Results 331 to 340 of about 196,474 (374)

Process Resilience under Optimal Data Injection Attacks

open access: yesAIChE Journal, Volume 71, Issue 8, August 2025.
Abstract In this article, we study the resilience of process systems in an information‐theoretic framework, from the perspective of an attacker capable of optimally constructing data injection attacks. The attack aims to distract the stationary distributions of process variables and stay stealthy, simultaneously.
Xiuzhen Ye, Wentao Tang
wiley   +1 more source

Cybersecuity Analysis of a Telemedicine Platform. [PDF]

open access: yesHealthcare (Basel)
Nobili M, Raguseo D, Setola R.
europepmc   +1 more source

Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI

open access: yesProceedings of the Annual Hawaii International Conference on System Sciences
Patton, Mark   +3 more
openaire   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Revisiting Wireless Cyberattacks on Vehicles. [PDF]

open access: yesSensors (Basel)
Gesteira-Miñarro R   +2 more
europepmc   +1 more source

Tingles and Society: The Emotional Experience of ASMR as a Social Phenomenon

open access: yesSociological Inquiry, Volume 95, Issue 3, Page 612-631, August 2025.
ASMR (“Autonomous Sensory Meridian Response”) is commonly defined as an emotional experience of a tingling sensation in the head and neck. It is said to be triggered by certain auditory, visual, interpersonal, tactile, and often socially intimate stimuli. A great many people around the world reportedly experience ASMR regularly.
Michael Grothe‐Hammer
wiley   +1 more source

Mathematical analysis of the dynamics of cyberattack propagation in IoT networks. [PDF]

open access: yesPLoS One
AbuHour Y   +4 more
europepmc   +1 more source

Dark Future: Development and Initial Validation of Artificial Intelligence Conspiracy Beliefs Scale (AICBS)

open access: yesBrain and Behavior, Volume 15, Issue 7, July 2025.
The Artificial Intelligence Conspiracy Beliefs Scale (AICBS) was developed and validated using data from 788 participants to assess conspiracy beliefs about artificial intelligence. EFA resulted in a five‐factor structure (Interpersonal Relations and Social Influence, Arms Rivalry and Less World Peace, Human Labor and Human Intelligence, Global Control,
Chung‐Ying Lin   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy