UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 190,423
1.
  • Study on attack paths of cy... Study on attack paths of cyber attack in cyber-physical power systems
    Chen, Lei; Yue, Dong; Dou, Chunxia ... IET generation, transmission & distribution, 06/2020, Volume: 14, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    By means of advanced information and communication technology, cyber-physical power systems can attain real-time monitor and control but have to suffer the damage caused by a cyber attack. In this ...
Full text

PDF
2.
Full text
3.
  • Effect of Stenting Plus Medical Therapy vs Medical Therapy Alone on Risk of Stroke and Death in Patients With Symptomatic Intracranial Stenosis: The CASSISS Randomized Clinical Trial
    Gao, Peng; Wang, Tao; Wang, Daming ... JAMA : the journal of the American Medical Association, 08/2022, Volume: 328, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Prior randomized trials have generally shown harm or no benefit of stenting added to medical therapy for patients with symptomatic severe intracranial atherosclerotic stenosis, but it remains ...
Check availability
4.
  • Social engineering attack e... Social engineering attack examples, templates and scenarios
    Mouton, Francois; Leenen, Louise; Venter, H.S. Computers & security, June 2016, 2016-06-00, 20160601, Volume: 59
    Journal Article
    Peer reviewed
    Open access

    The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to ...
Full text

PDF
5.
  • The Third China National St... The Third China National Stroke Registry (CNSR-III) for patients with acute ischaemic stroke or transient ischaemic attack: design, rationale and baseline patient characteristics
    Wang, Yongjun; Jing, Jing; Meng, Xia ... Stroke and vascular neurology, 09/2019, Volume: 4, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Background and purposeStroke is the leading cause of mortality and disability in China. Precise aetiological classification, imaging and biological markers may predict the prognosis of stroke. The ...
Full text

PDF
6.
  • Anti-Attack Protocol-Based ... Anti-Attack Protocol-Based Synchronization Control for Fuzzy Complex Dynamic Networks
    Wu, Tao; Cao, Jinde; Ahn, Choon Ki ... IEEE transactions on fuzzy systems, 06/2024, Volume: 32, Issue: 6
    Journal Article
    Peer reviewed

    This article investigates the synchronization control problem of fuzzy complex dynamic networks (FCDNs) with diversified network attacks. By making full use of the weighted historically released ...
Full text
7.
  • Modeling and control of Cyb... Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges
    Mahmoud, Magdi S.; Hamdan, Mutaz M.; Baroudi, Uthman A. Neurocomputing (Amsterdam), 04/2019, Volume: 338
    Journal Article
    Peer reviewed

    •In general, the cyber-attacks in the literature can be classified into three main types: denial of service (DoS) attacks, deception attacks, and replay attacks. The focus of this paper will be on ...
Full text
8.
  • Cyberattack and Machine-Ind... Cyberattack and Machine-Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems
    Taheri, Mahdi; Khorasani, Khashayar; Shames, Iman ... IEEE transactions on control systems technology, 2024-March, 2024-3-00, 20240301, Volume: 32, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    In this article, the problem of simultaneous cyberattack and fault detection and isolation (CAFDI) for both centralized and large-scale interconnected cyber-physical systems (CPSs) is studied. The ...
Full text
9.
  • Research on Key Technologie... Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction
    Kou, Guang; Wang, Shuo; Tang, Guangming Chinese Journal of Electronics, January 2019, Volume: 28, Issue: 1
    Journal Article
    Peer reviewed

    This paper analyzed the existing network security situation evaluation methods and discovered that they cannot accurately reflect the features of large-scale, synergetic, multi-stage gradually shown ...
Full text
10.
  • Incidence and prevalence of... Incidence and prevalence of dementia associated with transient ischaemic attack and stroke: analysis of the population-based Oxford Vascular Study
    Pendlebury, Sarah T; Rothwell, Peter M Lancet neurology, March 2019, 2019-03-00, 20190301, Volume: 18, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Risk of dementia after stroke is a major concern for patients and carers. Reliable data for risk of dementia, particularly after transient ischaemic attack or minor stroke, are scarce. We studied the ...
Full text

PDF
1 2 3 4 5
hits: 190,423

Load filters