Results 91 to 100 of about 249,048 (284)
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina +4 more
wiley +1 more source
ABSTRACT Objective Adolescents with higher weight status (HWS; body mass index > 85th percentile adjusted for age and sex) are at greater risk of eating disorders (ED). This study examined factors associated with HWS adolescents' increased risk and how weight status interacts with other risk factors to influence ED onset. Method Australian adolescents (
Gabriela Tavella +5 more
wiley +1 more source
EU Policy‐Making in the Digital Age: Major Trends and Insights From Public Policy Research
ABSTRACT Has digitalization changed policy‐making dynamics at the European Union (EU) level? To investigate this issue, this article presents a scoping review of the literature on EU digital policy‐making. While much scholarship adopts a ‘Governance’ approach, two conceptually rich strands emerge: critical approaches, and digital sovereignty.
Chloé Bérut
wiley +1 more source
Cyber-Physical System for Energy Management
Se-Range Oh, Young-Chul Bae
openalex +2 more sources
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen +4 more
wiley +1 more source
Adversarial Regression for Detecting Attacks in Cyber-Physical Systems [PDF]
Amin Ghafouri +2 more
openalex +1 more source
Digital Twin (DT) technology enhances building energy efficiency by enabling continuous monitoring, predictive maintenance, and operational optimization within Building Energy Management Systems. Through real‐time data integration and simulation, DTs provide dynamic feedback loops that optimize performance, reduce operational costs, and improve ...
Suqi Wang +6 more
wiley +1 more source
An Explainable Intelligent Framework for Anomaly Mitigation in Cyber-Physical Inverter-based Systems [PDF]
Asad Ali Khan +3 more
openalex +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
Brain inspired iontronic fluidic memristive and memcapacitive device for self-powered electronics
Ionic fluidic devices are gaining interest due to their role in enabling self-powered neuromorphic computing systems. In this study, we present an approach that integrates an iontronic fluidic memristive (IFM) device with low input impedance and a ...
Muhammad Umair Khan +4 more
doaj +1 more source

