Hijacking internet-connected devices to provoke harmful oscillations in an electrical network: a feasibility assessment.
Hugh GowingPaul CuffePublished in: IET Cyper-Phys. Syst.: Theory & Appl. (2020)
Keyphrases
- network infrastructure
- communication technologies
- mobile communication
- computer networks
- internet traffic
- network services
- network nodes
- network topologies
- distribution networks
- high speed networks
- tcp ip
- network traffic
- complex networks
- consumer electronics
- enterprise network
- network model
- communication networks
- remote control
- network technologies
- internet protocol
- internet service providers
- hand held devices
- local area network
- normal operation
- network management
- ad hoc networks
- network structure
- wireless sensor networks