Results 181 to 190 of about 118,316 (239)

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

A Comprehensive Review of Intelligent Fault Diagnosis and Resilient Fault‐Tolerant Control in the Design of Modern Modular Multilevel Converters

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
This review evaluates advanced intelligent fault diagnosis and resilient fault‐tolerant control strategies for modular multilevel converters (MMCs). It highlights how integrating machine learning with robust control architectures enhances reliability and operational continuity, providing a roadmap for developing more resilient, self‐healing power ...
Muhammad Haris Saleem   +3 more
wiley   +1 more source

Adaptive Q‐Wavelet Transform and Kalman Filtering for Power Quality Disturbance Prediction and Carbon Emission Impact Analysis in Smart Grids

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Maintaining power quality (PQ) and minimizing carbon emissions are crucial for sustainable smart grids, especially with increasing renewable energy integration. This paper proposes a novel method combining Adaptive Q‐Wavelet Transform (AQWT) and Kalman Filtering (KF) to predict PQ disturbances and faults while analyzing their impact on carbon emissions.
Abhishek Raj   +9 more
wiley   +1 more source

Multi‐Sensor Fusion‐Based Fault Detection in CNC Cutting Tools Using DWT and Ensemble Learning

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
A multi‐sensor CNC tool monitoring system integrates vibration, acoustic emission, spindle current, and cutting‐force signals. The signals undergo wavelet‐based denoising, normalization, and multi‐resolution feature extraction using Discrete Wavelet Transform (DWT).
Kechang Zhang   +3 more
wiley   +1 more source

A Covert Cyber‐Attack Framework and Detection on Communication Links in Linear Multi‐Agent Cyber‐Physical Systems

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
A covert attack architecture and detection approach in communication networks for homogenous and linear multi‐agent systems (MASs). A residual‐based detection method, exploiting a Kamlan filter observer and extra dynamic, is proposed to detect covert attacks on agents' communication channels.
Mohammad Tahmasbi
wiley   +1 more source

Optimizing Electric Vehicle Charging Scheduling With Deep Q Networks and Long Short‐Term Memory‐Based Electricity and Battery State of Charge Prediction

open access: yesEnergy Science &Engineering, Volume 14, Issue 5, Page 2583-2599, May 2026.
Schematic diagram showing the proposed approach for EV charging/discharging. ABSTRACT The number of electric vehicles (EVs) on the road is rising as a result of recent advancements in EV technology, and EVs are important to the smart grid economy. Demand response schemes involving electric vehicles have the potential to dramatically reduce the cost of ...
F. Zonuntluanga   +6 more
wiley   +1 more source

Enhancing Cloud‐Based Healthcare Security With Quantum‐Secure HealthChain: A Quantum Computing and Blockchain Integrated Framework

open access: yesHealth Science Reports, Volume 9, Issue 5, May 2026.
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose   +6 more
wiley   +1 more source

Cyber-Attacks, Cryptocurrencies and Cyber Security

2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +4 more sources

Discussing cyber attack

Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire   +1 more source

Futuristic cyber-attacks

International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
S. Sibi Chakkaravarthy   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy