An Analysis and Simulation of Security Risks in Radar Networks from the Perspective of Cybersecurity. [PDF]
Chen R, Zhang Y, Li X, Ran J.
europepmc +1 more source
In this article, I analyze my interviews with Mark (pseudonym), a social scientist who committed major academic fraud in over 50 top‐tier journal articles in the first decade of this century. I explain how stigma played a central role in how Mark and I shaped our interaction. I focus on how Mark, a former Professor and Dean with a distinguished career,
Thaddeus Müller
wiley +1 more source
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems. [PDF]
Şahin CB.
europepmc +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Graph-based federated learning approach for intrusion detection in IoT networks. [PDF]
Al Tfaily F +5 more
europepmc +1 more source
Effect of ‘combing’ on intramuscular sedation in pigs in a clinical setting—A randomised trial
Abstract Background Pigs pose distinct challenges to the anaesthetist due to their temperament, the limitations of manual restraint and species‐specific anatomical features. Despite the importance of minimising stress during clinical procedures, gentle handling techniques tailored for pigs in a clinical setting have yet to be clearly described or ...
Kaitlynn C. Ban +5 more
wiley +1 more source
Enhancing cybersecurity in virtual power plants by detecting network based cyber attacks using an unsupervised autoencoder approach. [PDF]
Singh KN +4 more
europepmc +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Enhanced SQL injection detection using chi-square feature selection and machine learning classifiers. [PDF]
Casmiry E, Mduma N, Sinde R.
europepmc +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source

