Results 81 to 90 of about 161,956 (247)

Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds

open access: yesIEEE Access
High Voltage Direct Current (HVDC) technology is one of the key enablers of the energy transition, especially for offshore wind energy systems. While extensive research on cyber security of High Voltage Alternating Current (HVAC) systems has been ...
Alfan Presekal   +7 more
doaj   +1 more source

Comprehensive fault simulation method in active distribution network with the consideration of cyber security

open access: yesIET Cyber-Physical Systems, 2021
With the many characteristics of cyber–physical systems (CPS), including the complex evolution of various dynamic processes in distribution networks (DNs), communication modes and serious network security events have become important issues.
Wanxing Sheng, Keyan Liu, Ying Liang
doaj   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Cyber-physical security for ports infrastructure

open access: yesInternational Maritime Transport and Logistic Journal, 2022
Taking advantage of the benefits associated with digital means has become a main priority for ports globally. The effective and smooth integration of Information Technology (IT) applications and those systems that support the conduct of operations (Operational Technology (OT) systems), along with the accurate “adjustment†of the human factor ...
Progoulakis, Iosif   +3 more
openaire   +1 more source

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Power System Stability Analysis From Cyber Attacks Perspective

open access: yesIEEE Access
Power grid digitalization introduces new vulnerabilities and cyber security threats. The impact of cyber attacks on power system stability is a topic of growing concern, which is yet to be comprehensively analyzed.
Ioannis Semertzis   +5 more
doaj   +1 more source

EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Providing Physical Layer Security for Mission Critical Machine Type Communication

open access: yes, 2017
The design of wireless systems for Mission Critical Machine Type Communication (MC-MTC) is currently a hot research topic. Wireless systems are considered to provide numerous advantages over wired systems in industrial applications for example.
Ambekar, Abhijit   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy