Results 101 to 110 of about 141,441 (275)

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia   +3 more
wiley   +1 more source

Finding the thieves amongst the liars: Thinking clearly about cyber-enabled influence operations

open access: yesEuropean Journal of International Security
How do cyber attacks aid attempts to generate influence? This article argues that cyber-enabled influence operations (CEIO) are more varied in form than is often recognised by scholars.
Christopher Whyte, Ugochukwu Etudo
doaj   +1 more source

Reliability assessment of cyber physical distribution systems including sequential scenario simulation correction and recovery resource decisions

open access: yesEnergy Conversion and Economics, EarlyView.
Abstract With the deepening of research on smart grids, the distribution system has gradually evolved into a cyber‐physical distribution system (CPDS). The refined reliability modelling and assessment methods for CPDS are of great significance. This paper proposes an integrated reliability assessment framework combining distribution information system (
Wei Wu   +9 more
wiley   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology

open access: yesIEEE Access
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa   +4 more
doaj   +1 more source

Real-Time Co-Simulation for the Analysis of Cyber Attacks Impact on Distance Relay Backup Protection

open access: yesEAI Endorsed Transactions on Energy Web
Smart Grid is a cyber-physical system that incorporates Information and Communication Technologies (ICT) into the physical power system, which introduces vulnerabilities to the grid and opens the door to cyber attacks.
Nadia Boumkheld   +2 more
doaj   +1 more source

Internal physiological drivers of leaf development in trees: Understanding the relationship between non‐structural carbohydrates and leaf phenology

open access: yesFunctional Ecology, EarlyView.
Read the free Plain Language Summary for this article on the Journal blog. Abstract Plant phenology is crucial for understanding plant growth and climate feedback. It affects canopy structure, surface albedo, and carbon and water fluxes. While the influence of environmental factors on phenology is well‐documented, the role of plant intrinsic factors ...
Yunpeng Luo   +8 more
wiley   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Cyber Attacks on Commercial Drones: A Review

open access: yesIEEE Access
s, also known as drones, are increasingly used in several applications and a variety of cyber attacks can be performed on them using several tools. Some examples of these attacks include breaking the connection between the drone and the controller with ...
Bruno Branco   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy