markets, but it has also introduced increasingly severe and sophisticated cybersecurity challenges. As a highly coupled cyber–phys...

  • Article
  • Open Access
25 Citations
7,792 Views
31 Pages

8 August 2022

The possibility of cyber-attacks against critical infrastructure, and in particular nuclear power plants, has prompted several efforts by academia. Many of these works aim to capture the vulnerabilities of the industrial control systems used in these...

  • Communication
  • Open Access
13 Citations
2,219 Views
13 Pages

24 October 2023

Internet of Things (IoT) devices within smart cities, require innovative detection methods. This paper addresses this critical challenge by introducing a deep learning-based approach for the detection of network traffic attacks in IoT ecosystems. Lev...

  • Article
  • Open Access
19 Citations
3,719 Views
22 Pages

29 December 2021

Critical infrastructures have recently been integrated with digital controls to support intelligent decision making. Although this integration provides various benefits and improvements, it also exposes the system to new cyberattacks. In particular,...

  • Article
  • Open Access
1 Citations
1,520 Views
27 Pages

25 June 2025

This study examines how the Russia–Ukraine conflict has affected the robustness of the global liquefied natural gas (LNG) trade network—an essential component of the global energy transition. As environmental concerns intensify worldwide,...

  • Article
  • Open Access
9 Citations
1,940 Views
18 Pages

Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic

  • Jörg Ehmer,
  • Yvon Savaria,
  • Bertrand Granado,
  • Jean-Pierre David and
  • Julien Denoulet

21 August 2024

In recent years, there has been a tremendous increase in the use of connected devices as part of the so-called Internet of Things (IoT), both in private spaces and the industry. Integrated distributed systems have shown many benefits compared to isol...

of 4