Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (383)

Search Parameters:
Keywords = attack time assessment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 307 KiB  
Article
An Endogenous Security-Oriented Framework for Cyber Resilience Assessment in Critical Infrastructures
by Mingyu Luo, Ci Tao, Yu Liu, Shiyao Chen and Ping Chen
Appl. Sci. 2025, 15(15), 8342; https://doi.org/10.3390/app15158342 - 26 Jul 2025
Viewed by 267
Abstract
In the face of escalating cyber threats to critical infrastructures, achieving robust cyber resilience has become paramount. This paper proposes an endogenous security-oriented framework for cyber resilience assessment, specifically tailored for critical infrastructures. Drawing on the principles of endogenous security, our framework integrates [...] Read more.
In the face of escalating cyber threats to critical infrastructures, achieving robust cyber resilience has become paramount. This paper proposes an endogenous security-oriented framework for cyber resilience assessment, specifically tailored for critical infrastructures. Drawing on the principles of endogenous security, our framework integrates dynamic heterogeneous redundancy (DHR) and adaptive defense mechanisms to address both known and unknown threats. We model resilience across four key dimensions—Prevention, Destruction Resistance, Adaptive Recovery, and Evolutionary Learning—using a novel mathematical formulation that captures nonlinear interactions and temporal dynamics. The framework incorporates environmental threat entropy to dynamically adjust resilience scores, ensuring relevance in evolving attack landscapes. Through empirical validation on simulated critical infrastructure scenarios, we demonstrate the framework’s ability to quantify resilience trajectories and trigger timely defensive adaptations. Empiricalvalidation on a real-world critical infrastructure system yielded an overall resilience score of 82.75, revealing a critical imbalance between strong preventive capabilities (90/100) and weak Adaptive Recovery (66/100). Our approach offers a significant advancement over static risk assessment models by providing actionable metrics for strategic resilience investments. This work contributes to the field by bridging endogenous security theory with practical resilience engineering, paving the way for more robust protection of critical systems against sophisticated cyber threats. Full article
Show Figures

Figure 1

17 pages, 6827 KiB  
Article
Deep Learning-Based Min-Entropy-Accelerated Evaluation for High-Speed Quantum Random Number Generation
by Xiaomin Guo, Wenhe Zhou, Yue Luo, Xiangyu Meng, Jiamin Li, Yaoxing Bian, Yanqiang Guo and Liantuan Xiao
Entropy 2025, 27(8), 786; https://doi.org/10.3390/e27080786 - 24 Jul 2025
Viewed by 141
Abstract
Secure communication is critically dependent on high-speed and high-security quantum random number generation (QRNG). In this work, we present a responsive approach to enhance the efficiency and security of QRNG by leveraging polarization-controlled heterodyne detection to simultaneously measure the quadrature amplitude and phase [...] Read more.
Secure communication is critically dependent on high-speed and high-security quantum random number generation (QRNG). In this work, we present a responsive approach to enhance the efficiency and security of QRNG by leveraging polarization-controlled heterodyne detection to simultaneously measure the quadrature amplitude and phase fluctuations of vacuum shot noise. To address the practical non-idealities inherent in QRNG systems, we investigate the critical impacts of imbalanced heterodyne detection, amplitude–phase overlap, finite-size effects, and security parameters on quantum conditional min-entropy derived from the entropy uncertainty principle. It effectively mitigates the overestimation of randomness and fortifies the system against potential eavesdropping attacks. For a high-security parameter of 1020, QRNG achieves a true random bit extraction ratio of 83.16% with a corresponding real-time speed of 37.25 Gbps following a 16-bit analog-to-digital converter quantization and 1.4 GHz bandwidth extraction. Furthermore, we develop a deep convolutional neural network for rapid and accurate entropy evaluation. The entropy evaluation of 13,473 sets of quadrature data is processed in 68.89 s with a mean absolute percentage error of 0.004, achieving an acceleration of two orders of magnitude in evaluation speed. Extracting the shot noise with full detection bandwidth, the generation rate of QRNG using dual-quadrature heterodyne detection exceeds 85 Gbps. The research contributes to advancing the practical deployment of QRNG and expediting rapid entropy assessment. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

20 pages, 2206 KiB  
Article
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions
by Mark Vainer, Arnas Kačeniauskas and Nikolaj Goranin
Appl. Sci. 2025, 15(15), 8152; https://doi.org/10.3390/app15158152 - 22 Jul 2025
Viewed by 210
Abstract
Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. Generating these tables is computationally intensive, and several researchers have proposed utilizing parallel computing to speed up the generation process. This [...] Read more.
Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. Generating these tables is computationally intensive, and several researchers have proposed utilizing parallel computing to speed up the generation process. This paper introduces a modification to the traditional master-slave parallelization model using the MPI framework, where, unlike previous approaches, the generation of starting points is decentralized, allowing each process to generate its own tasks independently. This design is proposed to reduce communication overhead and improve the efficiency of rainbow table generation. We reduced the number of inter-process communications by letting each process generate chains independently. We conducted three experiments to evaluate the performance of the parallel rainbow tables generation algorithm for four cryptographic hash functions: NTLMv2, MD5, SHA-256 and SHA-512. The first experiment assessed parallel performance, showing near-linear speedup and 95–99% efficiency across varying numbers of nodes. The second experiment evaluated scalability by increasing the number of processed chains from 100 to 100,000, revealing that higher workloads significantly impacted execution time, with SHA-512 being the most computationally intensive. The third experiment evaluated the effect of chain length on execution time, confirming that longer chains increase computational cost, with SHA-512 consistently requiring the most resources. The proposed approach offers an efficient and practical solution to the computational challenges of rainbow tables generation. The findings of this research can benefit key stakeholders, including cybersecurity professionals, ethical hackers, digital forensics experts and researchers in cryptography, by providing an efficient method for generating rainbow tables to analyze password security. Full article
Show Figures

Figure 1

30 pages, 1042 KiB  
Article
A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems
by Yukun Niu, Xiaopeng Han, Chuan He, Yunfan Wang, Zhigang Cao and Ding Zhou
Appl. Sci. 2025, 15(14), 8032; https://doi.org/10.3390/app15148032 - 18 Jul 2025
Viewed by 235
Abstract
Cloud–edge collaboration industrial control systems (ICSs) face critical security and privacy challenges that existing dynamic heterogeneous redundancy (DHR) architectures inadequately address due to two fundamental limitations: event-triggered scheduling approaches that amplify common-mode escape impacts in resource-constrained environments, and insufficient privacy-preserving arbitration mechanisms for [...] Read more.
Cloud–edge collaboration industrial control systems (ICSs) face critical security and privacy challenges that existing dynamic heterogeneous redundancy (DHR) architectures inadequately address due to two fundamental limitations: event-triggered scheduling approaches that amplify common-mode escape impacts in resource-constrained environments, and insufficient privacy-preserving arbitration mechanisms for sensitive industrial data processing. In contrast to existing work that treats scheduling and privacy as separate concerns, this paper proposes a unified polymorphic heterogeneous security architecture that integrates hybrid event–time triggered scheduling with adaptive privacy-preserving arbitration, specifically designed to address the unique challenges of cloud–edge collaboration ICSs where both security resilience and privacy preservation are paramount requirements. The architecture introduces three key innovations: (1) a hybrid event–time triggered scheduling algorithm with credibility assessment and heterogeneity metrics to mitigate common-mode escape scenarios, (2) an adaptive privacy budget allocation mechanism that balances privacy protection effectiveness with system availability based on attack activity levels, and (3) a unified framework that organically integrates privacy-preserving arbitration with heterogeneous redundancy management. Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (102 probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments. Full article
Show Figures

Figure 1

13 pages, 3525 KiB  
Article
Epidemiologic Investigation of a Varicella Outbreak in an Elementary School in Gyeonggi Province, Republic of Korea
by Gipyo Sung, Jieun Jang and Kwan Lee
Children 2025, 12(7), 949; https://doi.org/10.3390/children12070949 - 18 Jul 2025
Viewed by 368
Abstract
Background/Objectives: On 6 June 2023, two varicella cases were reported at a highly vaccinated elementary school in Gyeonggi Province, Republic of Korea. We investigated the outbreak to describe its transmission dynamics; quantify attack rates in school, household, and private-academy settings; and assess [...] Read more.
Background/Objectives: On 6 June 2023, two varicella cases were reported at a highly vaccinated elementary school in Gyeonggi Province, Republic of Korea. We investigated the outbreak to describe its transmission dynamics; quantify attack rates in school, household, and private-academy settings; and assess the impact of coordinated control measures. Methods: A case-series study included 89 teachers and students who had contact with suspected patients. Using case definitions, laboratory tests, questionnaires, and environmental assessments, we evaluated exposures and factors facilitating spread. Results: Varicella developed in 23 of 89 contacts (25.8%); laboratory confirmation was obtained in 2 (8.7% of cases). The mean incubation period was 13 days. Epidemic-curve and network analyses indicated that the outbreak began with a single index case and extended through household contacts and private educational facilities, ultimately involving multiple schools. Conclusions: Breakthrough transmission can occur even when single-dose coverage exceeds 95%, particularly as vaccine-induced immunity may wane over time. Poorly regulated extracurricular facilities, such as private academies, act as bridging hubs that amplify spread across grades and even between schools. For timely detection and control, these venues should be incorporated into routine varicella surveillance, and rapid, coordinated infection-control measures are required across all educational settings. Full article
(This article belongs to the Special Issue Pediatric Infectious Disease Epidemiology)
Show Figures

Figure 1

21 pages, 877 KiB  
Article
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
by Mengdi Zhao and Huiyan Chen
Entropy 2025, 27(7), 753; https://doi.org/10.3390/e27070753 - 15 Jul 2025
Viewed by 186
Abstract
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allows third parties to assess the integrity [...] Read more.
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allows third parties to assess the integrity of outsourced data, offering good openness and flexibility, but it may lead to privacy leakage and security risks. In contrast, private verification restricts the auditing capability to the data owner, providing better privacy protection but often resulting in higher verification costs and operational complexity due to limited local resources. Moreover, most existing PDP schemes are based on classical number-theoretic assumptions, making them vulnerable to quantum attacks. To address these challenges, this paper proposes an identity-based PDP with a designated verifier over lattices, utilizing a specially leveled identity-based fully homomorphic signature (IB-FHS) scheme. We provide a formal security proof of the proposed scheme under the small-integer solution (SIS) and learning with errors (LWE) within the random oracle model. Theoretical analysis confirms that the scheme achieves security guarantees while maintaining practical feasibility. Furthermore, simulation-based experiments show that for a 1 MB file and lattice dimension of n = 128, the computation times for core algorithms such as TagGen, GenProof, and CheckProof are approximately 20.76 s, 13.75 s, and 3.33 s, respectively. Compared to existing lattice-based PDP schemes, the proposed scheme introduces additional overhead due to the designated verifier mechanism; however, it achieves a well-balanced optimization among functionality, security, and efficiency. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

20 pages, 3414 KiB  
Article
Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM
by Fawad Ahmad, Reshail Khan and Armel Asongu Nkembi
Inventions 2025, 10(4), 56; https://doi.org/10.3390/inventions10040056 - 14 Jul 2025
Viewed by 266
Abstract
Data security is of the utmost importance in the domain of real-time environmental monitoring systems, particularly when employing advanced context-aware intelligent visual analytics. This paper addresses a significant deficiency in the Global System for Mobile Communications (GSM), a widely employed wireless communication system [...] Read more.
Data security is of the utmost importance in the domain of real-time environmental monitoring systems, particularly when employing advanced context-aware intelligent visual analytics. This paper addresses a significant deficiency in the Global System for Mobile Communications (GSM), a widely employed wireless communication system for environmental monitoring. The A5/1 encryption technique, which is extensively employed, ensures the security of user data by utilizing a 64-bit session key that is divided into three linear feedback shift registers (LFSRs). Despite the shown efficacy, the development of a probabilistic model for assessing the vulnerability of breaking or intercepting the session key (Kc) has not yet been achieved. In order to bridge this existing knowledge gap, this study proposes a probabilistic model that aims to evaluate the security of encrypted data within the framework of the Global System for Mobile Communications (GSM). The proposed model implements alterations to the current GSM encryption process by the augmentation of the quantity of Linear Feedback Shift Registers (LFSRs), consequently resulting in an improved level of security. The methodology entails increasing the number of registers while preserving the session key’s length, ensuring that the key length specified by GSM standards remains unaltered. This is especially important for environmental monitoring systems that depend on real-time data analysis and decision-making. In order to elucidate the notion, this analysis considers three distinct scenarios: encryption utilizing a set of five, seven, and nine registers. The majority function is employed to determine the registers that will undergo perturbation, hence increasing the complexity of the bit arrangement and enhancing the security against prospective attackers. This paper provides actual evidence using simulations to illustrate that an increase in the number of registers leads to a decrease in the vulnerability of data interception, hence boosting data security in GSM communication. Simulation results demonstrate that our method substantially reduces the risk of data interception, thereby improving the integrity of context-aware intelligent visual analytics in real-time environmental monitoring systems. Full article
Show Figures

Figure 1

9 pages, 428 KiB  
Proceeding Paper
Sensors and Sensing Methods for Early Detection of Life-Threatening Sudden Illnesses in Motor Vehicles Drivers
by Hristo Radev and Galidiya Petrova
Eng. Proc. 2025, 100(1), 30; https://doi.org/10.3390/engproc2025100030 - 11 Jul 2025
Viewed by 169
Abstract
Due to the increasing number of vehicles and the aging population, the vulnerability to sudden medical emergencies among drivers is a growing problem. Events such as heart attack, stroke, and loss of consciousness can occur without warning and endanger everyone on the road. [...] Read more.
Due to the increasing number of vehicles and the aging population, the vulnerability to sudden medical emergencies among drivers is a growing problem. Events such as heart attack, stroke, and loss of consciousness can occur without warning and endanger everyone on the road. Modern vehicles, equipped with electronic systems, can support real-time driver’s health monitoring through early detection technologies. The existing Driver Monitoring Systems (DMS) in our cars assess behavioral states such as drowsiness and distraction. In the future, DMS will include biometric sensors to monitor vital signs such as heart rate and respiration. By finding predictors of sudden illnesses (SI), such a system will provide valuable time for the driver to react before the strike of a medical event. In this paper, we present our vision for DMS operation with physiological monitoring capabilities. A brief overview of sensor’s types and their locations in the vehicle interior used in the research studies for monitoring the corresponding physiological parameters is presented. A comparative analysis of the advantages and disadvantages of the sensing methods used for physiological monitoring of the driver in real driving scenarios is made. Full article
Show Figures

Figure 1

19 pages, 4047 KiB  
Article
A Method for Detecting Preliminary Actions During an Actual Karate Kumite Match
by Kwangyun Kim, Shuhei Tsuchida, Tsutomu Terada and Masahiko Tsukamoto
Sensors 2025, 25(13), 4134; https://doi.org/10.3390/s25134134 - 2 Jul 2025
Viewed by 307
Abstract
Kumite is a karate sparring competition in which two players fight each other using various techniques. In kumite matches, it is essential to reduce a preliminary action (hereinafter referred to as “pre-action”), such as pulling the arms and lowering the shoulders just before [...] Read more.
Kumite is a karate sparring competition in which two players fight each other using various techniques. In kumite matches, it is essential to reduce a preliminary action (hereinafter referred to as “pre-action”), such as pulling the arms and lowering the shoulders just before performing an attack technique. This is because pre-actions reveal the timing of the attack to the opponent. However, players often find it difficult to recognize their own pre-actions, and accurately estimating their presence or absence is challenging with conventional motion analysis methods, as pre-actions are subtle compared to major techniques like punching or kicking. Previously, we proposed a method for detecting pre-actions during single punches performed in a static state using inertial sensors. While this method was effective in controlled situations, it failed to detect pre-actions in punches during actual kumite matches. The main reason is that players generally perform footwork during matches, and this footwork is often misrecognized as pre-action via conventional detection methods. To address misrecognition caused by footwork, we propose a new method that combines preprocessing designed to detect and smooth footwork segments in the inertial data with the conventional pre-action detection method, thereby enabling pre-action detection during kumite matches. In the preprocessing, we apply an autocorrelation function to assess the constancy of footwork and accurately separate the footwork segment from the kumite technique segment. Only the footwork segment is then smoothed to suppress its influence on the detection process. Our experimental results show that the proposed method can estimate the presence or absence of pre-action in the punch of an actual kumite match with an accuracy of 0.875. Full article
(This article belongs to the Collection Sensor Technology for Sports Science)
Show Figures

Figure 1

33 pages, 5362 KiB  
Article
A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things
by Bo Wang, Jiesheng Wang and Mingchu Li
Sensors 2025, 25(13), 4082; https://doi.org/10.3390/s25134082 - 30 Jun 2025
Viewed by 233
Abstract
With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system’s stability [...] Read more.
With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system’s stability and security. Moreover, the limited resources available in the FIoT, combined with the extensive deployment of AI algorithms, can significantly reduce overall system availability. To address the challenge of resisting malicious behaviors and attacks in the FIoT, this paper proposes a trust-based collaborative smart device selection algorithm that integrates both subjective and objective trust mechanisms with dynamic blacklists and whitelists, leveraging domain knowledge and game theory. It is essential to evaluate real-time dynamic trust levels during system execution to accurately assess device trustworthiness. A dynamic blacklist and whitelist transformation mechanism is also proposed to capture the evolving behavior of collaborative service devices and update the lists accordingly. The proposed algorithm enhances the anti-attack capabilities of smart devices in the FIoT by combining adaptive trust evaluation with blacklist and whitelist strategies. It maintains a high task success rate in both single and complex attack scenarios. Furthermore, to address the challenge of resource allocation for trusted smart devices under constrained edge resources, a coalition game-based algorithm is proposed that considers both device activity and trust levels. Experimental results demonstrate that the proposed method significantly improves task success rates and resource allocation performance compared to existing approaches. Full article
(This article belongs to the Special Issue Network Security and IoT Security: 2nd Edition)
Show Figures

Figure 1

19 pages, 55351 KiB  
Article
Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion
by Chen Meng, Haoyang Yang, Cuicui Jiang, Qinglei Hu and Dongyu Li
Remote Sens. 2025, 17(13), 2176; https://doi.org/10.3390/rs17132176 - 25 Jun 2025
Viewed by 381
Abstract
Accurate and robust navigation is fundamental to Unmanned Aerial Vehicle (UAV) remote sensing operations. However, the susceptibility of UAV navigation sensors to diverse interference and malicious attacks can severely degrade positioning accuracy and compromise mission integrity. Addressing these vulnerabilities, this paper presents an [...] Read more.
Accurate and robust navigation is fundamental to Unmanned Aerial Vehicle (UAV) remote sensing operations. However, the susceptibility of UAV navigation sensors to diverse interference and malicious attacks can severely degrade positioning accuracy and compromise mission integrity. Addressing these vulnerabilities, this paper presents an integrated framework combining sensor anomaly detection with a Dynamic Adaptive Extended Kalman Filter (DAEKF) and federated filtering algorithms to bolster navigation resilience and accuracy for UAV remote sensing. Specifically, mathematical models for prevalent UAV sensor attacks were established. The proposed framework employs adaptive thresholding and residual consistency checks for the real-time identification and isolation of anomalous sensor measurements. Based on these detection outcomes, the DAEKF dynamically adjusts its sensor fusion strategies and noise covariance matrices. To further enhance the fault tolerance, a federated filtering architecture was implemented, utilizing adaptively weighted sub-filters based on assessed trustworthiness to effectively isolate faults. The efficacy of this framework was validated through rigorous experiments that involved real-world flight data and software-defined radio (SDR)-based Global Positioning System (GPS) spoofing, alongside simulated attacks. The results demonstrate exceptional performance, where the average anomaly detection accuracy exceeded 99% and the precision surpassed 98%. Notably, when benchmarked against traditional methods, the proposed system reduced navigation errors by a factor of approximately 2-3 under attack scenarios, which substantially enhanced the operational stability of the UAVs in challenging environments. Full article
Show Figures

Figure 1

15 pages, 410 KiB  
Article
5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches
by José Dias, Pedro Pinto, Ricardo Santos and Silvestre Malta
Sensors 2025, 25(13), 3940; https://doi.org/10.3390/s25133940 - 24 Jun 2025
Viewed by 952
Abstract
This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of [...] Read more.
This paper explores the security challenges associated with network slicing in 5th Generation (5G) networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5G, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5G slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5G slicing deployments. Full article
Show Figures

Figure 1

21 pages, 2734 KiB  
Article
Quantifying Cyber Resilience: A Framework Based on Availability Metrics and AUC-Based Normalization
by Harksu Cho, Ji-Hyun Sung, Hye-Jin Kang, Jisoo Jang and Dongkyoo Shin
Electronics 2025, 14(12), 2465; https://doi.org/10.3390/electronics14122465 - 17 Jun 2025
Viewed by 460
Abstract
This study presents a metric selection framework and a normalization method for the quantitative assessment of cyber resilience, with a specific focus on availability as a core dimension. To develop a generalizable evaluation model, service types from 1124 organizations were categorized, and candidate [...] Read more.
This study presents a metric selection framework and a normalization method for the quantitative assessment of cyber resilience, with a specific focus on availability as a core dimension. To develop a generalizable evaluation model, service types from 1124 organizations were categorized, and candidate metrics applicable across diverse operational environments were identified. Ten quantitative metrics were derived based on five core selection criteria—objectivity, reproducibility, scalability, practicality, and relevance to resilience—while adhering to the principles of mutual exclusivity and collective exhaustiveness. To validate the framework, two availability-oriented metrics—Transactions per Second (TPS) and Connections per Second (CPS)—were empirically evaluated in a simulated denial-of-service environment using a TCP SYN flood attack scenario. The experiment included three phases: normal operation, attack, and recovery. An Area Under the Curve (AUC)-based Normalized Resilience Index (NRI) was introduced to quantify performance degradation and recovery, using each organization’s Recovery Time Objective (RTO) as a reference baseline. This approach facilitates objective, interpretable comparisons of resilience performance across systems with varying service conditions. The findings demonstrate the practical applicability of the proposed metrics and normalization technique for evaluating cyber resilience and underscore their potential in informing resilience policy development, operational benchmarking, and technical decision-making. Full article
(This article belongs to the Special Issue Advanced Research in Technology and Information Systems, 2nd Edition)
Show Figures

Figure 1

13 pages, 456 KiB  
Article
Relationship Between Offensive Performance and Symmetry of Muscle Function, and Injury Factors in Elite Volleyball Players
by Chaofan Chen, Panpan Shi, Munku Song, Yonghwan Kim and Jiyoung Lee
Symmetry 2025, 17(6), 956; https://doi.org/10.3390/sym17060956 - 16 Jun 2025
Viewed by 376
Abstract
In volleyball, successful offensive performance is influenced not only by physical muscle function but also by injury status. The purpose of this study was to analyze the relationship between muscle function—including strength, balance, and symmetry—and injury history in relation to offensive performance (OP) [...] Read more.
In volleyball, successful offensive performance is influenced not only by physical muscle function but also by injury status. The purpose of this study was to analyze the relationship between muscle function—including strength, balance, and symmetry—and injury history in relation to offensive performance (OP) and ultimately sought to find factors required to improve OP. The final analysis included 60 players in attacking positions (36 in the symmetry group and 24 in the asymmetry group). Muscle strength was assessed using isokinetic testing for shoulder and knee extension. Balance was evaluated using the Upper Quarter Y-Balance Test (UQ-YBT) and the Lower Quarter Y-Balance Test (LQ-YBT). The asymmetry index (AI, ≥10%) was calculated by comparing the dominant and non-dominant sides. The results showed that the asymmetry group had a higher injury rate and lower offensive performance (OP) than the symmetry group (p < 0.05). In multiple regression analysis, no significant predictors were found on the non-dominant side, whereas significant variables were identified only on the dominant side. The key variables influencing OP were shoulder and knee extension strength, UQ-YBT scores, and the AI of knee extension. A 13.8% improvement in shoulder extension strength on the dominant side increased the likelihood of enhanced offensive performance (OP) by 2.54 times. A 10.5% improvement in the asymmetry index (AI) of knee extension was associated with a 1.52-fold increase in OP (p < 0.05). Shoulder and knee flexion did not significantly affect OP in any of the tests (p > 0.05). In conclusion, offensive performance in volleyball is associated with the greater shoulder and knee extension strength of the dominant side, as well as positive changes in UQ-YBT scores and the AI of knee extension. Full article
(This article belongs to the Section Life Sciences)
Show Figures

Figure 1

36 pages, 5316 KiB  
Article
Risk Assessment of Cryptojacking Attacks on Endpoint Systems: Threats to Sustainable Digital Agriculture
by Tetiana Babenko, Kateryna Kolesnikova, Maksym Panchenko, Olga Abramkina, Nikolay Kiktev, Yuliia Meish and Pavel Mazurchuk
Sustainability 2025, 17(12), 5426; https://doi.org/10.3390/su17125426 - 12 Jun 2025
Cited by 1 | Viewed by 957
Abstract
Digital agriculture has rapidly developed in the last decade in many countries where the share of agricultural production is a significant part of the total volume of gross production. Digital agroecosystems are developed using a variety of IT solutions, software and hardware tools, [...] Read more.
Digital agriculture has rapidly developed in the last decade in many countries where the share of agricultural production is a significant part of the total volume of gross production. Digital agroecosystems are developed using a variety of IT solutions, software and hardware tools, wired and wireless data transmission technologies, open source code, Open API, etc. A special place in agroecosystems is occupied by electronic payment technologies and blockchain technologies, which allow farmers and other agricultural enterprises to conduct commodity and monetary transactions with suppliers, creditors, and buyers of products. Such ecosystems contribute to the sustainable development of agriculture, agricultural engineering, and management of production and financial operations in the agricultural industry and related industries, as well as in other sectors of the economy of a number of countries. The introduction of crypto solutions in the agricultural sector is designed to create integrated platforms aimed at helping farmers manage supply lines or gain access to financial services. At the same time, there are risks of illegal use of computing power for cryptocurrency mining—cryptojacking. This article offers a thorough risk assessment of cryptojacking attacks on endpoint systems, focusing on identifying critical vulnerabilities within IT infrastructures and outlining practical preventive measures. The analysis examines key attack vectors—including compromised websites, infected applications, and supply chain infiltration—and explores how unauthorized cryptocurrency mining degrades system performance and endangers data security. The research methodology combines an evaluation of current cybersecurity trends, a review of specialized literature, and a controlled experiment simulating cryptojacking attacks. The findings highlight the importance of multi-layered protection mechanisms and ongoing system monitoring to detect malicious activities at an early stage. Full article
(This article belongs to the Section Sustainable Agriculture)
Show Figures

Figure 1

Back to TopTop