Results 81 to 90 of about 31,297 (287)

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Pattern Analysis of Topological Attacks in Cyber-Physical Power Systems Considering Cascading Outages

open access: yesIEEE Access, 2020
Modern cyber-physical power systems are vulnerable to cyber attacks. Given that cyber and physical networks are coupled tightly, attacks in the cyber layer can penetrate the physical layer, causing the outage of transmission lines and other physical ...
Zhimei Zhang   +3 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Young adult self‐harm: The role of victimisation and polygenic risk in a population‐based longitudinal study

open access: yesJCPP Advances, EarlyView.
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki   +8 more
wiley   +1 more source

Hacking the market: Systemic contagion from cybersecurity breaches [PDF]

open access: yes, 2017
The average stock market reaction in the 10 days after a cyber attack has become increasingly negative, write Constantin Gurdgiev and Shaen ...
Vieira, Helena
core  

Neurophysiological correlates of visually induced motion sickness severity: A scoping review of the impact of experimental settings on EEG spectral power

open access: yesJournal of Intelligent Medicine, EarlyView.
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai   +5 more
wiley   +1 more source

Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A Review

open access: yesIEEE Open Journal of Power Electronics
This paper presents a systematic overview of the resilience framework for power electronics converter-based cyber-physical systems (CPSs), emphasizing end-to-end responses to the emerging challenges posed by cyber-physical attacks.
Chang Liu   +5 more
doaj   +1 more source

Archetypes of SME Resilience: A Systematic Literature Review of Antecedents, Types and Outcomes of Resilience in SMEs

open access: yesStrategic Change, EarlyView.
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy