Results 51 to 60 of about 144,780 (287)

Wireless ICS Training Platform [PDF]

open access: yes, 2019
Indiana University - Purdue University IndianapolisEssential public services, such as Electric, Water and Gas Utilities, are becoming increasingly reliant on network connected devices to control their processes. Wireless control systems are becoming more
Cassandra Boman, Nick Pohlman
core  

One Breaker is Enough: Hidden Topology Attacks on Power Grids

open access: yes, 2015
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross   +2 more
core   +1 more source

Building Community Amidst the Institutional Whiteness of Graduate Study: Black Joy and Maroon Moves in an Academic Marronage

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi   +6 more
wiley   +1 more source

Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation

open access: yesBaltic Journal of European studies, 2019
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts
Burton Joe
doaj   +1 more source

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis

open access: yesIEEE Access, 2018
The now ubiquitous use of information technology poses a crucial challenge to the cyber security of power grid operations, one that has aroused serious concerns from both industry and academia.
Xiaoge Huang, Zhijun Qin, Hui Liu
doaj   +1 more source

Cyber security and the unexplored threat to global health: a call for global norms

open access: yesGlobal Security: Health, Science and Policy, 2020
Cyber-attacks against hospitals, medical devices, and healthcare entities are becoming increasingly common; simultaneously, physical attacks against hospitals and healthcare entities are increasing. The purpose of this article is to explore the threat to
Rose Bernard   +2 more
doaj   +1 more source

Toward a Theory of Cyber Attacks

open access: yesCoRR, 2019
We provide a general methodology for analyzing defender-attacker based "games" in which we model such games as Markov models and introduce a capacity region to analyze how defensive and adversarial strategies impact security. Such a framework allows us to analyze under what kind of conditions we can prove statements (about an attack objective $k$) of ...
Saeed Valizadeh, Marten van Dijk
openaire   +2 more sources

Cyber-Attack Consequence Prediction

open access: yesCoRR, 2020
Cyber-physical systems posit a complex number of security challenges due to interconnection of heterogeneous devices having limited processing, communication, and power capabilities. Additionally, the conglomeration of both physical and cyber-space further makes it difficult to devise a single security plan spanning both these spaces.
Prerit Datta   +3 more
openaire   +2 more sources

Digital Technology's Role in Circular Waste Management: A Systematic Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Combining circular economy ideas with digital tools offers a game‐changing way to tackle global sustainability problems. This paper focuses on how digital changes and circular economy models link up. A review has been conducted for 112 articles from 2021 to September 2025, using PRISMA‐2020 methodology. This study covered new tech like AI, IoT,
Reza Eslamipoor
wiley   +1 more source

Home - About - Disclaimer - Privacy