Results 41 to 50 of about 317,969 (287)

Data-driven control against false data injection attacks

open access: yesAutomatica
The rise of cyber-security concerns has brought significant attention to the analysis and design of cyber-physical systems (CPSs). Among the various types of cyberattacks, denial-of-service (DoS) attacks and false data injection (FDI) attacks can be easily launched and have become prominent threats.
Liu, Wenjie   +5 more
openaire   +3 more sources

False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

open access: yes, 2017
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang   +3 more
core   +1 more source

Dual targeting of RET and SRC synergizes in RET fusion‐positive cancer cells

open access: yesMolecular Oncology, EarlyView.
Despite the strong activity of selective RET tyrosine kinase inhibitors (TKIs), resistance of RET fusion‐positive (RET+) lung cancer and thyroid cancer frequently occurs and is mainly driven by RET‐independent bypass mechanisms. Son et al. show that SRC TKIs significantly inhibit PAK and AKT survival signaling and enhance the efficacy of RET TKIs in ...
Juhyeon Son   +13 more
wiley   +1 more source

Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks

open access: yesEnergies, 2020
The accuracy of wind power forecasting depends a great deal on the data quality, which is so susceptible to cybersecurity attacks. In this paper, we study the cybersecurity issue of short-term wind power forecasting. We present one class of data attacks,
Yao Zhang, Fan Lin, Ke Wang
doaj   +1 more source

Effective therapeutic targeting of CTNNB1‐mutant hepatoblastoma with WNTinib

open access: yesMolecular Oncology, EarlyView.
WNTinib, a Wnt/CTNNB1 inhibitor, was tested in hepatoblastoma (HB) experimental models. It delayed tumor growth and improved survival in CTNNB1‐mutant in vivo models. In organoids, WNTinib outperformed cisplatin and showed enhanced efficacy in combination therapy, supporting its potential as a targeted treatment for CTNNB1‐mutated HB.
Ugne Balaseviciute   +17 more
wiley   +1 more source

System recovery of MIMO nonlinear systems against false data injection attack [PDF]

open access: yesPeerJ Computer Science
This article investigates the system recovery problem for a class of multi-input multi-output (MIMO) nonlinear systems under false data injection attack. Under the conditions that the attack is norm-bounded and the system has a vector relative degree and
Guokai Liang   +8 more
doaj   +2 more sources

An Improved Limit on the Muon Electric Dipole Moment [PDF]

open access: yes, 2009
Three independent searches for an electric dipole moment (EDM) of the positive and negative muons have been performed, using spin precession data from the muon g-2 storage ring at Brookhaven National Laboratory.
Bennett, G. W.   +75 more
core   +2 more sources

LINC01116, a hypoxia‐lncRNA marker of pathological lymphangiogenesis and poor prognosis in lung adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
The LINC01116 long noncoding RNA is induced by hypoxia and associated with poor prognosis and high recurrence rates in two cohorts of lung adenocarcinoma patients. Here, we demonstrate that besides its expression in cancer cells, LINC01116 is markedly expressed in lymphatic endothelial cells of the tumor stroma in which it participates in hypoxia ...
Marine Gautier‐Isola   +12 more
wiley   +1 more source

How Effective are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection

open access: yes, 2020
Security attacks targeting smart contracts have been on the rise, which have led to financial loss and erosion of trust. Therefore, it is important to enable developers to discover security vulnerabilities in smart contracts before deployment.
Akca Sefa   +9 more
core   +1 more source

Security Against False Data-Injection Attack in Cyber-Physical Systems [PDF]

open access: yesIEEE Transactions on Control of Network Systems, 2020
In this paper, secure, remote estimation of a linear Gaussian process via observations at multiple sensors is considered. Such a framework is relevant to many cyber-physical systems and internet-of-things applications. Sensors make sequential measurements that are shared with a fusion center; the fusion center applies a certain filtering algorithm to ...
Arpan Chattopadhyay, Urbashi Mitra
openaire   +2 more sources

Home - About - Disclaimer - Privacy