Results 121 to 130 of about 144,780 (287)
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects. [PDF]
Aslam MM +4 more
europepmc +1 more source
Guest Editorial: Graph Representation Learning for Feature Extraction and Signal Processing
CAAI Transactions on Intelligence Technology, EarlyView.
Xin Ning
wiley +1 more source
ABSTRACT Hereditary angioedema (HAE) with C1 inhibitor deficiency is a rare disease characterized by unpredictable episodes of tissue swelling (angioedema), which, in most cases, occur first under the age of 18 years, and entail a significant burden of disease not only for the patients but also for their families.
Henriette Farkas +128 more
wiley +1 more source
Recent progress in microgrids (MGs) has resulted in increased acceptance and utilization of green energy sources, energy storage technologies, and MGs.
Ijaz Ahmed +5 more
doaj +1 more source
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review. [PDF]
Singh R, Kukreja D, Sharma DK.
europepmc +1 more source
CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?
While technological advances have encompassed every aspect of our daily lives and provided great advantages, cyberattacks have also become an increasingly critical concern, raising questions about their potential role in terrorism. This article examines the intersection of cyberattacks and terrorism, focusing on the potential of cyberterrorism as a new
openaire +2 more sources
On 3‐MMC: A Cathinone I Have Come to Know and Love
ABSTRACT This article attempts to complicate the mythology of a compound in a state of becoming. I will trace lightly its origins as a cultural disruptor and how I am implicated in this imperative. Introducing you to 3‐MMC will require multiple modes of storytelling and taking of liberties, drawing on literature reviews, practice‐based research, prose,
Carmen Ostrander
wiley +1 more source
Generator of Slow Denial-of-Service Cyber Attacks. [PDF]
Sikora M +4 more
europepmc +1 more source

