Results 141 to 150 of about 1,171,713 (299)

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study. [PDF]

open access: yesSensors (Basel), 2023
Zarzycki K   +7 more
europepmc   +1 more source

Reliability assessment of cyber physical distribution systems including sequential scenario simulation correction and recovery resource decisions

open access: yesEnergy Conversion and Economics, EarlyView.
Abstract With the deepening of research on smart grids, the distribution system has gradually evolved into a cyber‐physical distribution system (CPDS). The refined reliability modelling and assessment methods for CPDS are of great significance. This paper proposes an integrated reliability assessment framework combining distribution information system (
Wei Wu   +9 more
wiley   +1 more source

Automatic Verification and Execution of Cyber Attack on IoT Devices. [PDF]

open access: yesSensors (Basel), 2023
Færøy FL, Yamin MM, Shukla A, Katt B.
europepmc   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Cyber attack evaluation dataset for deep packet inspection and analysis. [PDF]

open access: yesData Brief, 2023
Shandilya SK   +3 more
europepmc   +1 more source

Internal physiological drivers of leaf development in trees: Understanding the relationship between non‐structural carbohydrates and leaf phenology

open access: yesFunctional Ecology, EarlyView.
Read the free Plain Language Summary for this article on the Journal blog. Abstract Plant phenology is crucial for understanding plant growth and climate feedback. It affects canopy structure, surface albedo, and carbon and water fluxes. While the influence of environmental factors on phenology is well‐documented, the role of plant intrinsic factors ...
Yunpeng Luo   +8 more
wiley   +1 more source

Cyber attack monitoring

open access: yes, 2021
To date, the detection of cyberattacks is a very important task. Network monitoring is used for this purpose. Moreover, there is a need for rapid analytical processing of information, which requires the use of methods of data mining. Data mining helps to extract knowledge from acquired data.
openaire   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. [PDF]

open access: yesSensors (Basel), 2022
Le TD   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy