Results 101 to 110 of about 52,803 (214)

Comparing Kalman Filters and Observers for Power System Dynamic State Estimation with Model Uncertainty and Malicious Cyber Attacks

open access: yes, 2018
Kalman filters and observers are two main classes of dynamic state estimation (DSE) routines. Power system DSE has been implemented by various Kalman filters, such as the extended Kalman filter (EKF) and the unscented Kalman filter (UKF).
Qi, Junjian   +2 more
core  

A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation

open access: yesSystems Engineering, EarlyView.
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]

open access: yes, 2016
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Healthcare’s Biggest Cyber Attacks

open access: yesITNOW, 2023
Abstract Frank Plummer MBCS, cyber security consultant, explores the CIA triad – confidentiality, integrity and availability – and its impact on three recent cyber attacks in healthcare.
openaire   +1 more source

From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy