A detailed review of power system resilience enhancement pillars
The increasing occurrence of extreme vulnerabilities to electric grids due to natural
catastrophes and cyber-attacks, has resulted in a rise in global power outages. This has …
catastrophes and cyber-attacks, has resulted in a rise in global power outages. This has …
A beginner's guide to infrastructure‐less networking concepts
Infrastructure‐less networks connect communication devices end‐to‐end by managing links
and routes independent of fixed networking facilities, relying on dedicated protocols running …
and routes independent of fixed networking facilities, relying on dedicated protocols running …
Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward
While Large Language Models (LLMs) have seen widespread applications across
numerous fields, their limited interpretability poses concerns regarding their safe operations …
numerous fields, their limited interpretability poses concerns regarding their safe operations …
Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL
D Anandayuvaraj, M Campbell, A Tewari… - arXiv preprint arXiv …, 2024 - arxiv.org
Software failures inform engineering work, standards, regulations. For example, the Log4J
vulnerability brought government and industry attention to evaluating and securing software …
vulnerability brought government and industry attention to evaluating and securing software …
Manajemen Ketahanan Risiko Siber pada Internet of Things dan Cyber Physical System
A Nurain, RAG Gultom, RE Indrajit - Journal on Education, 2024 - jonedu.org
Abstrak Penelitian ini menggali Manajemen Ketahanan Risiko Siber pada Internet of Things
(IoT) dan Cyber Physical System (CPS). Kedua entitas ini terkait erat dengan internet …
(IoT) dan Cyber Physical System (CPS). Kedua entitas ini terkait erat dengan internet …
High-Availability in IoT Applications through Dual Connectivity: Integrating LoRaWAN and NB-IoT
M Utsch, B Böckling, W Kiess… - … Conference on the …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices are commonly connected using Low Power Wide Area
Network (LPWAN) technologies, such as NB-IoT or LoRaWAN. Due to their long range and …
Network (LPWAN) technologies, such as NB-IoT or LoRaWAN. Due to their long range and …
Vulnerabilidades de Segurança da Informação na Indústria 4.0: Proposição de Critérios para o uso de Análise Multicritério
RS Sotolani, IAC Menezes, NV Galegale… - Exacta, 2024 - periodicos.uninove.br
O progresso da Indústria 4.0 tem relevância cada vez maior, considerando o aumento das
vulnerabilidades de segurança da informação e da complexidade em priorizá-las na …
vulnerabilidades de segurança da informação e da complexidade em priorizá-las na …
Security in cyber physical systems: Transformation and challenges
SS Bindra, A Aggarwal - Journal of Autonomous Intelligence, 2024 - jai.front-sci.com
Network technology has significantly improved due to the growing use of Cyber-Physical
Systems (CPS) in various industries, including healthcare, transportation, and …
Systems (CPS) in various industries, including healthcare, transportation, and …
[PDF][PDF] Towards an Engineering Discipline for Resilient Cyber-Physical Systems
RD Caldas - 2024 - ricardocaldas.me
Resilient cyber-physical systems comprise computing systems able to continuously interact
with the physical environment in which they operate, despite runtime errors. The term …
with the physical environment in which they operate, despite runtime errors. The term …
Containerization: In the Context of Serverless Computing
SSV Pusapati - Serverless Computing Concepts, Technology and …, 2024 - igi-global.com
This chapter delves into the synergy between containerization and serverless computing,
pivotal for advancing cloud-native application deployment. It outlines the architectural …
pivotal for advancing cloud-native application deployment. It outlines the architectural …