National Institute of Standards and Technology (NIST). Guidelines for smart grid cybersecurity. Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements, NISTIR 7628 Rev. 1. Vol. 1 (2014).
National Institute of Standards and…
National Institute of Standards and Technology (NIST). Guidelines for smart grid cybersecurity. Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements, NISTIR 7628 Rev. 1. Vol. 1 (2014).
National Institute of Standards and…
Medium -term monitoring and machine learning-based forecasting of drought dynamics in Iran
Morris A, Brading H. E-literacy and the grey digital divide: review with recommendations. J Inf Lit. 2007;1:13–28.
Robotham D, Satkunanathan S, Doughty L, Wykes T. Do we still have a digital…
Yu, W. et al. The application of multi-scale simulation in advanced electronic packaging. Fundam. Res. 4 (6), 1442–1454 (2024).
Wu, J. et al. Vibration analysis of medical devices with a…
Roche, E. T. et al. A bioinspired soft actuated material. Adv. Mater. 26, 1200–1206 (2014).
Xu, C. et al. Muscle-inspired elasto-electromagnetic mechanism in autonomous insect robots. Nat….
Al-Hawawreh, M., Aljuhani, A. & Yaser Jararweh Chatgpt for Cybersecurity: Practical Applications, Challenges, and Future Directions. Cluster Comput. 26 (6), 3421–3436 (2023).
Zhang, J. et al….
O’Leary, B. C. et al. Options for managing human threats to high seas biodiversity. Ocean Coast. Manag. 187, 105110 (2020).
Blasiak, R. & Jouffray, J.-B. When will the BBNJ Agreement deliver…
Terzaghi, K. Rock defects and loads on tunnel supports. Rock. Tunneling Steel Supports. 1, 15–99 (1946).
Hoek, E. & Brown, E. T. Underground excavations in rock (Institution of Mining and…
Kim, S. Y., Yun, S. W., Lee, E. Y., Bae, S. H. & Lee, I. G. Fast packet inspection for end-to-end encryption. Electronics 9, 1937. https://doi.org/10.3390/electronics9111937 (2020).
Kil, Y. S.,…