Results 71 to 80 of about 62,210 (284)
Detection of Cyber-attacks with Zone Dividing and PCA
AbstractRecently cyber-attacks become serious threats even for control systems. For process control, not only security but also safety must be assured. For safety assurance, the effects of cyber-attacks such as concealed remote operation and maneuvering must be evaluated. We proposed a securing method to divide field networks into plural zones.
Takahito Morita +6 more
openaire +1 more source
Digital Technology's Role in Circular Waste Management: A Systematic Review
ABSTRACT Combining circular economy ideas with digital tools offers a game‐changing way to tackle global sustainability problems. This paper focuses on how digital changes and circular economy models link up. A review has been conducted for 112 articles from 2021 to September 2025, using PRISMA‐2020 methodology. This study covered new tech like AI, IoT,
Reza Eslamipoor
wiley +1 more source
Modern network security has a great difficulty in cyber attack detection. In this context, this work presents an CNN-LSTM-GRU Model for cyber attack detection.
Brij B. Gupta +5 more
doaj +1 more source
ABSTRACT Bullying, both traditional and cyber, has become a public health concern. Nevertheless, few studies have differentiated between traditional bullying and cyberbullying to examine how their interplay shapes distinct bullying involvement profiles and how these profiles link with well‐being and mental health outcomes.
Xingzhou Zhang +3 more
wiley +1 more source
A novel graphene‐based broad‐spectrum infrared (BSIR) device is developed for the noninvasive treatment of ulcerative colitis (UC). BSIR irradiation effectively alleviates colonic inflammation and accelerates mucosal recovery by inducing the systemic relocation of T lymphocytes to the spleen.
Siyu Chen +15 more
wiley +1 more source
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core +1 more source
Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie +10 more
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang +3 more
core +1 more source
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom +2 more
wiley +1 more source

