The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses ...The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses an intelligent computation technique based on the combination of two methods:Rebalancing data and representation learning to analyze and evaluate the code property graph(CPG)of the source code for detecting abnormal behavior of software vulnerabilities.To do that,DrCSE performs a combination of 3 main processing techniques:(i)building the source code feature profiles,(ii)rebalancing data,and(iii)contrastive learning.In which,the method(i)extracts the source code’s features based on the vertices and edges of the CPG.The method of rebalancing data has the function of supporting the training process by balancing the experimental dataset.Finally,contrastive learning techniques learn the important features of the source code by finding and pulling similar ones together while pushing the outliers away.The experiment part of this paper demonstrates the superiority of the DrCSE Framework for detecting source code security vulnerabilities using the Verum dataset.As a result,the method proposed in the article has brought a pretty good performance in all metrics,especially the Precision and Recall scores of 39.35%and 69.07%,respectively,proving the efficiency of the DrCSE Framework.It performs better than other approaches,with a 5%boost in Precision and a 5%boost in Recall.Overall,this is considered the best research result for the software vulnerability detection problem using the Verum dataset according to our survey to date.展开更多
Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,s...Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,so it is imperative to understand the socio-economic vulnerability of this region.This research aims to identify the vulnerability level of the Jeneberang watershed so that the government can prioritize areas with high vulnerability level and formulate effective strategies to reduce these the vulnerability.Specifically,this study was conducted in 12 districts located in the Jeneberang watershed.The primary data were collected from questionnaires completed by community members,community leaders,and various stakeholders,and the secondary data were from the Landsat satellite imagery in 2020,the Badan Push Statistic of Gowa Regency,and some governmental agencies.The socio-economic vulnerability variables were determined using the Multiple Criteria Decision Analysis(MCDA)method,and each variable was weighted and analyzed using the Geographical Information System(GIS).The study reveals that the levels of socio-economic vulnerability are affected by variables such as population density,vulnerable groups(disabled people,elderly people,and young people),road network and settlement,percentage of poor people,and productive land area in the Jeneberang watershed.Moreover,all of the 12 districts in the Jeneberang watershed are included in the medium vulnerability level,with the mean percentage of socio-economic vulnerability around 50.92%.The socio-economic vulnerability of Bajeng,Pallangga,and Somba Opu districts is categorized at high level,the socio-economic vulnerability of Bungaya,Parangloe,and Tombolo Pao districts is classified as medium level,and the remaining 6 districts(Barombong,Bontolempangan,Bontomarannu,Manuju,Parigi,and Tinggimoncong)are ranked as low socio-economic vulnerability.This study can help policy-makers to formulate strategy that contributes to the protection of biodiversity and sustainable development of the Jeneberang watershed,while improving disaster resilience and preparedness of the watershed.展开更多
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof...This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.展开更多
To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to...To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to 2022.We conducted participatory household survey on the livelihood status of the rural households and try to identify the key factors to influence their livelihood vulnerability using multiple linear regression.The results showed that:the livelihood situation of the rural households is relatively vulnerable.The vulnerability varies significantly with the income levels,education levels,and income sources.The vulnerability of farm households,categorized from low to high livelihood types,follows the sequence:non-agricultural dominant households,non-agricultural households,agricultural dominant households,and pure agricultural households.The degree of damage to the natural environment,education costs,loan opportunities,the proportion of agricultural income to annual household income,and the presence of sick people in the household have significant positive effects on the livelihood vulnerability index(LVI)of rural households;while help from relatives and friends,net income per capita,household size,household education,agricultural land area,participation in industrial organizations,number of livestock,purchase of commercial houses,drinking water source,and self-supply of food have significant negative effects.Based on the findings,we believe that local rural households operate in a complex livelihood system and recommend continuous interventions targeting key influences to provide empirical research support for areas facing similar situations.展开更多
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De...The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.展开更多
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v...Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.展开更多
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi...In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.展开更多
In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current secu...In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.展开更多
Chinese Loess Plateau has achieved a win-win situation concerning ecological restoration and socio-economic development.However,synergistic development may not be realized at the local scale.In areas undergoing ecolog...Chinese Loess Plateau has achieved a win-win situation concerning ecological restoration and socio-economic development.However,synergistic development may not be realized at the local scale.In areas undergoing ecological restoration,livelihood vulner-ability may be more pronounced due to the inflexibility,policy protection,and susceptibility to climate and market changes in forestry production.Although this issue has attracted academic interest,empirical studies are relatively scarce.This study,centered on Jiaxian County,Shaanxi Province of China explored the households’livelihood vulnerability and coping strategies and group heterogeneity con-cerned with livelihood structures or forestry resources through field investigation,comprehensive index assessment,and nonparametric tests.Findings showed that:1)the percentage of households with high livelihood vulnerability indicator(LVI)(>0.491)reached 46.34%.2)Eight groups in livelihood structures formed by forestry,traditional agriculture,and non-farm activities were significantly different in LVI,land resources(LR),social networks(SN),livelihood strategies(LS),housing characteristics(HC),and socio-demo-graphic profile(SDP).3)The livelihood vulnerability of the groups with highly engaged/reliance on jujube(Ziziphus jujuba)forest demonstrated more prominent livelihood vulnerability due to the increased precipitation and cold market,where the low-engaged with reliance type were significantly more vulnerable in LVI,SDP,LR,and HC.4)The threshold of behavioral triggers widely varied,and farmers dependent on forestry livelihoods showed negative coping behavior.Specifically,the cutting behavior was strongly associated with lagged years and government subsidies,guidance,and high returns of crops.Finally,the findings can provide guidance on the dir-ection of livelihood vulnerability mitigation and adaptive government management in ecologically restored areas.The issue of farmers’livelihood sustainability in the context of ecological conservation calls for immediate attention,and eco-compensations or other forms of assistance in ecologically functional areas are expected to be enhanced and diversified.展开更多
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representation...Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations.However,due to limitations in code representation and neural network design,the validity and practicality of the model still need to be improved.Additionally,due to differences in programming languages,most methods lack cross-language detection generality.To address these issues,in this paper,we analyze the shortcomings of previous code representations and neural networks.We propose a novel hierarchical code representation that combines Concrete Syntax Trees(CST)with Program Dependence Graphs(PDG).Furthermore,we introduce a Tree-Graph-Gated-Attention(TGGA)network based on gated recurrent units and attention mechanisms to build a Hierarchical Code Representation learning-based Vulnerability Detection(HCRVD)system.This system enables cross-language vulnerability detection at the function-level.The experiments show that HCRVD surpasses many competitors in vulnerability detection capabilities.It benefits from the hierarchical code representation learning method,and outperforms baseline in cross-language vulnerability detection by 9.772%and 11.819%in the C/C++and Java datasets,respectively.Moreover,HCRVD has certain ability to detect vulnerabilities in unknown programming languages and is useful in real open-source projects.HCRVD shows good validity,generality and practicality.展开更多
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i...Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.展开更多
The ecological environment of the Yellow River Basin has become more fragile under the combined action of natural and manmade activities.However,the change mechanisms of ecological vulnerability in different sub-regio...The ecological environment of the Yellow River Basin has become more fragile under the combined action of natural and manmade activities.However,the change mechanisms of ecological vulnerability in different sub-regions and periods vary,and the reasons for this variability are yet to be explained.Thus,in this study,we proposed a new remote sensing ecological vulnerability index by considering moisture,heat,greenness,dryness,land degradation,and social economy indicators and then analyzed and disclosed the spatial and temporal change patterns of ecological vulnerability of the Yellow River Basin,China from 2000 to 2022 and its driving mechanisms.The results showed that the newly proposed remote sensing ecological vulnerability index had a high accuracy,at 86.36%,which indicated a higher applicability in the Yellow River Basin.From 2000 to 2022,the average remote sensing ecological vulnerability index of the Yellow River Basin was 1.03,denoting moderate vulnerability level.The intensive vulnerability area was the most widely distributed,which was mostly located in the northern part of Shaanxi Province and the eastern part of Shanxi Province.From 2000 to 2022,the ecological vulnerability in the Yellow showed an overall stable trend,while that of the central and eastern regions showed an obvious trend of improvement.The gravity center of ecological vulnerability migrated southwest,indicating that the aggravation of ecological vulnerability in the southwestern regions was more severe than in the northeastern regions of the basin.The dominant single factor of changes in ecological vulnerability shifted from normalized difference vegetation index(NDVI)to temperature from 2000 to 2022,and the interaction factors shifted from temperature∩NDVI to temperature∩precipitation,which indicated that the global climate change exerted a more significant impact on regional ecosystems.The above results could provide decision support for the ecological protection and restoration of the Yellow River Basin.展开更多
Smallholder farmers in Ahafo Ano North District,Ghana,face multiple climatic and non-climatic issues.This study assessed the factors contributing to the livelihood vulnerability of smallholder farmers in this district...Smallholder farmers in Ahafo Ano North District,Ghana,face multiple climatic and non-climatic issues.This study assessed the factors contributing to the livelihood vulnerability of smallholder farmers in this district by household surveys with 200 respondents and focus group discussions(FGDs)with 10 respondents.The Mann–Kendall trend test was used to assess mean annual rainfall and temperature trends from 2002 to 2022.The relative importance index(RII)value was used to rank the climatic and non-climatic factors perceived by respondents.The socioeconomic characteristics affecting smallholder farmers’perceptions of climatic and non-climatic factors were evaluated by the binary logistic regression model.Results showed that mean annual rainfall decreased(P>0.05)but mean annual temperature significantly increased(P<0.05)from 2002 to 2022 in the district.The key climatic factors perceived by smallholder farmers were extreme heat or increasing temperature(RII=0.498),erratic rainfall(RII=0.485),and increased windstorms(RII=0.475).The critical non-climatic factors were high cost of farm inputs(RII=0.485),high cost of healthcare(RII=0.435),and poor condition of roads to farms(RII=0.415).Smallholder farmers’perceptions of climatic and non-climatic factors were significantly affected by their socioeconomic characteristics(P<0.05).This study concluded that these factors negatively impact the livelihoods and well-being of smallholder farmers and socioeconomic characteristics influence their perceptions of these factors.Therefore,to enhance the resilience of smallholder farmers to climate change,it is necessary to adopt a comprehensive and context-specific approach that accounts for climatic and non-climatic factors.展开更多
Climate change is an alarming global challenge, particularly affecting the least developed countries (LDCs) including Liberia. These countries, located in regions prone to unpredictable temperature and precipitation c...Climate change is an alarming global challenge, particularly affecting the least developed countries (LDCs) including Liberia. These countries, located in regions prone to unpredictable temperature and precipitation changes, are facing significant challenges, particularly in climate-sensitive sectors such as mining and agriculture. LDCs need more resilience to adverse climate shocks but have limited capacity for adaptation compared to other developed and developing nations. This paper examines Liberia’s susceptibility to climate change as a least developed country, focusing on its exposure, sensitivity, and adaptive capacity. It provides an overview of LDCs and outlines the global distribution of carbon dioxide emissions. The paper also evaluates specific challenges that amplify Liberia’s vulnerability and constrain sustainable adaptation, providing insight into climate change’s existing and potential effects. The paper emphasizes the urgency of addressing climate impacts on Liberia and calls for concerted local and international efforts for effective and sustainable mitigation efforts. It provides recommendations for policy decisions and calls for further research on climate change mitigation and adaptation.展开更多
Climate change vulnerability assessment is an essential tool for identifying regions that are most susceptible to the impacts of climate change and designing effective adaptation actions that can reduce vulnerability ...Climate change vulnerability assessment is an essential tool for identifying regions that are most susceptible to the impacts of climate change and designing effective adaptation actions that can reduce vulnerability and enhance long-term resilience of these regions.This study explored a framework for climate change vulnerability assessment in the new urban planning process in Jangwani Ward,Tanzania.Specifically,taking flood as an example,this study highlighted the steps and methods for climate change vulnerability assessment in the new urban planning process.In the study area,95 households were selected and interviewed through purposeful sampling.Additionally,10 respondents(4 females and 6 males)were interviewed for Focus Group Discussion(FGD),and 3 respondents(1 female and 2 males)were selected for Key Informant Interviews(KII)at the Ministry of Lands,Housing and Human Settlements Development.This study indicated that climate change vulnerability assessment framework involves the assessment of climatic hazards,risk elements,and adaptive capacity,and the determination of vulnerability levels.The average hazard risk rating of flood was 2.3.Socioeconomic and livelihood activities and physical infrastructures both had the average risk element rating of 3.0,and ecosystems had the average risk element rating of 2.9.Adaptive capacity ratings of knowledge,technology,economy or finance,and institution were 1.6,1.9,1.4,and 2.2,respectively.The vulnerability levels of socioeconomic and livelihood activities and physical infrastructure were very high(4.0).Ecosystems had a high vulnerability level(3.8)to flood.The very high vulnerability level of socioeconomic and livelihood activities was driven by high exposure and sensitivity to risk elements and low adaptive capacity.The study recommends adoption of the new urban planning process including preparation,planning,implementation,and monitoring-evaluation-review phases that integrates climate change vulnerability assessment in all phases.展开更多
Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,th...Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,the DRASTIC method was applied using Geographic Information System(GIS)to delineate groundwater vulnerability zones in the Erbil Dumpsite area,Central Erbil Basin,North Iraq.Results showed that the area was classified into four vulnerability classes:Very low(16.97%),low(27.67%),moderate(36.55%)and high(18.81%).The southern,south-eastern and northern parts of the study area exhibited the highest vulnerability potential,while the central-northern,northern and north-western regions displayed the lowest vulnerability potential.Moreover,results of the single-parameter sensitivity analysis indicated that amongst the seven DRASTIC parameters,the unsaturated zone and the aquifer media were the most influencing parameters.In conclustion,the correlation of 25 nitrate concentration values with the final vulnerability map,assessed using the Pearson correlation coefficient,yielded a satisfactory result of R=0.72.展开更多
Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, a...Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, and more. However, their widespread usage emphasizes the critical need to enhance their security posture to ensure the integrity and reliability of their outputs and minimize harmful effects. Prompt injections and training data poisoning attacks are two of the most prominent vulnerabilities in LLMs, which could potentially lead to unpredictable and undesirable behaviors, such as biased outputs, misinformation propagation, and even malicious content generation. The Common Vulnerability Scoring System (CVSS) framework provides a standardized approach to capturing the principal characteristics of vulnerabilities, facilitating a deeper understanding of their severity within the security and AI communities. By extending the current CVSS framework, we generate scores for these vulnerabilities such that organizations can prioritize mitigation efforts, allocate resources effectively, and implement targeted security measures to defend against potential risks.展开更多
Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-fe...Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-feeding of breast milk.Hazard Vulnerability Analysis based on the Kaiser model was applied to investigate and evaluate the risk events.Results:High-risk events include breast milk quality inspection,hand hygiene during collection,disinfection of collectors,cold chain management,hand hygiene during the reception,breast milk closed-loop management,and post-collection disposal.Root cause analysis of high-risk events was conducted and breast milk management strategies outside the hospital and within the neonatal department were proposed.Conclusion:Hazard Vulnerability Analysis based on the Kaiser model can identify and assess neonatal breast milk management risks effectively,which helps improve the management of neonatal breast milk.It is conducive to the safe development and promotion of bottle feeding of breast milk for neonates,ensuring the quality of medical services and the safety of children.展开更多
With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas...With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.展开更多
Coastal vulnerability assessment using the Integrated Sensitivity, Exposure, and Adaptive Capacity to Climate Change Vulnerability Assessment (ICSEA-C-Change) tool provides a deeper understanding of the potential impa...Coastal vulnerability assessment using the Integrated Sensitivity, Exposure, and Adaptive Capacity to Climate Change Vulnerability Assessment (ICSEA-C-Change) tool provides a deeper understanding of the potential impacts of climate change on coastal zones. Vulnerability ratings were obtained using rubrics that were presented to the stakeholders during focused group discussions. Derived scores were then averaged and consolidated to come up with the overall vulnerability rating. These ratings were based on the resource and status of coastal habitats’ reliance on near-shore fishing and other quality measures like fisheries ecosystem dependency, population, and water quality of the coastal habitats in the barangays. Ratings resulted in identifying 12 barangays out of 23 that are highly vulnerable to climate change impacts such as waves, storm surges, sea level rise, increase in surface temperature, and extreme rainfall. These are Buenavista and Basicao (Pioduran), Catburawan (Ligao), Tapel, Nagas and Maramba (Oas), Talin-Talin, Pantao, Macabugos, and Tambo (Libon) and Buhatan and Villa Hermosa (Rapu-Rapu). Assessment results were highly influenced by the absence of three major marine habitats, i.e., coral reefs, seagrass/seaweeds, and mangroves in the coastal areas. Likewise, 11 barangays out of 23, which were Marigondon and Malidong (Pioduran), Maonon and Cabarian (Ligao), Badian and Cagmanaba (Oas), Apud and Rawis (Libon), and Galicia, Hamorawon, and Poblacion (Rapu-Rapu) obtained moderate vulnerability scores. This was attributed to the presence of marine habitats that although in poor state, may serve their ecological functioning when properly protected. Highly vulnerable barangays must be prioritized in coastal rehabilitation and disaster risk reduction management planning. Parameters encompassing the sensitivity and adaptive capacity of each barangay must be taken into consideration to reduce potential impacts brought by factors attributed to climate change. Vital information from the assessment will serve as basis for developing strategic plans for improving the climate change adaptation strategies of the local government units.展开更多
文摘The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses an intelligent computation technique based on the combination of two methods:Rebalancing data and representation learning to analyze and evaluate the code property graph(CPG)of the source code for detecting abnormal behavior of software vulnerabilities.To do that,DrCSE performs a combination of 3 main processing techniques:(i)building the source code feature profiles,(ii)rebalancing data,and(iii)contrastive learning.In which,the method(i)extracts the source code’s features based on the vertices and edges of the CPG.The method of rebalancing data has the function of supporting the training process by balancing the experimental dataset.Finally,contrastive learning techniques learn the important features of the source code by finding and pulling similar ones together while pushing the outliers away.The experiment part of this paper demonstrates the superiority of the DrCSE Framework for detecting source code security vulnerabilities using the Verum dataset.As a result,the method proposed in the article has brought a pretty good performance in all metrics,especially the Precision and Recall scores of 39.35%and 69.07%,respectively,proving the efficiency of the DrCSE Framework.It performs better than other approaches,with a 5%boost in Precision and a 5%boost in Recall.Overall,this is considered the best research result for the software vulnerability detection problem using the Verum dataset according to our survey to date.
基金supported by the Ministry of Finance of the Republic of Indonesia that provides Beasiswa Unggulan Dosen Indonesia (BUDI) scholarships through the Financial Fund Management Institution。
文摘Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,so it is imperative to understand the socio-economic vulnerability of this region.This research aims to identify the vulnerability level of the Jeneberang watershed so that the government can prioritize areas with high vulnerability level and formulate effective strategies to reduce these the vulnerability.Specifically,this study was conducted in 12 districts located in the Jeneberang watershed.The primary data were collected from questionnaires completed by community members,community leaders,and various stakeholders,and the secondary data were from the Landsat satellite imagery in 2020,the Badan Push Statistic of Gowa Regency,and some governmental agencies.The socio-economic vulnerability variables were determined using the Multiple Criteria Decision Analysis(MCDA)method,and each variable was weighted and analyzed using the Geographical Information System(GIS).The study reveals that the levels of socio-economic vulnerability are affected by variables such as population density,vulnerable groups(disabled people,elderly people,and young people),road network and settlement,percentage of poor people,and productive land area in the Jeneberang watershed.Moreover,all of the 12 districts in the Jeneberang watershed are included in the medium vulnerability level,with the mean percentage of socio-economic vulnerability around 50.92%.The socio-economic vulnerability of Bajeng,Pallangga,and Somba Opu districts is categorized at high level,the socio-economic vulnerability of Bungaya,Parangloe,and Tombolo Pao districts is classified as medium level,and the remaining 6 districts(Barombong,Bontolempangan,Bontomarannu,Manuju,Parigi,and Tinggimoncong)are ranked as low socio-economic vulnerability.This study can help policy-makers to formulate strategy that contributes to the protection of biodiversity and sustainable development of the Jeneberang watershed,while improving disaster resilience and preparedness of the watershed.
基金This work is the result of commissioned research project supported by the Affiliated Institute of ETRI(2022-086)received by Junho AhnThis research was supported by the National Research Foundation of Korea(NRF)Basic Science Research Program funded by the Ministry of Education(No.2020R1A6A1A03040583)this work was supported by Korea Institute for Advancement of Technology(KIAT)Grant funded by the Korea government(MOTIE)(P0008691,HRD Program for Industrial Innovation).
文摘This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
基金funded by the National Natural Science Foundation of China(Grants No.41901209,42001173,and 41661144038).
文摘To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to 2022.We conducted participatory household survey on the livelihood status of the rural households and try to identify the key factors to influence their livelihood vulnerability using multiple linear regression.The results showed that:the livelihood situation of the rural households is relatively vulnerable.The vulnerability varies significantly with the income levels,education levels,and income sources.The vulnerability of farm households,categorized from low to high livelihood types,follows the sequence:non-agricultural dominant households,non-agricultural households,agricultural dominant households,and pure agricultural households.The degree of damage to the natural environment,education costs,loan opportunities,the proportion of agricultural income to annual household income,and the presence of sick people in the household have significant positive effects on the livelihood vulnerability index(LVI)of rural households;while help from relatives and friends,net income per capita,household size,household education,agricultural land area,participation in industrial organizations,number of livestock,purchase of commercial houses,drinking water source,and self-supply of food have significant negative effects.Based on the findings,we believe that local rural households operate in a complex livelihood system and recommend continuous interventions targeting key influences to provide empirical research support for areas facing similar situations.
基金supported by the National Key Research and Development Plan in China(Grant No.2020YFB1005500)。
文摘The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.
基金National Natural Science Foundation of China(Grant Nos.62005276,62175234)the Scientific and Technological Development Program of Jilin,China(Grant No.20230508111RC)to provide fund for this research。
文摘Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.
基金funded by the Major PublicWelfare Special Fund of Henan Province(No.201300210200)the Major Science and Technology Research Special Fund of Henan Province(No.221100210400).
文摘In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection.
基金This work is supported by the Provincial Key Science and Technology Special Project of Henan(No.221100240100)。
文摘In recent years,the rapid development of computer software has led to numerous security problems,particularly software vulnerabilities.These flaws can cause significant harm to users’privacy and property.Current security defect detection technology relies on manual or professional reasoning,leading to missed detection and high false detection rates.Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes,reducing missed alarms and false alarms.So,this project aims to study Java source code defect detection methods for defects like null pointer reference exception,XSS(Transform),and Structured Query Language(SQL)injection.Also,the project uses open-source Javalang to translate the Java source code,conducts a deep search on the AST to obtain the empty syntax feature library,and converts the Java source code into a dependency graph.The feature vector is then used as the learning target for the neural network.Four types of Convolutional Neural Networks(CNN),Long Short-Term Memory(LSTM),Bi-directional Long Short-Term Memory(BiLSTM),and Attention Mechanism+Bidirectional LSTM,are used to investigate various code defects,including blank pointer reference exception,XSS,and SQL injection defects.Experimental results show that the attention mechanism in two-dimensional BLSTM is the most effective for object recognition,verifying the correctness of the method.
基金Under the auspices of National Natural Science Foundation of China(No.42001202,52209030,42171208)Young Talent Fund of Association for Science and Technology in Shaanxi,China(No.20240703)+1 种基金Social Science Foundation Project of Shaanxi Province(No.2022R019)Fundamental Research Funds for the Central Universities(No.GK202207005)。
文摘Chinese Loess Plateau has achieved a win-win situation concerning ecological restoration and socio-economic development.However,synergistic development may not be realized at the local scale.In areas undergoing ecological restoration,livelihood vulner-ability may be more pronounced due to the inflexibility,policy protection,and susceptibility to climate and market changes in forestry production.Although this issue has attracted academic interest,empirical studies are relatively scarce.This study,centered on Jiaxian County,Shaanxi Province of China explored the households’livelihood vulnerability and coping strategies and group heterogeneity con-cerned with livelihood structures or forestry resources through field investigation,comprehensive index assessment,and nonparametric tests.Findings showed that:1)the percentage of households with high livelihood vulnerability indicator(LVI)(>0.491)reached 46.34%.2)Eight groups in livelihood structures formed by forestry,traditional agriculture,and non-farm activities were significantly different in LVI,land resources(LR),social networks(SN),livelihood strategies(LS),housing characteristics(HC),and socio-demo-graphic profile(SDP).3)The livelihood vulnerability of the groups with highly engaged/reliance on jujube(Ziziphus jujuba)forest demonstrated more prominent livelihood vulnerability due to the increased precipitation and cold market,where the low-engaged with reliance type were significantly more vulnerable in LVI,SDP,LR,and HC.4)The threshold of behavioral triggers widely varied,and farmers dependent on forestry livelihoods showed negative coping behavior.Specifically,the cutting behavior was strongly associated with lagged years and government subsidies,guidance,and high returns of crops.Finally,the findings can provide guidance on the dir-ection of livelihood vulnerability mitigation and adaptive government management in ecologically restored areas.The issue of farmers’livelihood sustainability in the context of ecological conservation calls for immediate attention,and eco-compensations or other forms of assistance in ecologically functional areas are expected to be enhanced and diversified.
基金funded by the Major Science and Technology Projects in Henan Province,China,Grant No.221100210600.
文摘Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations.However,due to limitations in code representation and neural network design,the validity and practicality of the model still need to be improved.Additionally,due to differences in programming languages,most methods lack cross-language detection generality.To address these issues,in this paper,we analyze the shortcomings of previous code representations and neural networks.We propose a novel hierarchical code representation that combines Concrete Syntax Trees(CST)with Program Dependence Graphs(PDG).Furthermore,we introduce a Tree-Graph-Gated-Attention(TGGA)network based on gated recurrent units and attention mechanisms to build a Hierarchical Code Representation learning-based Vulnerability Detection(HCRVD)system.This system enables cross-language vulnerability detection at the function-level.The experiments show that HCRVD surpasses many competitors in vulnerability detection capabilities.It benefits from the hierarchical code representation learning method,and outperforms baseline in cross-language vulnerability detection by 9.772%and 11.819%in the C/C++and Java datasets,respectively.Moreover,HCRVD has certain ability to detect vulnerabilities in unknown programming languages and is useful in real open-source projects.HCRVD shows good validity,generality and practicality.
文摘Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion.
基金funded by the National Natural Science Foundation of China(42471329,42101306,42301102)the Natural Science Foundation of Shandong Province(ZR2021MD047)+1 种基金the Scientific Innovation Project for Young Scientists in Shandong Provincial Universities(2022KJ224)the Gansu Youth Science and Technology Fund Program(24JRRA100).
文摘The ecological environment of the Yellow River Basin has become more fragile under the combined action of natural and manmade activities.However,the change mechanisms of ecological vulnerability in different sub-regions and periods vary,and the reasons for this variability are yet to be explained.Thus,in this study,we proposed a new remote sensing ecological vulnerability index by considering moisture,heat,greenness,dryness,land degradation,and social economy indicators and then analyzed and disclosed the spatial and temporal change patterns of ecological vulnerability of the Yellow River Basin,China from 2000 to 2022 and its driving mechanisms.The results showed that the newly proposed remote sensing ecological vulnerability index had a high accuracy,at 86.36%,which indicated a higher applicability in the Yellow River Basin.From 2000 to 2022,the average remote sensing ecological vulnerability index of the Yellow River Basin was 1.03,denoting moderate vulnerability level.The intensive vulnerability area was the most widely distributed,which was mostly located in the northern part of Shaanxi Province and the eastern part of Shanxi Province.From 2000 to 2022,the ecological vulnerability in the Yellow showed an overall stable trend,while that of the central and eastern regions showed an obvious trend of improvement.The gravity center of ecological vulnerability migrated southwest,indicating that the aggravation of ecological vulnerability in the southwestern regions was more severe than in the northeastern regions of the basin.The dominant single factor of changes in ecological vulnerability shifted from normalized difference vegetation index(NDVI)to temperature from 2000 to 2022,and the interaction factors shifted from temperature∩NDVI to temperature∩precipitation,which indicated that the global climate change exerted a more significant impact on regional ecosystems.The above results could provide decision support for the ecological protection and restoration of the Yellow River Basin.
文摘Smallholder farmers in Ahafo Ano North District,Ghana,face multiple climatic and non-climatic issues.This study assessed the factors contributing to the livelihood vulnerability of smallholder farmers in this district by household surveys with 200 respondents and focus group discussions(FGDs)with 10 respondents.The Mann–Kendall trend test was used to assess mean annual rainfall and temperature trends from 2002 to 2022.The relative importance index(RII)value was used to rank the climatic and non-climatic factors perceived by respondents.The socioeconomic characteristics affecting smallholder farmers’perceptions of climatic and non-climatic factors were evaluated by the binary logistic regression model.Results showed that mean annual rainfall decreased(P>0.05)but mean annual temperature significantly increased(P<0.05)from 2002 to 2022 in the district.The key climatic factors perceived by smallholder farmers were extreme heat or increasing temperature(RII=0.498),erratic rainfall(RII=0.485),and increased windstorms(RII=0.475).The critical non-climatic factors were high cost of farm inputs(RII=0.485),high cost of healthcare(RII=0.435),and poor condition of roads to farms(RII=0.415).Smallholder farmers’perceptions of climatic and non-climatic factors were significantly affected by their socioeconomic characteristics(P<0.05).This study concluded that these factors negatively impact the livelihoods and well-being of smallholder farmers and socioeconomic characteristics influence their perceptions of these factors.Therefore,to enhance the resilience of smallholder farmers to climate change,it is necessary to adopt a comprehensive and context-specific approach that accounts for climatic and non-climatic factors.
文摘Climate change is an alarming global challenge, particularly affecting the least developed countries (LDCs) including Liberia. These countries, located in regions prone to unpredictable temperature and precipitation changes, are facing significant challenges, particularly in climate-sensitive sectors such as mining and agriculture. LDCs need more resilience to adverse climate shocks but have limited capacity for adaptation compared to other developed and developing nations. This paper examines Liberia’s susceptibility to climate change as a least developed country, focusing on its exposure, sensitivity, and adaptive capacity. It provides an overview of LDCs and outlines the global distribution of carbon dioxide emissions. The paper also evaluates specific challenges that amplify Liberia’s vulnerability and constrain sustainable adaptation, providing insight into climate change’s existing and potential effects. The paper emphasizes the urgency of addressing climate impacts on Liberia and calls for concerted local and international efforts for effective and sustainable mitigation efforts. It provides recommendations for policy decisions and calls for further research on climate change mitigation and adaptation.
文摘Climate change vulnerability assessment is an essential tool for identifying regions that are most susceptible to the impacts of climate change and designing effective adaptation actions that can reduce vulnerability and enhance long-term resilience of these regions.This study explored a framework for climate change vulnerability assessment in the new urban planning process in Jangwani Ward,Tanzania.Specifically,taking flood as an example,this study highlighted the steps and methods for climate change vulnerability assessment in the new urban planning process.In the study area,95 households were selected and interviewed through purposeful sampling.Additionally,10 respondents(4 females and 6 males)were interviewed for Focus Group Discussion(FGD),and 3 respondents(1 female and 2 males)were selected for Key Informant Interviews(KII)at the Ministry of Lands,Housing and Human Settlements Development.This study indicated that climate change vulnerability assessment framework involves the assessment of climatic hazards,risk elements,and adaptive capacity,and the determination of vulnerability levels.The average hazard risk rating of flood was 2.3.Socioeconomic and livelihood activities and physical infrastructures both had the average risk element rating of 3.0,and ecosystems had the average risk element rating of 2.9.Adaptive capacity ratings of knowledge,technology,economy or finance,and institution were 1.6,1.9,1.4,and 2.2,respectively.The vulnerability levels of socioeconomic and livelihood activities and physical infrastructure were very high(4.0).Ecosystems had a high vulnerability level(3.8)to flood.The very high vulnerability level of socioeconomic and livelihood activities was driven by high exposure and sensitivity to risk elements and low adaptive capacity.The study recommends adoption of the new urban planning process including preparation,planning,implementation,and monitoring-evaluation-review phases that integrates climate change vulnerability assessment in all phases.
文摘Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,the DRASTIC method was applied using Geographic Information System(GIS)to delineate groundwater vulnerability zones in the Erbil Dumpsite area,Central Erbil Basin,North Iraq.Results showed that the area was classified into four vulnerability classes:Very low(16.97%),low(27.67%),moderate(36.55%)and high(18.81%).The southern,south-eastern and northern parts of the study area exhibited the highest vulnerability potential,while the central-northern,northern and north-western regions displayed the lowest vulnerability potential.Moreover,results of the single-parameter sensitivity analysis indicated that amongst the seven DRASTIC parameters,the unsaturated zone and the aquifer media were the most influencing parameters.In conclustion,the correlation of 25 nitrate concentration values with the final vulnerability map,assessed using the Pearson correlation coefficient,yielded a satisfactory result of R=0.72.
文摘Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, and more. However, their widespread usage emphasizes the critical need to enhance their security posture to ensure the integrity and reliability of their outputs and minimize harmful effects. Prompt injections and training data poisoning attacks are two of the most prominent vulnerabilities in LLMs, which could potentially lead to unpredictable and undesirable behaviors, such as biased outputs, misinformation propagation, and even malicious content generation. The Common Vulnerability Scoring System (CVSS) framework provides a standardized approach to capturing the principal characteristics of vulnerabilities, facilitating a deeper understanding of their severity within the security and AI communities. By extending the current CVSS framework, we generate scores for these vulnerabilities such that organizations can prioritize mitigation efforts, allocate resources effectively, and implement targeted security measures to defend against potential risks.
文摘Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-feeding of breast milk.Hazard Vulnerability Analysis based on the Kaiser model was applied to investigate and evaluate the risk events.Results:High-risk events include breast milk quality inspection,hand hygiene during collection,disinfection of collectors,cold chain management,hand hygiene during the reception,breast milk closed-loop management,and post-collection disposal.Root cause analysis of high-risk events was conducted and breast milk management strategies outside the hospital and within the neonatal department were proposed.Conclusion:Hazard Vulnerability Analysis based on the Kaiser model can identify and assess neonatal breast milk management risks effectively,which helps improve the management of neonatal breast milk.It is conducive to the safe development and promotion of bottle feeding of breast milk for neonates,ensuring the quality of medical services and the safety of children.
基金Our work is supported by the National Key R&D Program of China(2021YFB2012400).
文摘With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.
文摘Coastal vulnerability assessment using the Integrated Sensitivity, Exposure, and Adaptive Capacity to Climate Change Vulnerability Assessment (ICSEA-C-Change) tool provides a deeper understanding of the potential impacts of climate change on coastal zones. Vulnerability ratings were obtained using rubrics that were presented to the stakeholders during focused group discussions. Derived scores were then averaged and consolidated to come up with the overall vulnerability rating. These ratings were based on the resource and status of coastal habitats’ reliance on near-shore fishing and other quality measures like fisheries ecosystem dependency, population, and water quality of the coastal habitats in the barangays. Ratings resulted in identifying 12 barangays out of 23 that are highly vulnerable to climate change impacts such as waves, storm surges, sea level rise, increase in surface temperature, and extreme rainfall. These are Buenavista and Basicao (Pioduran), Catburawan (Ligao), Tapel, Nagas and Maramba (Oas), Talin-Talin, Pantao, Macabugos, and Tambo (Libon) and Buhatan and Villa Hermosa (Rapu-Rapu). Assessment results were highly influenced by the absence of three major marine habitats, i.e., coral reefs, seagrass/seaweeds, and mangroves in the coastal areas. Likewise, 11 barangays out of 23, which were Marigondon and Malidong (Pioduran), Maonon and Cabarian (Ligao), Badian and Cagmanaba (Oas), Apud and Rawis (Libon), and Galicia, Hamorawon, and Poblacion (Rapu-Rapu) obtained moderate vulnerability scores. This was attributed to the presence of marine habitats that although in poor state, may serve their ecological functioning when properly protected. Highly vulnerable barangays must be prioritized in coastal rehabilitation and disaster risk reduction management planning. Parameters encompassing the sensitivity and adaptive capacity of each barangay must be taken into consideration to reduce potential impacts brought by factors attributed to climate change. Vital information from the assessment will serve as basis for developing strategic plans for improving the climate change adaptation strategies of the local government units.