Results 61 to 70 of about 61,083 (243)
Local Cyber-physical Attack with Leveraging Detection in Smart Grid
A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack ...
Chung, Hwei-Ming +4 more
core +1 more source
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi +6 more
wiley +1 more source
Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen +10 more
wiley +1 more source
In recent years, microgrids (MGs) have attracted much attention from researchers due to the aggregation of distributed generation (DG) sources for visibility purposes, proper connection of these DGs and the power system, as well as more efficient control
Mohammad Sadegh Ghafoori, Jafar Soltani
doaj +1 more source
Research on Game Theory of Air Traffic Management Cyber Physical System Security
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences.
Zhijun Wu, Ruochen Dong, Peng Wang
doaj +1 more source
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core +1 more source
Detection of Cyber Attacks using Machine Learning
Abstract: In today's world, every aspect of daily life is now dependent on cyberspace. As a result, cybercrimes and threats are becoming more likely. Numerous machine learning methods have been developed to combat cyber threats and prevent them. Machine learning played an important role to detect the cyber-attacks as machine learning algorithms were ...
Simran Saini, Dr. Arvind Kalia
openaire +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
Detection-based active defense of biased injection attack based on robust adaptive controller
As the promising technology, the cooperative cyber-physical system can enhance the operating efficiency and reliability of smart grids. Meanwhile, the characteristics that deep integration of cyber-physical system can make smart grid face new security ...
Xinyu Wang +3 more
doaj +1 more source
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source

