Results 131 to 140 of about 31,297 (287)
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. [PDF]
Zhou B +5 more
europepmc +1 more source
Guest Editorial: Graph Representation Learning for Feature Extraction and Signal Processing
CAAI Transactions on Intelligence Technology, EarlyView.
Xin Ning
wiley +1 more source
ABSTRACT Hereditary angioedema (HAE) with C1 inhibitor deficiency is a rare disease characterized by unpredictable episodes of tissue swelling (angioedema), which, in most cases, occur first under the age of 18 years, and entail a significant burden of disease not only for the patients but also for their families.
Henriette Farkas +128 more
wiley +1 more source
On 3‐MMC: A Cathinone I Have Come to Know and Love
ABSTRACT This article attempts to complicate the mythology of a compound in a state of becoming. I will trace lightly its origins as a cultural disruptor and how I am implicated in this imperative. Introducing you to 3‐MMC will require multiple modes of storytelling and taking of liberties, drawing on literature reviews, practice‐based research, prose,
Carmen Ostrander
wiley +1 more source
In this large single‐centre series, conversional one‐anastomosis gastric bypass was demonstrated to be safe and to deliver meaningful medium‐term weight loss with low morbidity after primary sleeve gastrectomy or gastric banding. While reflux was not universally resolved, patient‐reported satisfaction was high, and secondary enteroenterostomy provided ...
Aaron Lerch +2 more
wiley +1 more source
Real‐Time Cyberattack Detection for SCADA in Power System
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi +2 more
doaj +1 more source
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks. [PDF]
Baek Y, Shin S.
europepmc +1 more source
Documentation comprises a large proportion of Child and Adolescent Mental Health Service (CAMHS) clinicians/practitioners' work burden and is often completed outside contracted working hours, either requiring overtime pay and/or contributing to burnout.
Judith Dineley +9 more
wiley +1 more source
A Comprehensive Study of Cyber Attack Mitigation with the Exchange of Frequency Containment Reserves Control in a Multi-Infeed Direct Current Power System. [PDF]
Ramadhan UF, Lee J, Yoon M.
europepmc +1 more source
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde +4 more
openaire +1 more source

