تصفح حسب الموضوع "Crime"
السجلات المعروضة 1 -- 16 من 16
-
A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems
( MDPI AG , 2020 , Article Review)Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable ... -
Comprehensive review of cybercrime detection techniques
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ... -
Covert attack in load frequency control of power systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The purpose of this work is to design a covert agent structure that can create a non-zero frequency deviation in the load frequency control (LFC) system and illustrate the necessity of a secure communication network for ... -
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ... -
Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)This paper studies covert-attacks for cyber-physical systems (CPS) under conditions that adversaries do not explicitly know the system characteristic matrices (A, B, C). Covert-attacks are considered as undetectable type ... -
Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)This paper studies the data-driven implementation of stealthy cyber-attacks for a class of nonlinear cyber-physical systems (CPS). In particular, we consider and study zero dynamics and covert cyber-attacks. By utilizing ... -
Denial-of-service attack on iec 61850-based substation automation system: A crucial cyber threat towards smart substation pathways
( MDPI , 2021 , Article)The generation of the mix-based expansion of modern power grids has urged the utilization of digital infrastructures. The introduction of Substation Automation Systems (SAS), advanced networks and communication technologies ... -
Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we are mainly concerned with formulation and computation of security indices for linear cyber-physical systems (CPS), where both input and output channels are subjected to malicious cyber attacks. The ... -
Distributed Event-Triggered Consensus-Based Control of DC Microgrids in Presence of DoS Cyber Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In this paper, the problem of distributed event-based control of large scale power systems in presence of denial-of-service (DoS) cyber attacks is addressed. Towards this end, a direct current (DC) microgrid composed of ... -
Identifying the AI-based solutions proposed for restricting Money Laundering in Financial Sectors: Systematic Mapping
( Taylor and Francis Ltd. , 2024 , Article Review)Money laundering (ML) is a critical source of extracting the money illegally from the financial system. It is linked to various types of crimes, including corruption, exploitation of a specific community, drug use, and ... -
Mitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is ... -
Monitoring and detection of malicious adversarial zero dynamics attacks in cyber-physical systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper is mainly concerned with monitoring and detection of zero dynamics (ZD) cyber attacks that are injected by malicious hackers and adversaries to safety critical cyber-physical systems (CPS). We consider a CPS ... -
Partial shoeprint retrieval using multiple point-of-interest detectors and SIFT descriptors
( IOS Press , 2015 , Article)Shoeprint evidence collected from crime scenes can play an important role in forensic investigations. Usually, the analysis of shoeprints is carried out manually and is based on human expertise and knowledge. As well as ... -
Social determinants of depression among mid-to-older aged Australians: A prospective study of the effects of neighbourhood disadvantage and crime
( Elsevier , 2022 , Article)BackgroundFew studies examining social determinants of depression have incorporated area level objectively measured crime combined with self-report measures of perceived crime. How these factors may interrelate with ... -
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks ... -
Using Education for Justice (E4J) Ethics & Integrity Modules
( Qatar University , 2021 , Video)