Results 71 to 80 of about 144,780 (287)

Novel Noninvasive Broad‐Spectrum Infrared Treatment of Ulcerative Colitis by Modulating T‐Cell Relocation

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
A novel graphene‐based broad‐spectrum infrared (BSIR) device is developed for the noninvasive treatment of ulcerative colitis (UC). BSIR irradiation effectively alleviates colonic inflammation and accelerates mucosal recovery by inducing the systemic relocation of T lymphocytes to the spleen.
Siyu Chen   +15 more
wiley   +1 more source

Contemporary Trends in Economic Cybersecurity

open access: yesМир новой экономики, 2019
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj   +1 more source

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie   +10 more
wiley   +1 more source

Distributed Hierarchical Controller Resilience Analysis in Islanded Microgrid Under Cyber-Attacks

open access: yesInternational Transactions on Electrical Energy Systems
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links.
Abdollah Mirzabeigi   +2 more
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

Cyber Attacks and Combat Behavior [PDF]

open access: yesOvidius University Annals: Economic Sciences Series, 2017
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina   +2 more
doaj  

Non-linearities, cyber attacks and cryptocurrencies [PDF]

open access: yesFinance Research Letters, 2019
Abstract This paper uses a Markov-switching non-linear specification to analyse the effects of cyber attacks on returns in the case of four cryptocurrencies (Bitcoin, Ethernam, Litecoin and Stellar) over the period 8/8/2015 - 28/2/2019. The analysis considers both cyber attacks in general and those targeting cryptocurrencies in particular, and also ...
Caporale, Guglielmo Maria   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy