Results 81 to 90 of about 121,838 (272)
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
Simulating a Cyber-Attack on the Mass Thruster Controllers at Low-Speed Motion
The aim of this paper is to highlight the vulnerability of Maritime Autonomous Surface Ships (MASS) to cyber-attack and to illustrate, through a simulation experiment on a testbed, how to mitigate a cyber-attack on the MASS thruster controllers during ...
Igor ASTROV, Sanja BAUK
doaj +1 more source
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley +1 more source
Modern cyber-physical power systems are vulnerable to cyber attacks. Given that cyber and physical networks are coupled tightly, attacks in the cyber layer can penetrate the physical layer, causing the outage of transmission lines and other physical ...
Zhimei Zhang +3 more
doaj +1 more source
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source
This study demonstrates that ECOSTRESS lands surface temperature (LST) data are sensitive to forest thinning, regional drought, and their interaction. Consistent with high‐resolution UAV images, ECOSTRESS LST data indicate thinned forest had significantly greater temperature across years.
Temuulen Tsagaan Sankey +9 more
wiley +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source

