Results 11 to 20 of about 36 (36)

A Network Modeling Systematics for Transition Paths Toward Climate Neutral Gas Networks—NeMoSys ['nεmɒsis] –

open access: yesEnergy Technology, Volume 13, Issue 2, February 2025.
This article discusses challenges in modeling complex energy systems, focusing on the importance of high spatial and temporal resolution. It proposes a systematic framework for gas network modeling, addressing dimensions, influencing factors, data requirements, development steps, and assessment criteria.
Joachim Müller‐Kirchenbauer   +5 more
wiley   +1 more source

Nicotinamide Phosphoribosyltransferase Acetylation Mediating Muscle Dysfunction Contributes to Sleep Apnoea in Obesity

open access: yesJournal of Cachexia, Sarcopenia and Muscle, Volume 16, Issue 1, February 2025.
ABSTRACT Background Obstructive sleep apnoea (OSA) occurs frequently among individuals with obesity, which is attributed to upper airway muscle dysfunction. Muscle function is regulated by the dynamic balance of the nicotinamide adenine dinucleotide (NAD+) and its reduced form (NADH), which is controlled by the enzyme nicotinamide ...
Liu Zhang   +12 more
wiley   +1 more source

REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
ABSTRACT The increasing demand for low‐latency, high‐bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during ...
Lyn Hill   +3 more
wiley   +1 more source

Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand   +5 more
wiley   +1 more source

Analysing a multi‐stage cyber threat and its impact on the power system

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The work in this paper highlights the importance of the multi‐stage defence paradigm. The use case presented here shows a multi‐stage threat scenario on a power utility, from Stage 1—initial access to Stage 4—physical impact. Abstract Electric power systems are composed of physical and cyber sub‐systems. The sub‐systems depend on each other.
Leen Al Homoud   +5 more
wiley   +1 more source

Real‐Time Cyberattack Detection for SCADA in Power System

open access: yesIET Energy Systems Integration, Volume 7, Issue 1, January/December 2025.
ABSTRACT Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats. As SCADA systems become essential infrastructure, their vulnerability to cyber‐attacks has increased ...
Botta Prudhvi   +2 more
wiley   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and Challenges

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
With the trend of large‐scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system operation and management. The SGs can be viewed as cyber–physical–social systems (CPSSs).
Qiuyu Lu   +4 more
wiley   +1 more source

Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor‐based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it an inherent susceptibility to potential threats from network intrusions, which pose risks to both the network infrastructure and ...
Jian Shu, Jiazhong Lu, Bhaskar Mondal
wiley   +1 more source
Some of the next articles are maybe not open access.

Injection fears and COVID-19 vaccine hesitancy

Psychological Medicine, 2023
Daniel Freeman   +2 more
exaly  

Home - About - Disclaimer - Privacy