Zobrazeno 1 - 10
of 454
pro vyhledávání: '"Youssef, Amr A."'
Autor:
Saber, Ahmad Mohammad, Youssef, Amr, Svetinovic, Davor, Zeineldin, Hatem, El-Saadany, Ehab F.
Line Current Differential Relays (LCDRs) are high-speed relays progressively used to protect critical transmission lines. However, LCDRs are vulnerable to cyberattacks. Fault-Masking Attacks (FMAs) are stealthy cyberattacks performed by manipulating
Externí odkaz:
http://arxiv.org/abs/2409.04242
Autor:
Saber, Ahmad Mohammad, Selim, Alaa, Hammad, Mohamed M., Youssef, Amr, Kundur, Deepa, El-Saadany, Ehab
With the rapid integration of electronically interfaced renewable energy resources and loads into smart grids, there is increasing interest in power quality disturbances (PQD) classification to enhance the security and efficiency of these grids. This
Externí odkaz:
http://arxiv.org/abs/2409.00025
The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party
Externí odkaz:
http://arxiv.org/abs/2405.18586
Autor:
Saber, Ahmad Mohammad, Youssef, Amr, Svetinovic, Davor, Zeineldin, Hatem, Kundur, Deepa, El-Saadany, Ehab
Recently, there has been a growing interest in utilizing machine learning for accurate classification of power quality events (PQEs). However, most of these studies are performed assuming an ideal situation, while in reality, we can have measurement
Externí odkaz:
http://arxiv.org/abs/2402.14949
Distributed Volt-Var Control (VVC) is a widely used control mode of smart inverters. However, necessary VVC curve parameters are remotely communicated to the smart inverter, which opens doors for cyberattacks. If the VVC curves of an inverter are mal
Externí odkaz:
http://arxiv.org/abs/2309.10304
A diverse set of Internet of Things (IoT) devices are becoming an integrated part of daily lives, and playing an increasingly vital role in various industry, enterprise and agricultural settings. The current IoT ecosystem relies on several IoT manage
Externí odkaz:
http://arxiv.org/abs/2307.13952
We conduct a large-scale measurement of developers' insecure practices leading to mini-app to super-app authentication bypass, among which hard-coding developer secrets for such authentication is a major contributor. We also analyze the exploitabilit
Externí odkaz:
http://arxiv.org/abs/2307.09317
Remotely controlled mobile robots are important examples of Cyber-Physical Systems (CPSs). Recently, these robots are being deployed in many safety critical applications. Therefore, ensuring their cyber-security is of paramount importance. Different
Externí odkaz:
http://arxiv.org/abs/2303.04931
Publikováno v:
Elsevier Computers & Security, volume 118, July 2022
Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet. Nowadays, websites utilize CDNs to improve user experience, perform
Externí odkaz:
http://arxiv.org/abs/2207.09335
The early Universe was characterized by the presence of heavy particles that decoupled at different temperatures leading to different phases of the Universe. This had a consequences on the time evolution of the thermodynamic and the cosmological para
Externí odkaz:
http://arxiv.org/abs/2204.03430