Results 71 to 80 of about 141,441 (275)

A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security

open access: yesIEEE Access
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform.
Naveen Tatipatri, S. L. Arun
doaj   +1 more source

Power System Security With Cyber-Physical Power System Operation

open access: yesIEEE Access, 2020
Cyber-attacks on a cyber-physical power system could lead to significant data failure, false data injection and cascading failure of physical power system components.
Peju Adesina Oyewole, Dilan Jayaweera
doaj   +1 more source

Cyber Attacks

open access: yes, 2007
Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks.
openaire   +2 more sources

Using Deep Learning Conditional Value‐at‐Risk Based Utility Function in Cryptocurrency Portfolio Optimisation

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT One of the critical risks associated with cryptocurrency assets is the so‐called downside risk, or tail risk. Conditional Value‐at‐Risk (CVaR) is a measure of tail risks that is not normally considered in the construction of a cryptocurrency portfolio.
Xinran Huang   +3 more
wiley   +1 more source

Power System Stability Analysis From Cyber Attacks Perspective

open access: yesIEEE Access
Power grid digitalization introduces new vulnerabilities and cyber security threats. The impact of cyber attacks on power system stability is a topic of growing concern, which is yet to be comprehensively analyzed.
Ioannis Semertzis   +5 more
doaj   +1 more source

Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

open access: yes, 2017
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core   +1 more source

Young adult self‐harm: The role of victimisation and polygenic risk in a population‐based longitudinal study

open access: yesJCPP Advances, EarlyView.
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki   +8 more
wiley   +1 more source

The contribution of vibrational spectroscopy and data analytics towards the achievement of the global sustainability goals

open access: yesJournal of the Science of Food and Agriculture, EarlyView.
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley   +1 more source

Distributed Hierarchical Controller Resilience Analysis in Islanded Microgrid Under Cyber-Attacks

open access: yesInternational Transactions on Electrical Energy Systems
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links.
Abdollah Mirzabeigi   +2 more
doaj   +1 more source

Contemporary Trends in Economic Cybersecurity

open access: yesМир новой экономики, 2019
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj   +1 more source

Home - About - Disclaimer - Privacy