Detection of disturbances and cyber-attacks in smart grids using explainable machine learning. [PDF]
Farsi M +7 more
europepmc +1 more source
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. [PDF]
Wang W +4 more
europepmc +1 more source
MOVES Research & Education Systems Seminar: Presentation; Session 3c: Human Systems and Training (Operational Systems); Moderator: Mike McCauley; ROGUEVIDEO: CyberAttack; speaker: Erik ...
openaire +1 more source
From Palestine Ally to Zionist Partner: India‐Israel Relations, 2014–2025
Abstract India's pro‐Palestinian diplomatic posture, which held for nearly 70 years, has been transformed within a single decade of rule by the Hindu nationalist Bharatiya Janata Party (BJP), turning New Delhi into one of Israel's most consequential Asian partners. This shift has narrowed the coalition supporting the Palestinian cause.
Yücel Bulut
wiley +1 more source
A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes. [PDF]
Basan E +5 more
europepmc +1 more source
ABSTRACT Background The association between adverse childhood experiences (ACEs) and metabolic syndrome (MetS) across life course and its components (abdominal obesity, elevated blood pressure, dyslipidemia, and hyperglycemia) is poorly understood. Methods Three databases were screened for studies published January 2000–February 2024 that examined the ...
Joohan Kim +4 more
wiley +1 more source
Quantifying the Multidimensional Impact of Cyber Attacks in Digital Financial Services: A Systematic Literature Review. [PDF]
Adekoya OA, Atlam HF, Lallie HS.
europepmc +1 more source
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. [PDF]
Lallie HS +6 more
europepmc +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Extended dissipative truncated predictive control strategy for conic-type delayed networked control systems affected by cyber attacks and sensor distortion. [PDF]
Narenshakthi T, Dharani S.
europepmc +1 more source

