Results 71 to 80 of about 66,369 (329)
Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming +5 more
core +1 more source
Data-Driven Detection of False Data Injection Attacks in Smart Grids
Cyber-physical attacks are the most significant threat facing the utilisation and development of the various smart grid technologies. Among these attacks, false data injection attacks (FDIAs) represent a major category, with a wide variety of types and effects. There has been extensive reporting on FDIAs recently. Several detection algorithms have been
openaire +2 more sources
Geometry and connectivity are complementary structures, which have demonstrated their ability to represent the brain's functional activity. This study evaluates geometric and connectome eigenmodes as biologically informed constraints for EEG source localization.
Pok Him Siu +6 more
wiley +1 more source
Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation
Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation.
Baldick, Ross +2 more
core +1 more source
PET Imaging of Cardiac Inflammation in Viral Myocarditis Using a DPP4‐Targeted Probe
This study describes a DPP4‐targeted PET probe for imaging myocardial inflammation by selectively targeting activated immune cells. Derived from the clinically approved small‐molecule inhibitor linagliptin, the probe demonstrates favorable biodistribution with specific cardiac uptake in myocarditis.
Wanhao Gao +14 more
wiley +1 more source
This study developed a hierarchical targeting nanoplatform, siTREM2@ETP‐PEOz‐OMVs, against triple‐negative breast cancer (TNBC) bone metastasis. It precisely delivers therapeutic siTREM2 to monocytes/macrophages within the metastatic niche. This intervention dually regulates cell fate: reprogramming immunosuppressive macrophages and inhibiting ...
Fanglu Chen +12 more
wiley +1 more source
Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex +3 more
core +1 more source
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that precedes the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl +27 more
wiley +1 more source
Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack
The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network
Yihe Wang +4 more
doaj +1 more source
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source

