Results 71 to 80 of about 14,082 (218)
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
Autonomous electric vehicles provide benefits to both drivers and the environment compared to conventional vehicles; however, they are burdened with an increase in potential pathways for cyber-attacks.
Douglas G. Scruggs +6 more
doaj +1 more source
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science.
Hadi Najafi Mohsenabad, Mehmet Ali Tut
doaj +1 more source
Preventive Priorities Survey 2015 [PDF]
The Center for Preventive Action's annual Preventive Priorities Survey (PPS) evaluates ongoing and potential conflicts based on their likelihood of occurring in the coming year and their impact on U.S. interests.
Paul B. Stares
core
ABSTRACT Much of the subsea cable network, which carries the vast majority of global internet traffic, is developed, owned, and operated by private corporations. In an era of growing global tensions, states have come to view these cables as critical to their interests. The article addresses the disconnect between statecraft‐centric explanations and the
Joscha Abels
wiley +1 more source
Business cybersecurity involves the protection of its important interests when using cyberspace, as well as timely detection, prevention and neutralization of real and potential threats.
Kostiantyn Zavrazhnyi, Anzhelika Kulyk
doaj +1 more source

