Results 121 to 130 of about 144,780 (287)

Complementarity in alliances: How strategic compatibility and hierarchy promote efficient cooperation in international security

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley   +1 more source

Cyber threat intelligence for smart grids using knowledge graphs, digital twins, and hybrid machine learning in SCADA networks

open access: yesInternational Journal of Engineering Business Management
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim   +3 more
doaj   +1 more source

International Guideline on the Diagnosis and Management of Pediatric Patients With Hereditary Angioedema

open access: yesAllergy, EarlyView.
ABSTRACT Hereditary angioedema (HAE) with C1 inhibitor deficiency is a rare disease characterized by unpredictable episodes of tissue swelling (angioedema), which, in most cases, occur first under the age of 18 years, and entail a significant burden of disease not only for the patients but also for their families.
Henriette Farkas   +128 more
wiley   +1 more source

Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems

open access: yesEnergy Strategy Reviews
Recent progress in microgrids (MGs) has resulted in increased acceptance and utilization of green energy sources, energy storage technologies, and MGs.
Ijaz Ahmed   +5 more
doaj   +1 more source

CYBER ATTACKS: ARE THEY THE TERRORISM OF THE FUTURE?

open access: yesYeditepe Üniversitesi Hukuk Fakültesi Dergisi
While technological advances have encompassed every aspect of our daily lives and provided great advantages, cyberattacks have also become an increasingly critical concern, raising questions about their potential role in terrorism. This article examines the intersection of cyberattacks and terrorism, focusing on the potential of cyberterrorism as a new
openaire   +2 more sources

On 3‐MMC: A Cathinone I Have Come to Know and Love

open access: yesAnthropology of Consciousness, EarlyView.
ABSTRACT This article attempts to complicate the mythology of a compound in a state of becoming. I will trace lightly its origins as a cultural disruptor and how I am implicated in this imperative. Introducing you to 3‐MMC will require multiple modes of storytelling and taking of liberties, drawing on literature reviews, practice‐based research, prose,
Carmen Ostrander
wiley   +1 more source

Generator of Slow Denial-of-Service Cyber Attacks. [PDF]

open access: yesSensors (Basel), 2021
Sikora M   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy