Results 71 to 80 of about 60,976 (288)
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga +6 more
wiley +1 more source
Distributed Hierarchical Controller Resilience Analysis in Islanded Microgrid Under Cyber-Attacks
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links.
Abdollah Mirzabeigi +2 more
doaj +1 more source
Cyber-Attacks, Cryptocurrencies and Cyber Security
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM +3 more
openaire +5 more sources
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Contemporary Trends in Economic Cybersecurity
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
On the Efficiency-vs-Security Tradeoff in the Smart Grid
The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators.
Abdallah, Yara +3 more
core +1 more source
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
Cyber Attacks and Combat Behavior [PDF]
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina +2 more
doaj
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai +5 more
wiley +1 more source

