Results 71 to 80 of about 31,297 (287)

A Latent Transition Analysis of Traditional Bullying and Cyberbullying Among Chinese Adolescents: Associations With Life Satisfaction and Depression

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT Bullying, both traditional and cyber, has become a public health concern. Nevertheless, few studies have differentiated between traditional bullying and cyberbullying to examine how their interplay shapes distinct bullying involvement profiles and how these profiles link with well‐being and mental health outcomes.
Xingzhou Zhang   +3 more
wiley   +1 more source

Research on FDIAs localization and traceability techniques for substation networks

open access: yesZhejiang dianli, 2022
With the wide application of ubiquitous sensing, real-time communication and precise control technologies in power grids, intelligent substations are enhancing their state sensing and business decision-making capabilities.
YE Wei   +5 more
doaj   +1 more source

Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center) [PDF]

open access: yes, 2010
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr.
Rotenberg, Marc
core   +1 more source

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks

open access: yesIEEE Access, 2019
With the developing cyber physical power systems and emerging threat of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber infrastructure can be exploited to cause physical damage ...
Qi Wang, Mengya Li, Yi Tang, Ming Ni
doaj   +1 more source

Novel Noninvasive Broad‐Spectrum Infrared Treatment of Ulcerative Colitis by Modulating T‐Cell Relocation

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
A novel graphene‐based broad‐spectrum infrared (BSIR) device is developed for the noninvasive treatment of ulcerative colitis (UC). BSIR irradiation effectively alleviates colonic inflammation and accelerates mucosal recovery by inducing the systemic relocation of T lymphocytes to the spleen.
Siyu Chen   +15 more
wiley   +1 more source

Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie   +10 more
wiley   +1 more source

Malware in the Future? Forecasting of Analyst Detection of Cyber Events

open access: yes, 2018
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi   +51 more
core   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Simulating a Cyber-Attack on the Mass Thruster Controllers at Low-Speed Motion

open access: yesPromet (Zagreb)
The aim of this paper is to highlight the vulnerability of Maritime Autonomous Surface Ships (MASS) to cyber-attack and to illustrate, through a simulation experiment on a testbed, how to mitigate a cyber-attack on the MASS thruster controllers during ...
Igor ASTROV, Sanja BAUK
doaj   +1 more source

Home - About - Disclaimer - Privacy