Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (3,051)

Search Parameters:
Keywords = countermeasures

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 4546 KB  
Article
Comprehensive Strategy for Effective Exploitation of Offshore Extra-Heavy Oilfields with Cyclic Steam Stimulation
by Chunsheng Zhang, Jianhua Bai, Xu Zheng, Wei Zhang and Chao Zhang
Processes 2026, 14(2), 359; https://doi.org/10.3390/pr14020359 - 20 Jan 2026
Abstract
The N Oilfield is the first offshore extra-heavy oilfield developed using thermal recovery methods, adopting cyclic steam stimulation (CSS) and commissioned in 2022. The development of offshore heavy oil reservoirs is confronted with numerous technical and operational challenges. Key constraints include limited platform [...] Read more.
The N Oilfield is the first offshore extra-heavy oilfield developed using thermal recovery methods, adopting cyclic steam stimulation (CSS) and commissioned in 2022. The development of offshore heavy oil reservoirs is confronted with numerous technical and operational challenges. Key constraints include limited platform space, stringent economic thresholds for single-well production, and elevated operational risks, collectively contributing to significant uncertainties in project viability. For effective exploitation of the target oilfield, a comprehensive strategy was proposed, which consisted of effective artificial lifting, steam channeling and high water cut treatment. First, to achieve efficient artificial lifting of the extra-heavy oil, an integrated injection–production lifting technology using jet pump was designed and implemented. In addition, during the first steam injection cycle, challenges such as inter-well steam channeling, high water cut, and an excessive water recovery ratio were encountered. Subsequent analysis indicated that low-quality reservoir intervals were the dominant sources of unwanted water production and preferential steam channeling pathways. To address these problems, a suite of efficiency-enhancing technologies was established, including regional steam injection for channeling suppression, classification-based water shutoff and control, and production regime optimization. Given the significant variations in geological conditions and production dynamics among different types of high-water-cut wells, a single plugging agent system proved inadequate for their diverse requirements. Therefore, customized water control countermeasures were formulated for specific well types, and a suite of plugging agent systems with tailored properties was subsequently developed, including high-temperature-resistant N2 foam, high-temperature-degradable gel, and high-strength ultra-fine cement systems. To date, regional steam injection has been implemented in 10 well groups, water control measures have been applied to 12 wells, and production regimes optimization has been implemented in 5 wells. Up to the current production round, no steam channeling has been observed in the well groups after thermal treatment. Compared with the pre-measurement stage, the average water cut per well decreased by 10%. During the three-year production cycle, the average daily oil production per well increased by 10%, the cumulative oil increment of the oilfield reached 15,000 tons, and the total crude oil production exceeded 800,000 tons. This study provides practical technical insights for the large-scale and efficient development of extra-heavy oil reservoirs in the Bohai Oilfield and offers a valuable reference for similar reservoirs worldwide. Full article
Show Figures

Figure 1

26 pages, 3535 KB  
Review
A Survey on Fault Detection of Solar Insecticidal Lamp Internet of Things: Recent Advance, Challenge, and Countermeasure
by Xing Yang, Zhengjie Wang, Lei Shu, Fan Yang, Xuanchen Guo and Xiaoyuan Jing
J. Sens. Actuator Netw. 2026, 15(1), 11; https://doi.org/10.3390/jsan15010011 - 19 Jan 2026
Abstract
Ensuring food security requires innovative, sustainable pest management solutions. The Solar Insecticidal Lamp Internet of Things (SIL-IoT) represents such an advancement, yet its reliability in harsh, variable outdoor environments is compromised by frequent component and sensor faults, threatening effective pest control and data [...] Read more.
Ensuring food security requires innovative, sustainable pest management solutions. The Solar Insecticidal Lamp Internet of Things (SIL-IoT) represents such an advancement, yet its reliability in harsh, variable outdoor environments is compromised by frequent component and sensor faults, threatening effective pest control and data integrity. This paper presents a comprehensive survey on fault detection (FD) for SIL-IoT systems, systematically analyzing their unique challenges, including electromagnetic interference, resource constraints, data scarcity, and network instability. To address these challenges, we investigate countermeasures, including blind source separation for signal decomposition under interference, lightweight model techniques for edge deployment, and transfer/self-supervised learning for low-cost fault modeling across diverse agricultural scenarios. A dedicated case study, utilizing sensor fault data of SIL-IoT, demonstrates the efficacy of these approaches: an empirical mode decomposition-enhanced model achieved 97.89% accuracy, while a depthwise separable-based convolutional neural network variant reduced computational cost by 88.7% with comparable performance. This survey not only synthesizes the state of the art but also provides a structured framework and actionable insights for developing robust, efficient, and scalable FD solutions, thereby enhancing the operational reliability and sustainability of SIL-IoT systems. Full article
(This article belongs to the Special Issue Fault Diagnosis in the Internet of Things Applications)
Show Figures

Figure 1

25 pages, 3597 KB  
Article
Social Engineering Attacks Using Technical Job Interviews: Real-Life Case Analysis and AI-Assisted Mitigation Proposals
by Tomás de J. Mateo Sanguino
Information 2026, 17(1), 98; https://doi.org/10.3390/info17010098 - 18 Jan 2026
Viewed by 61
Abstract
Technical job interviews have become a vulnerable environment for social engineering attacks, particularly when they involve direct interaction with malicious code. In this context, the present manuscript investigates an exploratory case study, aiming to provide an in-depth analysis of a single incident rather [...] Read more.
Technical job interviews have become a vulnerable environment for social engineering attacks, particularly when they involve direct interaction with malicious code. In this context, the present manuscript investigates an exploratory case study, aiming to provide an in-depth analysis of a single incident rather than seeking to generalize statistical evidence. The study examines a real-world covert attack conducted through a simulated interview, identifying the technical and psychological elements that contribute to its effectiveness, assessing the performance of artificial intelligence (AI) assistants in early detection and proposing mitigation strategies. To this end, a methodology was implemented that combines discursive reconstruction of the attack, code exploitation and forensic analysis. The experimental phase, primarily focused on evaluating 10 large language models (LLMs) against a fragment of obfuscated code, reveals that the malware initially evaded detection by 62 antivirus engines, while assistants such as GPT 5.1, Grok 4.1 and Claude Sonnet 4.5 successfully identified malicious patterns and suggested operational countermeasures. The discussion highlights how the apparent legitimacy of platforms like LinkedIn, Calendly and Bitbucket, along with time pressure and technical familiarity, act as catalysts for deception. Based on these findings, the study suggests that LLMs may play a role in the early detection of threats, offering a potentially valuable avenue to enhance security in technical recruitment processes by enabling the timely identification of malicious behavior. To the best of available knowledge, this represents the first academically documented case of its kind analyzed from an interdisciplinary perspective. Full article
Show Figures

Figure 1

33 pages, 1404 KB  
Review
Security of ADS-B and Remote ID Systems: Cyberattacks, Detection Techniques, and Countermeasures
by Qinxuan Shi, Toro Dama Caleb, Sicong Shao and Naima Kaabouch
Sensors 2026, 26(2), 634; https://doi.org/10.3390/s26020634 - 17 Jan 2026
Viewed by 91
Abstract
The aviation sector relies on cooperative surveillance systems such as Automatic Dependent Surveillance-Broadcast (ADS-B) and Remote Identification (RID) to enhance safety and efficiency. However, their open, unencrypted communication protocols make them vulnerable to various cyberattacks. This survey examines the current state of knowledge [...] Read more.
The aviation sector relies on cooperative surveillance systems such as Automatic Dependent Surveillance-Broadcast (ADS-B) and Remote Identification (RID) to enhance safety and efficiency. However, their open, unencrypted communication protocols make them vulnerable to various cyberattacks. This survey examines the current state of knowledge on attacks, detection techniques, and countermeasures for both ADS-B and RID, addressing a gap in the literature by analyzing them side by side. It categorizes attacks, including emerging threats, reviews detection methods from traditional to modern AI-based approaches and discusses existing countermeasures. Furthermore, this paper provides a list of simulation tools and open-access datasets and identifies current research challenges and future directions. Full article
(This article belongs to the Special Issue Advanced Sensing Technologies and Cybersecurity for UAV Systems)
31 pages, 4917 KB  
Article
Development of a Risk Assessment Method Under the Multi-Hazard of Earthquake and Tsunami for a Nuclear Power Plant
by Hiroyuki Yamada, Masato Nakajima, Hiromichi Miura, Ryusuke Haraguchi, Yoshinori Mihara and Eishiro Higo
J. Nucl. Eng. 2026, 7(1), 7; https://doi.org/10.3390/jne7010007 - 17 Jan 2026
Viewed by 186
Abstract
Based on lessons learned from the Fukushima Daiichi Nuclear Power Plant accident caused by the 2011 off the Pacific coast Tohoku Earthquake, and the subsequent tsunamis, Japanese utilities have been upgrading their tsunami countermeasures. To understand the residual risk from beyond-design-basis events, it [...] Read more.
Based on lessons learned from the Fukushima Daiichi Nuclear Power Plant accident caused by the 2011 off the Pacific coast Tohoku Earthquake, and the subsequent tsunamis, Japanese utilities have been upgrading their tsunami countermeasures. To understand the residual risk from beyond-design-basis events, it is important to assess seismic and tsunami risks independently while also recognizing how a plant’s risk profile changes when these events occur concurrently. This study developed a framework for a multi-hazard probabilistic risk assessment (PRA) to evaluate risks to nuclear power plants (NPPs) resulting from the superposition of earthquake and tsunami events. The framework is proposed on the assumption that the targeted plant has previously conducted single-hazard PRAs for both earthquakes and tsunamis. This study presents an approach to define the scope of risk assessment for the superposition of earthquake and tsunami events, based results from single-hazard PRAs for each hazard. It provides an analytical framework for superposition scenario analysis and a simplified method for multi-hazard assessment using data from single-hazard assessments. Moreover, a series of steps for the multi-hazard fragility assessment of superposed earthquake and tsunami events are proposed, clarifying the relationship between superposed impacts and the damaged parts and damage modes, accompanied by illustrative examples. Full article
(This article belongs to the Special Issue Probabilistic Safety Assessment and Management of Nuclear Facilities)
Show Figures

Figure 1

27 pages, 1112 KB  
Article
Unraveling COVID-19’s Impact on Raw Material Supply Chains and Production in the Turkish Pipe Industry: A Critical ANOVA and Advanced MCDM Evaluation
by Hatef Javadi, Oguz Toragay, Mehmet Akif Yerlikaya, Marco Falagario and Nicola Epicoco
Appl. Sci. 2026, 16(2), 959; https://doi.org/10.3390/app16020959 - 16 Jan 2026
Viewed by 78
Abstract
This paper analyzes the impact of COVID-19 on the supply chain and production, investigating countermeasures for industrial recovery. In particular, the study examines how COVID-19 has affected the raw material supply chain, production, and outages on a real case study, that is, Turkey’s [...] Read more.
This paper analyzes the impact of COVID-19 on the supply chain and production, investigating countermeasures for industrial recovery. In particular, the study examines how COVID-19 has affected the raw material supply chain, production, and outages on a real case study, that is, Turkey’s Glass-Reinforced Plastic (GRP) pipe industry. Using two- and three-way analysis of variance (ANOVA), significant negative impacts on the raw material supply chain are identified with 95% confidence. To enhance decision-making, the fuzzy q-rung orthopair set (FQROPS) and entropy-based multi-criteria decision-making (MCDM) methods are integrated in the baseline method. Specifically, ANOVA-identified factors, such as cost, supply continuity, production capacity, and risk level, are used as criteria in the MCDM analysis. Entropy determined criteria weights and FQROPS evaluate alternatives based on their proximity to the ideal solution. Findings show that significant disruptions occurred due to the pandemic. In addition, the MCDM analysis reveals that pre-pandemic conditions for key materials, such as fiberglass and resin, were significantly more favorable in terms of cost, supply continuity, production capacity, and risk levels. This integrated approach provides strategic insights for managing supply chains and production in the GRP pipe industry during and after pandemic events. Full article
17 pages, 14678 KB  
Article
Preamble Injection-Based Jamming Method for UAV LoRa Communication Links
by Teng Wu, Runze Mao, Yan Du, Quan Zhu, Shengjun Wei and Changzhen Hu
Sensors 2026, 26(2), 614; https://doi.org/10.3390/s26020614 - 16 Jan 2026
Viewed by 82
Abstract
The widespread use of low-cost, highly maneuverable unmanned aerial vehicles (UAVs), such as racing drones, has raised numerous security concerns. These UAVs commonly employ LoRa (Long Range) communication protocols, which feature long-range transmission and strong anti-interference capabilities. However, traditional countermeasure techniques targeting LoRa-based [...] Read more.
The widespread use of low-cost, highly maneuverable unmanned aerial vehicles (UAVs), such as racing drones, has raised numerous security concerns. These UAVs commonly employ LoRa (Long Range) communication protocols, which feature long-range transmission and strong anti-interference capabilities. However, traditional countermeasure techniques targeting LoRa-based links often suffer from delayed response, poor adaptability, and high power consumption. To address these challenges, this study first leverages neural networks to achieve efficient detection and reverse extraction of key parameters from LoRa signals in complex electromagnetic environments. Subsequently, a continuous preamble injection jamming method is designed based on the extracted target signal parameters. By protocol-level injection, this method disrupts the synchronization and demodulation processes of UAV communication links, significantly enhancing jamming efficiency while reducing energy consumption. Experimental results demonstrate that, compared with conventional approaches, the proposed continuous preamble injection jamming method achieves improved signal detection accuracy, jamming energy efficiency, and effective range. To the best of our knowledge, this protocol-aware scheme, which integrates neural network-based signal perception and denoising, offers a promising and cost-effective technical pathway for UAV countermeasures. Full article
(This article belongs to the Special Issue LoRa Communication Technology for IoT Applications—2nd Edition)
13 pages, 1868 KB  
Article
Stand Properties Relate to the Accuracy of Remote Sensing of Ips typographus L. Damage in Heterogeneous Managed Hemiboreal Forest Landscapes: A Case Study
by Agnis Šmits, Jordane Champion, Ilze Bargā, Linda Gulbe-Viļuma, Līva Legzdiņa, Elza Gricjus and Roberts Matisons
Forests 2026, 17(1), 121; https://doi.org/10.3390/f17010121 - 15 Jan 2026
Viewed by 75
Abstract
Under the intensifying water shortages in the vegetation season, early identification of Ips typographus L. damage is crucial for preventing wide outbreaks, which undermine the economic potential of commercial stands of Norway spruce (Picea abies Karst.) across Europe. For this purpose, remote [...] Read more.
Under the intensifying water shortages in the vegetation season, early identification of Ips typographus L. damage is crucial for preventing wide outbreaks, which undermine the economic potential of commercial stands of Norway spruce (Picea abies Karst.) across Europe. For this purpose, remote sensing based on satellite images is considered one of the most efficient methods, particularly in homogenous and wide forested landscapes. However, under highly heterogeneous seminatural managed forest landscapes in lowland Central and Northern Europe, as illustrated by the eastern Baltic region and Latvia in particular, the efficiency of such an approach can lack the desired accuracy. Hence, the identification of smaller damage patches by I. typographus, which can act as a source of wider outbreaks, can be overlooked, and situational awareness can be further aggravated by infrastructure artefacts. In this study, the accuracy of satellite imaging for the identification of I. typographus damage was evaluated, focusing on the occurrence of false positives and particularly false negatives obtained from the comparison with UAV imaging. Across the studied landscapes, correct or partially correct identification of damage patches larger than 30 m2 occurred in 73% of cases. Still, the satellite image analysis of the highly heterogeneous landscape resulted in quite a common occurrence of false negatives (up to one-third of cases), which were related to stand and patch properties. The high rate of false negatives, however, is crucial for the prevention of outbreaks, as the sources of outbreaks can be underestimated, burdening prompt and hence effective implication of countermeasures. Accordingly, elaborating an analysis of satellite images by incorporating stand inventory data could improve the efficiency of early detection systems, especially when coupled with UAV reconnaissance of heterogeneous landscapes, as in the eastern Baltic region. Full article
Show Figures

Figure 1

25 pages, 91838 KB  
Article
ICCA: Independent Multi-Agent Algorithm for Distributed Jamming Scheduling
by Wenpeng Wu, Zhenhua Wei, Haiyang You, Zhaoguang Zhang, Chenxi Li, Jianwei Zhan and Shan Zhao
Algorithms 2026, 19(1), 73; https://doi.org/10.3390/a19010073 - 15 Jan 2026
Viewed by 66
Abstract
In extreme scenarios, to prevent the leakage of jamming coordination information, the jammers must proactively terminate their communication functions and implement jamming resource scheduling via Non-Networked Cooperation. However, current research on this non-networked jamming approach is relatively limited. Furthermore, existing algorithms either rely [...] Read more.
In extreme scenarios, to prevent the leakage of jamming coordination information, the jammers must proactively terminate their communication functions and implement jamming resource scheduling via Non-Networked Cooperation. However, current research on this non-networked jamming approach is relatively limited. Furthermore, existing algorithms either rely on networked interactions or lack cognitive strategies for the surrounding communication countermeasure situation. For example, they fail to adapt to dynamic changes in electromagnetic noise and struggle to determine jamming effectiveness, leading to low jamming efficiency and severe energy waste in non-networked scenarios. To address this issue, this paper establishes a game process and corresponding algorithm for non-networked communication countermeasures and designs cognitive, cooperative, and scheduling strategies for individual jammers. Meanwhile, a novel performance metric called the “Overall Communication Suppression Ratio (OCSR)” is proposed. This metric quantifies the relationship between “sustained full-suppression duration” and “ operating duration of the jamming system,” overcoming the defect that traditional metrics cannot evaluate the dynamic jamming effectiveness in non-networked scenarios. Experimental results indicate that although the OCSR of the proposed Intelligent Concentric Circle Algorithm (ICCA) is significantly lower than that of the Full-Power Jamming Algorithm (FPJA), ICCA extends the operating duration of the jamming system by 4.8%. This achieves non-uniform power setting of jammers, enabling flexible and dynamic jamming in non-networked scenarios and retaining more battery capacity for jammers after overall jamming failure. Full article
Show Figures

Figure 1

44 pages, 648 KB  
Systematic Review
A Systematic Review and Energy-Centric Taxonomy of Jamming Attacks and Countermeasures in Wireless Sensor Networks
by Carlos Herrera-Loera, Carolina Del-Valle-Soto, Leonardo J. Valdivia, Javier Vázquez-Castillo and Carlos Mex-Perera
Sensors 2026, 26(2), 579; https://doi.org/10.3390/s26020579 - 15 Jan 2026
Viewed by 123
Abstract
Wireless Sensor Networks (WSNs) operate under strict energy constraints and are therefore highly vulnerable to radio interference, particularly jamming attacks that directly affect communication availability and network lifetime. Although jamming and anti-jamming mechanisms have been extensively studied, energy is frequently treated as a [...] Read more.
Wireless Sensor Networks (WSNs) operate under strict energy constraints and are therefore highly vulnerable to radio interference, particularly jamming attacks that directly affect communication availability and network lifetime. Although jamming and anti-jamming mechanisms have been extensively studied, energy is frequently treated as a secondary metric, and analyses are often conducted in partial isolation from system assumptions, protocol behavior, and deployment context. This fragmentation limits the interpretability and comparability of reported results. This article presents a systematic literature review (SLR) covering the period from 2004 to 2024, with a specific focus on energy-aware jamming and mitigation strategies in IEEE 802.15.4-based WSNs. To ensure transparency and reproducibility, the literature selection and refinement process is formalized through a mathematical search-and-filtering model. From an initial corpus of 482 publications retrieved from Scopus, 62 peer-reviewed studies were selected and analyzed across multiple dimensions, including jamming modality, affected protocol layers, energy consumption patterns, evaluation assumptions, and deployment scenarios. The review reveals consistent energy trends among constant, random, and reactive jamming strategies, as well as significant variability in the energy overhead introduced by defensive mechanisms at the physical (PHY), Medium Access Control (MAC), and network layers. It further identifies persistent methodological challenges, such as heterogeneous energy metrics, incomplete characterization of jamming intensity, and the limited use of real-hardware testbeds. To address these gaps, the paper introduces an energy-centric taxonomy that explicitly accounts for attacker–defender energy asymmetry, cross-layer interactions, and recurring experimental assumptions, and proposes a minimal set of standardized energy-related performance metrics suitable for IEEE 802.15.4 environments. By synthesizing energy behaviors, trade-offs, and application-specific implications, this review provides a structured foundation for the design and evaluation of resilient, energy-proportional WSNs operating under availability-oriented adversarial interference. Full article
(This article belongs to the Special Issue Security and Privacy in Wireless Sensor Networks (WSNs))
Show Figures

Figure 1

15 pages, 3234 KB  
Article
Optically Transparent Frequency Selective Surfaces for Electromagnetic Shielding in Cybersecurity Applications
by Pierpaolo Usai, Gabriele Sabatini, Danilo Brizi and Agostino Monorchio
Appl. Sci. 2026, 16(2), 821; https://doi.org/10.3390/app16020821 - 13 Jan 2026
Viewed by 287
Abstract
With the widespread diffusion of personal Internet of Things (IoT) devices, Electromagnetic Side-Channel Attacks (EM-SCAs), which exploit electromagnetic emissions to uncover critical data such as cryptographic keys, are becoming extremely common. Existing shielding approaches typically rely on bulky or opaque materials, which limit [...] Read more.
With the widespread diffusion of personal Internet of Things (IoT) devices, Electromagnetic Side-Channel Attacks (EM-SCAs), which exploit electromagnetic emissions to uncover critical data such as cryptographic keys, are becoming extremely common. Existing shielding approaches typically rely on bulky or opaque materials, which limit integration in modern IoT environments; this motivates the need for a transparent, lightweight, and easily integrable solution. Thus, to address this threat, we propose the use of electromagnetic metasurfaces with shielding capabilities, fabricated with an optically transparent conductive film. This film can be easily integrated into glass substrates, offering a novel and discrete shielding solution to traditional methods, which are typically based on opaque dielectric media. The paper presents two proof-of-concept case studies for shielding against EM-SCAs. The first one investigates the design and fabrication of a passive metasurface aimed at shielding emissions from chip processors in IoT devices. The metasurface is conceived to attenuate a specific frequency range, characteristic of the considered IoT processor, with a target attenuation of 30 dB. At the same time, the metasurface ensures that signals from 4G and 5G services are not affected, thus preserving normal wireless communication functioning. Conversely, the second case study introduces an active metasurface for dynamic shielding/transmission behavior, which can be modulated through diodes according to user requirements. This active metasurface is designed to block undesired electromagnetic emissions within the 150–465 MHz frequency range, which is a common band for screen gleaning security threats. The experimental results demonstrate an attenuation of approximately 10 dB across the frequency band when the shielding mode is activated, indicating a substantial reduction in signal transmission. Both the case studies highlight the potential of transparent metasurfaces for secure and dynamic electromagnetic shielding, suggesting their discrete integration in building windows or other environmental structural elements. Full article
(This article belongs to the Special Issue Cybersecurity: Novel Technologies and Applications)
Show Figures

Figure 1

56 pages, 1834 KB  
Review
Detection and Mitigation of Cyber Attacks on UAV Networks
by Jack Burbank, Toro Caleb, Emmanuela Andam and Naima Kaabouch
Electronics 2026, 15(2), 317; https://doi.org/10.3390/electronics15020317 - 11 Jan 2026
Viewed by 160
Abstract
The topic of Unmanned Aerial Vehicle (UAV) cybersecurity has received significant recent interest from the research community, with many methods proposed in the literature to improve detect and mitigate various types of attacks. This paper provides a comprehensive review of UAV cybersecurity, addressing [...] Read more.
The topic of Unmanned Aerial Vehicle (UAV) cybersecurity has received significant recent interest from the research community, with many methods proposed in the literature to improve detect and mitigate various types of attacks. This paper provides a comprehensive review of UAV cybersecurity, addressing all aspects of the UAV ecosystem and presenting a thorough review of the various types of UAV attacks, including a survey of recent real-world UAV cybersecurity incidents. UAV cybersecurity threat analysis and risk assessment methodologies are reviewed, discussing how potential attacks translate to UAV system risk. The various threat detection and countermeasure (mitigation) techniques are analyzed. Finally, this paper’s unique contribution is that it provides a survey of existing tools and datasets that are available to UAV cybersecurity researchers. A key identified research gap is the need to conduct real-world experimentation to validate proposed cybersecurity techniques. Many proposed approaches are computationally expensive or require additional redundant hardware onboard the UAV. Future research should focus on the development of lightweight methods that are practical for UAV adoption. Another key research gap is the relative lack of RemoteID cybersecurity research, despite its mandated adoption by UAVs. Lastly, this paper concludes that Global Positioning System (GPS)-related threats pose the greatest continued risk to UAVs. Full article
(This article belongs to the Special Issue Advances in UAV-Assisted Wireless Communications)
Show Figures

Figure 1

24 pages, 10050 KB  
Article
Temporal and Spatial Variation Pattern of Groundwater Storage and Response to Environmental Changes in Shandong Province
by Yanyang Bi and Xiucui Tan
Water 2026, 18(2), 189; https://doi.org/10.3390/w18020189 - 10 Jan 2026
Viewed by 189
Abstract
Based on GRACE RL06 data, this study reconstructs a monthly Terrestrial Water Storage Anomaly (TWSA) series in Shandong Province (2003–2024) using Singular Spectrum Analysis (SSA) and derives Groundwater Storage Anomaly (GWSA) via the water balance equation. The spatiotemporal evolution characteristics of GWSA were [...] Read more.
Based on GRACE RL06 data, this study reconstructs a monthly Terrestrial Water Storage Anomaly (TWSA) series in Shandong Province (2003–2024) using Singular Spectrum Analysis (SSA) and derives Groundwater Storage Anomaly (GWSA) via the water balance equation. The spatiotemporal evolution characteristics of GWSA were systematically examined, and the relative contributions of climatic factors and human activities to groundwater storage changes were quantitatively assessed, with the aim of contributing to the development, utilization, and protection of groundwater in Shandong Province. The results indicate that temporally, GWSA in Shandong Province exhibited a statistically significant decreasing trend at a rate of −8.45 mm/a (p < 0.01). The maximum GWSA value of 17.15 mm was recorded in 2006, while the Mann–Kendall abrupt change-point analysis identified 2013 as a significant transition point. Following this abrupt change, GWSA demonstrated a persistent decline, reaching the minimum annual average of −225.78 mm in 2020. Although moderate recovery was observed after 2020, GWSA values remained substantially lower than those in the pre-abrupt change period. Seasonal analysis revealed a distinct “higher in autumn and lower in spring” pattern, with the most pronounced fluctuations occurring in summer and the most stable conditions in winter. Spatially, approximately 99.1% of the study area showed significant decreasing trends, displaying a clear east–west gradient with more severe depletion in inland regions compared to relatively stable coastal areas. Crucially, human activities emerged as the dominant driving factor, with an average contribution rate of 86.11% during 2003–2024. The areal proportion where human activities served as the decisive factor (contribution rate > 80%) increased dramatically to 99.58%. Furthermore, the impact of human activities demonstrated bidirectional characteristics, transitioning from negative influences during the depletion phase to positive contributions promoting groundwater recovery in recent years. At present, the GWSA in Shandong Province is expected to continue declining in the future, with an overall downward trend. Countermeasures must be implemented promptly. Full article
(This article belongs to the Section Hydrology)
Show Figures

Figure 1

22 pages, 2835 KB  
Article
Research on Enhancing Disaster-Resilient Power Supply Capabilities in Distribution Networks Through Coordinated Clustering of Distributed PV Systems and Mobile Energy Storage System
by Yan Gao, Long Gao, Maosen Fan, Yuan Huang, Junchao Wang and Peixi Ma
Electronics 2026, 15(2), 299; https://doi.org/10.3390/electronics15020299 - 9 Jan 2026
Viewed by 148
Abstract
To enhance the power supply resilience of distribution networks with high-penetration distributed photovoltaic (PV) integration during extreme disasters, deploying Mobile Energy Storage Systems (MESSs) proves to be an effective countermeasure. This paper proposes an optimized operational strategy for distribution networks, integrating coordinated clustering [...] Read more.
To enhance the power supply resilience of distribution networks with high-penetration distributed photovoltaic (PV) integration during extreme disasters, deploying Mobile Energy Storage Systems (MESSs) proves to be an effective countermeasure. This paper proposes an optimized operational strategy for distribution networks, integrating coordinated clustering of distributed PV systems and MESS operation to ensure power supply during both pre-disaster prevention and post-disaster restoration phases. In the pre-disaster prevention phase, an improved Louvain algorithm is first applied for PV clustering to improve source-load matching efficiency within each cluster, thereby enhancing intra-cluster power supply security. Subsequently, under the worst-case scenarios of PV output fluctuations, a robust optimization algorithm is utilized to optimize the pre-deployment scheme of MESS. In the post-disaster restoration phase, cluster re-partitioning is performed with the goal of minimizing load shedding to ensure power supply, followed by reoptimizing the scheduling of MESS deployment and its charging/discharging power to maximize the improvement of load power supply security. Simulations on a modified IEEE 123-bus distribution network, which includes two MESS units and twenty-four PV systems, demonstrate that the proposed strategy improved the overall restoration rate from 68.98% to 86.89% and increased the PV utilization rate from 47.05% to 86.25% over the baseline case, confirming its significant effectiveness. Full article
Show Figures

Figure 1

22 pages, 367 KB  
Article
The Common Prosperity Effect of Integrated Urban Rural Development: Evidence from China
by Junguo Hua, Yu Jing, Juan Wang and Jing Ding
Sustainability 2026, 18(2), 683; https://doi.org/10.3390/su18020683 - 9 Jan 2026
Viewed by 198
Abstract
Common prosperity is an essential requirement of socialism with Chinese characteristics for a new era. Problems caused by the urban rural dual structure, such as resource misallocation, ecological-economic imbalance, and insufficient farmer income growth, not only hinder common prosperity but also conflict with [...] Read more.
Common prosperity is an essential requirement of socialism with Chinese characteristics for a new era. Problems caused by the urban rural dual structure, such as resource misallocation, ecological-economic imbalance, and insufficient farmer income growth, not only hinder common prosperity but also conflict with the sustainable development strategy. As the core path to break the dual structure and narrow gaps, the multi-dimensional impact and mechanism of urban rural integrated development on common prosperity need systematic verification. Based on panel data of 31 Chinese provinces from 2014 to 2023, this paper uses fixed-effects and mechanism test models to examine its direct, indirect, and spatial spillover effects, focusing on transmission mechanisms of wage, property, and operating incomes. Findings show: First, it exerts significant positive direct and cross-regional spillover effects on common prosperity; Second, wage and property incomes are key transmission paths, while operating income’s mediating effect is unclear; Third, effects vary geographically, stronger in eastern/central China, weaker in northeast China and insignificant in west China; Fourth, economic and spatial integration play prominent roles, social service integration has inhibitory effect, and ecological integration’s effect is under-released. Accordingly, this paper puts forward countermeasures to optimize resource allocation, tackle the rural operating income dilemma, advance regional coordination, and enhance equal social services, providing references for improving common prosperity policies and rural sustainable development. Full article
Show Figures

Figure 1

Back to TopTop