Results 101 to 110 of about 144,780 (287)
Finding the thieves amongst the liars: Thinking clearly about cyber-enabled influence operations
How do cyber attacks aid attempts to generate influence? This article argues that cyber-enabled influence operations (CEIO) are more varied in form than is often recognised by scholars.
Christopher Whyte, Ugochukwu Etudo
doaj +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Building Cyber-Attack Immunity in Electric Energy System Inspired by Infectious Disease Ecology
Despite being man-made, cyber-power systems and the associated cyber-attacks evolve in tandem with human expertise, which matures over time. This dynamic mirrors the evolutionary processes observed in infectious disease ecology within microbial and human
Hussain M. Mustafa +4 more
doaj +1 more source
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li +5 more
wiley +1 more source
Cyber Attacks on Commercial Drones: A Review
s, also known as drones, are increasingly used in several applications and a variety of cyber attacks can be performed on them using several tools. Some examples of these attacks include breaking the connection between the drone and the controller with ...
Bruno Branco +2 more
doaj +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
The State Itself as a Vulnerable Subject? Existential Resilience under International Law
This paper proposes a new framework for analysis of the law governing State continuity, with particular reference to Small Island Developing States (SIDS) threatened with legal extinction as a result of rising sea‐levels. Prevailing wisdom suggests that if States were to lose their inhabitable land or permanently resident populations, their status ...
Alex Green (文浩航)
wiley +1 more source
Real-Time Co-Simulation for the Analysis of Cyber Attacks Impact on Distance Relay Backup Protection
Smart Grid is a cyber-physical system that incorporates Information and Communication Technologies (ICT) into the physical power system, which introduces vulnerabilities to the grid and opens the door to cyber attacks.
Nadia Boumkheld +2 more
doaj +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source

