Results 91 to 100 of about 31,297 (287)
ABSTRACT Technological advancements aligned with sustainability and resilience requirements, as well as, a greater focus on human‐centric perspectives, are creating significant transformations in supply chains in this decade, bringing them to a more developed stage.
Guilherme F. Frederico
wiley +1 more source
Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming +5 more
core +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj +1 more source
RWU Cybersecurity Expert Works on State Initiative to Combat Cyber Threats [PDF]
As a founding member of the state\u27s Joint Cyber Task Force, RWU Cybersecurity Program Director Douglas White battles cyber disruptions in R.I.
Siliezar, Juan
core +1 more source
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage ...
Changyin Dong +7 more
doaj +1 more source
Counterplanning Deceptions to Foil Cyber-Attack Plans [PDF]
Proceedings of the 2003 IEEE Workshop in Information Assurance, West Point, NY, June 2003Tactics involving deception are important in military strategies. We have been exploring deliberate deception in defensive tactics by information systems under cyber-
Rowe, Neil C.
core

