Extended dissipative truncated predictive control strategy for conic-type delayed networked control systems affected by cyber attacks and sensor distortion. [PDF]
Narenshakthi T, Dharani S.
europepmc +1 more source
Markov Determinantal Point Process for Dynamic Random Sets
ABSTRACT The Law of Determinantal Point Process (LDPP) is a flexible parametric family of distributions over random sets defined on a finite state space, or equivalently over multivariate binary variables. The aim of this paper is to introduce Markov processes of random sets within the LDPP framework. We show that, when the pairwise distribution of two
Christian Gouriéroux, Yang Lu
wiley +1 more source
Risk Assessment Method for CPS-Based Distributed Generation Cluster Control in Active Distribution Networks Under Cyber Attacks. [PDF]
Ouyang J, Mo F, Huang F, Chen Y.
europepmc +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach. [PDF]
Singh KN +4 more
europepmc +1 more source
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Interdisciplinary framework for cyber-attacks and anomaly detection in industrial control systems using deep learning. [PDF]
Gulzar Q, Mustafa K.
europepmc +1 more source
A Simultaneous Cyber-attack and a Missile Attack
openaire +1 more source
The Impact of TikTok on Elections: (Mis)information and Regulatory Challenges
ABSTRACT TikTok's algorithm‐driven feed is reshaping electoral communication, yet a clear understanding of its effects is lacking. This study synthesizes and appraises evidence on how the platform's design and governance shape political (dis)information and may affect electoral dynamics.
Michele Giuseppe Giuranno +1 more
wiley +1 more source
Observer based resilient security control for networked nondeterministic Markovian jump systems with cyber attacks and its applications. [PDF]
Saravanakumar T +4 more
europepmc +1 more source

