Results 161 to 170 of about 62,210 (284)

Detecting Cyber Attacks On Nuclear Power Plants [PDF]

open access: yes, 2010
Julian L. Rrushi, Roy H. Campbell
openaire   +1 more source

Revisiting the Molecular Roadmap for Sugar Crops: Genome Reading, Trait Writing and Variety Redesigning

open access: yesPlant Biotechnology Journal, EarlyView.
ABSTRACT Sugar crops, including but not limited to sugarcane, sugar beet, sweet sorghum and stevia, are major sources of sugar production in the world. However, conventional breeding approaches, limited by long breeding cycles, low efficiency and restricted capacity to improve complex traits in sugar crops, are increasingly insufficient to address the ...
Peilin Wang   +7 more
wiley   +1 more source

A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm. [PDF]

open access: yesSci Rep
Jyothi KK   +8 more
europepmc   +1 more source

Temporal Cyber Attack Detection.

open access: yes, 2017
Joey Ingram   +3 more
openaire   +2 more sources

Cyber Attacks: Detection, Prevention Techniques

open access: yes
Cyber attacks are escalating in both volume and sophistication, posing an increasingly critical threat to digital infrastructureworldwide. From personal data theft and corporate espionage to targeted disruption of essential services, attackers employ a widespectrum of malicious techniques that threaten individuals, organizations, and entire societies ...
openaire   +2 more sources

A Water‐Saving Drought Survival Phenotype in a Wheat TILLING Mutant Involves Survival‐Biased Metabolic and Phosphorylation Reprogramming

open access: yesPlant, Cell &Environment, EarlyView.
ABSTRACT Drought tolerance in crops often involves trade‐offs between water conservation, growth and reproduction. Understanding how water‐saving strategies are implemented at physiological and metabolic levels remains critical for improving crop performance under water‐limited conditions.
Ryosuke Mega   +9 more
wiley   +1 more source

Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review

open access: yesPublic Administration Review, EarlyView.
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley   +1 more source

Reengaging Criminology in Regulation and Governance: A Synergistic Research Agenda on Regulatory Guardianship

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs   +3 more
wiley   +1 more source

Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”

open access: yesRegulation &Governance, EarlyView.
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley   +1 more source

Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement

open access: yesTheoria, EarlyView.
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley   +1 more source

Home - About - Disclaimer - Privacy