Results 41 to 50 of about 45,766 (284)

Energy Market Manipulation via False-Data Injection Attacks: A Review

open access: yesIEEE Access
Locational Marginal Prices (LMPs) are critical indicators in modern energy markets, representing the cost of delivering electricity at specific locations while considering the generation and transmission constraints.
Ghadeer O. Alsharif   +2 more
doaj   +1 more source

A Novel Diagnosis Scheme against Collusive False Data Injection Attack

open access: yesSensors, 2023
The collusive false data injection attack (CFDIA) is a false data injection attack (FIDA), in which false data are injected in a coordinated manner into some adjacent pairs of captured nodes of an attacked wireless sensor network (WSN). As a result, the defense of WSN against a CFDIA is much more difficult than defense against ordinary FDIA. This paper
Jiamin Hu, Xiaofan Yang, Luxing Yang
openaire   +3 more sources

Intelligent data attacks against power systems using incomplete network information: a review

open access: yesJournal of Modern Power Systems and Clean Energy, 2018
With the integration of information technologies, power system operations are increasingly threatened by cyber-attacks. It has even been revealed that an attacker can inject false data into real-time measurements stealthily without knowing the full ...
Yufei SONG   +4 more
doaj   +1 more source

A Deviation-Based Detection Method Against False Data Injection Attacks in Smart Grid

open access: yesIEEE Access, 2021
State estimation plays a vital role to ensure safe and reliable operations in smart grid. Intelligent attackers can carefully design a destructive and stealthy false data injection attack (FDIA) sequence such that commonly used weighted least squares ...
Chao Pei   +3 more
doaj   +1 more source

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

open access: yes, 2020
In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure.
Eberz, Simon   +2 more
core   +1 more source

Sertraline Treatment Can Mimic Niemann‐Pick Type C Biomarker Profile: A Diagnostic Pitfall

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Oxysterols (cholestane‐3β,5α,6β‐triol and 7‐ketocholesterol) and N‐palmitoyl‐O‐phosphocholineserine (PPCS) are sensitive biomarkers for Niemann‐Pick disease type C (NPC) screening. However, false‐positive results occur, with a biomarker profile suggestive of NPC despite the absence of pathogenic variants in genes involved in NPC or ...
Maria Makrygianni   +19 more
wiley   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj   +1 more source

Load frequency control under false data inject attacks based on multi-agent system method in multi-area power systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
This article considers the load frequency control of multi-area power system-based multi-agent system method under false data injection attacks. The research can provide better solutions for multi-area power system load frequency control under false data
Tengfei Weng   +6 more
doaj   +1 more source

Atomistic Mechanisms Triggered by Joule Heating Effects in Metallic Cu‐Bi Nanowires for Spintronics

open access: yesAdvanced Materials, EarlyView.
Bi doped metallic Cu nanowires are promising for spintronics thanks to the stabilization of a giant spin Hall effect. However, heat resulting from current injection forces Bi to leave solution, forcing segregation into monoatomic decorations which evolve into coherent crystalline aggregates.
Alejandra Guedeja‐Marrón   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy