期刊文献+
共找到5,482篇文章
< 1 2 250 >
每页显示 20 50 100
A blockchain future for internet of things security: a position paper 被引量:17
1
作者 Mandrita Banerjee Junghee Lee Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE 2018年第3期149-160,共12页
Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Th... Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of- Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a nmnber of observations, including the lack of publicly available loT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockehain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing loT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions. 展开更多
关键词 Blockchain Blockchain security Collaborative security Internet-of-military things DATASET SELF-HEALING security Intrusion-prevention system Predictive security Predictive security
下载PDF
The White Volta Basin, Climate Change and Food Security: Perspectives of Riparian Communities in Northern Ghana
2
作者 Asaah Sumaila Mohammed Emmanuel Kanchebe Derbile Musah Ibrahim Mordzeh-Ekpampo 《Journal of Environmental Science and Engineering(B)》 2013年第6期350-356,共7页
This paper has examined how the resources of the White Volta River are enhancing food availability for riparian communities in northern Ghana despite climate change and its associated effects on food security. Using p... This paper has examined how the resources of the White Volta River are enhancing food availability for riparian communities in northern Ghana despite climate change and its associated effects on food security. Using participatory methods such as focus group discussions and interviews, data was collected from households and institutions in three riparian communities. The result of the study indicates that, all things been equal, cultivation of food crops along the river bank in the rainy season gives significantly high yields as compared to yields from farms farthest from the river under rain fed agriculture. Higher organic content and moisture retention capacity of river bank soils explains the yield differential and adaptability to climate change. In addition, farmers now irrigate cereal crops which were hitherto, reserved for only rainy season production. However, inappropriate irrigation practices are accelerating erosion and sedimentation of the river and thus, threaten the sustainability of agriculture and food security in the White Volta Basin. The paper therefore, recommends the adoption of IWRM (integrated water resources management) and the participation of local communities, Government and Civil Society organisations for sustaining the productive capacity of the White Volta Basin for enabling adaptation of agriculture to climate change in the riparian communities of the basin. 展开更多
关键词 Food security northern Ghana riparian communities White Volta.
下载PDF
Agrobiodiversity for Livelihood Security: A Case Study of Agroforestry Technologies in Mexico
3
作者 P. Krishna Krishnamurthy Krishnamurthy Laksmi Reddiar 《Journal of Life Sciences》 2011年第2期108-119,共12页
The present article examines the livelihood benefits associated with agrobiodiversity in Veracruz, Mexico. Citrus-based agriculture is the principal economic activity in the agricultural sector of the state of Veracru... The present article examines the livelihood benefits associated with agrobiodiversity in Veracruz, Mexico. Citrus-based agriculture is the principal economic activity in the agricultural sector of the state of Veracruz. It is practiced in mono-crop plantations by the majority of farmers, who are rendered vulnerable to price depreciation resulting from simultaneous harvest and over-supply of a single commodity. Some farmers have associated multiple crops in citrus farms (agroforestry techniques) as a strategy to improve their livelihoods. Farmers who increased agrobiodiversity in their farms have significantly improved their livelihoods compared to mono-crop plantation owners. The research shows that increased agro-biodiversity can be a strategy to improve the livelihoods of citrus producers in the state of Veracruz, with significant economic benefits depending on the crop combination: maize-citrus is the least economically profitable combination (providing 21% in terms of internal rate of return), while pineapple-citrus, banana-citrus and vanilla-citrus give higher returns (41%, 44% and 221% respectively). The citrus-vanilla crop combination also has the highest benefit-cost ratio, relative to citrus monocrop (1.91) as well as the highest net present value (MX$579,635.73). The choice of crop ultimately depends on the farmer's priorities. The associated benefits can be classified in three ways which correspond to the tripartite goal of sustainable development: (i) ecological sustainability (through increased ecosystem resilience), (ii) economic stability (through diversified, less risk-prone sources of income), and (iii) social well-being (through lower). 展开更多
关键词 AGROBIODIVERSITY agrofroestry citriculture livelihood security Mexico multiple cropping.
下载PDF
Food Security: Where Are We Heading?
4
作者 Chua Kim Aik Fakhrul Anwar Zainol Nalini Arumugam 《Journal of Life Sciences》 2016年第7期357-364,共8页
The issues of food security are an important aspect of every country for its social and economic growth and the eradication of poverty. It is particularly crucial for satisfying the needs of the ever-growing populatio... The issues of food security are an important aspect of every country for its social and economic growth and the eradication of poverty. It is particularly crucial for satisfying the needs of the ever-growing population in developing countries. Agriculture is the backbone of the people and the economy for developing countries, particularly in highly populated countries such as India, China and South East Asia. The world population is anticipated to rise to 8.3 billion by 2030 and to 9.2 billion by 2050. By that time, to feed the growing population, food production must double to keep pace with the escalating food demand. Agricultural commodities showed increases of 58.9% in import dependency ratio (IDR) as compared to 32.2% in 2013. Thus, this study attempts to review and explore the challenges of food security as well as the opportunities of the seed industry in Malaysia. 展开更多
关键词 Food security seed industry challenges OPPORTUNITIES Malaysia.
下载PDF
Global Climate Change and National Security: Institutional Culture and Leadership Within Three Federal Departments
5
作者 John Ackerman Jean Gabriel (Gabe) Jolivet 《International Relations and Diplomacy》 2017年第7期389-411,共23页
National security implications (The White House, 2015; CNA, 2014) of global climate change currently radiate throughout the U.S. government. These implications are critically acute for three federal departments most... National security implications (The White House, 2015; CNA, 2014) of global climate change currently radiate throughout the U.S. government. These implications are critically acute for three federal departments most responsible for U.S. national security: the Department of Defense (DoD), the Department of State (DOS), and the Department of Homeland Security (DHS). However, the effect on these federal departments is understudied and poorly specified. This research intends to rectify the dearth of academic studies. Comparative analysis (Collier, 1993) of the institutional cultures and leadership of the DoD, DoS, and DHS was conducted determining how these agencies are responding to multiple vulnerabilities created by climate change (The White House, 2013a). Research revealed significant differences in how the DoD, DoS, and DHS are responding. The analysis discovered the DoD has institutionalized, or "mainstreamed" (Leggett, 2015, p. 16) planning for climate change and planning is driven mainly through hierarchical cultural organizations. The DoD bureaucratic leadership is multi-faceted with some transactional, transformational, and charismatic leadership elements. The DoS has also mainstreamed adaptation planning to a lesser extent and planning is driven primarily by an ad-hoc culture with a top-down/bottom-up, charismatic/transformational leadership emphasis. In contrast, the DHS has been unable to mainstream planning into their organizational culture due to the presence of several internal clans. The DHS bureaucratic leadership is somewhat chaotic with little top-down, transformational, or entrepreneurial direction. Overall, the knowledge gained from this comparative analysis provides valuable insights into how governmental institutions adapt to a multi-faceted national security threat. 展开更多
关键词 climate change CULTURE LEADERSHIP national security
下载PDF
Canadian Food Security: Beyond 150
6
作者 Kathleen Fryer 《International Relations and Diplomacy》 2017年第5期280-286,共7页
Not only necessary for survival, food plays an important social, economic, and cultural role in our lives. Globally in the 21 st century, food security faces many challenges including climate change and changing attit... Not only necessary for survival, food plays an important social, economic, and cultural role in our lives. Globally in the 21 st century, food security faces many challenges including climate change and changing attitudes surrounding food and agriculture. In Canada over the past 150 years, the role of food in society has changed. In the early 20th century, a third of Canada's population lived on and derived their livelihoods from agriculture (Statistics Canada, 2009). Agriculture played a central role in the daily lives of Canadians. Urbanization and mechanization has allowed for more food to be produced in Canada with fewer people, to the extent that today only two percent of the population now lives on a farm. Only seven percent of Canadian land is suitable for agriculture production, yet Canada remains one of the few countries expected to continue to produce more food than it consumes in the next 50 years. The disassociation between the average Canadian and the source of their food creates unique challenges for food security that must be addressed moving forward as Canada celebrates its 150th birthday. 展开更多
关键词 food security CANADA agriculture and climate change
下载PDF
Impact of Climate Change on Rice Water Demand and Food Security: Case of Thailand and Vietnam
7
作者 P. Suttinon A. M. Bhatti S. Nasu 《Journal of Agricultural Science and Technology》 2010年第6期63-70,共8页
Water plays an important role in food production especially rice. Rice productivity depends greatly on sufficient water to meet evaporative demand and soil moisture. It is certain thalL rice, the most important crop o... Water plays an important role in food production especially rice. Rice productivity depends greatly on sufficient water to meet evaporative demand and soil moisture. It is certain thalL rice, the most important crop of Thailand and Vietnam, is vulnerable to climate change. This paper proposes an analysis on the impact of climate on rice water requirement and food security in Thailand and Vietnam. Water demand, yield and production of rice were computed under the changed surface air temperature for three time slices, namely 2020s, 2050s and 2080s. Food security was analyzed from rice supply (calculated milled-rice product, rice stock, and imports) and demand (domestic uses from population growth, exports to world market, domestic seed and other uses). The result showed that, under the higher surface air temperature scenario, water requirement office in Thailand and Vietnam could increase by 1.8 times in the end of the 21 st century. Production of rice dropped by declined yield. Thailand and Vietnam which is the world largest rice exporter in last decades will face the rice shortage in 2080s and 2030s respectively. 展开更多
关键词 Climate change food security RICE Thailand VIETNAM water demand.
下载PDF
Agricultural development and food security: The way out of crisis
8
作者 Lewis-Ambrose Dana 《Journal of Agricultural Science and Technology》 2009年第12期51-62,共12页
The purpose of this study is to elicit how investments in agricultural development and food security would safeguard the Virgin Islands (BVI) and the Caribbean, by extension, from future global crisis. History shows... The purpose of this study is to elicit how investments in agricultural development and food security would safeguard the Virgin Islands (BVI) and the Caribbean, by extension, from future global crisis. History shows that agriculture played a significant role in the rise of civilization globally and was the main contributor to the Caribbean economy before the 1950's. Overall, it was determined that the BVI population, in general, is desirous of more investment opportunities within the agricultural sector, to assist with the alleviation of poverty at the national level, to advance economic development and trade across the region and to make sustainable development more attainable for the Caribbean, as a whole. To do this, agricultural development and food security must become the focal point of the BVI and other Caribbean economies. Accordingly, the paper recommends that investment within the agricultural sector be undertaken more aggressively across the region. The mixed research approach method was used to validate these claims. 展开更多
关键词 agricultural development Caribbean food security global financial crisis INVESTMENT mixed research approachmethod
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
9
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
10
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud Networks Artificial Intelligence Machine Learning Cloud security
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
11
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Survey on Video Security:Examining Threats,Challenges,and Future Trends
12
作者 Ali Asghar Amna Shifa Mamoona Naveed Asghar 《Computers, Materials & Continua》 SCIE EI 2024年第9期3591-3635,共45页
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s... Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world. 展开更多
关键词 ATTACKS threats security services video manipulation video security
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
13
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Soybean maize strip intercropping:A solution for maintaining food security in China
14
作者 Jiang Liu Wenyu Yang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第7期2503-2506,共4页
The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,pr... The practice of intercropping leguminous and gramineous crops is used for promoting sustainable agriculture,optimizing resource utilization,enhancing biodiversity,and reducing reliance on petroleum products.However,promoting conventional intercropping strategies in modern agriculture can prove challenging.The innovative technology of soybean maize strip intercropping(SMSI)has been proposed as a solution.This system has produced remarkable results in improving domestic soybean and maize production for both food security and sustainable agriculture.In this article,we provide an overview of SMSI and explain how it differs from traditional intercropping.We also discuss the core principles that foster higher yields and the prospects for its future development. 展开更多
关键词 strip intercropping food security SOYBEAN MAIZE spatial arrangement
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
15
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of Things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Food security amid the COVID-19 pandemic in Central Asia:Evidence from rural Tajikistan
16
作者 Yuhan Zhao Chen Qian +2 位作者 Yumei Zhang Xiande Li Kamiljon T.Akramov 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第8期2853-2867,共15页
Food security has been long understudied in the context of Central Asia.We present an analysis examining household-level food demand for Tajikistan and assessing the magnitude of its food security changes during the C... Food security has been long understudied in the context of Central Asia.We present an analysis examining household-level food demand for Tajikistan and assessing the magnitude of its food security changes during the COVID-19 pandemic.Based on an extensive household survey data set from Tajikistan,we estimate the expenditure,income,and price elasticities for nine food categories using the QUAIDS model.Then,we develop a microsimulation model using the estimated elasticities to assess the dual impact of declining remittance income and rising food prices stemming from the pandemic shock.There are significant differences in demand elasticities across food groups,with high elasticities observed for nutritious foods,such as meat,fruit,eggs,and milk,in rural households.Moreover,our findings show that changes in remittance income and food prices significantly negatively affected food security for rural households during the COVID-19 pandemic.These findings have important implications for policymakers concerned about rural livelihoods and food security in remittance-receiving economies during the post-pandemic period. 展开更多
关键词 international remittances food security COVID-19 TAJIKISTAN Central Asia
下载PDF
Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application
17
作者 Ahmed Redha Mahlous 《Computers, Materials & Continua》 SCIE EI 2024年第6期4781-4803,共23页
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything... Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security. 展开更多
关键词 Smart agriculture cyber-physical system IOT security temperature sensor threats VULNERABILITIES
下载PDF
Research progress and future prospects in the service security of key blast furnace equipment
18
作者 Yanxiang Liu Kexin Jiao +3 位作者 Jianliang Zhang Cui Wang Lei Zhang Xiaoyue Fan 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2024年第10期2121-2135,共15页
The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneve... The safety and longevity of key blast furnace(BF)equipment determine the stable and low-carbon production of iron.This pa-per presents an analysis of the heat transfer characteristics of these components and the uneven distribution of cooling water in parallel pipes based on hydrodynamic principles,discusses the feasible methods for the improvement of BF cooling intensity,and reviews the pre-paration process,performance,and damage characteristics of three key equipment pieces:coolers,tuyeres,and hearth refractories.Fur-thermoere,to attain better control of these critical components under high-temperature working conditions,we propose the application of optimized technologies,such as BF operation and maintenance technology,self-repair technology,and full-lifecycle management techno-logy.Finally,we propose further researches on safety assessments and predictions for key BF equipment under new operating conditions. 展开更多
关键词 blast furnace EQUIPMENT service security blast furnace campaign SELF-REPAIR
下载PDF
MV-Honeypot:Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
19
作者 Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期655-669,共15页
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav... Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established. 展开更多
关键词 AVATAR metaverse CYBERsecurity cloud computing internet of things artificial intelligence security analysis
下载PDF
A Review on the Security of the Ethereum-Based DeFi Ecosystem
20
作者 Yue Xue Dunqiu Fan +4 位作者 Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期69-101,共33页
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ... Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security. 展开更多
关键词 Blockchain smart contract decentralized finance DeFi security
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部