Results 141 to 150 of about 67,029 (331)

Anomaly detection using isomorphic analysis for false data injection attacks in industrial control systems [PDF]

open access: green
Xinchen Zhang   +6 more
openalex   +1 more source

Inroads into epilepsy through high‐frequency oscillations: Achievements and benchmark areas for improvement

open access: yesEpilepsia, EarlyView.
Abstract High‐frequency oscillations (HFOs) were discovered more than 20 years ago, and since then they have been studied intensively in the context of epilepsy. HFOs encompass a broad spectrum of oscillations, typically ranging from 80 Hz to several kHz, that include both normal and pathological oscillations, documented in people with epilepsy and ...
Christos Panagiotis Lisgaras   +6 more
wiley   +1 more source

A two‐sample Mendelian randomization study and mediation analysis exploring the link between cathepsins and epilepsy

open access: yesEpilepsia Open, EarlyView.
Abstract Objective This study aims to investigate the causal relationship between cathepsins and epilepsy, using Mendelian randomization (MR) and mediation analysis. Methods Publicly accessible summary statistics on epilepsy were obtained from FinnGen and the International League Against Epilepsy Consortium.
Huaiyu Sun   +7 more
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Inconsistent Transcriptomic Responses to Hexabromocyclododecane in Japanese Quail: A Comparative Analysis of Results From Four Different Study Designs

open access: yesEnvironmental Toxicology and Chemistry, EarlyView.
Abstract Efforts to use transcriptomics for toxicity testing have classically relied on the assumption that chemicals consistently produce characteristic transcriptomic signatures that are reflective of their mechanism of action. However, the degree to which transcriptomic responses are conserved across different test methodologies has seldom been ...
Paul Béziers   +10 more
wiley   +1 more source

Exercise‐specific plasma proteomic signatures in racehorses: Candidates for training adaptation and peak load monitoring

open access: yesEquine Veterinary Journal, EarlyView.
Abstract Background Racehorses undergo profound physiological changes with training and competition, but current biomarkers inadequately capture the complex molecular dynamics of exercise. This study aimed to identify novel plasma biomarkers of training adaptation and peak load using high‐throughput proteomics.
Jowita Grzędzicka   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy