Results 121 to 130 of about 141,441 (275)
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source
The maritime industry is constantly evolving and posing new challenges, especially with increasing digitalization, which has raised concerns about cyber-attacks on maritime supply chain agents.
Maria Valentina Clavijo Mesa +2 more
doaj +1 more source
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects. [PDF]
Aslam MM +4 more
europepmc +1 more source
Abstract Alongside their continuing growth in the popularity, both practice research in creative disciplines and arts‐based methods in research in the social sciences have histories now spanning several decades. In doctoral education, art and design education research sits within and across two distinct fields – the art and design doctorate and the ...
Sian Vaughan
wiley +1 more source
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review. [PDF]
Singh R, Kukreja D, Sharma DK.
europepmc +1 more source
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley +1 more source
Recent progress in microgrids (MGs) has resulted in increased acceptance and utilization of green energy sources, energy storage technologies, and MGs.
Ijaz Ahmed +5 more
doaj +1 more source
Generator of Slow Denial-of-Service Cyber Attacks. [PDF]
Sikora M +4 more
europepmc +1 more source
Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley +1 more source
Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach. [PDF]
Angel D.
europepmc +1 more source

