Results 201 to 210 of about 60,976 (288)
Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks. [PDF]
Miryahyaei M +2 more
europepmc +1 more source
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies. [PDF]
Lykou G, Moustakas D, Gritzalis D.
europepmc +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. [PDF]
Achaal B +4 more
europepmc +1 more source
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
An adaptive predefined time sliding mode control for uncertain nonlinear cyber-physical servo system under cyber attacks. [PDF]
Riaz S, Li B, Qi R, Zhang C.
europepmc +1 more source
Magnetic Field‐Modulated Boolean Logic in Proteinoid‐ Fe3 O4 Hybrid Materials
Proteinoid‐Fe3O4${\rm Fe}_3{\rm O}_4$. nanoparticle composites exhibit spontaneous electrical oscillations that emulate Boolean logic gates (AND, OR, XOR, NAND, NOR, NOT) under magnetic field modulation. External fields of 65.103 mT tune oscillatory behavior: 84 mT enhances amplitude while 103 mT suppresses it.
Panagiotis Mougkogiannis +1 more
wiley +1 more source
ABSTRACT Users of child protection social work and/or their families are fully entitled to express their dissatisfaction with the professional or service through both formal and informal channels. Fair criticism and dissatisfaction can sometimes, however, escalate and cross the line into violence, harassment and abuse (VHA).
Amy Bradley +3 more
wiley +1 more source

