Results 61 to 70 of about 52,803 (214)
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS [PDF]
Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged.
Dan-Iulian VOITAŞEC
doaj
An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj +1 more source
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform.
Naveen Tatipatri, S. L. Arun
doaj +1 more source
Power System Security With Cyber-Physical Power System Operation
Cyber-attacks on a cyber-physical power system could lead to significant data failure, false data injection and cascading failure of physical power system components.
Peju Adesina Oyewole, Dilan Jayaweera
doaj +1 more source
A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper) [PDF]
Computer networks are ubiquitous systems growing exponentially with a predicted 50 billion devices connected by 2050. This dramatically increases the potential attack surface of Internet networks. A key issue in cyber defense is to detect, categorize and
Brosset D. +5 more
core +3 more sources
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire +2 more sources

