Articles with "post attack" as a keyword



Photo by mbrunacr from unsplash

Link State Estimation Under Cyber-Physical Attacks: Theory and Algorithms

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3171169

Abstract: Effective defense against cyber-physical attacks in power grids requires accurate damage assessment. While some solutions have been proposed to recover the line states within the attacked area, existing solutions are limited by the assumption of… read more here.

Keywords: physical attacks; power; attack; post attack ... See more keywords
Photo from wikipedia

Catch Me if You Can : "Delaying" as a Social Engineering Technique in the Post-Attack Phase

Sign Up to like & get
recommendations!
Published in 2023 at "Proceedings of the ACM on Human-Computer Interaction"

DOI: 10.1145/3579465

Abstract: Much is known about social engineering strategies (SE) during the attack phase, but little is known about the post-attack period. To address this gap, we conducted 17 narrative interviews with victims of cyber fraud. We… read more here.

Keywords: post attack; attack phase; social engineering;