Results 71 to 80 of about 66,369 (329)

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

open access: yes, 2018
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming   +5 more
core   +1 more source

Data-Driven Detection of False Data Injection Attacks in Smart Grids

open access: yes, 2022
Cyber-physical attacks are the most significant threat facing the utilisation and development of the various smart grid technologies. Among these attacks, false data injection attacks (FDIAs) represent a major category, with a wide variety of types and effects. There has been extensive reporting on FDIAs recently. Several detection algorithms have been
openaire   +2 more sources

Structural Eigenmodes of the Brain to Improve the Source Localization of EEG: Application to Epileptiform Activity

open access: yesAdvanced Science, EarlyView.
Geometry and connectivity are complementary structures, which have demonstrated their ability to represent the brain's functional activity. This study evaluates geometric and connectome eigenmodes as biologically informed constraints for EEG source localization.
Pok Him Siu   +6 more
wiley   +1 more source

Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation

open access: yes, 2015
Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation.
Baldick, Ross   +2 more
core   +1 more source

PET Imaging of Cardiac Inflammation in Viral Myocarditis Using a DPP4‐Targeted Probe

open access: yesAdvanced Science, EarlyView.
This study describes a DPP4‐targeted PET probe for imaging myocardial inflammation by selectively targeting activated immune cells. Derived from the clinically approved small‐molecule inhibitor linagliptin, the probe demonstrates favorable biodistribution with specific cardiac uptake in myocarditis.
Wanhao Gao   +14 more
wiley   +1 more source

Hierarchical Targeting of TREM2+ Myeloid Cells via Acid‐Triggered OMVs Reprogram Immunosuppression and Suppress Osteolysis in Bone‐Metastatic TNBC

open access: yesAdvanced Science, EarlyView.
This study developed a hierarchical targeting nanoplatform, siTREM2@ETP‐PEOz‐OMVs, against triple‐negative breast cancer (TNBC) bone metastasis. It precisely delivers therapeutic siTREM2 to monocytes/macrophages within the metastatic niche. This intervention dually regulates cell fate: reprogramming immunosuppressive macrophages and inhibiting ...
Fanglu Chen   +12 more
wiley   +1 more source

Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective

open access: yes, 2014
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales.
Beutel, Alex   +3 more
core   +1 more source

Discovery of an Adaptive Neuroimmune Response Driving Itch and Fast Tick Removal with Implications for Preventing Pathogen Transmission

open access: yesAdvanced Science, EarlyView.
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that precedes the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl   +27 more
wiley   +1 more source

Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack

open access: yesIET Cyber-Physical Systems, 2023
The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network
Yihe Wang   +4 more
doaj   +1 more source

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy