Results 51 to 60 of about 144,780 (287)
Wireless ICS Training Platform [PDF]
Indiana University - Purdue University IndianapolisEssential public services, such as Electric, Water and Gas Utilities, are becoming increasingly reliant on network connected devices to control their processes. Wireless control systems are becoming more
Cassandra Boman, Nick Pohlman
core
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross +2 more
core +1 more source
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi +6 more
wiley +1 more source
Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts
Burton Joe
doaj +1 more source
Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen +10 more
wiley +1 more source
The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia.
Xiaoge Huang, Zhijun Qin, Hui Liu
doaj +1 more source
Cyber security and the unexplored threat to global health: a call for global norms
Cyber-attacks against hospitals, medical devices, and healthcare entities are becoming increasingly common; simultaneously, physical attacks against hospitals and healthcare entities are increasing. The purpose of this article is to explore the threat to
Rose Bernard +2 more
doaj +1 more source
Toward a Theory of Cyber Attacks
We provide a general methodology for analyzing defender-attacker based "games" in which we model such games as Markov models and introduce a capacity region to analyze how defensive and adversarial strategies impact security. Such a framework allows us to analyze under what kind of conditions we can prove statements (about an attack objective $k$) of ...
Saeed Valizadeh, Marten van Dijk
openaire +2 more sources
Cyber-Attack Consequence Prediction
Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta +3 more
openaire +2 more sources
Digital Technology's Role in Circular Waste Management: A Systematic Review
ABSTRACT Combining circular economy ideas with digital tools offers a game‐changing way to tackle global sustainability problems. This paper focuses on how digital changes and circular economy models link up. A review has been conducted for 112 articles from 2021 to September 2025, using PRISMA‐2020 methodology. This study covered new tech like AI, IoT,
Reza Eslamipoor
wiley +1 more source

