The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect...The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.展开更多
Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilizati...Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilization of heterogeneous resources and anti-eavesdropping.However,edge-end collaboration-based multi-mode PIoT faces challenges of mutual contradiction in communication and security quality of service(QoS)guarantee,inadaptability of resource management,and multi-mode access conflict.We propose an Adaptive learning based delAysensitive and seCure Edge-End Collaboration algorithm(ACE_(2))to optimize multi-mode channel selection and split device power into artificial noise(AN)transmission and data transmission for secure data delivery.ACE_(2) can achieve multi-attribute QoS guarantee,adaptive resource management and security enhancement,and access conflict elimination with the combined power of deep actor-critic(DAC),“win or learn fast(WoLF)”mechanism,and edge-end collaboration.Simulations demonstrate its superior performance in queuing delay,energy consumption,secrecy capacity,and adaptability to differentiated low-carbon services.展开更多
About twenty percent people in Bangladesh are poor and ultra-poor, and they face severe food insecurity every year. Since food deficit is a recurring phenomenon especially in the northern area of Bangladesh, due to sc...About twenty percent people in Bangladesh are poor and ultra-poor, and they face severe food insecurity every year. Since food deficit is a recurring phenomenon especially in the northern area of Bangladesh, due to scarcity of jobs in agriculture dilring the lean period, there is a necessity for creating employment opportunities in non-crop agriculture and off-farm services. This action research program is therefore planned and offered skill development training in different trades to the target beneficiaries in the study area for employment generation. It is observed from the field survey that introduction of self-employment opportunities of the poor farmers by conducting skill development training program in different income generating economic activities enabling them to acquire necessary skills, and helping them to choose self-employment in off-farm sectors. In addition, education and advocacy programs also helped them to ensure food security by depositing their money/foods in a community food bank aiming to use during crisis period.展开更多
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu...As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies.展开更多
This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification...This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future.展开更多
To meet the actual requirements of an automotive industry chain collaboration platform (AICCP), this paper offers several simple but effective security policies based upon the traditional security mechanism of data ...To meet the actual requirements of an automotive industry chain collaboration platform (AICCP), this paper offers several simple but effective security policies based upon the traditional security mechanism of data transfer, including user ID verification with SOAP (simple object access protocol), header, SOAP message encryption with SOAP extension and XML (extensible markup language) file encryption and decryption. Application of these policies to the AICCP for more than one year proves the effectiveness of the data exchange practice between the AICCP and enterprise Intranet.展开更多
China has all along emphasized gradual,carefully sequenced reform.Follow-ing 15 years of practice and exploration,China’s reform is finally proceedingin a clear direction:the Socialist market economy.The Third Plenum...China has all along emphasized gradual,carefully sequenced reform.Follow-ing 15 years of practice and exploration,China’s reform is finally proceedingin a clear direction:the Socialist market economy.The Third Plenum of the Chi-nese Communist Party’s 14th Central Committee in November 1993 endorsed ma-jor reforms of the banking and financial systems,the conversion of state enterprisesinto joint-stock companies and introduction of securities market.All these mea-sures accelerated movement toward a genuine market economy.展开更多
The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability sol...The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers.展开更多
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme...New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT.展开更多
A statistically representative questionnaire targeted people using rainwater harvesting(RWH)techniques in rural communities of Sarida catchment,West Bank,Palestine was distributed and analyzed.The main objective of th...A statistically representative questionnaire targeted people using rainwater harvesting(RWH)techniques in rural communities of Sarida catchment,West Bank,Palestine was distributed and analyzed.The main objective of this study is to assess the social,economic,and environmental impacts of adopting RWH techniques(e.g.cisterns,concrete and clay ponds,Wadi ponds,earth dams,and stone terraces)in different uses to increase water availability.The results showed a simple sharing of the female component among beneficiaries,while concrete ponds and cisterns were the most used techniques.Actually,social impacts were noticeable by sharing the same RWH structure and reflected to responsibility skills and role exchange increases.On the other hand,RWH techniques showed a significant economic impact for end users represented by enhancing domestic,agricultural,and recreational activities leading to good profit increase.In addition to food security as output,the most important environmental impact was water wasting prevention,which in turn could be linked to sustainable water management and considered as universal challenge for future generations.展开更多
It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is e...It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is equivalent to a process of achieving specific goals or objectives by means of legal regulation.The establishment of a regulatory system for shadow banking should consider the objective and practical needs of the sector,prioritize security as the desired value,and reasonably establish a value system for risk control.展开更多
文摘The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.
基金supported by the Science and Technology Project of State Grid Corporation of China under Grant Number 52094021N010 (5400202199534A-0-5-ZN)
文摘Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilization of heterogeneous resources and anti-eavesdropping.However,edge-end collaboration-based multi-mode PIoT faces challenges of mutual contradiction in communication and security quality of service(QoS)guarantee,inadaptability of resource management,and multi-mode access conflict.We propose an Adaptive learning based delAysensitive and seCure Edge-End Collaboration algorithm(ACE_(2))to optimize multi-mode channel selection and split device power into artificial noise(AN)transmission and data transmission for secure data delivery.ACE_(2) can achieve multi-attribute QoS guarantee,adaptive resource management and security enhancement,and access conflict elimination with the combined power of deep actor-critic(DAC),“win or learn fast(WoLF)”mechanism,and edge-end collaboration.Simulations demonstrate its superior performance in queuing delay,energy consumption,secrecy capacity,and adaptability to differentiated low-carbon services.
文摘About twenty percent people in Bangladesh are poor and ultra-poor, and they face severe food insecurity every year. Since food deficit is a recurring phenomenon especially in the northern area of Bangladesh, due to scarcity of jobs in agriculture dilring the lean period, there is a necessity for creating employment opportunities in non-crop agriculture and off-farm services. This action research program is therefore planned and offered skill development training in different trades to the target beneficiaries in the study area for employment generation. It is observed from the field survey that introduction of self-employment opportunities of the poor farmers by conducting skill development training program in different income generating economic activities enabling them to acquire necessary skills, and helping them to choose self-employment in off-farm sectors. In addition, education and advocacy programs also helped them to ensure food security by depositing their money/foods in a community food bank aiming to use during crisis period.
基金supported by National Natural Science Foundation of China(Grant Nos.62162022 and 62162024)Young Talents’Science and Technology Innovation Project of Hainan Association for Science and Technology(Grant No.QCXM202007)Hainan Provincial Natural Science Foundation of China(Grant Nos.2019RC098 and 621RC612).
文摘As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies.
文摘This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future.
基金National High-Tech Research and De-velopment Program of China (863 Program) (No2004AA414010)Science Technology Project of Sichuan Province(No2006z03-015)
文摘To meet the actual requirements of an automotive industry chain collaboration platform (AICCP), this paper offers several simple but effective security policies based upon the traditional security mechanism of data transfer, including user ID verification with SOAP (simple object access protocol), header, SOAP message encryption with SOAP extension and XML (extensible markup language) file encryption and decryption. Application of these policies to the AICCP for more than one year proves the effectiveness of the data exchange practice between the AICCP and enterprise Intranet.
文摘China has all along emphasized gradual,carefully sequenced reform.Follow-ing 15 years of practice and exploration,China’s reform is finally proceedingin a clear direction:the Socialist market economy.The Third Plenum of the Chi-nese Communist Party’s 14th Central Committee in November 1993 endorsed ma-jor reforms of the banking and financial systems,the conversion of state enterprisesinto joint-stock companies and introduction of securities market.All these mea-sures accelerated movement toward a genuine market economy.
文摘The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2021R1A2C2011391)and was supported by the Ajou University research fund.
文摘New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT.
文摘A statistically representative questionnaire targeted people using rainwater harvesting(RWH)techniques in rural communities of Sarida catchment,West Bank,Palestine was distributed and analyzed.The main objective of this study is to assess the social,economic,and environmental impacts of adopting RWH techniques(e.g.cisterns,concrete and clay ponds,Wadi ponds,earth dams,and stone terraces)in different uses to increase water availability.The results showed a simple sharing of the female component among beneficiaries,while concrete ponds and cisterns were the most used techniques.Actually,social impacts were noticeable by sharing the same RWH structure and reflected to responsibility skills and role exchange increases.On the other hand,RWH techniques showed a significant economic impact for end users represented by enhancing domestic,agricultural,and recreational activities leading to good profit increase.In addition to food security as output,the most important environmental impact was water wasting prevention,which in turn could be linked to sustainable water management and considered as universal challenge for future generations.
基金This paper is funded by the National Social Science Fund titled“Study on the Legal Issues Concerning the Financial Risks and Security of Shadow Banking”(13CXF081).
文摘It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is equivalent to a process of achieving specific goals or objectives by means of legal regulation.The establishment of a regulatory system for shadow banking should consider the objective and practical needs of the sector,prioritize security as the desired value,and reasonably establish a value system for risk control.