Skip Content
You are currently on the new version of our website. Access the old version .

8,617 Results Found

  • Article
  • Open Access
2 Citations
3,918 Views
18 Pages

An Exploratory Study Gathering Security Requirements for the Software Development Process

  • Roberto Andrade,
  • Jenny Torres,
  • Iván Ortiz-Garcés,
  • Jorge Miño and
  • Luis Almeida

25 August 2023

Software development stands out as one of the most rapidly expanding markets due to its pivotal role in crafting applications across diverse sectors like healthcare, transportation, and finance. Nevertheless, the sphere of cybersecurity has also unde...

  • Review
  • Open Access
109 Citations
24,800 Views
38 Pages

9 April 2021

A grave concern to an organization’s information security is employees’ behavior when they do not value information security policy compliance (ISPC). Most ISPC studies evaluate compliance and noncompliance behaviors separately. However, the literatu...

  • Article
  • Open Access
4 Citations
3,489 Views
29 Pages

1 February 2025

Integrating process safety and process security risk management is increasingly essential for enhancing resilience in the chemical process industry. This study addresses how practitioners perceive the integration of these two domains, identifying key...

  • Review
  • Open Access
10 Citations
8,091 Views
28 Pages

Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions

  • Temitope Elizabeth Abioye,
  • Oluwasefunmi Tale Arogundade,
  • Sanjay Misra,
  • Kayode Adesemowo and
  • Robertas Damaševičius

26 November 2021

Despite the attractive benefits of cloud-based business processes, security issues, cloud attacks, and privacy are some of the challenges that prevent many organizations from using this technology. This review seeks to know the level of integration o...

  • Communication
  • Open Access
2 Citations
1,720 Views
11 Pages

21 October 2024

The rapid development of Artificial General Intelligence (AGI) in recent years has provided many new opportunities and challenges for human social production. However, recent evaluation methods have some problems with regard to consistency, subjectiv...

  • Article
  • Open Access
1 Citations
1,944 Views
18 Pages

13 December 2024

Synthetical eco-environmental problems’ treatment is a new stage for certain pollutant control or ecological restoration. Traditional urban planners have focused more on social–economic development but less on eco-environmental considerat...

  • Article
  • Open Access
6 Citations
4,090 Views
17 Pages

Climate Change and Food Security Prioritizing Indices: Applying Analytical Hierarchy Process (AHP) and Social Network Analysis (SNA)

  • Ramesh Allipour Birgani,
  • Amirhossein Takian,
  • Abolghasem Djazayery,
  • Ali Kianirad and
  • Hamed Pouraram

11 July 2022

Food security and climate change are multidimensional issues. Therefore, a lack of knowledge about the most essential variables made these concepts more complex for decision-making and highlighted the need for credible decision support methods. Here,...

  • Article
  • Open Access
1,732 Views
43 Pages

The Process of Using Power Supply Technical Solutions for Electronic Security Systems Operated in Smart Buildings: Modelling, Simulation and Reliability Analysis

  • Michał Wiśnios,
  • Michał Mazur,
  • Sebastian Tatko,
  • Jacek Paś,
  • Adam Rosiński,
  • Jarosław Mateusz Łukasiak,
  • Wiktor Koralewski and
  • Janusz Dyduch

21 December 2024

This article presents selected issues related to the reliability of the power supply for electronic security systems (ESSs) used in smart buildings (SBs). ESSs operate in diverse environmental conditions and are responsible for the safety of lives, p...

  • Article
  • Open Access
4 Citations
3,047 Views
18 Pages

On the Security of Offloading Post-Processing for Quantum Key Distribution

  • Thomas Lorünser,
  • Stephan Krenn,
  • Christoph Pacher and
  • Bernhard Schrenk

24 January 2023

Quantum key distribution (QKD) has been researched for almost four decades and is currently making its way to commercial applications. However, deployment of the technology at scale is challenging because of the very particular nature of QKD and its...

  • Article
  • Open Access
1,286 Views
16 Pages

Bayesian nonparametric methods, particularly the Dirichlet process (DP), have gained increasing popularity in both theoretical and applied research, driven by advances in computing power. Traditional Bayesian estimation, which often relies on Gaussia...

  • Article
  • Open Access
2 Citations
2,858 Views
32 Pages

11 September 2022

Recently, studies on secure database outsourcing have been highlighted for the cloud computing environment. A few secure Top-k query processing algorithms have been proposed in the encrypted database. However, the previous algorithms can support eith...

  • Article
  • Open Access
1 Citations
3,298 Views
25 Pages

This research aims to explain the role of food processing in improving the sustainability of food security under the framework of ‘Goal 2’ associated with the Sustainable Development Goals (SDGs). The research methodology relied on descri...

  • Review
  • Open Access
9 Citations
5,478 Views
27 Pages

A Review: Image Processing Techniques’ Roles towards Energy-Efficient and Secure IoT

  • Abbas M. Al-Ghaili,
  • Hairoladenan Kasim,
  • Zainuddin Hassan,
  • Naif Mohammed Al-Hada,
  • Marini Othman,
  • Rafiziana Md. Kasmani and
  • Ibraheem Shayea

6 February 2023

The goal of this review paper is to highlight the image processing techniques’ role in the Internet of Things (IoT), aiming to attain an energy-efficient and secure IoT. IoT-dependent systems (IoTSs) cause heavy usage of energy. This is one of the bi...

  • Article
  • Open Access
5 Citations
3,149 Views
18 Pages

13 September 2024

This study aimed to strengthen the security of autonomous vehicles by analyzing the current status of autonomous vehicle security, such as autonomous vehicle features, security threats, and compliance, and deriving security-level check items. Based o...

  • Article
  • Open Access
27 Citations
4,811 Views
19 Pages

A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust

  • Francisco José Mora-Gimeno,
  • Higinio Mora-Mora,
  • Diego Marcos-Jorquera and
  • Bruno Volckaert

23 September 2018

Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows...

  • Article
  • Open Access
6 Citations
3,136 Views
25 Pages

Hardware-Implemented Security Processing Unit for Program Execution Monitoring and Instruction Fault Self-Repairing on Embedded Systems

  • Zhun Zhang,
  • Xiang Wang,
  • Qiang Hao,
  • Dongdong Xu,
  • Jiqing Wang,
  • Jiakang Liu,
  • Jinhui Ma and
  • Jinlei Zhang

1 April 2022

Embedded systems are increasingly applied in numerous security-sensitive applications, such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace. However, embedded systems are compromised in the execution of untrus...

  • Review
  • Open Access
147 Citations
32,152 Views
20 Pages

According to the IPCC, global temperatures are expected to increase between 1.1 and 6.4 °C during the 21st century and precipitation patterns will be altered. Soils are intricately linked to the atmospheric/climate system through the carbon, nitrogen...

  • Article
  • Open Access
1 Citations
695 Views
24 Pages

14 November 2025

Achieving long-term stable optimization in complex industrial processes (CIPs) is notoriously challenging due to their unclear physical/chemical reaction mechanisms, fluctuating operating conditions, and stringent regulatory constraints. A significan...

  • Article
  • Open Access
7 Citations
3,520 Views
23 Pages

30 April 2023

Robotic process automation (RPA)* based on the use of software robots has proven to be one of the most demanded technologies to emerge in recent years used for automating daily IT routines in many sectors, such as banking and finance. As with any new...

  • Article
  • Open Access
4 Citations
6,618 Views
16 Pages

Publish/Subscribe Method for Real-Time Data Processing in Massive IoT Leveraging Blockchain for Secured Storage

  • Mohammadhossein Ataei,
  • Ali Eghmazi,
  • Ali Shakerian,
  • Rene Landry and
  • Guy Chevrette

8 December 2023

In the Internet of Things (IoT) era, the surge in Machine-Type Devices (MTDs) has introduced Massive IoT (MIoT), opening new horizons in the world of connected devices. However, such proliferation presents challenges, especially in storing and analyz...

  • Article
  • Open Access
3 Citations
3,558 Views
13 Pages

24 August 2020

In the requirement engineering phase, the team members work to get the user requirements, comprehend them and specify them for the next process. There are many models for the requirement engineering phase. There is a need to select the best Requireme...

  • Article
  • Open Access
8 Citations
10,486 Views
22 Pages

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

  • Tor Onshus,
  • Lars Bodsberg,
  • Stein Hauge,
  • Martin Gilje Jaatun,
  • Mary Ann Lundteigen,
  • Thor Myklebust,
  • Maria Vatshaug Ottermo,
  • Stig Petersen and
  • Egil Wille

12 February 2022

The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry. A general requirement from the operators...

  • Article
  • Open Access
6 Citations
2,133 Views
21 Pages

5 October 2023

The article focuses on the study of the impact of the level of training of security control operators (SCOs) at airports on the energy consumption of the passenger baggage control process. With the constant growing emphasis on security at airports, t...

  • Article
  • Open Access
1 Citations
2,448 Views
26 Pages

As the signaling processing center of 5G, the security and stability of the 5G Core Network (5GC) are of great importance for 5G. The current 5GC consists of multiple mutually independent Network Functions (NFs). However, the NF service access proced...

  • Article
  • Open Access
11 Citations
2,834 Views
16 Pages

Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments

  • Manal Abdullah Alohali,
  • Mohammed Aljebreen,
  • Fuad Al-Mutiri,
  • Mahmoud Othman,
  • Abdelwahed Motwakel,
  • Mohamed Ibrahim Alsaid,
  • Amani A. Alneil and
  • Azza Elneil Osman

14 March 2023

The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital...

  • Article
  • Open Access
7 Citations
3,671 Views
30 Pages

The Internet of Things environment (e.g., smart phones, smart televisions, and smart watches) ensures that the end user experience is easy, by connecting lives on web services via the internet. Integrating Internet of Things devices poses ethical ris...

  • Article
  • Open Access
11 Citations
5,132 Views
22 Pages

15 April 2022

Brazil was one of the largest cocoa producers in the world, mainly supported by the South of Bahia region. After the 1980s, the witch-broom disease demolished plantations, and farmers were forced into bankruptcy. The worldwide search for gourmet coco...

  • Article
  • Open Access
143 Views
18 Pages

3 February 2026

Ecological security is fundamental to human survival and sustainable development. However, current assessment frameworks often lack regional adaptability. They also frequently overlook the security risks associated with landscape patterns. To address...

  • Article
  • Open Access
2 Citations
3,393 Views
30 Pages

11 February 2023

Identity management ensures that users have appropriate access to resources, such as ICT services and data. Thereby, identity management does not only identify, authenticate, and authorize individuals, but also the hardware devices and software appli...

  • Article
  • Open Access
33 Citations
12,764 Views
25 Pages

20 July 2020

With recent advancements of technologies such as Internet of Things and cloud computing, security of information systems has emerged as a critical issue. This has created a need for elicitation and analysis of the security requirements at an early st...

  • Article
  • Open Access
14 Citations
13,955 Views
14 Pages

In the era of global social media, Internet users’ privacy rights have been weakened, and the insight and alertness of individuals for privacy disclosure are decreasing. The security and flexibility of the system are usually the two ends of the...

  • Article
  • Open Access
1 Citations
3,477 Views
23 Pages

A Framework Using Applied Process Analysis Methods to Assess Water Security in the Vu Gia–Thu Bon River Basin, Vietnam

  • Nguyen Mai Dang,
  • Le Ngoc Vien,
  • Ahad Hasan Tanim,
  • Alexandre S. Gagnon and
  • Duong Tran Anh

5 July 2024

The Vu Gia–Thu Bon (VG–TB) river basin is facing numerous challenges to water security, particularly in light of the increasing impacts of climate change. These challenges, including salinity intrusion, shifts in rainfall patterns, and re...

  • Article
  • Open Access
5 Citations
2,884 Views
19 Pages

26 November 2022

The various ecosystem services related to water form a complex structure that impacts on human well-being so it is necessary to know the relationships between their attributes to support decision making for water security. Our work investigates indiv...

  • Article
  • Open Access
395 Views
79 Pages

22 December 2025

The security and integrity of election systems represent fundamental pillars of democratic governance in the 21st century. As electoral processes increasingly rely on networked technologies and digital infrastructures, the vulnerability of these syst...

  • Article
  • Open Access
3 Citations
3,318 Views
39 Pages

30 March 2021

In the information era, information security monitoring tools would be helpful for enterprises/organizations to monitor employees’ computer usage behaviors and improve their information security protection. The Windows-based operating systems have th...

  • Article
  • Open Access
25 Citations
8,726 Views
28 Pages

16 January 2023

There is an increasing demand for processing large volumes of unstructured data for a wide variety of applications. However, protection measures for these big data sets are still in their infancy, which could lead to significant security and privacy...

  • Article
  • Open Access
43 Citations
10,471 Views
22 Pages

5 May 2020

Water security is a major concern for water-scarce cities that face dynamic water challenges due to limited water supply, climate change and increasing water demand. Framing urban water security is challenging due to the complexity and uncertainties...

  • Article
  • Open Access
42 Citations
7,059 Views
36 Pages

Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks

  • Muhammad Imran Tariq,
  • Shakeel Ahmed,
  • Nisar Ahmed Memon,
  • Shahzadi Tayyaba,
  • Muhammad Waseem Ashraf,
  • Mohsin Nazir,
  • Akhtar Hussain,
  • Valentina Emilia Balas and
  • Marius M. Balas

28 February 2020

With the advent of cloud computing and wireless sensor networks, the number of cyberattacks has rapidly increased. Therefore, the proportionate security of networks has become a challenge for organizations. Information security advisors of organizati...

  • Review
  • Open Access
121 Citations
16,435 Views
31 Pages

A Review of Industry 4.0 Manufacturing Process Security Risks

  • Jaco Prinsloo,
  • Saurabh Sinha and
  • Basie von Solms

26 November 2019

The advent of three-dimensional (3D) printing has found a unique and prominent role in Industry 4.0 and is rapidly gaining popularity in the manufacturing industry. 3D printing offers many advantages over conventional manufacturing methods, making it...

  • Article
  • Open Access
1 Citations
2,222 Views
26 Pages

1 September 2025

This study explores the application of federated learning (FL) in security camera surveillance systems to overcome the structural limitations inherent in traditional centralized artificial intelligence (AI) training approaches, while simultaneously e...

  • Article
  • Open Access
7 Citations
2,237 Views
35 Pages

24 January 2024

Process algebra can be considered one of the most practical formal methods for modeling Smart IoT Systems in Digital Twin, since each IoT device in the systems can be considered as a process. Further, some of the algebras are applied to predict the b...

  • Article
  • Open Access
2 Citations
2,743 Views
11 Pages

Dual-Safety Knowledge Graph Completion for Process Industry

  • Lingzhi Wang,
  • Haotian Li,
  • Wei Wang,
  • Guodong Xin and
  • Yuliang Wei

With the rise of Industry 4.0, control systems have taken on increasing importance in industrial processes, and ensuring their security has become a pressing issue. While recent research has focused on cybersecurity threats, the security risks inhere...

  • Article
  • Open Access
16 Citations
4,839 Views
22 Pages

Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications

  • Alexandru Vulpe,
  • Răzvan Crăciunescu,
  • Ana-Maria Drăgulinescu,
  • Sofoklis Kyriazakos,
  • Ali Paikan and
  • Pouyan Ziafati

18 October 2021

Today’s IoT deployments are highly complex, heterogeneous and constantly changing. This poses severe security challenges such as limited end-to-end security support, lack of cross-platform cross-vertical security interoperability as well as the lack...

  • Article
  • Open Access
7 Citations
5,112 Views
20 Pages

Security Risk Analysis Approach for Safety-Critical Systems of Connected Vehicles

  • Feng Luo,
  • Shuo Hou,
  • Xuan Zhang,
  • Zhenyu Yang and
  • Wenwen Pan

Modern vehicles are no longer merely mechanical systems but are monitored and controlled by various electronic systems. Safety-critical systems of connected vehicles become vulnerable to cyberattacks because of increasing interconnection. At present,...

  • Article
  • Open Access
3 Citations
4,541 Views
32 Pages

Optimal Portfolio Selection in an Itô–Markov Additive Market

  • Zbigniew Palmowski,
  • Łukasz Stettner and
  • Anna Sulima

25 March 2019

We study a portfolio selection problem in a continuous-time Itô–Markov additive market with prices of financial assets described by Markov additive processes that combine Lévy processes and regime switching models. Thus, the model...

  • Article
  • Open Access
10 Citations
5,586 Views
19 Pages

ARES: Automated Risk Estimation in Smart Sensor Environments

  • Athanasios Dimitriadis,
  • Jose Luis Flores,
  • Boonserm Kulvatunyou,
  • Nenad Ivezic and
  • Ioannis Mavridis

17 August 2020

Industry 4.0 adoption demands integrability, interoperability, composability, and security. Currently, integrability, interoperability and composability are addressed by next-generation approaches for enterprise systems integration such as model-base...

  • Article
  • Open Access
1 Citations
815 Views
19 Pages

Enhanced-Dueling Deep Q-Network for Trustworthy Physical Security of Electric Power Substations

  • Nawaraj Kumar Mahato,
  • Junfeng Yang,
  • Jiaxuan Yang,
  • Gangjun Gong,
  • Jianhong Hao,
  • Jing Sun and
  • Jinlu Liu

18 June 2025

This paper introduces an Enhanced-Dueling Deep Q-Network (EDDQN) specifically designed to bolster the physical security of electric power substations. We model the intricate substation security challenge as a Markov Decision Process (MDP), segmenting...

  • Article
  • Open Access
1 Citations
1,325 Views
26 Pages

Short-Term Optimal Scheduling of Power Grids Containing Pumped-Storage Power Station Based on Security Quantification

  • Hua Li,
  • Xiangfei Qiu,
  • Qiuyi Xi,
  • Ruogu Wang,
  • Gang Zhang,
  • Yanxin Wang and
  • Bao Zhang

3 September 2024

In order to improve grid security while pursuing a grid operation economy and new energy consumption rates, this paper proposes a short-term optimal scheduling method based on security quantification for the grid containing a pumped-storage power pla...

  • Article
  • Open Access
9 Citations
8,858 Views
28 Pages

Prevailing trends in the automotive and medical device industry, such as life cycle overarching configurability, connectivity, and automation, require an adaption of development processes, especially regarding the security and safety thereof. The cha...

of 173