Results 91 to 100 of about 121,838 (272)

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Digital Futures, Sustainable Outcomes: Mapping the Impact of Digital Transformation on EU SDG Progress

open access: yesSustainable Development, EarlyView.
ABSTRACT This study explores how digital transformation, measured by the Global Digitalisation Index (GDI), relates to progress on the UN Sustainable Development Goals (SDGs) across EU member states. Using partial correlation, regression analysis with interaction terms and cluster analysis, the research examines the moderating effects of governance and
Luis Fonseca   +4 more
wiley   +1 more source

Ensuring Battery Safety in Electric Vehicles: Challenges, Developments, and Future Perspectives

open access: yesSmall, EarlyView.
This review explores machine learning techniques to predict and mitigate thermal runaway in lithium‐ion batteries. By analyzing failure mechanisms and safety issues, the study develops data‐driven models for early detection. It proposes safety enhancement strategies for battery design and maintenance, offering actionable insights to prevent ...
Oumayma ELJarray   +7 more
wiley   +1 more source

Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A Review

open access: yesIEEE Open Journal of Power Electronics
This paper presents a systematic overview of the resilience framework for power electronics converter-based cyber-physical systems (CPSs), emphasizing end-to-end responses to the emerging challenges posed by cyber-physical attacks.
Chang Liu   +5 more
doaj   +1 more source

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde   +4 more
openaire   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Unveiling Regional Disparities: Exploring Cybersecurity Capabilities and Performance Through Systems Theory Approach

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola   +2 more
wiley   +1 more source

Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems

open access: yesIEEE Open Access Journal of Power and Energy
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy