Results 161 to 170 of about 62,210 (284)
Detecting Cyber Attacks On Nuclear Power Plants [PDF]
Julian L. Rrushi, Roy H. Campbell
openaire +1 more source
ABSTRACT Sugar crops, including but not limited to sugarcane, sugar beet, sweet sorghum and stevia, are major sources of sugar production in the world. However, conventional breeding approaches, limited by long breeding cycles, low efficiency and restricted capacity to improve complex traits in sugar crops, are increasingly insufficient to address the ...
Peilin Wang +7 more
wiley +1 more source
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm. [PDF]
Jyothi KK +8 more
europepmc +1 more source
Cyber Attacks: Detection, Prevention Techniques
Cyber attacks are escalating in both volume and sophistication, posing an increasingly critical threat to digital infrastructureworldwide. From personal data theft and corporate espionage to targeted disruption of essential services, attackers employ a widespectrum of malicious techniques that threaten individuals, organizations, and entire societies ...
openaire +2 more sources
ABSTRACT Drought tolerance in crops often involves trade‐offs between water conservation, growth and reproduction. Understanding how water‐saving strategies are implemented at physiological and metabolic levels remains critical for improving crop performance under water‐limited conditions.
Ryosuke Mega +9 more
wiley +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley +1 more source
Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley +1 more source

