Results 111 to 120 of about 1,213,263 (334)

Analysis of Information-Physical Coordinated Attack Paths Based on Vulnerability of Critical Nodes in Cyber-Physical Power System [PDF]

open access: yesDianli jianshe
[Objective] Traditional power systems have evolved into more efficient and controllable cyber-physical systems (CPS) with the integration of advanced digital information technology and power physical systems. However,this also increases the risk of cyber-
LIU Wei, LI Ke, WEI Xingshen, WANG Qi
doaj   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

Formal modeling and control of cyber-physical manufacturing systems

open access: yesAdvances in Mechanical Engineering, 2017
Cyber-physical manufacturing systems are a new paradigm of manufacturing systems that integrate cyber systems and physical systems to aid smart manufacturing.
Zhenhua Yu   +3 more
doaj   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

The Relationship Between Premorbid Weight Status and Eating Disorder Onset in Adolescents: A Longitudinal Study

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella   +5 more
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

VeriPhy: verified controller executables from verified cyber-physical system models

open access: yesACM-SIGPLAN Symposium on Programming Language Design and Implementation, 2018
We present VeriPhy, a verified pipeline which automatically transforms verified high-level models of safety-critical cyber-physical systems (CPSs) in differential dynamic logic (dL) to verified controller executables.
Brandon Bohrer   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy