Results 71 to 80 of about 14,082 (218)

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Neural Network-Based Cyber-Threat Detection Strategy in Four Motor-Drive Autonomous Electric Vehicles

open access: yesIEEE Access
Autonomous electric vehicles provide benefits to both drivers and the environment compared to conventional vehicles; however, they are burdened with an increase in potential pathways for cyber-attacks.
Douglas G. Scruggs   +6 more
doaj   +1 more source

Tech Diplomacy and the Digital International Order: The Case of the EU–U.S. Trade and Technology Council

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset

open access: yesApplied Sciences
In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science.
Hadi Najafi Mohsenabad, Mehmet Ali Tut
doaj   +1 more source

Preventive Priorities Survey 2015 [PDF]

open access: yes, 2014
The Center for Preventive Action's annual Preventive Priorities Survey (PPS) evaluates ongoing and potential conflicts based on their likelihood of occurring in the coming year and their impact on U.S. interests.
Paul B. Stares
core  

Private Network Realignment: State Strategies Versus Market‐Driven Globalization in the Subsea Cable Network

open access: yesGlobal Policy, EarlyView.
ABSTRACT Much of the subsea cable network, which carries the vast majority of global internet traffic, is developed, owned, and operated by private corporations. In an era of growing global tensions, states have come to view these cables as critical to their interests. The article addresses the disconnect between statecraft‐centric explanations and the
Joscha Abels
wiley   +1 more source

MODERN BUSINESS CYBERSECURITY CHALLENGES AND THE ROLE OF ARTIFICIAL INTELLIGENCE IN COUNTERING THREATS

open access: yesEkonomìčnij Vìsnik Nacìonalʹnogo Tehnìčnogo Unìversitetu Ukraïni "Kiïvsʹkij Polìtehnìčnij Institut"
Business cybersecurity involves the protection of its important interests when using cyberspace, as well as timely detection, prevention and neutralization of real and potential threats.
Kostiantyn Zavrazhnyi, Anzhelika Kulyk
doaj   +1 more source

Home - About - Disclaimer - Privacy