2020
DOI: 10.1007/978-3-030-51971-1_42
|View full text |Cite
|
Sign up to set email alerts
|

The Impact of the Advanced Technologies over the Cyber Attacks Surface

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The data exchange between the VM1 and the PDU was secure. Other methods for secure data exchange are discussed in [46,47]. Figure 69 shows the Wireshark results verifying that the tunnel was functional while also exchanging traffic with other devices somewhere in the world.…”
Section: Using the Ip Network Modeling Platforms To Study Power Elect...mentioning
confidence: 91%
See 1 more Smart Citation
“…The data exchange between the VM1 and the PDU was secure. Other methods for secure data exchange are discussed in [46,47]. Figure 69 shows the Wireshark results verifying that the tunnel was functional while also exchanging traffic with other devices somewhere in the world.…”
Section: Using the Ip Network Modeling Platforms To Study Power Elect...mentioning
confidence: 91%
“…The data exchange between the VM1 and the PDU was secure. Other methods for secure data exchange are discussed in [46,47]. Finally, with the help of IP network modeling platforms, different hypotheses can be verified.…”
Section: Using the Ip Network Modeling Platforms To Study Power Elect...mentioning
confidence: 99%
“…Using new technologies to find and predict strange behavior that could be a sign of an attack early on could make systems more resilient. Without any formal programming, machine learning looks at very large datasets to find patterns and find outliers (Dimitrov, 2020). When reinforcement learning models are taught on normal infrastructure operations, they automatically report deviations so that they can be looked at again before they have a big effect (Xing et al, 2021).…”
Section: Advanced Detection Technologiesmentioning
confidence: 99%
“…It's easy for recurrent neural networks to work with time series data, which lets them look for problems in operational information (Xing et al, 2021). Training deep learning models needs a lot of different datasets, which can't be gathered without adding fake data (Dimitrov, 2020). Infrastructure providers can still have trouble getting good training data, but the federal government can help by coordinating data sharing programs.…”
Section: Advanced Detection Technologiesmentioning
confidence: 99%
“…As can be seen, it is accessing different content on the Internet that goes along with the encrypted data in the tunnel. Other ways to implement secure data exchange are presented in [39,40]. In the modeled "WAN" network (from Figure 2), a tunnel is created between R1 and R4 that passes through R1, R2, R3, R4, and vice versa.…”
Section: Security Of Data Exchangementioning
confidence: 99%