A dataset collected in real-world industrial control systems for network attack detection. [PDF]
Zhou X +9 more
europepmc +1 more source
Hydrocarbon membranes are a greener alternative to PFSA in PEM fuel cells, but degrade rapidly from radical attack. We present a novel strategy using poly(vinylphosphonic acid) (PVPA) as a local radical scavenger. Incorporated as an interfacial barrier, PVPA enhances chemical stability and significantly extends membrane lifetime under accelerated ...
Hendrik Sannemüller +6 more
wiley +1 more source
CoAP_UAD: CoAP under attack dataset - A comprehensive dataset for CoAP-based IoT security research. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
Dicarboxylate‐modified anionic hairy cellulose nanocrystals exhibit a high selectivity for dysprosium(III) over neodymium(III). This selectivity arises from disordered dicarboxylate cellulose “hairs” that enable cooperative ionic coordination, hydrogen bonding, and strain‐induced conformational shrinkage.
Roya Koshani +6 more
wiley +1 more source
Double reinforcement learning for cluster synchronization of Boolean control networks under denial of service attacks. [PDF]
Deng W, Huang C, Shuai Q.
europepmc +1 more source
An optimized carbon host nanostructure enables a dual‐interface‐dominant architecture in sulfur cathodes of solid‐state Li‐S batteries by selectively forming sulfur|carbon and sulfur|solid electrolyte interfaces. This tailored interfacial configuration accelerates sulfur redox kinetics by establishing enriched Li+/e– transport networks, while ...
Zhao Yang +13 more
wiley +1 more source
A Spatially Distributed Perturbation Strategy with Smoothed Gradient Sign Method for Adversarial Analysis of Image Classification Systems. [PDF]
Xu Y, Li J, Chang D, Dong Y.
europepmc +1 more source
MQTT_UAD: MQTT Under Attack Dataset. A public dataset for the detection of attacks in IoT networks using MQTT protocol. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]
Nauman M +4 more
europepmc +1 more source

