Results 101 to 110 of about 118,316 (239)

Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge

open access: yesApplied Sciences
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced ...
Shenjian Qiu   +4 more
doaj   +1 more source

Renewable Energy‐Driven Green Electricity Supplement for Empowering Blue Economy

open access: yesSusMat, EarlyView.
In order to support the blue economy to expand to the distant sea, this work proposes the framework driven by renewable energy. It integrates flexible perovskite solar cells, triboelectric nanogenerator‐supercapacitors, grid‐forming control strategies, and AI‐driven digital engines.
Ruibo Fan   +5 more
wiley   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Fault‐Tolerant Fuzzy Boundary Control for Nonlinear Distributed Parameter Systems Under Limited Measurements and Markovian Failures

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy