Results 151 to 160 of about 697,637 (332)

Airport Cyber Security and Cyber Resilience Controls

open access: yes, 2019
Cyber Security scares are the main areas of demerits associated with the advent and widespread of internet technology. While the internet has improved life and business processes, the levels of security threats have been increasing proportionally. As such, the web and the related cyber systems have exposed the world to the state of continuous vigilance
openaire   +2 more sources

Modelling Cyber Resilience in SMEs as a Socio-Technical System: A Systemic Approach to Adaptive Digital Risk Management

open access: yesSystems
Small and medium-sized enterprises (SMEs) increasingly rely on digital technologies in everyday operations, often without having sufficient resources or structured mechanisms to manage the cyber risks that accompany this dependence.
Alona Bahmanova, Natalja Lace
doaj   +1 more source

Protecting Critical Infrastructure in the EU [PDF]

open access: yes, 2010
Haemmerli, Bernard, Renda, Andrea
core   +1 more source

From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia   +3 more
wiley   +1 more source

Guide to Australia’s national security capability [PDF]

open access: yes
This paper provides a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes in a range of environments, including domestically, at the border, offshore and in cyberspace.

core  

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

A Review of Human–AI Synergy in Smart Energy Management Concepts, Functions, Applications, and Future Frontiers

open access: yesEnergy Internet, EarlyView.
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An   +5 more
wiley   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, EarlyView.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Technology for Whom and for What? A Global South View of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley   +1 more source

Home - About - Disclaimer - Privacy