Results 331 to 340 of about 196,474 (374)
Process Resilience under Optimal Data Injection Attacks
Abstract In this article, we study the resilience of process systems in an information‐theoretic framework, from the perspective of an attacker capable of optimally constructing data injection attacks. The attack aims to distract the stationary distributions of process variables and stay stealthy, simultaneously.
Xiuzhen Ye, Wentao Tang
wiley +1 more source
Cybersecuity Analysis of a Telemedicine Platform. [PDF]
Nobili M, Raguseo D, Setola R.
europepmc +1 more source
Patton, Mark+3 more
openaire +1 more source
Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat+3 more
wiley +1 more source
Revisiting Wireless Cyberattacks on Vehicles. [PDF]
Gesteira-Miñarro R+2 more
europepmc +1 more source
Tingles and Society: The Emotional Experience of ASMR as a Social Phenomenon
ASMR (“Autonomous Sensory Meridian Response”) is commonly defined as an emotional experience of a tingling sensation in the head and neck. It is said to be triggered by certain auditory, visual, interpersonal, tactile, and often socially intimate stimuli. A great many people around the world reportedly experience ASMR regularly.
Michael Grothe‐Hammer
wiley +1 more source
Mathematical analysis of the dynamics of cyberattack propagation in IoT networks. [PDF]
AbuHour Y+4 more
europepmc +1 more source
The Artificial Intelligence Conspiracy Beliefs Scale (AICBS) was developed and validated using data from 788 participants to assess conspiracy beliefs about artificial intelligence. EFA resulted in a five‐factor structure (Interpersonal Relations and Social Influence, Arms Rivalry and Less World Peace, Human Labor and Human Intelligence, Global Control,
Chung‐Ying Lin+8 more
wiley +1 more source
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms. [PDF]
Saranya K, Valarmathi A.
europepmc +1 more source
Smart intrusion detection model to identify unknown attacks for improved road safety and management. [PDF]
Alshammari F, Alsaleh A.
europepmc +1 more source