Results 61 to 70 of about 144,780 (287)

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

A Latent Transition Analysis of Traditional Bullying and Cyberbullying Among Chinese Adolescents: Associations With Life Satisfaction and Depression

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT Bullying, both traditional and cyber, has become a public health concern. Nevertheless, few studies have differentiated between traditional bullying and cyberbullying to examine how their interplay shapes distinct bullying involvement profiles and how these profiles link with well‐being and mental health outcomes.
Xingzhou Zhang   +3 more
wiley   +1 more source

A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security

open access: yesIEEE Access
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform.
Naveen Tatipatri, S. L. Arun
doaj   +1 more source

APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS [PDF]

open access: yesChallenges of the Knowledge Society, 2015
Technology plays an important role in everyday life. Technological advancement can be found in every field of government including the military. Because of this, new means and methods of conducting hostilities have emerged.
Dan-Iulian VOITAŞEC
doaj  

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation

open access: yes, 2010
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M.   +2 more
core   +1 more source

Learning-based attacks in cyber-physical systems [PDF]

open access: yes, 2020
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems---the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller ...
Franceschetti, Massimo   +3 more
core   +1 more source

Tokenism or Catalytic? Exploring Board Gender Diversity Through the Lens of SDG 9 Outcomes in the EU Context

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study explores the relationship between Executive gender diversity (EGD) and the achievement of Sustainable Development Goal 9 (SDG 9—Industry, Innovation, and Infrastructure) in the European Union. It investigates whether female representation in corporate governance contributes to innovation‐driven sustainability.
Suzan Dsouza   +2 more
wiley   +1 more source

Power System Stability Analysis From Cyber Attacks Perspective

open access: yesIEEE Access
Power grid digitalization introduces new vulnerabilities and cyber security threats. The impact of cyber attacks on power system stability is a topic of growing concern, which is yet to be comprehensively analyzed.
Ioannis Semertzis   +5 more
doaj   +1 more source

Power System Security With Cyber-Physical Power System Operation

open access: yesIEEE Access, 2020
Cyber-attacks on a cyber-physical power system could lead to significant data failure, false data injection and cascading failure of physical power system components.
Peju Adesina Oyewole, Dilan Jayaweera
doaj   +1 more source

Home - About - Disclaimer - Privacy