Results 221 to 230 of about 31,297 (287)
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
Multi‐Sensor Fusion‐Based Fault Detection in CNC Cutting Tools Using DWT and Ensemble Learning
A multi‐sensor CNC tool monitoring system integrates vibration, acoustic emission, spindle current, and cutting‐force signals. The signals undergo wavelet‐based denoising, normalization, and multi‐resolution feature extraction using Discrete Wavelet Transform (DWT).
Kechang Zhang +3 more
wiley +1 more source
Detection of disturbances and cyber-attacks in smart grids using explainable machine learning. [PDF]
Farsi M +7 more
europepmc +1 more source
A covert attack architecture and detection approach in communication networks for homogenous and linear multi‐agent systems (MASs). A residual‐based detection method, exploiting a Kamlan filter observer and extra dynamic, is proposed to detect covert attacks on agents' communication channels.
Mohammad Tahmasbi
wiley +1 more source
Prediction-based attack detection and mitigation mechanism in power system. [PDF]
Zhai P, Zhang M, Wang X.
europepmc +1 more source
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga +6 more
wiley +1 more source
Sparse-selective quantization for real-time cyber threat detection in large-scale networks. [PDF]
Xie Y, Wang R, Dong L.
europepmc +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Artificial intelligence driven approach for securing backup data and enhancing cyber resilience in sustainable smart infrastructure. [PDF]
Kumar B +5 more
europepmc +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source

