Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (294)

Search Parameters:
Keywords = IP security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 3660 KB  
Review
The Current State of Research on Reputation Evaluation of Network Nodes
by Jingxiong Xu, Lisheng Huang, Fengjun Zhang, Zuoyuan Niu, Kai Shi and Qinghua Li
Electronics 2025, 14(19), 3900; https://doi.org/10.3390/electronics14193900 - 30 Sep 2025
Abstract
As cybersecurity threats continue to escalate, assessing the security and credibility of critical network nodes, such as web servers, email servers, and URLs, becomes pivotal to ensure network integrity. This entails a comprehensive evaluation of the network nodes’ reputation, employing reputation scores as [...] Read more.
As cybersecurity threats continue to escalate, assessing the security and credibility of critical network nodes, such as web servers, email servers, and URLs, becomes pivotal to ensure network integrity. This entails a comprehensive evaluation of the network nodes’ reputation, employing reputation scores as performance indices to instigate bespoke protective measures, thereby alleviating Internet-associated risks. This paper examines the progress in the realm of IP reputation evaluation, providing an exhaustive analysis of reputation assessment methodologies premised on statistical analysis, similarity detection, and machine learning. Further, it underlines their practical applications and effectiveness in bolstering network security. In a head-to-head comparison of the assorted methods, the paper underscores their merits and demerits relative to implementation specifics and performance. In conclusion, it outlines the evolving trends and challenges in network reputation evaluation, providing a scientific framework and valuable technical references for prompt detection and effective mitigation of latent security threats in the network milieu. Full article
Show Figures

Figure 1

36 pages, 4047 KB  
Review
Application of FPGA Devices in Network Security: A Survey
by Abdulmunem A. Abdulsamad and Sándor R. Répás
Electronics 2025, 14(19), 3894; https://doi.org/10.3390/electronics14193894 - 30 Sep 2025
Abstract
Field-Programmable Gate Arrays (FPGAs) are increasingly shaping the future of network security, thanks to their flexibility, parallel processing capabilities, and energy efficiency. In this survey, we examine 50 peer-reviewed studies published between 2020 and 2025, selected from an initial pool of 210 articles [...] Read more.
Field-Programmable Gate Arrays (FPGAs) are increasingly shaping the future of network security, thanks to their flexibility, parallel processing capabilities, and energy efficiency. In this survey, we examine 50 peer-reviewed studies published between 2020 and 2025, selected from an initial pool of 210 articles based on relevance, hardware implementation, and the presence of empirical performance data. These studies encompass a broad range of topics, including cryptographic acceleration, intrusion detection and prevention systems (IDS/IPS), hardware firewalls, and emerging strategies that incorporate artificial intelligence (AI) and post-quantum cryptography (PQC). Our review focuses on five major application areas: cryptographic acceleration, intrusion detection and prevention systems (IDS/IPS), hardware firewalls, and emerging strategies involving artificial intelligence (AI) and post-quantum cryptography (PQC). We propose a structured taxonomy that organises the field by technical domain and challenge, and compare solutions in terms of scalability, resource usage, and real-world performance. Beyond summarising current advances, we explore ongoing limitations—such as hardware constraints, integration complexity, and the lack of standard benchmarking. We also outline future research directions, including low-power cryptographic designs, FPGA–AI collaboration for detecting zero-day attacks, and efficient PQC implementations. This survey aims to offer both a clear overview of recent progress and a valuable roadmap for researchers and engineers working toward secure, high-performance FPGA-based systems. Full article
Show Figures

Figure 1

24 pages, 1641 KB  
Article
Intellectual Property Protection Through Blockchain: Introducing the Novel SmartRegistry-IP for Secure Digital Ownership
by Abeer S. Al-Humaimeedy
Future Internet 2025, 17(10), 444; https://doi.org/10.3390/fi17100444 - 29 Sep 2025
Abstract
The rise of digital content has made the need for reliable and practical intellectual property (IP) management systems more critical than ever. Most traditional IP systems are prone to issues such as delays, inefficiency, and data security breaches. This paper introduces SmartRegistry-IP, a [...] Read more.
The rise of digital content has made the need for reliable and practical intellectual property (IP) management systems more critical than ever. Most traditional IP systems are prone to issues such as delays, inefficiency, and data security breaches. This paper introduces SmartRegistry-IP, a system developed to simplify the registration, licensing, and transfer of intellectual property assets in a secure and scalable decentralized environment. By utilizing the InterPlanetary File System (IPFS) for decentralized storage, SmartRegistry-IP achieves a low storage latency of 300 milliseconds, outperforming both cloud storage (500 ms) and local storage (700 ms). The system also supports a high transaction throughput of 120 transactions per second. Through the use of smart contracts, licensing agreements are automatically and securely enforced, reducing the need for intermediaries and lowering operational costs. Additionally, the proof-of-work process verifies all transactions, ensuring higher security and maintaining data consistency. The platform integrates an intuitive graphical user interface that enables seamless asset uploads, license management, and analytics visualization in real time. SmartRegistry-IP demonstrates superior efficiency compared to traditional systems, achieving a blockchain delay of 300 ms, which is half the latency of standard systems, averaging 600 ms. According to this study, adopting SmartRegistry-IP provides IP organizations with enhanced security and transparent management, ensuring they can overcome operational challenges regardless of their size. As a result, the use of blockchain for intellectual property management is expected to increase, helping maintain precise records and reducing time spent on online copyright registration. Full article
Show Figures

Figure 1

29 pages, 3651 KB  
Article
YOLO-RP: A Lightweight and Efficient Detection Method for Small Rice Pests in Complex Field Environments
by Xiang Yang, Qi He, Xiaolan Xie and Minggang Dong
Symmetry 2025, 17(10), 1598; https://doi.org/10.3390/sym17101598 - 25 Sep 2025
Abstract
Accurate and efficient pest monitoring in complex rice field environments is vital for food security. Existing detection methods often struggle with small targets and high computational redundancy, limiting deployment on resource-constrained edge devices. To address these issues, we propose YOLO-RP, a lightweight and [...] Read more.
Accurate and efficient pest monitoring in complex rice field environments is vital for food security. Existing detection methods often struggle with small targets and high computational redundancy, limiting deployment on resource-constrained edge devices. To address these issues, we propose YOLO-RP, a lightweight and efficient rice pest detection method based on YOLO11n. YOLO-RP reduces model complexity while maintaining detection accuracy. The model removes the redundant P5 detection head and introduces a high-resolution P2 head to enhance small-object detection. A lightweight partial convolution detection head (LPCHead) decouples task branches and shares feature extraction, reducing redundancy and boosting performance. The re-parameterizable DBELCSP module strengthens feature representation and robustness while cutting parameters and computation. Wavelet pooling preserves essential edge and texture information during downsampling, improving accuracy under complex backgrounds. Experiments show that YOLO-RP achieves a precision of 90.62%, recall of 87.38%, mAP@0.5 of 90.99%, and mAP@0.5:0.95 of 63.84%, while reducing parameters, GFLOPs, and model size by 61.3%, 50.8%, and 49.1% to 1.00 M, 3.1, and 2.8 MB. Cross-dataset tests on Common Rice Pests (Philippines), IP102, and Pest24 confirm strong robustness and generalization. On NVIDIA Jetson Nano, YOLO-RP attains 20.8 FPS—66.4% faster than the baseline—validating its potential for edge deployment. These results indicate that YOLO-RP provides an effective solution for real-time rice pest detection in complex, resource-limited environments. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

15 pages, 2044 KB  
Article
Assessing Spectral Reflectance in African Smallholder Cereal Farms Using Sentinel-2 Imagery
by Aicha Biaou, Steve Phillips, Ivan Adolwa, Jean Sogbedji, Mouna Mechri and Basil Kavishe
Remote Sens. 2025, 17(18), 3135; https://doi.org/10.3390/rs17183135 - 10 Sep 2025
Viewed by 394
Abstract
Achieving food security in Africa requires the sustainable intensification of cereal production, particularly for wheat, rice, and maize, which form the foundation of daily caloric intake in Africa. Smallholder farmers, who dominate cereal production in Africa, face challenges such as low productivity, limited [...] Read more.
Achieving food security in Africa requires the sustainable intensification of cereal production, particularly for wheat, rice, and maize, which form the foundation of daily caloric intake in Africa. Smallholder farmers, who dominate cereal production in Africa, face challenges such as low productivity, limited resources, and varying climatic conditions. Remote sensing, specifically through Sentinel-2 satellite imagery, offers a cost-effective method to monitor and improve farming practices. This study evaluates the possibility of extracting spectral reflectance curves of cereal crops from Sentinel-2 imagery across 68 smallholder farms in Togo, Tunisia, and Tanzania from 2021 to 2023. The farms ranged in size from 1 to 2 ha. We also assessed the separability of reflectance values following improved management practices (IPs), which included optimized seeding, fertilization, and pest control, and traditional farmers’ practices (FPs), which are typically characterized by inconsistent plant spacing and sub-optimal fertilization and pest management. Additionally, we analyzed regional variability in reflectance values to understand how climatic and management differences affect crop performance. Results showed that Sentinel-2 successfully captured spectral reflectance curves in all the countries and delineated management practice differences in Togo and Tunisia. Full article
(This article belongs to the Section Remote Sensing in Agriculture and Vegetation)
Show Figures

Figure 1

20 pages, 13905 KB  
Article
Dehydrin Protein TaCOR410 Improves Drought Resistance of Wheat Through Autophagy
by Mei Yan, Hua-Dong Song, Jia-Lian Wei, Kai-Yong Fu, Gang Li, Yong-Bo Li and Cheng Li
Plants 2025, 14(17), 2726; https://doi.org/10.3390/plants14172726 - 2 Sep 2025
Viewed by 669
Abstract
Drought seriously affects wheat yield; it is therefore important to study the molecular mechanism of wheat resistance to drought stress to ensure national food security. Plants can remove harmful substances through autophagy, thus improving their drought resistance. The results of previous studies have [...] Read more.
Drought seriously affects wheat yield; it is therefore important to study the molecular mechanism of wheat resistance to drought stress to ensure national food security. Plants can remove harmful substances through autophagy, thus improving their drought resistance. The results of previous studies have shown that autophagy is involved in the drought stress response; however, the molecular mechanism of autophagy in response to drought stress has yet to be elucidated. In this study, molecular biological methods such as immunohistochemistry, Co-Immunoprecipitation (Co-IP), and pull-down were used to explain the molecular mechanism of autophagy in response to drought stress at the protein level. We found that a dehydrin protein called cold-regulated 410 (TaCOR410) interacts with autophagy-related 8 (TaATG8, a key protein of wheat autophagy). TaCOR410 interacted with TaATG8 through its ATG8-interacting motif (AIM), and interaction was inhibited after mutation of the AIM. Interference with TaCOR410 inhibited autophagy and reduced the drought resistance of wheat. In contrast, transient transfection of TaCOR410 promoted autophagy. In wheat, overexpression of TaATG8 improved the drought resistance of wheat. Following interference with TaATG5, TaATG7 inhibited autophagy and reduced the drought resistance of wheat. From the above results, it is evident that autophagy can improve the drought resistance of wheat and can respond to drought stress through the interaction of TaCOR410 with TaATG8. Full article
(This article belongs to the Section Plant Molecular Biology)
Show Figures

Figure 1

17 pages, 1149 KB  
Article
IP Spoofing Detection Using Deep Learning
by İsmet Kaan Çekiş, Buğra Ayrancı, Fezayim Numan Salman and İlker Özçelik
Appl. Sci. 2025, 15(17), 9508; https://doi.org/10.3390/app15179508 - 29 Aug 2025
Viewed by 601
Abstract
IP spoofing is a critical component in many cyberattacks, enabling attackers to evade detection and conceal their identities. This study rigorously compares eight deep learning models—LSTM, GRU, CNN, MLP, DNN, RNN, ResNet1D, and xLSTM—for their efficacy in detecting IP spoofing attacks. Overfitting was [...] Read more.
IP spoofing is a critical component in many cyberattacks, enabling attackers to evade detection and conceal their identities. This study rigorously compares eight deep learning models—LSTM, GRU, CNN, MLP, DNN, RNN, ResNet1D, and xLSTM—for their efficacy in detecting IP spoofing attacks. Overfitting was mitigated through techniques such as dropout, early stopping, and normalization. Models were trained using binary cross-entropy loss and the Adam optimizer. Performance was assessed via accuracy, precision, recall, F1 score, and inference time, with each model executed a total of 15 times to account for stochastic variability. Results indicate a powerful performance across all models, with LSTM and GRU demonstrating superior detection efficacy. After ONNX conversion, the MLP and DNN models retained their performance while achieving significant reductions in inference time, miniaturized model sizes, and platform independence. These advancements facilitated the effective utilization of the developed systems in real-time network security applications. The comprehensive performance metrics presented are crucial for selecting optimal IP spoofing detection strategies tailored to diverse application requirements, serving as a valuable reference for network anomaly monitoring and targeted attack detection. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

15 pages, 3236 KB  
Article
Analysis of OpenCV Security Vulnerabilities in YOLO v10-Based IP Camera Image Processing Systems for Disaster Safety Management
by Do-Yoon Jung and Nam-Ho Kim
Electronics 2025, 14(16), 3216; https://doi.org/10.3390/electronics14163216 - 13 Aug 2025
Viewed by 741
Abstract
This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the use of AI-based real-time image analysis technology [...] Read more.
This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the use of AI-based real-time image analysis technology in disaster response and safety management systems has been increasing, but it has been confirmed that open source-based object detection frameworks and security vulnerabilities in IP cameras can pose serious threats to the reliability and safety of actual systems. In this study, the structure of an image processing system that applies the latest YOLO v10 algorithm was analyzed, and major security threats (e.g., remote code execution, denial of service, data tampering, authentication bypass, etc.) that might occur during the IP camera image collection and processing process using OpenCV were identified. In particular, the possibility of attacks due to insufficient verification of external inputs (model files, configuration files, image data, etc.), failure to set an initial password, and insufficient encryption of network communication sections were presented with cases. These problems could lead to more serious results in mission-critical environments such as disaster safety management. Full article
Show Figures

Figure 1

20 pages, 1527 KB  
Article
Trends in Patent Applications for Technologies in the Automotive Industry: Applications of Deep Learning and Machine Learning
by ChoongChae Woo and Junbum Park
AI 2025, 6(8), 185; https://doi.org/10.3390/ai6080185 - 13 Aug 2025
Viewed by 1390
Abstract
This study investigates global innovation trends in machine learning (ML) and deep learning (DL) technologies within the automotive sector through a patent analysis of 5314 applications filed between 2005 and 2022 across the five major patent offices (IP5). Using Cooperative Patent Classification (CPC) [...] Read more.
This study investigates global innovation trends in machine learning (ML) and deep learning (DL) technologies within the automotive sector through a patent analysis of 5314 applications filed between 2005 and 2022 across the five major patent offices (IP5). Using Cooperative Patent Classification (CPC) codes and keyword analysis, we identify seven sub-technology domains and examine both geographical and corporate patenting strategies. Our findings show that the United States dominates in overall filings, while Japan demonstrates a notably high share of triadic patents, which reflects a strong global-reach strategy. Patent activity is heavily concentrated in vehicle control and infrastructure traffic control, with emerging growth observed in battery management and occupant analytics. In contrast, security-related technologies remain underrepresented, indicating a potential blind spot in current innovation efforts. Corporate strategies diverge markedly; for example, some firms, such as Toyota and Bosch, pursue balanced tri-regional protection, whereas others, including Ford and GM, focus on dual-market coverage in the United States and China. These patterns illustrate how market priorities, regulatory environments, and technological objectives influence patenting behavior. By mapping the technological and strategic landscape of ML/DL innovation in the automotive industry, this study provides actionable insights for industry practitioners seeking to optimize intellectual property portfolios and for policymakers aiming to address gaps such as automotive cybersecurity in future R&D agendas. Full article
Show Figures

Figure 1

36 pages, 3172 KB  
Review
Indoor Positioning Systems as Critical Infrastructure: An Assessment for Enhanced Location-Based Services
by Tesfay Gidey Hailu, Xiansheng Guo and Haonan Si
Sensors 2025, 25(16), 4914; https://doi.org/10.3390/s25164914 - 8 Aug 2025
Viewed by 1044
Abstract
As the demand for context-aware services in smart environments continues to rise, Indoor Positioning Systems (IPSs) have evolved from auxiliary technologies into indispensable components of mission-critical infrastructure. This paper presents a comprehensive, multidimensional evaluation of IPSs through the lens of critical infrastructure, addressing [...] Read more.
As the demand for context-aware services in smart environments continues to rise, Indoor Positioning Systems (IPSs) have evolved from auxiliary technologies into indispensable components of mission-critical infrastructure. This paper presents a comprehensive, multidimensional evaluation of IPSs through the lens of critical infrastructure, addressing both their technical capabilities and operational limitations across dynamic indoor environments. A structured taxonomy of IPS technologies is developed based on sensing modalities, signal processing techniques, and system architectures. Through an in-depth trade-off analysis, the study highlights the inherent tensions between accuracy, energy efficiency, scalability, and deployment cost—revealing that no single technology meets all performance criteria across application domains. A novel evaluation framework is introduced that integrates traditional performance metrics with emerging requirements such as system resilience, interoperability, and ethical considerations. Empirical results from long-term Wi-Fi fingerprinting experiments demonstrate the impact of temporal signal fluctuations, heterogeneity features, and environmental dynamics on localization accuracy. The proposed adaptive algorithm consistently outperforms baseline models in terms of Mean Absolute Error (MAE) and Root Mean Square Error (RMSE), confirming its robustness under evolving conditions. Furthermore, the paper explores the role of collaborative and infrastructure-free positioning systems as a pathway to achieving scalable and resilient localization in healthcare, logistics, and emergency services. Key challenges including privacy, standardization, and real-world adaptability are identified, and future research directions are proposed to guide the development of context-aware, interoperable, and secure IPS architectures. By reframing IPSs as foundational infrastructure, this work provides a critical roadmap for designing next-generation indoor localization systems that are technically robust, operationally viable, and ethically grounded. Full article
(This article belongs to the Special Issue Indoor Positioning Technologies for Internet-of-Things)
Show Figures

Figure 1

26 pages, 2653 KB  
Article
Attacker Attribution in Multi-Step and Multi-Adversarial Network Attacks Using Transformer-Based Approach
by Romina Torres and Ana García
Appl. Sci. 2025, 15(15), 8476; https://doi.org/10.3390/app15158476 - 30 Jul 2025
Viewed by 513
Abstract
Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and [...] Read more.
Recent studies on network intrusion detection using deep learning primarily focus on detecting attacks or classifying attack types, but they often overlook the challenge of attributing each attack to its specific source among many potential adversaries (multi-adversary attribution). This is a critical and underexplored issue in cybersecurity. In this study, we address the problem of attacker attribution in complex, multi-step network attack (MSNA) environments, aiming to identify the responsible attacker (e.g., IP address) for each sequence of security alerts, rather than merely detecting the presence or type of attack. We propose a deep learning approach based on Transformer encoders to classify sequences of network alerts and attribute them to specific attackers among many candidates. Our pipeline includes data preprocessing, exploratory analysis, and robust training/validation using stratified splits and 5-fold cross-validation, all applied to real-world multi-step attack datasets from capture-the-flag (CTF) competitions. We compare the Transformer-based approach with a multilayer perceptron (MLP) baseline to quantify the benefits of advanced architectures. Experiments on this challenging dataset demonstrate that our Transformer model achieves near-perfect accuracy (99.98%) and F1-scores (macro and weighted ≈ 99%) in attack attribution, significantly outperforming the MLP baseline (accuracy 80.62%, macro F1 65.05% and weighted F1 80.48%). The Transformer generalizes robustly across all attacker classes, including those with few samples, as evidenced by per-class metrics and confusion matrices. Our results show that Transformer-based models are highly effective for multi-adversary attack attribution in MSNA, a scenario not or under-addressed in the previous intrusion detection systems (IDS) literature. The adoption of advanced architectures and rigorous validation strategies is essential for reliable attribution in complex and imbalanced environments. Full article
(This article belongs to the Special Issue Application of Deep Learning for Cybersecurity)
Show Figures

Figure 1

19 pages, 308 KB  
Article
Caught Between Rights and Vows: The Negative Impacts of U.S. Spousal Reunification Policies on Mixed-Status, Transnational Families with Low “Importability”
by Gina Marie Longo and Ian Almond
Soc. Sci. 2025, 14(7), 442; https://doi.org/10.3390/socsci14070442 - 20 Jul 2025
Viewed by 1469
Abstract
This study examines how U.S. immigration policies enact legal violence and multigenerational punishment through the spousal reunification process, particularly in mixed-status, transnational families. Building on the concept of “deportability,” we introduce “importability” to describe a beneficiary’s potential to secure permanent residency, which varies [...] Read more.
This study examines how U.S. immigration policies enact legal violence and multigenerational punishment through the spousal reunification process, particularly in mixed-status, transnational families. Building on the concept of “deportability,” we introduce “importability” to describe a beneficiary’s potential to secure permanent residency, which varies according to social markers such as race, gender, and region of origin. Drawing from a content analysis of threads on the Immigration Pathways (IP) web forum, we analyze discussions among U.S. citizen petitioners navigating marriage-based green card applications, with a focus on experiences involving administrative processing (AP) (i.e., marriage fraud investigations). Our findings show that couples who do not align with the state’s conception of “proper” family—particularly U.S. citizen women petitioning for Black African partners—face intensified scrutiny, long delays, and burdensome requirements, including DNA tests and surveillance. These bureaucratic obstacles produce prolonged family separation, financial strain, and diminished sense of belonging, especially for children in single-parent households. Through the lens of “importability,” we reveal how legal violence and multigenerational punishment of immigration policies on mixed-status families beyond deportation threats, functioning as a gatekeeping mechanism that disproportionately affects marginalized families. This research highlights the understudied consequences of immigration policies on citizen petitioners and contributes to a broader understanding of inequality in U.S. immigration enforcement. Full article
(This article belongs to the Special Issue Migration, Citizenship and Social Rights)
18 pages, 1059 KB  
Article
Exponential Backoff and Its Security Implications for Safety-Critical OT Protocols over TCP/IP Networks
by Matthew Boeding, Paul Scalise, Michael Hempel, Hamid Sharif and Juan Lopez
Future Internet 2025, 17(7), 286; https://doi.org/10.3390/fi17070286 - 26 Jun 2025
Viewed by 603
Abstract
The convergence of Operational Technology (OT) and Information Technology (IT) networks has become increasingly prevalent with the growth of Industrial Internet of Things (IIoT) applications. This shift, while enabling enhanced automation, remote monitoring, and data sharing, also introduces new challenges related to communication [...] Read more.
The convergence of Operational Technology (OT) and Information Technology (IT) networks has become increasingly prevalent with the growth of Industrial Internet of Things (IIoT) applications. This shift, while enabling enhanced automation, remote monitoring, and data sharing, also introduces new challenges related to communication latency and cybersecurity. Oftentimes, legacy OT protocols were adapted to the TCP/IP stack without an extensive review of the ramifications to their robustness, performance, or safety objectives. To further accommodate the IT/OT convergence, protocol gateways were introduced to facilitate the migration from serial protocols to TCP/IP protocol stacks within modern IT/OT infrastructure. However, they often introduce additional vulnerabilities by exposing traditionally isolated protocols to external threats. This study investigates the security and reliability implications of migrating serial protocols to TCP/IP stacks and the impact of protocol gateways, utilizing two widely used OT protocols: Modbus TCP and DNP3. Our protocol analysis finds a significant safety-critical vulnerability resulting from this migration, and our subsequent tests clearly demonstrate its presence and impact. A multi-tiered testbed, consisting of both physical and emulated components, is used to evaluate protocol performance and the effects of device-specific implementation flaws. Through this analysis of specifications and behaviors during communication interruptions, we identify critical differences in fault handling and the impact on time-sensitive data delivery. The findings highlight how reliance on lower-level IT protocols can undermine OT system resilience, and they inform the development of mitigation strategies to enhance the robustness of industrial communication networks. Full article
Show Figures

Figure 1

22 pages, 1422 KB  
Article
MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism
by Yongzong Lu, Pengfei Liu and Chong Tan
Agronomy 2025, 15(7), 1549; https://doi.org/10.3390/agronomy15071549 - 25 Jun 2025
Cited by 2 | Viewed by 847
Abstract
Agricultural pest detection is critical for crop protection and food security, yet existing methods suffer from low computational efficiency and poor generalization due to imbalanced data distribution, minimal inter-class variations among pest categories, and significant intra-class differences. To address the high computational complexity [...] Read more.
Agricultural pest detection is critical for crop protection and food security, yet existing methods suffer from low computational efficiency and poor generalization due to imbalanced data distribution, minimal inter-class variations among pest categories, and significant intra-class differences. To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. The SDConv module reduces computational costs through depthwise separable convolution and dynamic group convolution while enhancing local feature extraction. The LDSPF module captures multi-scale information via parallel dilated convolutions with spatial attention mechanisms and dual residual connections. The ASCC module improves feature discriminability by establishing an adaptive triple-weight system for global, channel, and spatial semantic responses. The MDF module balances efficiency and multi-scale feature extraction using multi-branch depthwise separable convolution and soft attention-based dynamic weighting. Experimental results demonstrate detection accuracies of 65.4% and 73.9% on the IP102 and Pest24 datasets, respectively, representing improvements of 2% and 1.8% over the original YOLOv11s network. These results establish MA-YOLO as an effective solution for automated agricultural pest monitoring with applications in precision agriculture and crop protection systems. Full article
(This article belongs to the Collection Advances of Agricultural Robotics in Sustainable Agriculture 4.0)
Show Figures

Figure 1

67 pages, 2821 KB  
Review
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
by Khaled Saleh, Dirar Darweesh, Omar Darwish, Eman Hammad and Fathi Amsaad
Computers 2025, 14(7), 251; https://doi.org/10.3390/computers14070251 - 25 Jun 2025
Viewed by 2029
Abstract
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats. For example, software and hardware have become highly susceptible to various threats, like reverse engineering, cloning, tampering, and [...] Read more.
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats. For example, software and hardware have become highly susceptible to various threats, like reverse engineering, cloning, tampering, and IP piracy. While various techniques exist to enhance software and hardware security, including encryption, native code, and secure server-side execution, obfuscation emerges as a preeminent and cost-efficient solution to address these challenges. Obfuscation purposely converts software and hardware to improve complexity for probable adversaries, targeting obscure realization operations while preserving safety and functionality. Former research has commonly engaged features of obfuscation, deobfuscation, and obfuscation detection approaches. A novel departure from conventional research methodologies, this revolutionary comprehensive article reviews these approaches in depth. It explicates the correlations and dynamics among them. Furthermore, it conducts a meticulous comparative analysis, evaluating obfuscation techniques across parameters such as the methodology, testing procedures, efficacy, associated drawbacks, market applicability, and prospects for future enhancement. This review aims to assist organizations in wisely electing obfuscation techniques for firm protection against threats and enhances the strategic choice of deobfuscation and obfuscation detection techniques to recognize vulnerabilities in software and hardware products. This empowerment permits organizations to proficiently treat security risks, guaranteeing secure software and hardware solutions, and improving user satisfaction for maximized profitability. Full article
(This article belongs to the Special Issue Using New Technologies in Cyber Security Solutions (2nd Edition))
Show Figures

Figure 1

Back to TopTop