ABSTRACT Drought tolerance in crops often involves trade‐offs between water conservation, growth and reproduction. Understanding how water‐saving strategies are implemented at physiological and metabolic levels remains critical for improving crop performance under water‐limited conditions.
Ryosuke Mega +9 more
wiley +1 more source
Risk Assessment Method for CPS-Based Distributed Generation Cluster Control in Active Distribution Networks Under Cyber Attacks. [PDF]
Ouyang J, Mo F, Huang F, Chen Y.
europepmc +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach. [PDF]
Singh KN +4 more
europepmc +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning. [PDF]
Gulzar Q, Mustafa K.
europepmc +1 more source
Law and Infrastructure: Reliability, Automation Transition, and Irregularities of “U‐Space”
ABSTRACT The European Union (EU) is making regulatory efforts to allow for the safe integration of drones into civilian airspace through automated means. Commission Implementing Regulation (EU) 2021/664 concerning unmanned traffic management (a system referred to as “U‐Space”) furthers that commitment. Accordingly, drone operators must avail themselves
Samar Abbas Nawaz
wiley +1 more source
Observer based resilient security control for networked nondeterministic Markovian jump systems with cyber attacks and its applications. [PDF]
Saravanakumar T +4 more
europepmc +1 more source
Informal Firms' Adoption and Use of Mobile Money Under Uncertain Times: Evidence From Burkina Faso
ABSTRACT This paper investigates how uncertainty affects mobile money adoption and use by informal businesses. Despite the prevalence of the informal sector in developing countries and the recognized potential of mobile money for financial inclusion, empirical research on its adoption and usage among unregistered businesses is limited.
Serge Stéphane Ky, Clovis Rugemintwari
wiley +1 more source
Detecting cyber attacks in vehicle networks using improved LSTM based optimization methodology. [PDF]
Jayasri C +3 more
europepmc +1 more source

