Results 11 to 20 of about 36 (36)
This article discusses challenges in modeling complex energy systems, focusing on the importance of high spatial and temporal resolution. It proposes a systematic framework for gas network modeling, addressing dimensions, influencing factors, data requirements, development steps, and assessment criteria.
Joachim Müller‐Kirchenbauer+5 more
wiley +1 more source
ABSTRACT Background Obstructive sleep apnoea (OSA) occurs frequently among individuals with obesity, which is attributed to upper airway muscle dysfunction. Muscle function is regulated by the dynamic balance of the nicotinamide adenine dinucleotide (NAD+) and its reduced form (NADH), which is controlled by the enzyme nicotinamide ...
Liu Zhang+12 more
wiley +1 more source
REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation
ABSTRACT The increasing demand for low‐latency, high‐bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during ...
Lyn Hill+3 more
wiley +1 more source
Abstract As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion ...
Nemalikanti Anand+5 more
wiley +1 more source
Analysing a multi‐stage cyber threat and its impact on the power system
The work in this paper highlights the importance of the multi‐stage defence paradigm. The use case presented here shows a multi‐stage threat scenario on a power utility, from Stage 1—initial access to Stage 4—physical impact. Abstract Electric power systems are composed of physical and cyber sub‐systems. The sub‐systems depend on each other.
Leen Al Homoud+5 more
wiley +1 more source
Real‐Time Cyberattack Detection for SCADA in Power System
ABSTRACT Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats. As SCADA systems become essential infrastructure, their vulnerability to cyber‐attacks has increased ...
Botta Prudhvi+2 more
wiley +1 more source
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia+5 more
wiley +1 more source
With the trend of large‐scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system operation and management. The SGs can be viewed as cyber–physical–social systems (CPSSs).
Qiuyu Lu+4 more
wiley +1 more source
Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor‐based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it an inherent susceptibility to potential threats from network intrusions, which pose risks to both the network infrastructure and ...
Jian Shu, Jiazhong Lu, Bhaskar Mondal
wiley +1 more source
Some of the next articles are maybe not open access.
Injection fears and COVID-19 vaccine hesitancy
Psychological Medicine, 2023Daniel Freeman+2 more
exaly