Results 61 to 70 of about 1,363,692 (325)
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions.
Qiyi He, Xiaolin Meng, Rong Qu
doaj +1 more source
Active Cyber Defense Dynamics Exhibiting Rich Phenomena [PDF]
The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses.
Lu, Wenlian, Xu, Shouhuai, Zheng, Ren
core
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated ...
Barabasi +51 more
core +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network.
Sangjun Kim, Kyung-Joon Park
doaj +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source
ABSTRACT This article reflects on the construction of a supportive community of Black Afro‐diasporic graduate students and their supervisors researching issues relating to race in the field of education in Australia. It draws on the concept of marronage—a term rooted in the fugitive act of becoming a maroon, where enslaved people enacted an escape in ...
Hellen Magoi +6 more
wiley +1 more source
Quantitative Risk Assessment of Cyber Attacks on Cyber-Physical Systems using Attack Graphs
Over the past decade, the number of cyber attack incidents targeting critical infrastructures such as the electrical power system has increased. To assess the risk of cyber attacks on the cyber-physical system, a holistic approach is needed that ...
Ioannis Semertzis +4 more
semanticscholar +1 more source
Magnetic Field‐Modulated Boolean Logic in Proteinoid‐ Fe3 O4 Hybrid Materials
Proteinoid‐Fe3O4${\rm Fe}_3{\rm O}_4$. nanoparticle composites exhibit spontaneous electrical oscillations that emulate Boolean logic gates (AND, OR, XOR, NAND, NOR, NOT) under magnetic field modulation. External fields of 65.103 mT tune oscillatory behavior: 84 mT enhances amplitude while 103 mT suppresses it.
Panagiotis Mougkogiannis +1 more
wiley +1 more source

