ABSTRACT Sugar crops, including but not limited to sugarcane, sugar beet, sweet sorghum and stevia, are major sources of sugar production in the world. However, conventional breeding approaches, limited by long breeding cycles, low efficiency and restricted capacity to improve complex traits in sugar crops, are increasingly insufficient to address the ...
Peilin Wang +7 more
wiley +1 more source
Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies. [PDF]
Paul B +13 more
europepmc +1 more source
ABSTRACT Drought tolerance in crops often involves trade‐offs between water conservation, growth and reproduction. Understanding how water‐saving strategies are implemented at physiological and metabolic levels remains critical for improving crop performance under water‐limited conditions.
Ryosuke Mega +9 more
wiley +1 more source
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks. [PDF]
Kandasamy V, Roseline AA.
europepmc +1 more source
D4I - Digital forensics framework for reviewing and investigating cyber attacks. [PDF]
Dimitriadis A +3 more
europepmc +1 more source
Unpacking Resilience in Public Administration: Insights From a Meta‐Narrative Review
ABSTRACT Increasing environmental complexity and uncertainty have made organizational resilience a key concern in public administration. Yet its inherent ambiguity calls for a systematic examination of its conceptualizations, operationalizations, and applications. This meta‐narrative review synthesizes 49 studies, advancing the discourse by identifying
Jixiang Li, Shui‐Yan Tang, Bo Wen
wiley +1 more source
Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework. [PDF]
Wang Z, Lou P, Wang Y, Li J, Wang J.
europepmc +1 more source
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. [PDF]
Al-Eidi S, Darwish O, Chen Y.
europepmc +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use. [PDF]
Tubis AA +4 more
europepmc +1 more source

