Results 71 to 80 of about 144,780 (287)
A novel graphene‐based broad‐spectrum infrared (BSIR) device is developed for the noninvasive treatment of ulcerative colitis (UC). BSIR irradiation effectively alleviates colonic inflammation and accelerates mucosal recovery by inducing the systemic relocation of T lymphocytes to the spleen.
Siyu Chen +15 more
wiley +1 more source
Contemporary Trends in Economic Cybersecurity
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dynamics of cyber-attacks over the past five years and, particularly, pointed on the main trends of 2018 year.
Yu. Yu. Shitova, Yu. A. Shitov
doaj +1 more source
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source
Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie +10 more
wiley +1 more source
Distributed Hierarchical Controller Resilience Analysis in Islanded Microgrid Under Cyber-Attacks
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links.
Abdollah Mirzabeigi +2 more
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila +14 more
core +1 more source
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom +2 more
wiley +1 more source
Cyber Attacks and Combat Behavior [PDF]
Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages.
Carataș Maria Alina +2 more
doaj
Non-linearities, cyber attacks and cryptocurrencies [PDF]
Abstract This paper uses a Markov-switching non-linear specification to analyse the effects of cyber attacks on returns in the case of four cryptocurrencies (Bitcoin, Ethernam, Litecoin and Stellar) over the period 8/8/2015 - 28/2/2019. The analysis considers both cyber attacks in general and those targeting cryptocurrencies in particular, and also ...
Caporale, Guglielmo Maria +3 more
openaire +4 more sources

