Results 21 to 30 of about 3,713 (127)
Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi +2 more
wiley +1 more source
Proposal, development and test of an analog front-end electronic board for Nemo telescope [PDF]
The NEMO collaboration is involved in the R&D of the main technologies for the project of a km3 scale underwater neutrino telescope. The proposed detector is made up of thousands of Optical Modules (hereafter OM), spread over the entire volume for Cˇ ...
Caponetto, L +5 more
core +1 more source
This study presents a comprehensive analysis of system resilience and recovery in the face of cyber attacks on a hydrogen energy infrastructure, utilizing advanced modelling techniques and state‐of‐the‐art cybersecurity strategies. We developed a robust optimization framework integrated with graph neural networks (GNNs) to detect and mitigate ...
Dong Hua +3 more
wiley +1 more source
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware [PDF]
Funding: This work has been co-funded by the DFG as part of projects S1 within the CRC 1119 CROSSING and C.1 within the RTG 2050 ”Privacy and Trust for Mobile Users”, and by the BMBF within CRISP.
Classen, Jiska +4 more
core +2 more sources
Mobile Microgrids: Concepts, Key Technologies, Business Models, Applications and Prospects
Our study explores MMG concepts, key technologies, business models and applications, illustrating their impact on improving the flexible ADN operation. This study emphasises not only the practical importance of MMGs but also their pivotal role in reshaping the future landscape of energy delivery, offering valuable insights for researchers, policymakers
Tao Ding +5 more
wiley +1 more source
Rapid digital adoption in Nigeria has been accompanied by rising cybercrime; a 2021 Sophos survey found 71% of Nigerian organizations experienced cyberattacks, 44% of which paid ransoms averaging USD 3.43 million. The integration of emerging technologies (artificial intelligence, blockchain, Internet of Things, and 5G) offers transformative ...
Goddy Uwa Osimen +5 more
wiley +1 more source
Multistable Composite Laminate Grids as a Design Tool for Soft Reconfigurable Multirotors
Flexible, lightweight, stable: the reconfigurable multirotor combines stable flight in multiple shapes with low‐energy reconfiguration. Utilizing optimized multistable composites, it achieves self‐locking in open and folded configurations, cutting width‐span by 48% and allowing for safe gap traversal.
Luca Girardi +4 more
wiley +1 more source
Reducing the dynamic FPGA reconfiguration overhead [PDF]
Dynamic hardware generation reduces the number of FPGA resources needed and speeds up the application by optimizing the configuration for the exact problem at hand at run-time. If the problem changes, the system needs to be reconfigured. When this occurs
Bruneel, Karel +3 more
core +1 more source
Radio hardware virtualization for software-defined wireless networks [PDF]
Software-Defined Network (SDN) is a promising architecture for next generation Internet. SDN can achieve Network Function Virtualization much more efficiently than conventional architectures by splitting the data and control planes.
Jiao, Xianjun +3 more
core +2 more sources
This paper explicitly reviews the state‐of‐the‐art RIS‐assisted wireless networks, especially open challenges relating to the B5G and 6G networks. This work presents an intensive study of recent research on RIS to provide an in‐depth understanding of the underlying principles surrounding RIS operations, composition, and effect on EM waves.
Chukwuemeka Nwufo +2 more
wiley +1 more source

