Results 51 to 60 of about 16,976 (274)
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source
Stakeholder Perspectives on Therapeutic and Safe Building Design in Residential Care
ABSTRACT Residential care is a form of out‐of‐home care that plays a critical role in supporting vulnerable young people in Australia. However, there is an evidence gap regarding the built environment in this context. This research aimed to explore the perspectives of key stakeholders in residential care in Victoria, Australia, regarding design that ...
Carmen Schroder +3 more
wiley +1 more source
This paper investigates the cooperative anti-jamming distributed channel selection problem in UAV communication networks. Considering the existence of malicious jamming and co-channel interference, we design an interference-aware cooperative anti-jamming
Yifan Xu +5 more
doaj +1 more source
A Model-Free Cognitive Anti-Jamming Strategy Using Adversarial Learning Algorithm
Modern networking systems can benefit from Cognitive Radio (CR) because it mitigates spectrum scarcity. CR is prone to jamming attacks due to shared communication medium that results in a drop of spectrum usage.
Sudha Y., Sarasvathi V.
doaj +1 more source
Galileo and EGNOS as an asset for UTM safety and security [PDF]
GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low ...
Andrade-Cetto, Juan +7 more
core
Compromise-resilient anti-jamming communication in wireless sensor networks [PDF]
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate ...
Xuan Jiang +3 more
openaire +1 more source
Objectives The interleukin (IL)‐1, IL‐6, and C‐reactive protein (CRP) pathway is central to the immune response after intracerebral hemorrhage (ICH). We tested for associations between hematoma and plasma cytokine concentrations and patient outcomes in Minimally Invasive Surgery Plus Rt‐PA for ICH Evacuation Phase III (MISTIE III) participants ...
Adrian R. Parry‐Jones +54 more
wiley +1 more source
Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems
We show that end-to-end learning of communication systems through deep neural network (DNN) autoencoders can be extremely vulnerable to physical adversarial attacks.
Larsson, Erik G., Sadeghi, Meysam
core +1 more source
Opposing consensus science through scholarly practices: The role of claims maintenance
Abstract This study examines how three US‐based communities who oppose consensus science produce and disseminate scholarly‐like artifacts: pro‐life activists, Young Earth Creationists, and Anthropogenic Climate Crisis skeptics. Prior research shows that industry‐ or church‐backed advocacy campaigns often generate claims supported by these communities ...
Irene V. Pasquetto +3 more
wiley +1 more source
The 3‐Hit Metabolic Signaling Model for Autism Spectrum Disorder: A Summary
ABSTRACT Autism spectrum disorder (ASD) is a highly heritable yet environmentally sensitive neurodevelopmental condition whose biological heterogeneity has resisted a unifying causal explanation for over 100 years. The 3‐hit metabolic signaling model proposes that ASD arises from abnormal persistence of an evolutionarily conserved stress‐response ...
Robert K. Naviaux
wiley +1 more source

