Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (174)

Search Parameters:
Keywords = Security Operation Center

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 717 KiB  
Article
Advancing Nuclear Energy Governance Through Strategic Pathways for Q-NPT Adoption
by Hassan Qudrat-Ullah
Energies 2025, 18(15), 4040; https://doi.org/10.3390/en18154040 - 29 Jul 2025
Viewed by 151
Abstract
This paper proposes a strategic framework to enhance nuclear energy governance by advancing the Qudrat-Ullah Nuclear Peace and Trust (Q-NPT) framework. Designed to complement existing treaties such as the Nuclear Non-Proliferation Treaty (NPT) and International Atomic Energy Agency (IAEA) safeguards, Q-NPT integrates principles [...] Read more.
This paper proposes a strategic framework to enhance nuclear energy governance by advancing the Qudrat-Ullah Nuclear Peace and Trust (Q-NPT) framework. Designed to complement existing treaties such as the Nuclear Non-Proliferation Treaty (NPT) and International Atomic Energy Agency (IAEA) safeguards, Q-NPT integrates principles of equity, transparency, and trust to address persistent governance challenges. The framework emphasizes sustainable nuclear technology access, multilateral cooperation, and integration with global energy transition goals. Through an analysis of institutional, economic, technological, and geopolitical barriers, the study outlines actionable pathways for adoption, including legal harmonization, differentiated financial instruments, and deployment of advanced verification technologies such as blockchain, artificial intelligence (AI), and remote monitoring. A phased implementation timeline is presented, enabling adaptive learning and stakeholder engagement over short-, medium-, and long-term horizons. Regional case studies, including Serbia and Latin America, demonstrate the framework’s applicability in diverse contexts. By linking nuclear policy to broader climate, energy equity, and global security objectives, Q-NPT offers an operational and inclusive roadmap for future-ready governance. This approach contributes to the literature on energy systems transformation by situating nuclear governance within a sustainability-oriented, trust-centered paradigm. Full article
(This article belongs to the Section C: Energy Economics and Policy)
Show Figures

Figure 1

6 pages, 229 KiB  
Proceeding Paper
Reliability of Electro-Power Equipment Determined by Data in Its Operation and Storage
by Nikolay Gueorguiev, Atanas Nachev, Yavor Boychev, Konstantin Nesterov and Svetlana Yaneva
Eng. Proc. 2025, 100(1), 5; https://doi.org/10.3390/engproc2025100005 - 1 Jul 2025
Viewed by 184
Abstract
The reliability of the electro-power equipment of electrical power transmission systems is essential in ensuring an uninterrupted power supply with the necessary voltage and frequency stability. This is especially important when performing lengthy procedures requiring the serviceability of the electrical equipment used, such [...] Read more.
The reliability of the electro-power equipment of electrical power transmission systems is essential in ensuring an uninterrupted power supply with the necessary voltage and frequency stability. This is especially important when performing lengthy procedures requiring the serviceability of the electrical equipment used, such as those related to foundries and metallurgical processes, or with the processes of testing complex means for the remote control of electromagnetic radiation within the implementation of the Sustainable development of the Competence Center “Quantum Communication, Intelligent Security Systems and Risk Management” (QUASAR) Project, funded with the participation of the EU under the “Research, Innovation and Digitalization for Smart Transformation” Program 2021.2027 according to procedure BG16RFPR002-1.014. One of the main issues in this case is related to the availability of information regarding the technical condition of the deployed or reserve energy resources. In this connection, this study proposes methods for determining the quantity of operational equipment that is either in use or in storage, based on the reliability testing of a representative sample of it. Full article
30 pages, 2240 KiB  
Systematic Review
Mapping the Landscape of Blockchain for Transparent and Sustainable Supply Chains: A Bibliometric and Thematic Analysis
by Félix Díaz, Rafael Liza and Nhell Cerna
Logistics 2025, 9(3), 86; https://doi.org/10.3390/logistics9030086 - 30 Jun 2025
Viewed by 691
Abstract
Background: The increasing complexity of global supply chains has intensified the demand for transparency, traceability, security, and sustainability in logistics and operations. Blockchain technology enables decentralized, immutable frameworks that improve data integrity, automate transactions via smart contracts, and integrate seamlessly with the IoT [...] Read more.
Background: The increasing complexity of global supply chains has intensified the demand for transparency, traceability, security, and sustainability in logistics and operations. Blockchain technology enables decentralized, immutable frameworks that improve data integrity, automate transactions via smart contracts, and integrate seamlessly with the IoT and AI. Methods: This bibliometric review analyzes 559 peer-reviewed publications retrieved from Scopus and Web of Science using a PRISMA-guided protocol. Data were processed with Bibliometrix and Biblioshiny to examine scientific production, contributing institutions, author countries, collaboration patterns, thematic clusters, and keyword evolution. Results: The analysis reveals a 400% increase in publications after 2020, with China, India, and the USA leading in output but with limited international collaboration. Keyword co-occurrence and thematic mapping reveal dominant topics, including smart contracts, food supply chain traceability, and sustainability, as well as emerging themes such as decentralization, privacy, and the circular economy. Conclusions: The field is marked by interdisciplinary growth, yet it remains thematically and geographically fragmented. This review maps the intellectual structure of blockchain-enabled sustainable supply chains, offering insights for policymakers, developers, and industry leaders and outlining future research avenues centered on global cooperation, platform efficiency, and ethical and regulatory dimensions. Full article
(This article belongs to the Special Issue Current & Emerging Trends to Achieve Sustainable Supply Trends)
Show Figures

Figure 1

10 pages, 1106 KiB  
Article
Comparison of Surgical Outcomes in Robot-Assisted Nipple Sparing Mastectomy with Conventional Open Nipple Sparing Mastectomy: A Single Center Experience
by Ji Young You, Young Min Kim, Eun-shin Lee, Haemin Lee and Seung Pil Jung
J. Clin. Med. 2025, 14(13), 4608; https://doi.org/10.3390/jcm14134608 - 29 Jun 2025
Viewed by 517
Abstract
Background: A surgical therapy for breast cancer, robot-assisted nipple-sparing mastectomy (RANSM) has gained popularity because it may offer better cosmetic results than traditional nipple-sparing mastectomy (CNSM). Data regarding RANSM’s viability and security are still scarce, nevertheless. Comparing the surgical results of RANSM [...] Read more.
Background: A surgical therapy for breast cancer, robot-assisted nipple-sparing mastectomy (RANSM) has gained popularity because it may offer better cosmetic results than traditional nipple-sparing mastectomy (CNSM). Data regarding RANSM’s viability and security are still scarce, nevertheless. Comparing the surgical results of RANSM and CNSM in a single-center experience was the goal of this study. Methods: 57 patients who had nipple-sparing mastectomy procedures performed at our facility between January and December 2021 were included in this retrospective research. Of them, 49 patients had CNSM, and 8 patients had RANSM. Analysis was performed on pain scores, length of hospital stay, postoperative complications, patient demographics, and operating time. Results: The mean total operative time was longer for RANSM group was 148 min compared to 117 min for the CNSM group; however, this difference was not statistically significant (p = 0.083). The mean duration of hospital stay was shorter for the RANSM group than for the CNSM group (10.75 days vs. 2.92 days, respectively; p = 0.302). Both groups had similar pain scores on postoperative day 3 (RANSM: 3.50, CNSM: 3.54, p = 0.926). No patient in the RANSM group received adjuvant chemotherapy or radiotherapy, whereas 32.6% of patients in the CNSM group received chemotherapy. The RANSM and CNSM groups experienced complications at rates of 12.5% and 18.4%, respectively (p = 0.571). In contrast to 14.3% in the CNSM group, there were no documented incidences of skin necrosis in the RANSM group. Conclusions: RANSM demonstrated comparable safety to CNSM with potential benefits, including a shorter hospital stay and lower complication rates. These findings support the feasibility of RANSM, particularly in patients prioritizing cosmetic outcomes. To validate these initial findings, more research with larger cohorts and longer follow-up times is necessary. Full article
(This article belongs to the Special Issue Breast Reconstruction: The Current Environment and Future Directions)
Show Figures

Graphical abstract

30 pages, 4883 KiB  
Article
Cyber-Secure IoT and Machine Learning Framework for Optimal Emergency Ambulance Allocation
by Jonghyuk Kim and Sewoong Hwang
Appl. Sci. 2025, 15(13), 7156; https://doi.org/10.3390/app15137156 - 25 Jun 2025
Viewed by 402
Abstract
Optimizing ambulance deployment is a critical task in emergency medical services (EMS), as it directly affects patient outcomes and system efficiency. This study proposes a cyber-secure, machine learning-based framework for predicting region-specific ambulance allocation and response times across South Korea. The model integrates [...] Read more.
Optimizing ambulance deployment is a critical task in emergency medical services (EMS), as it directly affects patient outcomes and system efficiency. This study proposes a cyber-secure, machine learning-based framework for predicting region-specific ambulance allocation and response times across South Korea. The model integrates heterogeneous datasets—including demographic profiles, transportation indices, medical infrastructure, and dispatch records from 229 EMS centers—and incorporates real-time IoT streams such as traffic flow and geolocation data to enhance temporal responsiveness. Supervised regression algorithms—Random Forest, XGBoost, and LightGBM—were trained on 2061 center-month observations. Among these, Random Forest achieved the best balance of accuracy and interpretability (MSE = 0.05, RMSE = 0.224). Feature importance analysis revealed that monthly patient transfers, dispatch variability, and high-acuity case frequencies were the most influential predictors, underscoring the temporal and contextual complexity of EMS demand. To support policy decisions, a Lasso-based simulation tool was developed, enabling dynamic scenario testing for optimal ambulance counts and dispatch time estimates. The model also incorporates the coefficient of variation (CV) of workload intensity as a performance metric to guide long-term capacity planning and equity assessment. All components operate within a cyber-secure architecture that ensures end-to-end encryption of sensitive EMS and IoT data, maintaining compliance with privacy regulations such as GDPR and HIPAA. By integrating predictive analytics, real-time data, and operational simulation within a secure framework, this study offers a scalable and resilient solution for data-driven EMS resource planning. Full article
Show Figures

Figure 1

25 pages, 7400 KiB  
Article
OT Control and Integration of Mobile Robotic Networks
by Marco Mărieș and Mihai Olimpiu Tătar
Electronics 2025, 14(13), 2531; https://doi.org/10.3390/electronics14132531 - 22 Jun 2025
Viewed by 701
Abstract
This paper introduces a configuration and integration model for mobile robots deployed in emergency and special operations scenarios. The proposed method is designed for implementation within the operational technology (OT) domain, enforcing security protocols that ensure both data encryption and network isolation. The [...] Read more.
This paper introduces a configuration and integration model for mobile robots deployed in emergency and special operations scenarios. The proposed method is designed for implementation within the operational technology (OT) domain, enforcing security protocols that ensure both data encryption and network isolation. The primary objective is to establish a dedicated operational environment encompassing a command and control center where the robotic network server resides, alongside real-time data storage from network clients and remote control of field-deployed mobile robots. Building on this infrastructure, operational strategies are developed to enable an efficient robotic response in critical situations. By leveraging remote robotic networks, significant benefits are achieved in terms of personnel safety and mission efficiency, minimizing response time and reducing the risk of injury to human operators during hazardous interventions. Unlike generic IoT or IoRT systems, this work focuses on secure robotic integration within segmented OT infrastructures. The technologies employed create a synergistic system that ensures data integrity, encryption, and safe user interaction through a web-based interface. Additionally, the system includes mobile robots and a read-only application positioned within a demilitarized zone (DMZ), allowing for secure data monitoring without granting control access to the robotic network, thus enabling cyber-physical isolation and auditability. Full article
(This article belongs to the Special Issue Modeling and Control of Mobile Robots)
Show Figures

Figure 1

25 pages, 1858 KiB  
Article
Improving Threat Detection in Wazuh Using Machine Learning Techniques
by Samir Achraf Chamkar, Mounia Zaydi, Yassine Maleh and Noreddine Gherabi
J. Cybersecur. Priv. 2025, 5(2), 34; https://doi.org/10.3390/jcp5020034 - 14 Jun 2025
Viewed by 1408
Abstract
The increasing complexity and sophistication of cyber threats underscore the critical need for advanced threat detection mechanisms within Security Operations Centers (SOCs) to effectively mitigate risks and enhance cybersecurity resilience. This study enhances the capabilities of Wazuh, an open-source Security Information and Event [...] Read more.
The increasing complexity and sophistication of cyber threats underscore the critical need for advanced threat detection mechanisms within Security Operations Centers (SOCs) to effectively mitigate risks and enhance cybersecurity resilience. This study enhances the capabilities of Wazuh, an open-source Security Information and Event Management (SIEM) system, by addressing its primary limitation: high false-positive rates in rule-based detection. We propose a hybrid approach that integrates machine learning (ML) techniques—specifically, Random Forest (RF) and DBSCAN—into Wazuh’s detection pipeline to improve both accuracy and operational efficiency. Experimental results show that RF achieves 97.2% accuracy, while DBSCAN yields 91.06% accuracy with a false-positive rate of 0.0821, significantly improving alert quality. Real-time deployment requirements are rigorously evaluated, with all models maintaining end-to-end processing latencies below 100 milliseconds and 95% of events processed within 500 milliseconds. Scalability testing confirms linear performance up to 500 events per second, with an average processing latency of 45 milliseconds under typical SOC workloads. This integration demonstrates a practical, resource-efficient solution for enhancing real-time threat detection in modern cybersecurity environments. Full article
(This article belongs to the Special Issue Cybersecurity Risk Prediction, Assessment and Management)
Show Figures

Figure 1

34 pages, 8462 KiB  
Article
Enhancing Power Quality in a PV/Wind Smart Grid with Artificial Intelligence Using Inverter Control and Artificial Neural Network Techniques
by Musawenkosi Lethumcebo Thanduxolo Zulu, Rudiren Sarma and Remy Tiako
Electricity 2025, 6(2), 35; https://doi.org/10.3390/electricity6020035 - 13 Jun 2025
Viewed by 560
Abstract
Power systems need to meet the ever-increasing demand for higher quality and reliability of electricity in distribution systems while remaining sustainable, secure, and economical. The globe is moving toward using renewable energy sources to provide electricity. An evaluation of the influence of artificial [...] Read more.
Power systems need to meet the ever-increasing demand for higher quality and reliability of electricity in distribution systems while remaining sustainable, secure, and economical. The globe is moving toward using renewable energy sources to provide electricity. An evaluation of the influence of artificial intelligence (AI) on the accomplishment of SDG7 (affordable and clean energy) is necessary in light of AI’s development and expanding impact across numerous sectors. Microgrids are gaining popularity due to their ability to facilitate distributed energy resources (DERs) and form critical client-centered integrated energy coordination. However, it is a difficult task to integrate, coordinate, and control multiple DERs while also managing the energy transition in this environment. To achieve low operational costs and high reliability, inverter control is critical in distributed generation (DG) microgrids, and the application of artificial neural networks (ANNs) is vital. In this paper, a power management strategy (PMS) based on Inverter Control and Artificial Neural Network (ICANN) technique is proposed for the control of DC–AC microgrids with PV-Wind hybrid systems. The proposed combined control strategy aims to improve power quality enhancement. ensuring access to affordable, reliable, sustainable, and modern energy for all. Additionally, a review of the rising role and application of AI in the use of renewable energy to achieve the SDGs is performed. MATLAB/SIMULINK is used for simulations in this study. The results from the measures of the inverter control, m, VL-L, and Vph_rms, reveal that the power generated from the hybrid microgrid is reliable and its performance is capable of providing power quality enhancement in microgrids through controlling the inverter side of the system. The technique produced satisfactory results and the PV/wind hybrid microgrid system revealed stability and outstanding performance. Full article
(This article belongs to the Special Issue Recent Advances in Power and Smart Grids)
Show Figures

Figure 1

32 pages, 571 KiB  
Review
Digital Twin of the European Electricity Grid: A Review of Regulatory Barriers, Technological Challenges, and Economic Opportunities
by Bo Nørregaard Jørgensen and Zheng Grace Ma
Appl. Sci. 2025, 15(12), 6475; https://doi.org/10.3390/app15126475 - 9 Jun 2025
Viewed by 1127
Abstract
The European Union (EU) is advancing a digital twin of its electricity grid as a flagship initiative to accelerate the dual transitions of decarbonization and digitalization. By creating a real-time virtual replica of the EU-27 power network, policymakers and industry stakeholders aim to [...] Read more.
The European Union (EU) is advancing a digital twin of its electricity grid as a flagship initiative to accelerate the dual transitions of decarbonization and digitalization. By creating a real-time virtual replica of the EU-27 power network, policymakers and industry stakeholders aim to enhance grid efficiency, resilience, and renewable energy integration. This review provides a comprehensive analysis of the three critical dimensions shaping the digital twin’s development: (1) regulatory barriers, including fragmented policies, inconsistent data governance frameworks, and the need for harmonized standards and incentives across member states; (2) technological challenges, such as achieving interoperability, integrating real-time data, developing robust cybersecurity measures, and ensuring scalable infrastructure; and (3) economic opportunities, centered on potential cost savings, optimized asset management, new flexibility services, and pathways for innovation and investment. Drawing on European Commission policy documents, regulatory reports, academic studies, and industry projects like the Horizon Europe TwinEU initiative, this review highlights that significant groundwork has been laid to prototype and federate local grid twins into a cohesive continental system. However, achieving the full potential of a pan-European digital twin will require additional regulatory harmonization, more mature data-sharing protocols, and sustained financial commitment. This review concludes with an outlook on the strategic convergence of policy reforms, collaborative R&D, and targeted funding, emphasizing how institutional momentum, federated architectures, and cross-sector integration are advancing a secure, resilient, and economically viable digital twin that is envisioned as a foundational layer in the operational and planning infrastructure of Europe’s future electricity system. Full article
(This article belongs to the Special Issue Holistic Approaches in Artificial Intelligence and Renewable Energy)
Show Figures

Figure 1

21 pages, 11588 KiB  
Article
Optimization of Airflow Organization in Bidirectional Air Supply Data Centers in China
by Yixin Wu, Junwei Yan and Xuan Zhou
Appl. Sci. 2025, 15(10), 5711; https://doi.org/10.3390/app15105711 - 20 May 2025
Viewed by 420
Abstract
Optimizing airflow organization is essential for ensuring the energy-efficient and secure operation of data centers. To address common airflow distribution issues in air-cooled systems, such as uneven air supply and cooling capacity imbalance, this study investigates a bidirectional airflow data center room located [...] Read more.
Optimizing airflow organization is essential for ensuring the energy-efficient and secure operation of data centers. To address common airflow distribution issues in air-cooled systems, such as uneven air supply and cooling capacity imbalance, this study investigates a bidirectional airflow data center room located in a hot-summer and warm-winter region. A computational fluid dynamics (CFD) model was developed based on field-measured data to analyze the airflow distribution characteristics and evaluate the existing thermal conditions. Three optimization strategies were systematically examined: (1) Installation of rack blanking panels, (2) cold aisle containment with varying degrees of closure, and (3) combined implementations of these measures. Performance evaluation was conducted using three thermal metrics: the Return Temperature Index (RTI), Supply Heat Index (SHI), and Rack Cooling Index (RCIHI). The results demonstrate that among individual optimization strategies, rack blanking panels achieved the most significant improvement, reducing SHI by 42.61% while effectively eliminating local hotspots. For combined optimization strategies, the rack blanking panels and fully contained cold aisle containment showed optimal performance, improving cooling utilization efficiency by 88.26%. The optimal retrofit solution for this data center is the rack blanking panels with fully contained cold aisle containment. When considering budget constraints, the secondary option would be rack blanking panels with cold aisle top-only containment. These findings provide practical guidance for energy efficiency improvements in similar data center environments. Full article
Show Figures

Figure 1

25 pages, 1515 KiB  
Article
Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine
by Hyang Jin Lee, Sangjin Kook, Keunok Kim, Jihyeon Ryu, Hakjun Lee, Youngsook Lee and Dongho Won
Sensors 2025, 25(9), 2894; https://doi.org/10.3390/s25092894 - 3 May 2025
Viewed by 475
Abstract
Medical Internet of Things (IoT) systems are crucial in monitoring the health status of patients. Recently, telemedicine services that manage patients remotely by receiving real-time health information from IoT devices attached to or carried by them have experienced significant growth. A primary concern [...] Read more.
Medical Internet of Things (IoT) systems are crucial in monitoring the health status of patients. Recently, telemedicine services that manage patients remotely by receiving real-time health information from IoT devices attached to or carried by them have experienced significant growth. A primary concern in medical IoT services is ensuring the security of transmitted information and protecting patient privacy. To address these challenges, various authentication schemes have been proposed. We analyze the authentication scheme by Wang et al. and identified several limitations. Specifically, an attacker can exploit information stored in an IoT device to generate an illegitimate session key. Additionally, despite using a cloud center, the scheme lacks efficiency. To overcome these limitations, we propose an authentication and key distribution scheme that incorporates a physically unclonable function (PUF) and public-key computation. To enhance efficiency, computationally intensive public-key operations are performed exclusively in the cloud center. Furthermore, our scheme addresses privacy concerns by employing a temporary ID for IoT devices used to identify patients. We validate the security of our approach using the formal security analysis tool ProVerif. Full article
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2025)
Show Figures

Figure 1

35 pages, 1615 KiB  
Article
Toward Robust Security Orchestration and Automated Response in Security Operations Centers with a Hyper-Automation Approach Using Agentic Artificial Intelligence
by Ismail, Rahmat Kurnia, Zilmas Arjuna Brata, Ghitha Afina Nelistiani, Shinwook Heo, Hyeongon Kim and Howon Kim
Information 2025, 16(5), 365; https://doi.org/10.3390/info16050365 - 29 Apr 2025
Viewed by 2925
Abstract
The evolving landscape of cybersecurity threats demands the modernization of Security Operations Centers (SOCs) to enhance threat detection, response, and mitigation. Security Orchestration, Automation, and Response (SOAR) platforms play a crucial role in addressing operational inefficiencies; however, traditional no-code SOAR solutions face significant [...] Read more.
The evolving landscape of cybersecurity threats demands the modernization of Security Operations Centers (SOCs) to enhance threat detection, response, and mitigation. Security Orchestration, Automation, and Response (SOAR) platforms play a crucial role in addressing operational inefficiencies; however, traditional no-code SOAR solutions face significant limitations, including restricted flexibility, scalability challenges, inadequate support for advanced logic, and difficulties in managing large playbooks. These constraints hinder effective automation, reduce adaptability, and underutilize analysts’ technical expertise, underscoring the need for more sophisticated solutions. To address these challenges, we propose a hyper-automation SOAR platform powered by agentic-LLM, leveraging Large Language Models (LLMs) to optimize automation workflows. This approach shifts from rigid no-code playbooks to AI-generated code, providing a more flexible and scalable alternative while reducing operational complexity. Additionally, we introduce the IVAM framework, comprising three critical stages: (1) Investigation, structuring incident response into actionable steps based on tailored recommendations, (2) Validation, ensuring the accuracy and effectiveness of executed actions, (3) Active Monitoring, providing continuous oversight. By integrating AI-driven automation with the IVAM framework, our solution enhances investigation quality, improves response accuracy, and increases SOC efficiency in addressing modern cybersecurity threats. Full article
Show Figures

Figure 1

25 pages, 2501 KiB  
Article
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments
by Cong Wang, Haoyu Wu, Yulong Gan, Rui Zhang and Maode Ma
Entropy 2025, 27(5), 471; https://doi.org/10.3390/e27050471 - 26 Apr 2025
Viewed by 504
Abstract
As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate [...] Read more.
As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate management and computationally intensive bilinear pairings under traditional Public Key Infrastructure (PKI), while NDN routers require low-latency batch verification for high-speed data forwarding. To address these issues, this study proposes ECAE, an efficient certificateless aggregate signature scheme based on elliptic curve cryptography (ECC). ECAE introduces a partial private key distribution mechanism in key generation, enabling the authentication of identity by a Key Generation Center (KGC) for terminal devices. It leverages ECC and universal hash functions to construct an aggregate verification model that eliminates bilinear pairing operations and reduces communication overhead. Security analysis formally proves that ECAE resists forgery, replay, and man-in-the-middle attacks under the random oracle model. Experimental results demonstrate substantial efficiency gains: total computation overhead is reduced by up to 46.18%, and communication overhead is reduced by 55.56% compared to state-of-the-art schemes. This lightweight yet robust framework offers a trusted and scalable verification solution for NDN-IoT environments. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

23 pages, 7732 KiB  
Article
Evolution of Real-Time Dynamics Monitoring of Colombian Power Grid Using Wide-Area Monitoring System and High-Speed Big Data Analytics
by Samuel Bustamante, Jaime D. Pinzón and Daniel Giraldo-Gómez
Sustainability 2025, 17(9), 3848; https://doi.org/10.3390/su17093848 - 24 Apr 2025
Cited by 1 | Viewed by 876
Abstract
To ensure the reliability and security of Colombia’s national power system, there is an ongoing necessity for upgrades in monitoring and protection mechanisms. Approximately sixteen years ago, the introduction of synchrophasor measurements enabled the swift detection of potentially network-detrimental events. Subsequent advancements have [...] Read more.
To ensure the reliability and security of Colombia’s national power system, there is an ongoing necessity for upgrades in monitoring and protection mechanisms. Approximately sixteen years ago, the introduction of synchrophasor measurements enabled the swift detection of potentially network-detrimental events. Subsequent advancements have seen the deployment of Phasor Measurement Units (PMUs), currently tallying 150 across 25 substations, facilitating real-time monitoring and analysis. The growth of the PMU network is pivotal for the modernization of the National Control Center, particularly in the face of complexities introduced by renewable energy sources. There is an increasing demand for data analytics platforms to support operators in responding to threats. This paper explores the development of the Colombian Wide-Area Measurement System (WAMS) network, highlighting its milestones and advancements. Significant contributions include the technological evolution of the WAMS for real-time monitoring, an innovative high-speed data analytics strategy, and tools for the monitoring of frequency, rate of change of frequency (RoCoF), angular differences, oscillations, and voltage recovery, alongside industry-specific criteria for real-time assessment. Implemented within an operational WAMS, these tools enhance situational awareness, thereby assisting operators in decision-making and augmenting the power system’s reliability, security, and efficiency, underscoring their significance in modernization and sustainability initiatives. Full article
Show Figures

Figure 1

25 pages, 4755 KiB  
Article
Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward
by Luca Mainetti and Andrea Elia
Appl. Syst. Innov. 2025, 8(2), 55; https://doi.org/10.3390/asi8020055 - 18 Apr 2025
Cited by 1 | Viewed by 1854
Abstract
The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and [...] Read more.
The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. While discovering PII from a large unstructured text corpus is still challenging, a lot of research work has focused on identifying methods and tools for the detection of PII in real-time scenarios and the ability to discover data exfiltration attacks. In those research attempts, natural language processing (NLP)-based schemas are widely adopted. Our work combines NLP with deep learning to identify PII in unstructured texts. NLP is used to extract semantic information and the syntactic structure of the text. This information is then processed by a pre-trained Bidirectional Encoder Representations from Transformers (BERT) algorithm. We achieved high performance in detecting PII, reaching an accuracy of 99.558%. This represents an improvement of 7.47 percentage points over the current state-of-the-art model that we analyzed. However, the experimental results show that there is still room for improvement to obtain better accuracy in detecting PII, including working on a new, balanced, and higher-quality training dataset for pre-trained models. Our study contributions encourage researchers to enhance NLP-based PII detection models and practitioners to transform those models into privacy detection tools to be deployed in security operation centers. Full article
Show Figures

Figure 1

Back to TopTop