A detailed review of power system resilience enhancement pillars

DK Mishra, M Eskandari, MH Abbasi… - Electric Power Systems …, 2024 - Elsevier
The increasing occurrence of extreme vulnerabilities to electric grids due to natural
catastrophes and cyber-attacks, has resulted in a rise in global power outages. This has …

A beginner's guide to infrastructure‐less networking concepts

A Förster, J Dede, A Könsgen, K Kuladinithi… - IET …, 2024 - Wiley Online Library
Infrastructure‐less networks connect communication devices end‐to‐end by managing links
and routes independent of fixed networking facilities, relying on dedicated protocols running …

Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward

X Xie, J Song, Z Zhou, Y Huang, D Song… - arXiv preprint arXiv …, 2024 - arxiv.org
While Large Language Models (LLMs) have seen widespread applications across
numerous fields, their limited interpretability poses concerns regarding their safe operations …

Can Large Language Models Analyze Software Failures in the News? An End-to-End Automated Pipeline with FAIL

D Anandayuvaraj, M Campbell, A Tewari… - arXiv preprint arXiv …, 2024 - arxiv.org
Software failures inform engineering work, standards, regulations. For example, the Log4J
vulnerability brought government and industry attention to evaluating and securing software …

Manajemen Ketahanan Risiko Siber pada Internet of Things dan Cyber Physical System

A Nurain, RAG Gultom, RE Indrajit - Journal on Education, 2024 - jonedu.org
Abstrak Penelitian ini menggali Manajemen Ketahanan Risiko Siber pada Internet of Things
(IoT) dan Cyber Physical System (CPS). Kedua entitas ini terkait erat dengan internet …

High-Availability in IoT Applications through Dual Connectivity: Integrating LoRaWAN and NB-IoT

M Utsch, B Böckling, W Kiess… - … Conference on the …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices are commonly connected using Low Power Wide Area
Network (LPWAN) technologies, such as NB-IoT or LoRaWAN. Due to their long range and …

Vulnerabilidades de Segurança da Informação na Indústria 4.0: Proposição de Critérios para o uso de Análise Multicritério

RS Sotolani, IAC Menezes, NV Galegale… - Exacta, 2024 - periodicos.uninove.br
O progresso da Indústria 4.0 tem relevância cada vez maior, considerando o aumento das
vulnerabilidades de segurança da informação e da complexidade em priorizá-las na …

Security in cyber physical systems: Transformation and challenges

SS Bindra, A Aggarwal - Journal of Autonomous Intelligence, 2024 - jai.front-sci.com
Network technology has significantly improved due to the growing use of Cyber-Physical
Systems (CPS) in various industries, including healthcare, transportation, and …

[PDF][PDF] Towards an Engineering Discipline for Resilient Cyber-Physical Systems

RD Caldas - 2024 - ricardocaldas.me
Resilient cyber-physical systems comprise computing systems able to continuously interact
with the physical environment in which they operate, despite runtime errors. The term …

Containerization: In the Context of Serverless Computing

SSV Pusapati - Serverless Computing Concepts, Technology and …, 2024 - igi-global.com
This chapter delves into the synergy between containerization and serverless computing,
pivotal for advancing cloud-native application deployment. It outlines the architectural …