AI-Driven Cybersecurity in IoT: Adaptive Malware Detection and Lightweight Encryption via TRIM-SEC Framework. [PDF]
Mutambik I.
europepmc +1 more source
From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia +3 more
wiley +1 more source
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source
Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi +3 more
wiley +1 more source
Digital Twin-Driven Intrusion Detection for Industrial SCADA: A Cyber-Physical Case Study. [PDF]
Sayghe A.
europepmc +1 more source
D3O-IIoT: deep reinforcement learning-driven dynamic deception orchestration for industrial IoT security. [PDF]
Wushishi U +5 more
europepmc +1 more source
This study combines replicated experimental manipulation, social network analysis, network permutations and meta‐analysis to disentangle active from spatially‐induced changes in animal network structure in the wild. It reveals that short‐term environmental changes primarily alter space use, with limited effects on social structure.
Camille N. M. Bordes +6 more
wiley +1 more source
Secure TPMS Data Transmission in Real-Time IoV Environments: A Study on 5G and LoRa Networks. [PDF]
Niranjan DK, Supriya M, Tiberti W.
europepmc +1 more source
Integrating comparative spectrometry, image analysis, and thermal modeling, we reveal that (1) females optimize crypsis via background matching, (2) males prioritize high‐contrast disruptive patterning at a significant thermoregulatory cost (reduced solar heat gain), and (3) habitat‐specific monomorphism in Diploderma slowinskii underscores ecological ...
Yuning Cao, Lin Shi, Yin Qi
wiley +1 more source
A privacy preserving intrusion detection framework for IIoT in 6G networks using homomorphic encryption and graph neural networks. [PDF]
Hua B, Xi H.
europepmc +1 more source

