Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (5,081)

Search Parameters:
Keywords = cyber-security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
51 pages, 1270 KB  
Review
Human-in-the-Loop Artificial Intelligence: A Systematic Review of Concepts, Methods, and Applications
by Konstantinos Lazaros, Aristidis G. Vrahatis and Sotiris Kotsiantis
Entropy 2026, 28(4), 377; https://doi.org/10.3390/e28040377 (registering DOI) - 26 Mar 2026
Abstract
The integration of human judgment into artificial intelligence (AI) systems has emerged as a key research direction, particularly for high-stakes applications where full automation remains insufficient. Human-in-the-Loop (HITL) AI represents a field that combines machine learning capabilities with human oversight, feedback, and decision-making [...] Read more.
The integration of human judgment into artificial intelligence (AI) systems has emerged as a key research direction, particularly for high-stakes applications where full automation remains insufficient. Human-in-the-Loop (HITL) AI represents a field that combines machine learning capabilities with human oversight, feedback, and decision-making at various stages of the AI pipeline. This survey provides a systematic review of HITL approaches, covering theoretical foundations, technical methods, ethical considerations, and domain-specific applications. We propose a unified taxonomy that categorizes HITL systems based on loop placement, interaction granularity, and temporal characteristics. This review synthesizes findings from healthcare, autonomous systems, cybersecurity, and other high-risk domains where human oversight is essential. We also examine the challenges of scalability, cognitive load, and trust calibration that affect the practical deployment of HITL systems. The final section outlines open research directions and introduces a framework for designing effective human–AI collaborative systems. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
23 pages, 1201 KB  
Article
NeSySwarm-IDS: End-to-End Differentiable Neuro-Symbolic Logic for Privacy-Preserving Intrusion Detection in UAV Swarms
by Gang Yang, Lin Ni, Tao Xia, Qinfang Shi and Jiajian Li
Appl. Sci. 2026, 16(7), 3204; https://doi.org/10.3390/app16073204 - 26 Mar 2026
Abstract
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) [...] Read more.
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) suffer from opacity, prohibitive resource consumption, and vulnerability to gradient leakage attacks in federated settings, while traditional rule-based systems fail to handle encrypted payloads and evolving attack patterns. To bridge this gap, we present NeSySwarm-IDS (Neuro-Symbolic Swarm Intrusion Detection System), an end-to-end differentiable neuro-symbolic framework that simultaneously achieves high accuracy, strong privacy guarantees, and built-in interpretability under resource constraints. NeSySwarm-IDS integrates an extremely lightweight 1D convolutional neural network with a differentiable ukasiewicz fuzzy logic reasoner incorporating attack-specific rules. By aggregating only low-dimensional logic rule weights with calibrated differential privacy noise, we drastically reduce communication overhead while providing (ϵ,δ)-DP guarantees with negligible utility loss. Extensive experiments on the UAV-NIDD dataset and our self-collected dataset demonstrate that NeSySwarm-IDS achieves near-perfect detection accuracy, significantly outperforming traditional machine learning baselines despite using limited training data. A detailed case study on GPS spoofing confirms the interpretability of our approach, providing axiomatic explanations suitable for autonomous mission verification. These results establish that end-to-end neuro-symbolic learning can effectively bridge the semantic gap in UAV swarm security while ensuring privacy and interpretability, offering a practical pathway for deploying trustworthy AI in contested environments. Full article
(This article belongs to the Special Issue Cyberspace Security Technology in Computer Science)
20 pages, 403 KB  
Article
The Impact of Cybersecurity Governance on Corporate Digital Marketing: Evidence from Chinese A-Share Listed Firms
by Yushun Han and Bing He
J. Theor. Appl. Electron. Commer. Res. 2026, 21(4), 102; https://doi.org/10.3390/jtaer21040102 - 26 Mar 2026
Abstract
In the digital economy era, digital marketing has become a key strategy for firms seeking competitive advantage. However, its reliance on data has heightened exposure to cybersecurity risks. While existing research highlights the importance of digital transformation, less is known about how cybersecurity [...] Read more.
In the digital economy era, digital marketing has become a key strategy for firms seeking competitive advantage. However, its reliance on data has heightened exposure to cybersecurity risks. While existing research highlights the importance of digital transformation, less is known about how cybersecurity governance influences firms’ digital marketing activities. Drawing on signalling theory and the resource-based view, this study uses panel data from Chinese A-share listed firms during 2012–2023 to examine the impact of cybersecurity governance on digital marketing and its underlying mechanisms. The results show that effective cybersecurity governance significantly enhances firms’ digital marketing engagement. Mechanism analyses identify three channels. First, by preventing data breaches and negative incidents, firms enhance corporate reputation. Second, by creating a secure operating environment, cybersecurity governance strengthens risk-taking capacity and encourages marketing innovation. Third, by improving information disclosure and stakeholder communication, it alleviates information asymmetry. Heterogeneity analyses indicate that the positive effect is more pronounced for non-state-owned enterprises, firms in eastern regions, and high-tech firms. This study fills a gap in the literature by linking cybersecurity governance path to digital marketing and contributes to research on its economic consequences. The findings also offer practical implications for strengthening internal governance to support external market activities. Full article
Show Figures

Figure 1

38 pages, 1490 KB  
Review
Technological Advances in Energy Storage: Environmental and Cyber Challenges, Opportunities and Threats—A Review
by Piotr Filipowicz, Michał Dziuba and Bogdan Saletnik
Sustainability 2026, 18(7), 3230; https://doi.org/10.3390/su18073230 - 26 Mar 2026
Abstract
Energy storage plays a key role in the energy transition by enabling the effective integration of variable renewable energy sources such as solar and wind power and by supporting the stability and flexibility of modern energy systems. The rapid development of energy storage [...] Read more.
Energy storage plays a key role in the energy transition by enabling the effective integration of variable renewable energy sources such as solar and wind power and by supporting the stability and flexibility of modern energy systems. The rapid development of energy storage technologies has become one of the pillars of sustainable energy management; however, it simultaneously raises environmental, material, and systemic challenges. This review analyses the environmental implications of energy storage development using an integrative perspective that combines technological, environmental, and system-level analysis. The paper examines major classes of energy storage technologies, including electrochemical, mechanical and physical, thermal energy storage, and chemical pathways within Power-to-X, with particular emphasis on their technical characteristics, maturity, and life cycle environmental performance. Lithium-ion battery systems typically achieve round-trip efficiencies of 85–92% and cycle lifetimes exceeding 5000 cycles, while flow batteries may exceed 10,000 cycles under stationary operating conditions. Mechanical storage technologies such as pumped hydro provide efficiencies of approximately 70–85% with operational lifetimes exceeding several decades. Key challenges related to critical raw material availability, recycling, end-of-life management, and ecosystem impacts are discussed, highlighting the importance of sustainable production and recovery strategies in supporting the circular economy. In addition, the review addresses the consequences of insufficient reuse of secondary materials and the growing relevance of digitisation and cyber resilience of energy storage systems as indirect contributors to environmental risk. The review also considers geopolitical aspects related to critical material supply chains and the cyber security of energy storage infrastructure, emphasising their growing importance for the resilience and environmental sustainability of future energy systems. The analysis indicates that further development of energy storage technologies will significantly influence not only power systems but also transport, industry, and heat sectors. The results emphasise that sustainable deployment of energy storage requires hybrid system architectures and policy frameworks that account for environmental performance, system flexibility, and long-term resilience in line with the principles of sustainable development. Full article
Show Figures

Figure 1

31 pages, 5541 KB  
Article
Preference-Guided Reinforcement Learning for Dynamic Green Flexible Assembly Job Shop Scheduling with Learning–Forgetting Effects
by Ruyi Wang, Xiaojuan Liao, Guangzhu Chen, Yaxin Liu and Leyuan Liu
Sustainability 2026, 18(7), 3222; https://doi.org/10.3390/su18073222 - 25 Mar 2026
Abstract
With the evolution from Industry 4.0 to 5.0, flexible assembly scheduling must simultaneously address production efficiency, environmental sustainability, and human factors, while remaining adaptive to real-time disruptions. This study investigates the dynamic green scheduling problem in dual-resource Flexible Assembly Job Shops with worker [...] Read more.
With the evolution from Industry 4.0 to 5.0, flexible assembly scheduling must simultaneously address production efficiency, environmental sustainability, and human factors, while remaining adaptive to real-time disruptions. This study investigates the dynamic green scheduling problem in dual-resource Flexible Assembly Job Shops with worker learning and forgetting, aiming to minimize makespan and total energy consumption. To tackle this problem, a Hierarchical Dual-Agent Deep Reinforcement Learning algorithm (HAD-DRL) is proposed. The framework integrates a Heterogeneous Graph Neural Network to extract real-time workshop states and employs two collaborative agents, i.e., a high-level preference decision agent and a low-level scheduling execution agent. The upper agent dynamically adjusts the preference weights between economic and environmental objectives, while the lower agent generates corresponding scheduling actions. Unlike existing multi-agent methods that optimize a single objective at each step, HAD-DRL achieves adaptive coordination and balanced trade-offs among conflicting goals. Experimental results demonstrate that the proposed method outperforms heuristic and baseline DRL approaches in both objectives, validating its effectiveness and practical applicability for intelligent and sustainable manufacturing. Full article
(This article belongs to the Special Issue Sustainable Manufacturing Systems in the Context of Industry 4.0)
Show Figures

Figure 1

20 pages, 1442 KB  
Article
FedTheftDetect: Optimizing Anomaly Detection in Smart Grid Metering Systems Using Federated Learning
by Samar M. Nour, Ahmed Rady, Mohammed S. Hussien, Sameh A. Salem and Samar A. Said
Computers 2026, 15(4), 202; https://doi.org/10.3390/computers15040202 - 25 Mar 2026
Abstract
The detection of anomaly energy consumption patterns in smart grid metering systems remains a critical issue. This is due to data imbalance, privacy constraints, and the dynamic nature of consumption patterns. To address these concerns, we present a privacy-preserving and scalable anomaly detection [...] Read more.
The detection of anomaly energy consumption patterns in smart grid metering systems remains a critical issue. This is due to data imbalance, privacy constraints, and the dynamic nature of consumption patterns. To address these concerns, we present a privacy-preserving and scalable anomaly detection framework named as FedTheftDetect framework. The proposed framework integrates deep learning algorithms into a federated learning (FL) architecture through the incorporation of advanced ensemble classifiers to detect behavioral anomalies in daily consumption patterns. A real-world smart meter dataset with significant class imbalance is used to assess the suggested framework. The dataset had significant preprocessing to identify consumption-related anomalies in behavior. Experimental results demonstrate that the suggested framework outperforms the competitive centralized and distributed models. It achieves significant improvements in Accuracy, Precision, Recall, and F1-score, all of which are close to 0.95, which indicates a great predictive capability and reliability. Full article
(This article belongs to the Section ICT Infrastructures for Cybersecurity)
Show Figures

Figure 1

33 pages, 2907 KB  
Article
Reimagining Bitcoin Mining as a Virtual Energy Storage Mechanism in Grid Modernization: Enhancing Security, Sustainability, and Resilience of Smart Cities Against False Data Injection Cyberattacks
by Ehsan Naderi
Electronics 2026, 15(7), 1359; https://doi.org/10.3390/electronics15071359 - 25 Mar 2026
Abstract
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and [...] Read more.
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and controllable load capable of delivering large-scale demand response services, positioning it as a competitive alternative to traditional energy storage systems, including electrical, mechanical, thermal, chemical, and electrochemical storage solutions. By strategically aligning mining activities with grid conditions, Bitcoin mining can absorb excess electricity during periods of oversupply, converting it into digital assets, and reduce operations during times of scarcity, effectively emulating the behavior of conventional energy storage systems without the associated capital expenditures and material requirements. Beyond its operational flexibility, this paper explores the cyber–physical benefits of integrating Bitcoin mining into the power transmission systems as a defensive mechanism against false data injection (FDI) cyberattacks in smart city infrastructure. To achieve this goal, a decentralized and adaptive control strategy is proposed, in which mining loads dynamically adjust based on authenticated grid-state information, thereby improving system observability and hindering adversarial efforts to disrupt state estimation. In addition, to handle the proposed approach, this paper introduces a high-performance algorithm, a combination of quantum-augmented particle swarm optimization and wavelet-oriented whale optimization (QAPSO-WOWO). Simulation results confirm that strategic deployment of mining loads improves grid sustainability by utilizing curtailed renewables, enhances resilience by mitigating load-generation imbalances, and bolsters cybersecurity by reducing the impacts of FDI attacks. This work lays the foundation for a transdisciplinary paradigm shift, positioning Bitcoin mining not as a passive energy consumer but as an active participant in securing and stabilizing the future power grid in smart cities. Full article
Show Figures

Figure 1

16 pages, 897 KB  
Data Descriptor
A Dataset Capturing Decision Processes, Tool Interactions and Provenance Links in Autonomous AI Agents
by Yasser Hmimou, Mohamed Tabaa, Azeddine Khiat and Zineb Hidila
Data 2026, 11(4), 66; https://doi.org/10.3390/data11040066 (registering DOI) - 25 Mar 2026
Abstract
Agent-based systems built on large language models (LLMs) increasingly rely on complex internal reasoning processes, tool interactions, and memory mechanisms. However, the internal decision-making dynamics of such agents remain difficult to observe, analyze, and compare in a systematic manner. To address this limitation, [...] Read more.
Agent-based systems built on large language models (LLMs) increasingly rely on complex internal reasoning processes, tool interactions, and memory mechanisms. However, the internal decision-making dynamics of such agents remain difficult to observe, analyze, and compare in a systematic manner. To address this limitation, we present AgentSec, a curated dataset of structured agent interaction traces designed to support the analysis of agent-level reasoning and action behaviors. The dataset consists of 30 deterministic and non-redundant scenario instances, each capturing a complete agent interaction session under a fixed and validated schema. Quantitatively, the 30 released sessions comprise 67 decision nodes and 45 tool calls (73.3% successful), with provenance graphs exhibiting an average depth of 4.53 (max 7) and a maximum branching factor of 3. Scenarios are organized according to a predefined taxonomy of agent behavioral patterns, including tool success and failure modes, fallback strategies, memory conflicts and overwrites, decision rollbacks, and provenance branching structures. Each scenario encodes a distinct analytical case rather than a parametric variation, enabling focused and interpretable study of agent decision-making processes. AgentSec provides detailed records of decision traces, tool calls, memory updates, and provenance relations, and is intended to facilitate reproducible research on agent behavior analysis, auditing, and evaluation. The dataset is released alongside its schema, scenario manifest, and validation tooling to support reuse and extension by the research community. Rather than serving as a large-scale performance benchmark, AgentSec is explicitly designed as a diagnostic and unit-test suite for auditing agent-level reasoning logic and provenance consistency under controlled structural conditions. Full article
Show Figures

Figure 1

30 pages, 564 KB  
Article
A Context-Aware Cybersecurity Readiness Assessment Framework for Organisations in Developing and Emerging Environments
by Raymond Agyemang, Steven Furnell and Tim Muller
Future Internet 2026, 18(4), 178; https://doi.org/10.3390/fi18040178 - 24 Mar 2026
Abstract
Organisations increasingly face complex cybersecurity threats shaped not only by internal capabilities but also by external regulatory, institutional, and environmental conditions. While existing cybersecurity standards and maturity models provide valuable guidance, they often offer limited support for assessing organisational readiness in a manner [...] Read more.
Organisations increasingly face complex cybersecurity threats shaped not only by internal capabilities but also by external regulatory, institutional, and environmental conditions. While existing cybersecurity standards and maturity models provide valuable guidance, they often offer limited support for assessing organisational readiness in a manner that is both context-sensitive and diagnostically meaningful. This paper presents a context-aware cybersecurity readiness assessment framework designed to support organisational evaluation of cybersecurity readiness while explicitly accounting for external environmental influences. The framework adopts a two-tier architecture. Tier 1 assesses organisational awareness of and engagement with the external cybersecurity environment, including national regulatory obligations, institutional support mechanisms, and international collaboration. Tier 2 evaluates internal organisational cybersecurity readiness across governance, operational controls, awareness and culture, and external collaboration practices. The two tiers are designed to operate independently, enabling complementary interpretation without assuming deterministic relationships between external context and internal capability. The framework is developed and evaluated using a Design Science Research approach and is operationalised through a structured assessment instrument and an interpretable scoring model. Empirical validation is conducted across multiple organisational contexts operating in developing and emerging environments, with qualitative case study evidence where available. The results demonstrate that the framework differentiates meaningfully across readiness domains, avoids artificial score inflation or compression, and supports interpretable diagnosis of alignment gaps between external expectations and internal practices. The study contributes a validated assessment artefact that extends cybersecurity awareness research into a broader organisational readiness perspective. From a practical standpoint, the framework provides organisations, policymakers, and researchers with a structured tool to support incremental improvement, informed decision-making, and reflective engagement with both internal cybersecurity practices and external environmental conditions. Full article
Show Figures

Figure 1

20 pages, 1326 KB  
Systematic Review
Reimagining Traditional Workspaces Through Digitalisation and Hybrid Perspective: A Systematic Review
by Ayogeboh Epizitone and Smangele Pretty Moyane
Informatics 2026, 13(4), 46; https://doi.org/10.3390/informatics13040046 - 24 Mar 2026
Viewed by 54
Abstract
Workspace digitalisation presents a transformative shift from traditional, physically bounded offices to virtual, technology-enabled environments. Digital technologies like cloud computing, artificial intelligence, and the Internet of Things enable remote collaboration, data accessibility, and operational efficiency, thereby accelerating this transformation. Digital workspaces transcend geographical [...] Read more.
Workspace digitalisation presents a transformative shift from traditional, physically bounded offices to virtual, technology-enabled environments. Digital technologies like cloud computing, artificial intelligence, and the Internet of Things enable remote collaboration, data accessibility, and operational efficiency, thereby accelerating this transformation. Digital workspaces transcend geographical limitations, enabling a more flexible, inclusive, and adaptive work culture. They offer better work–life balance, with flexible options, reduced commuting time, and increased personal autonomy and control over commitments, compared to traditional workspaces. Despite these benefits, digitalisation creates cybersecurity, data privacy, and digital divide issues, where unequal access to digital tools and skills can exacerbate social and economic inequalities. The lack of physical interaction affects team cohesion and company culture. Hence, this paper explores these phenomena to uncover their implications and consider possible strategies to optimise workspace digitalisation, providing a comprehensive systematic review of extant literature within the study context, offering pragmatic insights and recommendations for workspaces. This study has found workspace digitalisation to be a complex, multifaceted phenomenon that provides flexibility, efficiency, and innovation, but also poses challenges that must be carefully managed. It postulates that as technology and work progress, a hybrid model that blends digital and traditional workspaces would be suited to each organisation’s needs and goals. Full article
(This article belongs to the Section Social Informatics and Digital Humanities)
Show Figures

Figure 1

21 pages, 300 KB  
Article
Tides of Change: Counter-Terrorism, Rights, and Commercial Efficiency in UK Ports
by Selina Wai Ming Robinson
Laws 2026, 15(2), 21; https://doi.org/10.3390/laws15020021 - 24 Mar 2026
Viewed by 76
Abstract
UK ports handle the vast majority of national trade by volume and constitute Critical National Infrastructure. Since 2004, the SOLAS/ISPS Code and the Port Security Regulations 2009 have established baseline security requirements, recently supplemented by the National Security and Investment Act 2021 and [...] Read more.
UK ports handle the vast majority of national trade by volume and constitute Critical National Infrastructure. Since 2004, the SOLAS/ISPS Code and the Port Security Regulations 2009 have established baseline security requirements, recently supplemented by the National Security and Investment Act 2021 and the National Security Act 2023, creating overlapping obligations. This contribution maps the evolving regulatory framework (ISPS/Port Security Regulations, NSI 2021, NSA 2023, and CNI-related guidance). It assesses operational impacts using industry metrics and draws comparative lessons from Singapore and Rotterdam. Empirical research indicates that security regulation is not uniformly detrimental to performance: targeted, intelligence-led, and technology-enabled measures can coincide with productivity gains, whereas fragmented or blanket compliance regimes are more consistently associated with increased dwell times and throughput loss. These delays propagate through supply chains and intensify cost pressures, with proportionally greater impacts on mid-sized ports. Comparative evidence indicates that risk-based screening, integrated cyber–physical platforms, transparent governance, and clear cost-sharing frameworks can maintain security without compromising commercial performance. The contribution recommends (i) tiered, risk-based screening with transparent indicators; (ii) the consolidation of overlapping regulatory obligations; (iii) clearer liability frameworks, including model terms and alternative dispute resolution; and (iv) scheduled review provisions to maintain proportionality over time. Full article
(This article belongs to the Special Issue Criminal Justice: Rights and Practice)
34 pages, 1728 KB  
Systematic Review
Integrating Machine Learning and Business Intelligence into Supply Chain Risk Management for a Comprehensive Cybersecurity Framework: A Systematic Literature Review
by Rasha Aljaafreh, Firas Al-Doghman, Farookh Hussain, Fazlullah Khan and Ali Aljaafreh
Technologies 2026, 14(4), 194; https://doi.org/10.3390/technologies14040194 - 24 Mar 2026
Viewed by 78
Abstract
Supply chain cybersecurity is a growing concern for businesses as they utilize increasingly interconnected digital systems. This systematic literature review examines how machine learning (ML) and business intelligence (BI) may be used in conjunctions to improve supply chain cyber security risk management. This [...] Read more.
Supply chain cybersecurity is a growing concern for businesses as they utilize increasingly interconnected digital systems. This systematic literature review examines how machine learning (ML) and business intelligence (BI) may be used in conjunctions to improve supply chain cyber security risk management. This review followed PRISMA guidelines. A quality evaluation was performed based on CASP to evaluate 35 peer-reviewed articles published in 2016–2025. The review analysis indicates that although ML has been extensively utilized for threat detection, BI utilization is fragmented. Additionally, there is a lack of integrated ML-BI frameworks, specifically for small–medium enterprises (SMEs) and developing economies. As such, this literature review provides a conceptual four-layer framework of predictive and analytical capabilities for threat detection, risk assessment, and decision-making. It also identifies a structured research agenda with which to advance the field of research. Full article
(This article belongs to the Special Issue Research on Security and Privacy of Data and Networks)
Show Figures

Figure 1

38 pages, 5627 KB  
Article
Documenting Security Assurance for Resource-Constrained IIoT Devices—The CERTIFY Project Methodology
by Valerio Senni, Simone Fulvio Rollini and Fabio Federici
Electronics 2026, 15(6), 1337; https://doi.org/10.3390/electronics15061337 - 23 Mar 2026
Viewed by 92
Abstract
Securing resource-constrained Industrial Internet of Things (IIoT) devices requires guarantees of integrity and confidentiality. This paper presents a security framework developed under the CERTIFY project to document and justify trustworthy execution of sensitive software running on resource-constrained devices. Our architecture model assumes the [...] Read more.
Securing resource-constrained Industrial Internet of Things (IIoT) devices requires guarantees of integrity and confidentiality. This paper presents a security framework developed under the CERTIFY project to document and justify trustworthy execution of sensitive software running on resource-constrained devices. Our architecture model assumes the presence of a separation kernel, that employs hardware Memory Protection Units to enforce Memory isolation and mediate communications during boot, provisioning, and run-time. On the other side, the paper does not cover implementation aspects, but leaves them to the choice of the user intending to adopt the proposed solution architecture. To systematically show the trustworthiness of this proposed architecture, we develop an assurance case using Goal Structuring Notation: we map system requirements to architecture-specific security objectives and introduce a novel “attacker action” graphical element to explicitly integrate threat modeling into our arguments. The resulting assurance case provides a structured, auditable, and reusable foundation architecture for the secure implementation of the CERTIFY IIoT framework. Full article
(This article belongs to the Special Issue New Technologies for Cybersecurity)
Show Figures

Figure 1

42 pages, 916 KB  
Systematic Review
Sustainable AI-Enabled UAV Healthcare Logistics: Environmental, Social, and Governance Implications from a PRISMA-ScR Review
by Patricia Acosta-Vargas, Gloria Acosta-Vargas, Mateo Herrera-Avila, Belén Salvador-Acosta, Juan Pablo Pérez-Vargas, Eduardo A. Donadi and Luis Salvador-Ullauri
Sustainability 2026, 18(6), 3140; https://doi.org/10.3390/su18063140 - 23 Mar 2026
Viewed by 133
Abstract
Artificial intelligence (AI)-enabled unmanned aerial vehicles (UAVs) are rapidly emerging as transformative technologies for sustainable healthcare logistics, particularly in remote and infrastructure-constrained regions. Despite growing implementation, the environmental, social, and governance (ESG) implications of these systems remain insufficiently synthesized in the literature. This [...] Read more.
Artificial intelligence (AI)-enabled unmanned aerial vehicles (UAVs) are rapidly emerging as transformative technologies for sustainable healthcare logistics, particularly in remote and infrastructure-constrained regions. Despite growing implementation, the environmental, social, and governance (ESG) implications of these systems remain insufficiently synthesized in the literature. This study conducts a PRISMA-ScR-guided Systematic Review of 37 peer-reviewed studies selected from 333 records across six major scientific databases (2015–2026). The analysis reveals a sharp acceleration of research after 2021, with over 80% of publications produced between 2021 and 2024, indicating increasing global interest in AI-supported autonomous medical logistics. Evidence demonstrates that AI-enabled drones can substantially reduce delivery times; expand access to blood, vaccines, and essential medicines; and enhance emergency response capacity in rural and disaster-affected environments. From a sustainability perspective, AI-driven route optimization and autonomous navigation may reduce transport-related emissions, supporting climate-responsive healthcare supply chains. However, large-scale deployment remains constrained by regulatory fragmentation, cybersecurity risks, operational limitations, and challenges with social acceptance. This review proposes an ESG-oriented framework linking technological innovation, ethical governance, and equitable healthcare access while identifying key research gaps in lifecycle sustainability assessment, cost-effectiveness modeling, and real-world implementation aligned with the Sustainable Development Goals (SDGs). Full article
Show Figures

Figure 1

24 pages, 3066 KB  
Article
Enhancing Network Traffic Monitoring Through eXplainable Artificial Intelligence Methodologies
by Cătălin-Eugen Bucur, Georgiana Crihan, Anamaria Rădoi, Elena-Grațiela Robe-Voinea and Iustin-Nicolae Moroșan
Telecom 2026, 7(2), 34; https://doi.org/10.3390/telecom7020034 - 23 Mar 2026
Viewed by 160
Abstract
In the contemporary digital landscape, AI (Artificial Intelligence) emerged as a pivotal tool in enhancing the defense technologies developed across the entire network infrastructure. As reliance on AI-based decision-making grew, so did the imperative need for interpretability, transparency, and trustworthiness, leading to the [...] Read more.
In the contemporary digital landscape, AI (Artificial Intelligence) emerged as a pivotal tool in enhancing the defense technologies developed across the entire network infrastructure. As reliance on AI-based decision-making grew, so did the imperative need for interpretability, transparency, and trustworthiness, leading to the development and integration of XAI (eXplainable Artificial Intelligence). This research paper provides a comprehensive overview of the current state of the art in XAI approaches that can be effectively implemented for network traffic monitoring, especially in critical digital infrastructures. The main contribution of this research article consists of the comparative analysis of the XAI SHAP (Shapley Additive Explanation) method applied to different datasets obtained from real-time network traffic monitoring, utilizing several representative parameters, which demonstrates the performance, vulnerabilities, and limitations of the proposed method, and also the security implications of the system resources from a cybersecurity perspective. Experimental results show that Ethernet networks offer higher predictability and clearer decision boundaries. Consequently, they are a safer solution for deployment in sensitive network architectures. In contrast, BYOD (Bring Your Own Device) Wi-Fi environments exhibit greater randomness. Full article
Show Figures

Figure 1

Back to TopTop