Results 41 to 50 of about 52,803 (214)

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks

open access: yes, 2020
We expect an increase in the frequency and severity of cyber-attacks that comes along with the need for efficient security countermeasures. The process of attributing a cyber-attack helps to construct efficient and targeted mitigating and preventive ...
Karafili, Erisa   +2 more
core   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles

open access: yesJournal of Advanced Transportation, 2020
CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions.
Qiyi He, Xiaolin Meng, Rong Qu
doaj   +1 more source

One Breaker is Enough: Hidden Topology Attacks on Power Grids

open access: yes, 2015
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross   +2 more
core   +1 more source

Non-linearities, cyber attacks and cryptocurrencies [PDF]

open access: yesFinance Research Letters, 2019
Abstract This paper uses a Markov-switching non-linear specification to analyse the effects of cyber attacks on returns in the case of four cryptocurrencies (Bitcoin, Ethernam, Litecoin and Stellar) over the period 8/8/2015 - 28/2/2019. The analysis considers both cyber attacks in general and those targeting cryptocurrencies in particular, and also ...
Caporale, Guglielmo Maria   +3 more
openaire   +4 more sources

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy