Results 61 to 70 of about 162,443 (304)
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Suggestions on cyber security talents cultivation
Cyber security has been approved to be the first level discipline by Academic Degrees Committee of the State Council.It is important to figure out the curriculum of this new discipline and make it clear what is the differ-ence between this new discipline
Hui LI,Ning ZHANG
doaj +3 more sources
Abstract The current study aimed to investigate whether negative student–teacher relationships and within‐class perceptions of the class climate at the individual level, and positive class climates at the classroom level in fifth grade, were associated with traditional bullying and cyberbullying perpetration 1 year later, in sixth grade, in a sample of
Robert Thornberg +3 more
wiley +1 more source
State-aware access control for cyber-physical-social space: Model and policy security assurance
The cyber–physical-social space provides its users with a comfortable and convenient environment for work or living, achieved through the integration of state information from the cyber world, the physical world and the social world.
Yan Cao +5 more
doaj +1 more source
A Security Analysis of Cyber-Physical Systems Architecture for Healthcare
This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare.
Darren Seifert, Hassan Reza
doaj +1 more source
Review of cybersecurity for integrated energy systems with integration of cyber‐physical systems
The integrated energy system leverages advanced information, communication, and control technology to integrate various energy subsystems, including electricity, heat, and gas, to achieve efficient and coordinated operation of the entire energy system ...
Shixing Ding +4 more
doaj +1 more source
SMS-I: Intelligent Security for Cyber–Physical Systems
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber–physical nature of these infrastructures makes them more vulnerable to cyber–physical threats and ...
Eva Maia +5 more
doaj +1 more source
Security of Cyber-Physical Systems [PDF]
Traditional control environments connected to physical systems are being upgraded with novel information and communication technologies. The resulting systems need to be adequately protected. Experimental testbeds are crucial for the study and analysis of ongoing threats against those resulting cyber-physical systems.
Jose Rubio-Hernan +2 more
openaire +1 more source
An analysis of security issues in building automation systems [PDF]
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core +2 more sources

