Results 71 to 80 of about 61,508 (265)
Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming +5 more
core +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
Modern network security has a great difficulty in cyber attack detection. In this context, this work presents an CNN-LSTM-GRU Model for cyber attack detection.
Brij B. Gupta +5 more
doaj +1 more source
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source
Cloaking the Clock: Emulating Clock Skew in Controller Area Networks
Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN).
Bushnell, Linda +4 more
core +1 more source
Cyber-Attacks Detection Using Novel IDDMS Framework [PDF]
Security of a data system is a significant property, particularly today when PCs are interconnected by means of the internet. Since no system can be totally secure, the opportune and precise detection of intrusions is essential. Cyber security is the region that manages shielding from cyber terrorism.
Bhivsen, Gadekar Ganesh +4 more
openaire +1 more source
Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie +10 more
wiley +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga +6 more
wiley +1 more source
ABSTRACT One of the critical risks associated with cryptocurrency assets is the so‐called downside risk, or tail risk. Conditional Value‐at‐Risk (CVaR) is a measure of tail risks that is not normally considered in the construction of a cryptocurrency portfolio.
Xinran Huang +3 more
wiley +1 more source

