Results 61 to 70 of about 45,445 (284)

Graph theoretical defense mechanisms against false data injection attacks in smart grids

open access: yesJournal of Modern Power Systems and Clean Energy, 2018
This paper addresses false data injection, which is one of the most significant security challenges in smart grids. Having an accurately estimated state is of great importance for maintaining a stable running condition of smart grids.
Mohammad Hasan ANSARI   +3 more
doaj   +1 more source

Detection and Estimation of False Data Injection Attacks for Load Frequency Control Systems

open access: yesJournal of Modern Power Systems and Clean Energy, 2022
False data injection attacks (FDIAs) against the load frequency control (LFC) system can lead to unstable operation of power systems. In this paper, the problems of detecting and estimating the FDIAs for the LFC system in the presence of external ...
Jun Ye, Xiang Yu
doaj   +1 more source

Liver Stiffness Directs Intrahepatic Cholesterol Accumulation Through YAP/TAZ in Metabolic Dysfunction‐Associated Steatotic Liver Disease

open access: yesAdvanced Science, EarlyView.
Liver stiffness promotes intrahepatic cholesterol accumulation by repressing LXRα through YAP/TAZ activation. Stiff matrices impair cholesterol efflux in hepatocytes, while YAP/TAZ deletion restores LXRα activity and prevents cholesterol‐induced fibrosis.
Na Young Lee   +9 more
wiley   +1 more source

Impact of optimal false data injection attacks on local energy trading in a residential microgrid

open access: yesICT Express, 2018
This paper illustrates the vulnerability of local energy trading to false data injection attacks in a smart residential microgrid and demonstrates the impact of such attacks on the financial benefits earned by the participants.
Shama N. Islam, M.A. Mahmud, A.M.T. Oo
doaj   +1 more source

False Data Injection Attack Detection in Smart Grid Using Energy Consumption Forecasting

open access: yesEnergies, 2022
Supervisory Control and Data Acquisition (SCADA) systems are essential for reliable communication and control of smart grids. However, in the cyber-physical realm, it becomes highly vulnerable to cyber-attacks like False Data Injection (FDI) into the ...
Abrar Mahi-al-rashid   +3 more
doaj   +1 more source

Gut Microbiota‐Derived Anandamide Mediates the Therapeutic Effects of Urolithin A on Alcohol‐Induced Cognitive and Social Dysfunction via CB1R‐DRD2‐RAP1 Signaling Axis

open access: yesAdvanced Science, EarlyView.
This study reveals that Urolithin A (UA) counteracts alcohol‐induced cognitive and social dysfunction (AICSD) via a gut microbiome‐dependent mechanism. UA‐enriched Bacteroids sartorii and Parabacteroids distasonis elevate anandamide (AEA), which activates the CB1R‐DRD2‐Rap1 signaling cascade to drive synaptic repair and reduce neuroinflammation ...
Hongbo Zhang   +9 more
wiley   +1 more source

False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment

open access: yesIEEE Access, 2018
In this paper, a new class of false data injection attacks (FDIAs) on contingency analysis (CA) through state estimation (SE) is proposed, and the economic impact of the proposed attacks on real-time power market operations is quantified.
Jeong-Won Kang   +2 more
doaj   +1 more source

One Breaker is Enough: Hidden Topology Attacks on Power Grids

open access: yes, 2015
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines
Baldick, Ross   +2 more
core   +1 more source

Stochastic Nanoscale Biophysical Cues as a Basis for the Induction of Glioblastoma‐Like Transcriptional Programs in Astrocytes

open access: yesAdvanced Science, EarlyView.
Stochastic nanoscale physical cues induce glioblastoma (GBM)‐associated transcriptional traits in naïve astrocytes leading to spontaneous formation of spheroids. Cells within spheroids express activated‐MMP2 and a differential gene expression pattern involving P53 and NOTCH3, providing evidence for a role for changes in brain topography, as observed in
Laurent Starck   +8 more
wiley   +1 more source

Tuning Windowed Chi-Squared Detectors for Sensor Attacks

open access: yes, 2017
A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures as benchmarks to compare the ...
aström   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy