Results 71 to 80 of about 8,269 (263)
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source
Resilience Framework for Power Electronic Systems Against Cyber-Physical Attacks: A Review
This paper presents a systematic overview of the resilience framework for power electronics converter-based cyber-physical systems (CPSs), emphasizing end-to-end responses to the emerging challenges posed by cyber-physical attacks.
Chang Liu +5 more
doaj +1 more source
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde +4 more
openaire +1 more source
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
ABSTRACT This study investigates the relationship between cybersecurity capabilities (CCs) and cybersecurity performance (CP) across diverse regional contexts, employing ordinary least squares (OLS) and random forest (RF) regression models. The research highlights how economic, political and cultural factors shape CCs and their impact on CP ...
Angélica Pigola +2 more
wiley +1 more source
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj +1 more source
A Systems Engineering Methodology for System of Autonomous Systems: Test and Evaluation
ABSTRACT Recent advances in artificial intelligence and machine learning (AI/ML) have resulted in autonomous systems that reduce operators' workload and involvement in hazardous missions. Integrating these systems into an existing system of systems (SoS) can evolve it into a system of autonomous system (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley +1 more source
Evaluating impact of remote-access cyber-attack on lane changes for connected automated vehicles
Connected automated vehicles (CAVs) rely heavily on intelligent algorithms and remote sensors. If the control center or on-board sensors are under cyber-attack due to the security vulnerability of wireless communication, it can cause significant damage ...
Changyin Dong +7 more
doaj +1 more source
Information plays a vital role in the development of human society, an element that cannot be neglected in interpersonal relationships. The use of information technologies in all fields has proven its effectiveness through the speed and efficiency with which activities are carried out.
Luca Iamandi +3 more
openaire +1 more source

