Results 91 to 100 of about 231,772 (185)
A multi-label visualisation approach for malware behaviour analysis
Modern malware evolves continuously, posing persistent challenges to cybersecurity. Conventional classification approaches typically group malware by its primary objective, emphasising dominant behaviours while overlooking the complex and overlapping ...
Dilara T. Uysal +4 more
doaj +1 more source
Management of environmental and economic tradeoffs for the optimization of renewable energy scheme
This study proposes a synergistic approach that aligns environmental sustainability with economic viability to meet the energy trilemma of energy security, affordability, and sustainability.
Tayo Uthman Badrudeen +2 more
doaj +1 more source
Fog Computing for Control of Cyber-Physical Systems in Industry Using BCI. [PDF]
Rodríguez-Azar PI +4 more
europepmc +1 more source
Linear temporal logic (LTL) formalism can ensure the correctness of mobile robot planning through concise, readable, and verifiable mission specifications.
Manuel Toscano-Moreno +3 more
doaj +1 more source
Efficient complaint management is essential for service companies aiming to maintain high levels of customer satisfaction. Traditionally, complaint resolution has relied on human analysts performing manual processes, which are time-consuming and error ...
Catalina Sierra +3 more
doaj +1 more source
Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]
Smrčka A +9 more
europepmc +1 more source
A Literature Review on the Development and Creation of Digital Twins, Cyber-Physical Systems, and Product-Service Systems. [PDF]
Fett M +4 more
europepmc +1 more source
Extensible Hook System for Rendezvous and Docking of a CubeSat Swarm
Deployment of CubeSat swarms is proposed for various missions necessitating cooperative interactions among satellites. Commonly, the cube swarm requires formation flight and even rendezvous and docking, which are very challenging tasks since they require
Carlos Pérez-del-Pulgar +3 more
doaj +1 more source
Emerging framework for attack detection in cyber-physical systems using heuristic-based optimization algorithm. [PDF]
Alohali MA +3 more
europepmc +1 more source

