Results 71 to 80 of about 1,171,713 (299)
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye +16 more
wiley +1 more source
The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators ...
Raid W. Amin +4 more
doaj +1 more source
Research on Game Theory of Air Traffic Management Cyber Physical System Security
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences.
Zhijun Wu, Ruochen Dong, Peng Wang
doaj +1 more source
Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu +9 more
wiley +1 more source
False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu +10 more
doaj +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
Vulnerability analysis of satellite-based synchronized smart grids monitoring systems [PDF]
The large-scale deployment of wide-area monitoring systems could play a strategic role in supporting the evolution of traditional power systems toward smarter and self-healing grids. The correct operation of these synchronized monitoring systems requires
Ahmed faheem Zobaa +19 more
core +1 more source
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi +6 more
wiley +1 more source
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies.
Kulkarni, Nimish +4 more
core +1 more source
Non-linearities, cyber attacks and cryptocurrencies [PDF]
Abstract This paper uses a Markov-switching non-linear specification to analyse the effects of cyber attacks on returns in the case of four cryptocurrencies (Bitcoin, Ethernam, Litecoin and Stellar) over the period 8/8/2015 - 28/2/2019. The analysis considers both cyber attacks in general and those targeting cryptocurrencies in particular, and also ...
Caporale, Guglielmo Maria +3 more
openaire +4 more sources

