Results 91 to 100 of about 31,297 (287)

Seven Years of Supply Chain 4.0 and Supply Chain 5.0: Mapping Themes and Knowledge Toward More Developed and Contemporary Supply Chains

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT Technological advancements aligned with sustainability and resilience requirements, as well as, a greater focus on human‐centric perspectives, are creating significant transformations in supply chains in this decade, bringing them to a more developed stage.
Guilherme F. Frederico
wiley   +1 more source

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

open access: yes, 2018
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming   +5 more
core   +1 more source

Life after herbarium digitisation: Physical and digital collections, curation and use

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton   +39 more
wiley   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems

open access: yesIEEE Open Access Journal of Power and Energy
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj   +1 more source

RWU Cybersecurity Expert Works on State Initiative to Combat Cyber Threats [PDF]

open access: yes, 2017
As a founding member of the state\u27s Joint Cyber Task Force, RWU Cybersecurity Program Director Douglas White battles cyber disruptions in R.I.
Siliezar, Juan
core   +1 more source

Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms

open access: yesSustainable Development, EarlyView.
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza   +2 more
wiley   +1 more source

Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles

open access: yesDigital Communications and Networks
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage ...
Changyin Dong   +7 more
doaj   +1 more source

Counterplanning Deceptions to Foil Cyber-Attack Plans [PDF]

open access: yes, 2003
Proceedings of the 2003 IEEE Workshop in Information Assurance, West Point, NY, June 2003Tactics involving deception are important in military strategies. We have been exploring deliberate deception in defensive tactics by information systems under cyber-
Rowe, Neil C.
core  

Home - About - Disclaimer - Privacy