Results 181 to 190 of about 118,316 (239)
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
This review evaluates advanced intelligent fault diagnosis and resilient fault‐tolerant control strategies for modular multilevel converters (MMCs). It highlights how integrating machine learning with robust control architectures enhances reliability and operational continuity, providing a roadmap for developing more resilient, self‐healing power ...
Muhammad Haris Saleem +3 more
wiley +1 more source
Maintaining power quality (PQ) and minimizing carbon emissions are crucial for sustainable smart grids, especially with increasing renewable energy integration. This paper proposes a novel method combining Adaptive Q‐Wavelet Transform (AQWT) and Kalman Filtering (KF) to predict PQ disturbances and faults while analyzing their impact on carbon emissions.
Abhishek Raj +9 more
wiley +1 more source
Multi‐Sensor Fusion‐Based Fault Detection in CNC Cutting Tools Using DWT and Ensemble Learning
A multi‐sensor CNC tool monitoring system integrates vibration, acoustic emission, spindle current, and cutting‐force signals. The signals undergo wavelet‐based denoising, normalization, and multi‐resolution feature extraction using Discrete Wavelet Transform (DWT).
Kechang Zhang +3 more
wiley +1 more source
A covert attack architecture and detection approach in communication networks for homogenous and linear multi‐agent systems (MASs). A residual‐based detection method, exploiting a Kamlan filter observer and extra dynamic, is proposed to detect covert attacks on agents' communication channels.
Mohammad Tahmasbi
wiley +1 more source
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga +6 more
wiley +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyber-Attacks, Cryptocurrencies and Cyber Security
2023This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM +3 more
openaire +4 more sources
Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy +4 more
openaire +1 more source
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy +4 more
openaire +1 more source

