Results 41 to 50 of about 2,702,156 (313)

Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces

open access: yesApplied Sciences, 2023
The rapid expansion of digital twin technology has revolutionized management and testing across various sectors, particularly in safeguarding critical infrastructure like smart grids.
Luigi Coppolino   +3 more
doaj   +1 more source

Attack and defence methods in cyber‐physical power system

open access: yesIET Energy Systems Integration, 2022
With the development of digitalisation and intelligence, the power system has been upgraded from the traditional single energy transmission and conversion system to a complex cyber‐physical power system (CPPS) with tightly coupled energy and information ...
Ting Yang, Yuzhe Liu, Wei Li
doaj   +1 more source

New Perspectives on the Use of Satellite Information in Contemporary Armed Conflicts and Crisis Management

open access: yesPolish Political Science Yearbook, 2023
Among current global threats, the risk of developing an emergency requires a comprehensive approach from all entities involved in crisis management. Despite the advanced technologies available to predict each threat, taking appropriate countermeasures is
Krzysztof Goniewicz
doaj   +1 more source

A Component-Based Approach for Securing Indoor Home Care Applications

open access: yesSensors, 2017
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre   +3 more
doaj   +1 more source

Privacy and Security Management in Intelligent Transportation System

open access: yesIEEE Access, 2020
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by ...
Suresh Chavhan   +5 more
doaj   +1 more source

Response to neoadjuvant chemotherapy in early breast cancers is associated with epithelial–mesenchymal transition and tumor‐infiltrating lymphocytes

open access: yesMolecular Oncology, EarlyView.
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane   +16 more
wiley   +1 more source

Detection of Current Attacks in Active Directory Environment with Log Correlation Methods

open access: yesHavacılık ve Uzay Teknolojileri Dergisi, 2023
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj  

A novel security information and event management system for enhancing cyber security in a hydroelectric dam

open access: yesInternational Journal of Critical Infrastructure Protection, 2016
Security information and event management (SIEM) systems are increasingly used to cope with the security challenges involved in critical infrastructure protection. However, these systems have several limitations. This paper describes an enhanced security information and event management system that (i) resolves conflicts between security policies; (ii)
Di Sarno, Cesario   +3 more
openaire   +5 more sources

IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response [PDF]

open access: yesarXiv, 2023
Security orchestration, automation, and response (SOAR) systems ingest alerts from security information and event management (SIEM) system, and then trigger relevant playbooks that automate and orchestrate the execution of a sequence of security activities. SOAR systems have two major limitations: (i) security analysts need to define, create and change
arxiv  

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy