This paper presents a robust protection scheme to protect the power transmission network against a class of feedback-based attacks referred in the literature as "Dynamic Load Altering Attacks" (D-LAAs). The proposed scheme envisages the usage of Energy Storage Systems (ESSs) to avoid the...
04b Atto di convegno in volume
-
-
The need for a Blockchain Oriented Software Engineering (BOSE) has been recognized in several research papers. Design Patterns are considered among the main and compelling areas to be developed in BOSE. Anyway, design patterns need to be enhanced with some additional fields to better support the...
-
We consider a distributed system of n identical mobile robots operating in the two dimensional Euclidian plane. As in the previous studies, we consider the robots to be anonymous, oblivious, dis-oriented, and without any communication capabilities, operating based on the Look-Compute-Move model...
-
Glycemia regulation algorithms which are designed to be implemented in several artificial pancreas projects are often model based control algorithms. However, actual diabetes monitoring is based throughout the world on the so-called Flexible Insulin Therapy (FIT) which does not always cope with...
-
The use of videogames is an established tool to train a systematic way of thinking that allows users to learn by gaming. In this paper, to address the increasing need of awareness in cybersecurity related issues, we present the realization of a Virtual Reality (VR) videogame targeted towards...
-
-
In this work, we investigate the concept of "restraining bolt'", envisioned in Science Fiction. Specifically, we introduce a novel problem in AI. We have two distinct sets of features extracted from the world, one by the agent and one by the authority imposing restraining specifications (the "...
-
-
-