Results 41 to 50 of about 2,702,156 (313)
Building Cyber-Resilient Smart Grids with Digital Twins and Data Spaces
The rapid expansion of digital twin technology has revolutionized management and testing across various sectors, particularly in safeguarding critical infrastructure like smart grids.
Luigi Coppolino+3 more
doaj +1 more source
Attack and defence methods in cyber‐physical power system
With the development of digitalisation and intelligence, the power system has been upgraded from the traditional single energy transmission and conversion system to a complex cyber‐physical power system (CPPS) with tightly coupled energy and information ...
Ting Yang, Yuzhe Liu, Wei Li
doaj +1 more source
Among current global threats, the risk of developing an emergency requires a comprehensive approach from all entities involved in crisis management. Despite the advanced technologies available to predict each threat, taking appropriate countermeasures is
Krzysztof Goniewicz
doaj +1 more source
A Component-Based Approach for Securing Indoor Home Care Applications
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly ...
Aitor Agirre+3 more
doaj +1 more source
Privacy and Security Management in Intelligent Transportation System
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by ...
Suresh Chavhan+5 more
doaj +1 more source
Epithelial–mesenchymal transition (EMT) and tumor‐infiltrating lymphocytes (TILs) are associated with early breast cancer response to neoadjuvant chemotherapy (NAC). This study evaluated EMT and TIL shifts, with immunofluorescence and RNA sequencing, at diagnosis and in residual tumors as potential biomarkers associated with treatment response.
Françoise Derouane+16 more
wiley +1 more source
Detection of Current Attacks in Active Directory Environment with Log Correlation Methods
Active Directory is a directory service that provides control and integrity with a centralized management and identity management to cyber structures that expand over time and increase the number of devices. Protecting user credentials, corporate systems
Mehmet Sabri Elmastaş
doaj
Security information and event management (SIEM) systems are increasingly used to cope with the security challenges involved in critical infrastructure protection. However, these systems have several limitations. This paper describes an enhanced security information and event management system that (i) resolves conflicts between security policies; (ii)
Di Sarno, Cesario+3 more
openaire +5 more sources
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response [PDF]
Security orchestration, automation, and response (SOAR) systems ingest alerts from security information and event management (SIEM) system, and then trigger relevant playbooks that automate and orchestrate the execution of a sequence of security activities. SOAR systems have two major limitations: (i) security analysts need to define, create and change
arxiv
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source