期刊文献+
共找到325,923篇文章
< 1 2 250 >
每页显示 20 50 100
A Cooperative Security Monitoring Mechanism Aided by Optimal Multiple Slave Cluster Heads for UASNs
1
作者 Yougan Chen Wei Wang +3 位作者 Xiang Sun Yi Tao Zhenwen Liu Xiaomei Xu 《China Communications》 SCIE CSCD 2023年第5期148-169,共22页
As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this... As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme. 展开更多
关键词 underwater acoustic sensor networks data security cluster head nodes optimal location distribution of multiple slave cluster head nodes
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
2
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
3
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
4
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
The Role of Plantain in Promoting Food Security: A Review
5
作者 Doreen Dedo Adi 《Food and Nutrition Sciences》 CAS 2024年第5期313-335,共23页
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ... Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste. 展开更多
关键词 Food security PLANTAIN Foam-Mat Drying RIPENING
下载PDF
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
6
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber security QR Codes Quishing AI Framework Machine Learning AI-Enhanced security
下载PDF
Accuracy of FreeStyle Libre flash glucose monitoring in patients with type 2 diabetes who migrated from highlands to plains
7
作者 Zeng-Mei Sun Yuan-Ze Du +11 位作者 Su-Yuan Wang Shu-Yao Sun Yan Ye Xue-Ping Sun Ming-Xia Li Hua He Wun-Chun Long Cheng-Hui Zhang Xuan-Yu Yao Wu-Yi Fan Ling Wang Yun-Hong Wu 《World Journal of Diabetes》 SCIE 2024年第6期1254-1262,共9页
BACKGROUND The FreeStyle Libre flash glucose monitoring(FGM)system entered the Chinese market in 2017 to complement the self-monitoring of blood glucose.Due to its increased usage in clinics,the number of studies inve... BACKGROUND The FreeStyle Libre flash glucose monitoring(FGM)system entered the Chinese market in 2017 to complement the self-monitoring of blood glucose.Due to its increased usage in clinics,the number of studies investigating its accuracy has increased.However,its accuracy has not been investigated in highland populations in China.AIM To evaluate measurements recorded using the FreeStyle Libre FGM system compared with capillary blood glucose measured using the enzyme electrode method in patients with type 2 diabetes(T2D)who had migrated within 3 mo from highlands to plains.METHODS Overall,68 patients with T2D,selected from those who had recently migrated from highlands to plains(within 3 mo),were hospitalized at the Department of Endocrinology from August to October 2017 and underwent continuous glucose monitoring(CGM)with the FreeStyle Libre FGM system for 14 d.Throughout the study period,fingertip capillary blood glucose was measured daily using the enzyme electrode method(Super GL,China),and blood glucose levels were read from the scanning probe during fasting and 2 h after all three meals.Moreover,the time interval between reading the data from the scanning probe and collecting fingertip capillary blood was controlled to<5 min.The accuracy of the FGM system was evaluated according to the CGM guidelines.Subsequently,the factors influencing the mean absolute relative difference(MARD)of this system were analyzed by a multiple linear regression method.RESULTS Pearson’s correlation analysis showed that the fingertip and scanned glucose levels were positively correlated(R=0.86,P=0.00).The aggregated MARD of scanned glucose was 14.28±13.40%.Parker's error analysis showed that 99.30%of the data pairs were located in areas A and B.According to the probe wear time of the FreeStyle Libre FGM system,MARD_(1 d) and MARD_(2-14 d) were 16.55%and 14.35%,respectively(t=1.23,P=0.22).Multiple stepwise regression analysis showed that MARD did not correlate with blood glucose when the largest amplitude of glycemic excursion(LAGE)was<5.80 mmol/L but negatively correlated with blood glucose when the LAGE was≥5.80 mmol/L.CONCLUSION The FreeStyle Libre FGM system has good accuracy in patients with T2D who had recently migrated from highlands to plains.This system might be ideal for avoiding the effects of high hematocrit on blood glucose monitoring in populations that recently migrated to plains.MARD is mainly influenced by glucose levels and fluctuations,and the accuracy of the system is higher when the blood glucose fluctuation is small.In case of higher blood glucose level fluctuations,deviation in the scanned glucose levels is the highest at extremely low blood glucose levels. 展开更多
关键词 Type 2 diabetes Flash glucose monitoring ACCURACY Continuous glucose monitor High altitude
下载PDF
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
8
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 CRYPTOGRAPHIC security privacy preservation DECRYPTION INTEGRITY
下载PDF
Security and Privacy in Solar Insecticidal Lamps Internet of Things:Requirements and Challenges
9
作者 Qingsong Zhao Lei Shu +3 位作者 Kailiang Li Mohamed Amine Ferrag Ximeng Liu Yanbin Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期58-73,共16页
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the... Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT. 展开更多
关键词 CHALLENGES Internet of Things(IoT) privacy and security security requirements solar insecticidal lamps(SIL)
下载PDF
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
10
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis security GUIDELINES
下载PDF
Application and management of continuous glucose monitoring in diabetic kidney disease
11
作者 Xin-Miao Zhang Quan-Quan Shen 《World Journal of Diabetes》 SCIE 2024年第4期591-597,共7页
Diabetic kidney disease(DKD)is a common complication of diabetes mellitus that contributes to the risk of end-stage kidney disease(ESKD).Wide glycemic var-iations,such as hypoglycemia and hyperglycemia,are broadly fou... Diabetic kidney disease(DKD)is a common complication of diabetes mellitus that contributes to the risk of end-stage kidney disease(ESKD).Wide glycemic var-iations,such as hypoglycemia and hyperglycemia,are broadly found in diabetic patients with DKD and especially ESKD,as a result of impaired renal metabolism.It is essential to monitor glycemia for effective management of DKD.Hemoglobin A1c(HbA1c)has long been considered as the gold standard for monitoring glycemia for>3 months.However,assessment of HbA1c has some bias as it is susceptible to factors such as anemia and liver or kidney dysfunction.Continuous glucose monitoring(CGM)has provided new insights on glycemic assessment and management.CGM directly measures glucose level in interstitial fluid,reports real-time or retrospective glucose concentration,and provides multiple glycemic metrics.It avoids the pitfalls of HbA1c in some contexts,and may serve as a precise alternative to estimation of mean glucose and glycemic variability.Emerging studies have demonstrated the merits of CGM for precise monitoring,which allows fine-tuning of glycemic management in diabetic patients.Therefore,CGM technology has the potential for better glycemic monitoring in DKD patients.More research is needed to explore its application and management in different stages of DKD,including hemodialysis,peritoneal dialysis and kidney transplantation. 展开更多
关键词 Diabetic kidney disease Continuous glucose monitoring Glycemic monitoring HEMODIALYSIS Peritoneal dialysis Kidney transplantation
下载PDF
A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
12
作者 Fu Shiming Zhang Ping Shi Xuehong 《China Communications》 SCIE CSCD 2024年第5期177-189,共13页
Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vul... Traditional wireless sensor networks(WSNs)are typically deployed in remote and hostile environments for information collection.The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks.Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes.The trust-based security mechanism is usually adopted to solve this problem in WSNs.However,the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes.Moreover,how to efficiently collect behavioral evidences are rarely discussed.To address these issues,in this paper,we present a trust management mechanism based on fuzzy logic and a cloud model.First,a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty.Then,the cloud model is introduced to estimate the trust values for sensor nodes.Finally,a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance.Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring. 展开更多
关键词 behavior monitoring CLOUD FUZZY TRUST wireless sensor networks
下载PDF
NFT Security Matrix:Towards Modeling NFT Ecosystem Threat
13
作者 Peng Liao Chaoge Liu +2 位作者 Jie Yin Zhi Wang Xiang Cui 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3255-3285,共31页
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,nume... Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in 2022.Nevertheless,numerous security concerns have been raised by the rapid expansion of the NFT ecosystem.NFT holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being lost.However,academic research on NFT security is scarce,and the security issues have aroused rare attention.In this study,the NFT ecological process is comprehensively explored.This process falls into five different stages encompassing the entire lifecycle of NFTs.Subsequently,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security issues.Diverse data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem.From this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis.This study aims to shed light on the severity of NFT ecosystem security issues.The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem. 展开更多
关键词 Non-fungible token blockchain cyber security
下载PDF
Push forward LC-MS-based therapeutic drug monitoring and pharmacometabolomics for anti-tuberculosis precision dosing and comprehensive clinical management
14
作者 Nguyen Quang Thu Nguyen Tran Nam Tien +3 位作者 Nguyen Thi Hai Yen Thuc-Huy Duong Nguyen Phuoc Long Huy Truong Nguyen 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2024年第1期16-38,共23页
The spread of tuberculosis(TB),especially multidrug-resistant TB and extensively drug-resistant TB,has strongly motivated the research and development of new anti-TB drugs.New strategies to facilitate drug combination... The spread of tuberculosis(TB),especially multidrug-resistant TB and extensively drug-resistant TB,has strongly motivated the research and development of new anti-TB drugs.New strategies to facilitate drug combinations,including pharmacokinetics-guided dose optimization and toxicology studies of first-and second-line anti-TB drugs have also been introduced and recommended.Liquid chromatography-mass spectrometry(LC-MS)has arguably become the gold standard in the analysis of both endo-and exo-genous compounds.This technique has been applied successfully not only for therapeutic drug monitoring(TDM)but also for pharmacometabolomics analysis.TDM improves the effectiveness of treatment,reduces adverse drug reactions,and the likelihood of drug resistance development in TB patients by determining dosage regimens that produce concentrations within the therapeutic target window.Based on TDM,the dose would be optimized individually to achieve favorable outcomes.Pharmacometabolomics is essential in generating and validating hypotheses regarding the metabolism of anti-TB drugs,aiding in the discovery of potential biomarkers for TB diagnostics,treatment monitoring,and outcome evaluation.This article highlighted the current progresses in TDM of anti-TB drugs based on LC-MS bioassay in the last two decades.Besides,we discussed the advantages and disadvantages of this technique in practical use.The pressing need for non-invasive sampling approaches and stability studies of anti-TB drugs was highlighted.Lastly,we provided perspectives on the prospects of combining LC-MS-based TDM and pharmacometabolomics with other advanced strategies(pharmacometrics,drug and vaccine developments,machine learning/artificial intelligence,among others)to encapsulate in an all-inclusive approach to improve treatment outcomes of TB patients. 展开更多
关键词 TUBERCULOSIS Therapeutic drug monitoring LC-MS MIPD Pharmacometabolomics Precision medicine
下载PDF
A Review on the Security of the Ethereum-Based DeFi Ecosystem
15
作者 Yue Xue Dunqiu Fan +4 位作者 Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期69-101,共33页
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ... Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security. 展开更多
关键词 Blockchain smart contract decentralized finance DeFi security
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
16
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
Clinical/Behavioral Monitoring of Rodents and Rabbits Undergoing Scientific Experiments
17
作者 Luiz Cesar Cavalcanti Pereira Jhônata Willy Rocha Coelho +5 位作者 Hyago da Silva Medeiros Elidio Rita de Cássia dos Passos Ferraz Da Silva João Gabriel Regis Sobral Bárbara Alves de Brito Soledade Leandro Thomaz Vilela Isabele Barbieri Dos Santos 《Open Journal of Veterinary Medicine》 CAS 2024年第5期91-109,共19页
Background: We currently have international and national guidelines regarding the assessment and monitoring of clinical signs and humane endpoints in animals used in teaching and research, which make the performance o... Background: We currently have international and national guidelines regarding the assessment and monitoring of clinical signs and humane endpoints in animals used in teaching and research, which make the performance of these activities mandatory for any experiment and professional working in this area. Assigning the severity of a research experiment is the result of an analysis of records of observations of the animal’s behavior, and clinical signs. The aim of this study was to describe the importance of carrying out a severity assessment associated with clinical and behavioral monitoring of rodents and rabbits during experimentation to maintain the welfare of these animals undergoing scientific research. Methods: The literature search was carried out using the following terms: “Monitoring”;“Humane endpoints”;“Animal welfare”, “Rodents”;“Rabbits”, and as connectors “and”;“or”, in the following databases: PubMed;LILACS/BIREME and SciELO. Results: A total of 987 articles were identified in the databases, and 20 of these studies were included in this review. Conclusions: Humane endpoint protocols and procedure severity tables are of the utmost importance, both from an ethical point and to refine the results of research conducted on laboratory animals. They should be drawn up jointly by the teams responsible for the project and the maintenance of the animals during the research period, and the data obtained should be published so that the scientific community can have access to it, helping to disseminate these practices, as well as helping to draw up new procedures. Monitoring and evaluating the welfare and clinical condition of animals undergoing scientific research procedures is the responsibility of the professors, researchers, veterinarians, and animal facility coordinators. The Ethics Committee on the Use of Animals must monitor all the activities conducted with the animals, by inspecting the experimental procedures and the physical environment of the laboratory animal facility where the animals are housed. 展开更多
关键词 monitoring Humane Endpoints Animal Welfare Experimental Design Laboratory Animals’ Investigations
下载PDF
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
18
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
下载PDF
An improved typhoon monitoring model based on precipitable water vapor and pressure
19
作者 Junyu Li Haojie Li +7 位作者 Lilong Liu Jiaqing Chen Yibin Yao Mingyun Hu Liangke Huang Fade Chen Tengxu Zhang Lv Zhou 《Geodesy and Geodynamics》 EI CSCD 2024年第3期276-290,共15页
The potential of monitoring the movement of typhoons using the precipitable water vapor(PWV) has been confirmed. However, monitoring the movement of typhoon is focused on PWV, making it difficult to describe the movem... The potential of monitoring the movement of typhoons using the precipitable water vapor(PWV) has been confirmed. However, monitoring the movement of typhoon is focused on PWV, making it difficult to describe the movement of a typhoon in detail minutely and resulting in insufficient accuracy. Hence,based on PWV and meteorological data, we propose an improved typhoon monitoring mode. First, the European Centre for Medium-Range Weather Forecasts Reanalysis 5-derived PWV(ERA5-PWV) and the Global Navigation Satellite System-derived PWV(GNSS-PWV) were compared with the reference radiosonde PWV(RS-PWV). Then, using the PWV and atmospheric parameters derived from ERA5, we discussed the anomalous variations of PWV, pressure(P), precipitation, and wind speed during different typhoons. Finally, we compiled a list of critical factors related to typhoon movement, PWV and P. We developed an improved multi-factor typhoon monitoring mode(IMTM) with different models(i.e.,IMTM-I and IMTM-II) in different cases with a higher density of GNSS observation or only Numerical Weather Prediction(NWP) data. The IMTM was evaluated through the reference movement speeds of HATO and Mangkhut from the China Meteorological Observatory Typhoon Network(CMOTN). The results show that the root mean square(RMS) of the IMTM-I is 1.26 km/h based on ERA5-P and ERA5-PWV,and the absolute bias values are mostly within 2 km/h. Compared with the models considering the single factor ERA5-P/ERA5-PWV, the RMS of the IMTM-I is improved by 26.3% and 38.5%, respectively. The IMTM-II model manifests a residual of only 0.35 km/h. Compared with the single-factor model based on GNSS-PWV/P, the residual of the IMTM-II model is reduced by 90.8% and 84.1%, respectively. These results propose that the typhoon movement monitoring approach combining PWV and P has evident advantages over the single-factor model and is expected to supplement traditional typhoon monitoring. 展开更多
关键词 TYPHOON GNSS/ERA5 PWV PRESSURE monitoring Improved model
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
20
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部