IEEE Organizations related to Cyberattack

Back to Top

No organizations are currently tagged "Cyberattack"



Conferences related to Cyberattack

Back to Top

2019 North American Power Symposium (NAPS)

This conference is organized to serve educators and graduate students of regional universities in North America. It is a one-day meeting designed to improve communication of progress and results of university-based power system research. Planned for a college campus setting, it provides for the early dissemination and publication of research project progress before results are available in formal technical paper form at other Power Engineering Society meetings. The Power Engineering Education Committee is responsible for the technical program at this meeting. Attendance can be expected to be approximately 100 faculty, graduate students, and sponsoring industry IEEE members

  • 2018 North American Power Symposium (NAPS)

    NAPS welcomes papers on analytical, computational, theoretical, and experimental studies aimed at solving problems related to the dynamics, stability, control, protection, reliability, economics, and optimal operation of bulk energy systems and distribution systems.

  • 2017 North American Power Symposium (NAPS)

    The NAPS 2017 organizing committee cordially invites you to attend and present original research results at the 49th North American Power Symposium, which will be hosted by West Virginia University, September 17-19, 2017 (tentative). NAPS welcomes papers on analytical, computational, experimental studies aimed at solving problems related to optimized operation, real time and near real time control, monitoring and data collection, protection with and without distributed generations including wind and solar, reliability as well as economics of power and energy systems along with recent trends on connected and smart cities, dc grids and microgrids with its components.

  • 2016 North American Power Symposium (NAPS)

    Every autumn, the NAPS is hosted by a selected university. For almost half century, the NAPS becomes a prestigious conference/exhibition that draws hundreds of international attendees, including academic professors, national laboratory researchers, industrial developers & practitioners, and excellent graduate students in power engineering. NAPS welcomes papers on analytical, computational, experimental studies aimed at solving problems related to operation, control, monitoring, protection, reliability as well as economics of power and energy systems and components. NAPS will continue the long held tradition of encouraging presentation of papers by students and recognizing their best efforts by awards at the end of the symposium.

  • 2015 North American Power Symposium (NAPS)

    NAPS 2015 welcomes papers on analytical, computational, experimental studies aimed at solving problems related to operation, control, monitoring, protection, reliability as well as economics of power and energy systems and components.NAPS is held every year at a different university in North America and provides an international open forum for participants from academia and industry to exchange innovative ideas and solutions. NAPS will continue the long held tradition of encouraging presentation of papers by students and recognizing their best efforts by awards at the end of the symposium.

  • 2014 North American Power Symposium (NAPS)

    NAPS 2014 welcomes papers on analytical, computational, experimental studies aimed at solving problems related to operation, control, monitoring, protection, reliability as well as economics of power and energy systems and components. NAPS is held every year at a different university in North America and provides an international open forum for participants from academia and industry to exchange innovative ideas and solutions with each other. NAPS will continue the long held tradition of encouraging presentation of papers by students and recognizing their best efforts by awards at the end of the symposium.We expect around 75 accepted papers to be presented at the symposium other than 2 panels on the smart electric grid and undergraduate poster session. We also have job fair and invited talk for dinner reception. Only technical papers will be thoroughly reviewed by multiple reviewers and technical program committee before submitting to IEEE Xplore.

  • 2013 North American Power Symposium (NAPS)

    The purpose of the North American Power Symposium is to stimulate advanced scholarly work in the field of electric power systems. This symposium is a forum where students, their academic advisors, and practicing engineers can present the results of their work, discuss the activities of their colleagues, and publish their technical accomplishments with a minimum time delay.

  • 2012 North American Power Symposium (NAPS 2012)

    The symposium will focus on analytical, computational, experimental studies aimed at solving problems related to power and energy system operation,control,monitoring, protection, reliability as well as economics.

  • 2011 North American Power Symposium (NAPS 2011)

    The symposium will focus on analytical, computational, experimental studies aimed at solving problems related to power and energy system operation, control, monitoring, protection, reliability as well as economics.

  • 2010 North American Power Symposium (NAPS 2010)

    Topics of interest include but are not restricted to the following areas: 1.Transmission system operation and control, 2.Distribution system operation and control, 3.Transients and EMC, 4.Power system protection 5. Modeling and simulation of power systems, 6.Power system stability, 7. Power system reliability and security,8. Shipboard power systems, 9.Power electronics in power systems, 10. Instrumentation in power systems, 11. Renewable and sustainable energy systems, 12. High voltage engineering

  • 2009 North American Power Symposium - NAPS

    NAPS 2009 will provide an excellent opportunity for power engineering faculty, students and industrial representatives to share stateof- the-art research results, discuss pressing technical issues and network with colleagues from around North America and the world.

  • 2008 40th North American Power Symposium - NAPS

    The purpose of NAPS is to stimulate scholarly work in the field of electrical power engineering. This symposium is to be a forum where university students, their academic advisors, and practicing engineers can present the results of their work, discuss the activities of their colleagues, and publish their technical accomplishments.

  • 2007 39th North American Power Symposium - NAPS

  • 2006 38th North American Power Symposium - NAPS

  • 2005 37th North American Power Symposium - NAPS


2018 10th International Conference on Cyber Conflict (CyCon)

Conflict and actors in cyberspaceCyber capabilitiesTechnical challenges, innovations and requirementsInternet of thingsInternational law and normsInternational cooperation

  • 2017 9th International Conference on Cyber Conflict (CyCon)

    International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation

  • 2016 8th International Conference on Cyber Conflict (CyCon)

    In today’s increasingly complex cyberspace we see a variety of actors struggling to gain or maintain their position. The ubiquitous use of information and communication technologies has had a profound influence on how these actors pursue their goals and interests. The 8th International Conference on Cyber Conflict (CyCon 2016) will focus on ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace. Both ‘hard’ and ‘soft power’ are being employed to achieve strategic and political goals through technical, legal and economic means. But how can we assess such power? How can we ensure that such power remains in the right hands? How can we ensure or enforce ‘cyber power’ without risking conflict escalation? How can we respond to exercises of this power with the right tools and measures? Is there a way to maintain a balance of power in cyberspace?

  • 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace(CyCon)

    International cooperation and international relations with regards to cyberspace;Technical challenges and requirements;Conflict in cyberspace;Regulations and standards;Virtualisation

  • 2014 6th International Conference on Cyber Conflict (CyCon)

    The International Conference on Cyber Conflict is CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts . The theme of the conference is Active Cyber Defence.

  • 2013 5th International Conference on Cyber Conflict (CyCon)

    Technical, strategic and legal implications of using automaticmethods to manage cyber conflicts. Conceptual Framework of Cyber ConflictsConcepts for using automatic methods in cyber conflictActors in cyber conflictAutomation of Tactical, Operational and Strategic Procedures in Cyber ConflictsCase Studies, Experiments and SystemsCyber Conflict ModelsReasoning and Attribution in Cyber Conflict targeting and Cyber Attack Impact Assessment

  • 2012 4th International Conference on Cyber Conflict (CYCON)

    The 4th International Conference on Cyber Conflict 2012 (CYCON 2012) will provide a multi-disciplinary forum for scholars, researchers, analysts and practitioners to discuss issues related to cyber conflict and warfare. The conference aspires to advance scientific knowledge and understanding and to support the development of related policies, models and systems.

  • 2011 3rd International Conference on Cyber Conflict (ICCC)

    The International Conference on Cyber Conflict is the CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts (see http://www.ccdcoe.org/ICCC). In 2011 the conference will focus on combination of defensive and offensive aspects of Cyber Forces and will combine different views on cyber defence and operations in the current and envisaged threat environments. This shall not be limited to military perspective. Legal, strategic and tec


2018 XIV-th International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH)

The Scope of Conference is devoted to:Analysis, modeling, research and design methods of microsensors and microactuators;Software systems, models, algorithms, methods and strategies of embedded systems design;Field issues in embedded systems modeling and design;Issues of testing, verification, reliability and optimization in embedded systems modeling and design;Sensors and actuators systems, nanotechnology;Biomedical circuits and systems;Energy-efficient wireless sensors;Sensors and actuators for smart devices;


2016 Fifth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)

Cyber security,Computer Science and Security, Cyber Welfare


2010 5th International Conference on Critical Infrastructure (CRIS)

The special theme of the 2010 conference is: INTERACTING CRITICAL INFRASTRUCTURES FOR THE 21ST CENTURY . There is a proliferation of infrastructures in present day societies, such as communications, transportation, electric energy systems, public health management, disaster management etc.This conference is particularly interested in the interfaces between these critical infrastructures.



Periodicals related to Cyberattack

Back to Top

No periodicals are currently tagged "Cyberattack"



Xplore Articles related to Cyberattack

Back to Top

Detection of false data injection in automatic generation control systems using Kalman filter

2017 IEEE Electrical Power and Energy Conference (EPEC), 2017

Automatic Generation Control (AGC) is a vital power system component responsible for the system frequency regulation. Also, it helps to minimize the tie-line power deviation in multi-area systems. The AGC uses communication to send/receive measurements/control actions about frequency and power deviation in power system. Small errors in AGC can drive the frequency out of the allowable range and blackouts may ...


Design of a Cyber Threat Information Collection System for Cyber Attack Correlation

2018 International Conference on Platform Technology and Service (PlatCon), 2018

Nowadays, the number of cyber threats is increasing continuously, and attack techniques are becoming increasingly advanced and intelligent. One important thing that should be noted with regard to this situation is the marked increase in similar cyber incidents which use the same IP, domain, and malicious code for one cyberattack. Therefore, it is essential to understand the correlation between cyberattacks ...


Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks under Deception Attacks

IEEE Transactions on Industrial Informatics, None

This paper considers the resilient consensus problems of discrete-time complex cyber-physical networks under F-local deception attacks. A resilient consensus algorithm, where extreme values received are removed by each node, is firstly introduced. By utilizing the presented algorithm, a necessary and sufficient condition to ensure resilient consensus in the absence of trusted edges is then provided by means of network robustness. ...


Malicious Host Detection by Imaging SYN Packets and A Neural Network

2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018

As is the case for recently networked systems, traffic analysis that detects malicious hosts is one of the most important issues in achieving better security. Many methods for detecting cyber attacks have been proposed; however, methods that specialize in detecting and identifying specific attacks will be obsolete in the near future. Instead of identifying types of cyber attacks, we propose ...


Sliding mode observer-based load frequency control of multi-area power systems under delayed inputs attack

2018 Chinese Control And Decision Conference (CCDC), 2018

This paper investigates the state estimation on load frequency control (LFC) of multi-area power systems under delayed inputs attack. First, the LFC system under time-delay switch attack is modeled by formulating time-delay switch attacks as a switch action. Then, an observer to estimate system states is designed, and sliding surfaces with a discontinuous controller are constructed to the guarantee asymptotical ...


More Xplore Articles

Educational Resources on Cyberattack

Back to Top

IEEE-USA E-Books

  • Detection of false data injection in automatic generation control systems using Kalman filter

    Automatic Generation Control (AGC) is a vital power system component responsible for the system frequency regulation. Also, it helps to minimize the tie-line power deviation in multi-area systems. The AGC uses communication to send/receive measurements/control actions about frequency and power deviation in power system. Small errors in AGC can drive the frequency out of the allowable range and blackouts may occur. Since communication links in recent smart grids are targets of cyber attackers, this renders AGC systems in modern smart grids susceptible to false data injection attacks. This paper investigates the impact of cyber attacks on the AGC and how the adversary can perform an attack against it. Also, it proposes a method to detect these attacks using a Kalman filter-based technique. To confirm the effectiveness of this approach, a 2-area power system is simulated using MATLAB/Simulink. The results show that the utilized technique is capable of detecting various types of false data injection attacks against AGC systems.

  • Design of a Cyber Threat Information Collection System for Cyber Attack Correlation

    Nowadays, the number of cyber threats is increasing continuously, and attack techniques are becoming increasingly advanced and intelligent. One important thing that should be noted with regard to this situation is the marked increase in similar cyber incidents which use the same IP, domain, and malicious code for one cyberattack. Therefore, it is essential to understand the correlation between cyberattacks that occur due to the re-use of the same attack infrastructure (IP, domain, malicious code, etc.) for different cyberattacks, in order to detect and respond promptly to similar cyberattacks. To understand the correlation between cyberattacks, it is necessary to collect the related data concerning the procedures and techniques of cyberattacks. This paper proposes the design details of the cyber threat information collection system according to such needs. The proposed system performs the function of collecting the attack infrastructure data (IoCs) exploited for the cyberattack from various open data sources (OSINT, Open Source INTelligence), and uses the collected data as an input value to collect more data recursively. The relationship of the collected data can also be collected, saved, and managed, so that the data can be used to analyze the collection of cyberattacks. The proposed system uses a virtualization structure and distributed processing technology to collect data stably from various collection channels.

  • Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks under Deception Attacks

    This paper considers the resilient consensus problems of discrete-time complex cyber-physical networks under F-local deception attacks. A resilient consensus algorithm, where extreme values received are removed by each node, is firstly introduced. By utilizing the presented algorithm, a necessary and sufficient condition to ensure resilient consensus in the absence of trusted edges is then provided by means of network robustness. We further generalize the notion of network robustness and present the necessary and sufficient condition for the achievement of resilient consensus in the presence of trusted edges. In addition, we show that through appropriately assigning the trusted edges, the resilient consensus can be reached under arbitrary communication network. At last, the validity of the theoretical findings is demonstrated by simulation examples.

  • Malicious Host Detection by Imaging SYN Packets and A Neural Network

    As is the case for recently networked systems, traffic analysis that detects malicious hosts is one of the most important issues in achieving better security. Many methods for detecting cyber attacks have been proposed; however, methods that specialize in detecting and identifying specific attacks will be obsolete in the near future. Instead of identifying types of cyber attacks, we propose a novel method to detect malicious hosts based on their behavior characteristics when they send SYN packets. Our method does not identify types of cyber attacks. It detects malicious hosts suspiciously sending SYN packets. This paper shows that (1) we have developed a method to convert a series of SYN packets to a visual image as input for neural networks, (2) the image represents distinctive features of the behavior of the hosts and (3) our convolutional neural network model successfully distinguishes malicious host from normal ones. Our preliminary evaluation using real-word traffic shows that the detection accuracy for identifying malicious hosts is over 98% regardless of types of attack.

  • Sliding mode observer-based load frequency control of multi-area power systems under delayed inputs attack

    This paper investigates the state estimation on load frequency control (LFC) of multi-area power systems under delayed inputs attack. First, the LFC system under time-delay switch attack is modeled by formulating time-delay switch attacks as a switch action. Then, an observer to estimate system states is designed, and sliding surfaces with a discontinuous controller are constructed to the guarantee asymptotical stability of the LFC system. Finally, a sliding mode controller is constructed to ensure the reachability of the systems trajectories.

  • Effect of Malware Spreading on Propagation of Cascading Failure in Cyber-Coupled Power Systems

    In this paper, we consider the failure propagation in a power system which is coupled with a cyber network. We identify the ratio of the infection rate of malware to the tripping rate of elements in the power network, defined as cyber-physical propagation ratio (CPPR), as a crucial parameter, and show that CPPR affects the propagation pattern. When CPPR is very small, the overloading effect in the power system dominates, and the failure propagation profile shows a typical "jump" or step pattern. Moreover, as CPPR increases, the step magnitude rapidly reduces and becomes less noticeable. Furthermore, we develop a simple approach to distinguish various propagation patterns for different values of CPPR. Results show that CPPR effectively characterizes the significance of cyber coupling and hence the relative impact of malicious attack from the cyber network, and its value determines how cascading failure propagates in a cyber-coupled power network.

  • Deep Neural Network for Detection of Cyber Attacks

    In this paper the approach for detection of cyber attacks is described. The approach is based on deep neural network. The main goal of proposed approach is to detect unknown, previous unseen cyber attacks. The proposed approach can increase the reliability of detection cyber attacks in computer systems and, as a result, it may reduce financial losses of companies.

  • Managing Cyber Threat Intelligence in a Graph Database: Methods of Analyzing Intrusion Sets, Threat Actors, and Campaigns

    Efforts to cope jointly with the ever-increasing number of breach incidents have resulted in the establishment of the standard format and protocol and given birth to many consultative groups. In addition, various channels that distribute Cyber Threat Intelligence information free of charge have emerged, and studies on utilizing such channels have spread. As the market for sharing information professionally is expanding, the need to manage the shared information in various ways in order to achieve better result has arisen. This paper proposes a standardized management structure and method based on the standardized format and a meaning and standard of Cyber Threat Intelligence that can be shared outside when loading OSINT information collected from various channels into the graph database. This paper also proposes a method of supporting the detection provided by existing security equipment with the information saved in the graph database and an effective method of analysis. Lastly, the paper discusses the advantages that can be expected from saving cyber threat information in the graph database developed using information collected from the outside.

  • Fighting Cyber Terrorism: Comparison of Turkey and Russia

    In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about which attacks should be called terrorist attacks. The purpose of this study is to analyze cyber terrorism according to Turkish Law and Russian Law. In the first part of the study Russian and Turkish legislation about cyber terrorism are discussed separately. The second part contains comparison between these two countries and the conclusion.

  • Cascading Failure of Cyber-Coupled Power Systems Considering Interactions Between Attack and Defense

    In this paper, we develop a network-based model with consideration of the physical power flow process to study the cascading failure in cyber-coupled power systems. We take the coupling between power and cyber networks as being resulted from the interdependence of power nodes and cyber nodes. Interaction between two processes, one aiming to attack (cause damage) and the other aiming to defend (protect) the components in the power network, is considered in the model. This interaction offers a novel perspective to interpreting the interdependence of power and cyber networks. To study how an attacker or defender deploys resources to attack or protect a power component, four strategies in distributing the attack and defense strengths are considered, namely, even distribution, degree-based distribution, capacity-based distribution, and random distribution. To probe into the actual propagation process of a blackout, we define four critical time points, namely, start time, attack time, isolation time and end time, and use these time points to analyze and evaluate the effectiveness of different attack and defense strategies. The tit-for-tat defense strategy, in which defender adopts the same strategy as the attacker, is found to be the preferred defense strategy under most conditions. Moreover, allocating defense strength in terms of capacity-based distribution can most effectively suppress cascading failure. This finding was not obtainable without due consideration of the physical power flow process in network-based models.



Standards related to Cyberattack

Back to Top

No standards are currently tagged "Cyberattack"