Results 81 to 90 of about 60,976 (288)
Kalman filters and observers are two main classes of dynamic state estimation (DSE) routines. Power system DSE has been implemented by various Kalman filters, such as the extended Kalman filter (EKF) and the unscented Kalman filter (UKF).
Qi, Junjian +2 more
core
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
Resort to Self-Defense Against Cyber Attacks by Non-State Actors in International Law10.22133/mtlj.2025.424362.1265 [PDF]
In the discussion of resorting to Self defenseSelf-defense against cyber attackscyber-attacks by non-State actors, at first it must be determined that for what type of cyber attackcyber-attack the right to Self defenseSelf-defense is allowed.
parviz farshasaid, Mahmoud Jalali
doaj +1 more source
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross +2 more
core +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
Defending Against Firmware Cyber Attacks on Safety-Critical Systems [PDF]
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to ‘rip and replace’ obsolete components.
Barker, Tom +5 more
core
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications
The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators.
Abdallah, Yara +4 more
core +1 more source
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde +4 more
openaire +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
RTAP: A Real-Time Model for Attack Detection and Prediction in Smart Grid Systems
One main challenge of smart grid systems is the cascading failures caused by cyber-attacks, which can affect the power and communication networks. Many testbeds have been proposed to model the impact of cyber-attacks on these two networks; however, many ...
Ali Salehpour, Irfan Al-Anbagi
doaj +1 more source

