Effective IoT-based deep learning platform for online fault diagnosis of power transformers against cyberattacks and data uncertainties

M Elsisi, MQ Tran, K Mahmoud, DEA Mansour… - Measurement, 2022 - Elsevier
artificial intelligence methods have been realized to yield high precision rates and effective
diagnostics of diverse faults of power transformers. The artificial neural network (… and secure

The Possibilities of Cyber Methods as Part of Maritime Warfare: Baltic Sea

M Turunen - … Conference on Cyber Warfare and Security, 2019 - search.proquest.com
… awareness, cyber deterrence, cyber physic systems and affecting the … harassment and utilize
artificial intelligence has been … area of computer security, in particular intrusion detection, …

The game-theoretic model and experimental investigation of cyber wargaming

EJM Colbert, A Kott, LP Knachel - The Journal of Defense …, 2020 - journals.sagepub.com
methods by which the defenders and attackers in the wargame may choose their strategy.
We discuss these methods in … Table-top exercise: intrusion detection capabilities for US Army …

[HTML][HTML] Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures

S Sciancalepore, S Alhazbi, R Di Pietro - Journal of Network and Computer …, 2021 - Elsevier
… We remark that even this level of accuracy enables the understanding of the district where
the sensor is deployed, and only requires a physical survey of a reduced area to further locate …

[PDF][PDF] RESEARCH AND ANALYSIS OF WORKING CONDITIONS IN INDUSTRIAL OCCUPATIONS

M DOBROWOLSKA, M ŚLAZYK-SOBOL… - delibra.bg.polsl.pl
… the singularity that will be produced soon by artificial intelligence (AI). The technological
singularity would occur when AI overcomes human intelligence in all forms. Considering the …