Results 61 to 70 of about 14,082 (218)

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

Anomaly Detection Dataset for Industrial Control Systems

open access: yesIEEE Access, 2023
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet.
Alireza Dehlaghi-Ghadim   +3 more
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Impact of Cyber Risks and Threats on the Critical Infrastructure Development: Visualization of Scientific Research

open access: yesProceedings of the International Conference on Applied Innovations in IT
In the global world, there is a constant dynamic process that leads to structural changes (economic, social, organizational, environmental, etc.) of objects and infrastructure networks in a multi-component spatial system.
Aleksy Kwilinski, Nataliia Trushkina
doaj   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

A Systems Engineering Methodology for System of Autonomous Systems: Architecture and Integration

open access: yesSystems Engineering, EarlyView.
ABSTRACT Artificial intelligence and machine learning (AI/ML) rapidly transform systems by providing autonomous capabilities. This new class of systems can become a constituent system in a system of systems (SoS) to evolve it into a system of autonomous systems (SoAS).
Mohammadreza Torkjazi, Ali K. Raz
wiley   +1 more source

Deep learning for cybersecurity in smart grids: Review and perspectives

open access: yesEnergy Conversion and Economics, 2023
Protecting cybersecurity is a non‐negotiable task for smart grids (SG) and has garnered significant attention in recent years. The application of artificial intelligence, particularly deep learning (DL), holds great promise for enhancing the ...
Jiaqi Ruan   +6 more
doaj   +1 more source

Is There a Judicial Remedy for Victims of Federal Data Breaches? [PDF]

open access: yes, 2015
[Excerpt] The scope of information believed to have been compromised by a series of cyber-intrusions at the Office of Personnel Management (OPM) continues to grow.
Congressional Research Service
core   +1 more source

Home - About - Disclaimer - Privacy