You are currently on the new version of our website. Access the old version .

411 Results Found

  • Article
  • Open Access
7 Citations
3,213 Views
15 Pages

21 September 2018

The protection and management of lakes is closely related to people’s quality of life and the rapid development of urban economy, and it is also an important aspect of realizing ecological sustainability. Hubei Province has over 1000 lakes, so...

  • Article
  • Open Access
9 Citations
2,109 Views
20 Pages

1 October 2022

The coal mine underground reservoir is an effective facility for mine groundwater utilization in water-deficient and ecologically fragile areas. Usually, the artificial reserved coal pillar is used as the dam of underground reservoir, and little rese...

  • Review
  • Open Access
47 Citations
12,367 Views
33 Pages

Space Radiation Protection Countermeasures in Microgravity and Planetary Exploration

  • Carlos A. Montesinos,
  • Radina Khalid,
  • Octav Cristea,
  • Joel S. Greenberger,
  • Michael W. Epperly,
  • Jennifer A. Lemon,
  • Douglas R. Boreham,
  • Dmitri Popov,
  • Gitika Gorthi and
  • Jeffrey A. Jones

14 August 2021

Background: Space radiation is one of the principal environmental factors limiting the human tolerance for space travel, and therefore a primary risk in need of mitigation strategies to enable crewed exploration of the solar system. Methods: We summa...

  • Article
  • Open Access
22 Citations
10,126 Views
17 Pages

Physical model tests with the scale of 1:36 are carried out in the Near-Shore Wave Basin (NSWB) at Tainan Hydraulics Laboratory (THL) with the jacket-type offshore wind turbine foundation (jacket-type foundation) and the combination of hard or soft s...

  • Article
  • Open Access
5 Citations
8,247 Views
29 Pages

The Effect of Countermeasure Readability on Security Intentions

  • Tim Smit,
  • Max van Haastrecht and
  • Marco Spruit

19 November 2021

Human failure is a primary contributor to successful cyber attacks. For any cybersecurity initiative, it is therefore vital to motivate individuals to implement secure behavior. Research using protection motivation theory (PMT) has given insights int...

  • Article
  • Open Access
5 Citations
6,197 Views
19 Pages

15 January 2024

This study investigated riverbank protection strategies along the dynamic Jamuna River in Bangladesh, a braided river prone to erosion and sedimentation. It reviews past countermeasures and emphasizes the effectiveness of groyne-type structures in re...

  • Review
  • Open Access
9 Citations
7,004 Views
22 Pages

2 August 2018

1. Background: Fishers face many occupational hazards that include a high risk of fatal and nonfatal injuries and a variety of adverse health effects. Our purpose is to provide an overview of potential countermeasures for the control of hazards that...

  • Article
  • Open Access
13 Citations
9,041 Views
13 Pages

8 March 2023

Any stretch of coastline requires protection when the rate of erosion exceeds a certain threshold and seasonal coastal drift fluctuations fail to restore balance. Coast erosion can be caused by natural, synthetic, or a combination of the two. Severe...

  • Review
  • Open Access
38 Citations
7,956 Views
33 Pages

Therapeutic Strategies to Reduce the Toxicity of Misfolded Protein Oligomers

  • Ryan P. Kreiser,
  • Aidan K. Wright,
  • Natalie R. Block,
  • Jared E. Hollows,
  • Lam T. Nguyen,
  • Kathleen LeForte,
  • Benedetta Mannini,
  • Michele Vendruscolo and
  • Ryan Limbocker

17 November 2020

The aberrant aggregation of proteins is implicated in the onset and pathogenesis of a wide range of neurodegenerative disorders, including Alzheimer’s and Parkinson’s diseases. Mounting evidence indicates that misfolded protein oligomers...

  • Review
  • Open Access
9 Citations
3,636 Views
10 Pages

Foundation and Prospects of Wild Population Reconstruction of Acipenser dabryanus

  • Junyi Li,
  • Hao Du,
  • Jinming Wu,
  • Hui Zhang,
  • Li Shen and
  • Qiwei Wei

30 October 2021

Acipenser dabryanus is an endemic fish inhabiting the upper reaches of the Yangtze River in China. It is classified as a first-class nationally protected animal in China and is listed in the International Union for Conservation of Nature (IUCN) Red L...

  • Article
  • Open Access
1,840 Views
17 Pages

Exploring Illegal Trade and Management Strategies in Protected Aquatic Wildlife in Xiamen, China

  • Jia-Ying Liu,
  • Jia-Qiao Wang,
  • Yi-Jia Shih,
  • Cheng-Ye Wu and
  • Ta-Jen Chu

22 January 2025

In recent decades, illegal wildlife trade has become a global problem that threatens the conservation of many species. To promote sustainable animal trade, conservation plans must be developed and implemented locally. However, illegal trade in protec...

  • Systematic Review
  • Open Access
2 Citations
4,733 Views
28 Pages

Sedative Agents, Synthetic Torpor, and Long-Haul Space Travel—A Systematic Review

  • Thomas Cahill,
  • Nataliya Matveychuk,
  • Elena Hardiman,
  • Howard Rosner,
  • Deacon Farrell and
  • Gary Hardiman

27 April 2025

Background: With renewed interest in long-duration space missions, there is growing exploration into synthetic torpor as a countermeasure to mitigate physiological stressors. Sedative agents, particularly those used in clinical anesthesia, have been...

  • Article
  • Open Access
1 Citations
623 Views
16 Pages

The Pollinating Network of Pollinators and the Service Value of Pollination in Hanzhong City, China

  • Xuemei Chang,
  • Xiaofeng Yan,
  • Fengming Lv,
  • Ying Zhang,
  • Tom D. Breeze and
  • Xiushan Li

30 November 2025

Pollinating insects are the most important pollinators in nature; they pollinate vegetables, fruits, oil crops, and wild plants, so that crop yields can be increased, wild plants can live and reproduce, and human food security and ecosystem stability...

  • Review
  • Open Access
28 Citations
11,095 Views
22 Pages

Scour at Bridge Piers Protected by the Riprap Sloping Structure: A Review

  • Antonija Harasti,
  • Gordon Gilja,
  • Kristina Potočki and
  • Martina Lacko

15 December 2021

Bridge piers on large rivers are often protected from scouring using launchable stone, such as a riprap sloping structure. While such scour countermeasures are effective for pier protection, they significantly alter flow conditions in the bridge open...

  • Article
  • Open Access
13 Citations
8,642 Views
28 Pages

Lightweight block ciphers are an important topic in the Internet of Things (IoT) since they provide moderate security while requiring fewer resources than the Advanced Encryption Standard (AES). Ongoing cryptographic contests and standardization effo...

  • Review
  • Open Access
25 Citations
6,872 Views
15 Pages

Antioxidant Tocols as Radiation Countermeasures (Challenges to be Addressed to Use Tocols as Radiation Countermeasures in Humans)

  • Ujwani Nukala,
  • Shraddha Thakkar,
  • Kimberly J. Krager,
  • Philip J. Breen,
  • Cesar M. Compadre and
  • Nukhet Aykin-Burns

23 February 2018

Radiation countermeasures fall under three categories, radiation protectors, radiation mitigators, and radiation therapeutics. Radiation protectors are agents that are administered before radiation exposure to protect from radiation-induced injuries...

  • Communication
  • Open Access
6 Citations
4,526 Views
11 Pages

Security of Optical Beam Splitter in Quantum Key Distribution

  • Dong-Dong Li,
  • Yan-Lin Tang,
  • Yu-Kang Zhao,
  • Lei Zhou,
  • Yong Zhao and
  • Shi-Biao Tang

The optical beam splitter is an essential device used for decoding in quantum key distribution. The impact of optical beam splitters on the security of quantum key distribution was studied, and it was found that the realistic device characteristics c...

  • Article
  • Open Access
3,413 Views
17 Pages

CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes

  • Ehsan Aerabi,
  • David Hély,
  • Cyril Bresch,
  • Athanasios Papadimitriou and
  • Mahdi Fazeli

CONFISCA is the first generic SIMD-based software countermeasure that can concurrently resist against Side-Channel Attack (SCA) and Fault Injection (FI). Its promising strength is presented in a PRESENT cipher case study and compared to software-base...

  • Review
  • Open Access
79 Citations
9,708 Views
30 Pages

6 October 2021

The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a...

  • Article
  • Open Access
1,104 Views
19 Pages

FSL-1 Pre-Administration Protects Radiation-Induced Hematopoietic Organs Through the Modulation of the TLR Signaling Pathway

  • Venkateshwara Rao Dronamraju,
  • Gregory P. Holmes-Hampton,
  • Emily Gu,
  • Vidya P. Kumar and
  • Sanchita P. Ghosh

Substantial progress has been made in the development of radiation countermeasures, resulting in the recent approval of several mitigators; however, there has yet to be an approved prophylactic radioprotectant. Research on countermeasure performance...

  • Article
  • Open Access
7 Citations
2,192 Views
27 Pages

26 August 2020

With high sensitivity and strong tolerance capability for the fault resistance, the fault component-based directional relay (FCBDR) has drawn considerable attention from industry and academia. However, the best application environment for FCBDR no lo...

  • Article
  • Open Access
26 Citations
3,953 Views
14 Pages

Alterations in Tissue Metabolite Profiles with Amifostine-Prophylaxed Mice Exposed to Gamma Radiation

  • Amrita K. Cheema,
  • Yaoxiang Li,
  • Michael Girgis,
  • Meth Jayatilake,
  • Oluseyi O. Fatanmi,
  • Stephen Y. Wise,
  • Thomas M. Seed and
  • Vijay K. Singh

Acute exposure to high-dose ionizing irradiation has the potential to severely injure the hematopoietic system and its capacity to produce vital blood cells that innately serve to ward off infections and excessive bleeding. Developing a medical radia...

  • Article
  • Open Access
87 Citations
8,556 Views
19 Pages

21 July 2019

Local scour of bridge piers is one of the main threats responsible for bridge damage. Adopting scour countermeasures to protect bridge foundations from scour has become an important issue for the design and maintenance of bridges located in erodible...

  • Article
  • Open Access
4 Citations
3,538 Views
18 Pages

Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing

  • Sunghyun Jin,
  • Philip Johansson,
  • HeeSeok Kim and
  • Seokhie Hong

23 March 2022

Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security. A combined countermeasure approach employin...

  • Article
  • Open Access
2 Citations
2,864 Views
21 Pages

4 November 2022

Algorithms based on the hardness of solving multivariate quadratic equations present promising candidates for post-quantum digital signatures. Contemporary threats to implementations of cryptographic algorithms, especially in embedded systems, includ...

  • Article
  • Open Access
7 Citations
4,141 Views
23 Pages

The success of source protection in ensuring safe drinking water is centered around being able to understand the hazards present in the catchment then plan and implement control measures to manage water quality risk to levels which can be controlled...

  • Review
  • Open Access
13 Citations
4,965 Views
20 Pages

Hardware Countermeasures Benchmarking against Fault Attacks

  • Francisco Eugenio Potestad-Ordóñez,
  • Erica Tena-Sánchez,
  • Antonio José Acosta-Jiménez,
  • Carlos Jesús Jiménez-Fernández and
  • Ricardo Chaves

26 February 2022

The development of differential fault analysis (DFA) techniques and mechanisms to inject faults into cryptographic circuits brings with it the need to use protection mechanisms that guarantee the expected level of security. The AES cipher, as a stand...

  • Article
  • Open Access
7 Citations
4,035 Views
20 Pages

6 November 2018

Binary scalar multiplication, which is the main operation of elliptic curve cryptography, is vulnerable to side-channel analysis. It is especially vulnerable to side-channel analysis using power consumption and electromagnetic emission patterns. Thus...

  • Article
  • Open Access
23 Citations
12,574 Views
19 Pages

Electromagnetic and power side-channel analysis (SCA) provides attackers a prominent tool to extract the secret key from the cryptographic engine. In this article, we present our cross-device deep learning (DL)-based side-channel attack (X-DeepSCA) w...

  • Article
  • Open Access
59 Citations
15,663 Views
17 Pages

Investigating the Role of Perceived Risk, Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM

  • Mohammed Amin Almaiah,
  • Shaha Al-Otaibi,
  • Rima Shishakly,
  • Lamia Hassan,
  • Abdalwali Lutfi,
  • Mahmoad Alrawad,
  • Mohammad Qatawneh and
  • Orieb Abu Alghanam

21 June 2023

Effective security support remains a challenge, even for mobile banking applications; this is leading to the loss of many customers due to limited protection of customer data and privacy. Cyber threats include everything from identity theft to malwar...

  • Review
  • Open Access
34 Citations
7,490 Views
20 Pages

Influenza A Virus Antibodies with Antibody-Dependent Cellular Cytotoxicity Function

  • Rongyuan Gao,
  • Zizhang Sheng,
  • Chithra C. Sreenivasan,
  • Dan Wang and
  • Feng Li

1 March 2020

Influenza causes millions of cases of hospitalizations annually and remains a public health concern on a global scale. Vaccines are developed and have proven to be the most effective countermeasures against influenza infection. Their efficacy has bee...

  • Article
  • Open Access
22 Citations
6,421 Views
14 Pages

6 August 2020

The increasing occurrences of greenwashing pose great risks to environmental protection. The current studies mainly focused on corporate greenwashing, and few paid attention to the greenwashing of the local government (GLG), thus lacking methods to i...

  • Article
  • Open Access
1 Citations
3,918 Views
25 Pages

Locking-Enabled Security Analysis of Cryptographic Circuits

  • Devanshi Upadhyaya,
  • Maël Gay and
  • Ilia Polian

Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit agains...

  • Article
  • Open Access
2 Citations
2,668 Views
18 Pages

Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures

  • Renato Lo Cigno,
  • Francesco Gringoli,
  • Stefania Bartoletti,
  • Marco Cominelli,
  • Lorenzo Ghiro and
  • Samuele Zanini

7 January 2025

Recent advances in signal processing and AI-based inference enable the exploitation of wireless communication signals to collect information on devices, people, actions, and the environment in general, i.e., to perform Integrated Sensing And Communic...

  • Article
  • Open Access
6 Citations
6,810 Views
17 Pages

Reset Tree-Based Optical Fault Detection

  • Dong-Geon Lee,
  • Dooho Choi,
  • Jungtaek Seo and
  • Howon Kim

21 May 2013

In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to m...

  • Article
  • Open Access
2 Citations
2,561 Views
17 Pages

Shift-Invariance Robustness of Convolutional Neural Networks in Side-Channel Analysis

  • Marina Krček,
  • Lichao Wu,
  • Guilherme Perin and
  • Stjepan Picek

18 October 2024

Convolutional neural networks (CNNs) offer unrivaled performance in profiling side-channel analysis. This claim is corroborated by numerous results where CNNs break targets protected with masking and hiding countermeasures. One hiding countermeasure...

  • Article
  • Open Access
2 Citations
2,651 Views
15 Pages

PrC-210 Protects against Radiation-Induced Hematopoietic and Intestinal Injury in Mice and Reduces Oxidative Stress

  • Vidya P. Kumar,
  • Shukla Biswas,
  • Gregory P. Holmes-Hampton,
  • Torsten Goesch,
  • William Fahl and
  • Sanchita P. Ghosh

The development of safe, orally available, and effective prophylactic countermeasures to protect our warfighters is an unmet need because there is no such FDA-approved countermeasure available for use. Th 1-Propanethiol, 3-(methylamino)-2-((methylami...

  • Review
  • Open Access
76 Citations
12,390 Views
30 Pages

Immunopathology of RSV: An Updated Review

  • Harrison C. Bergeron and
  • Ralph A. Tripp

10 December 2021

RSV is a leading cause of respiratory tract disease in infants and the elderly. RSV has limited therapeutic interventions and no FDA-approved vaccine. Gaps in our understanding of virus–host interactions and immunity contribute to the lack of b...

  • Article
  • Open Access
17 Citations
7,640 Views
23 Pages

31 October 2020

Scour is caused by the erosive action of flowing water, which causes materials from the bed and the banks of a river to be moved or unsettled. Hydraulic structures can be drastically impacted as a result of scour, which is why it is one of the most c...

  • Article
  • Open Access
7 Citations
2,720 Views
18 Pages

1 November 2021

This paper presents a study on bridge pier protection with a single porous basket (SPB) in clear-water experiments. The SPB is a type of combined flow-altering countermeasure. The SPB was installed at a distance ahead of the protected pier. After a s...

  • Review
  • Open Access
15 Citations
7,848 Views
12 Pages

An Overview of Selected Material Properties in Finite Element Modeling of the Human Femur

  • Pourya Bazyar,
  • Andreas Baumgart,
  • Holm Altenbach and
  • Anna Usbeck

Specific finite detail modeling of the human body gives a capable primary enhancement to the prediction of damage risk through automobile impact. Currently, car crash protection countermeasure improvement is based on an aggregate of testing with inst...

  • Article
  • Open Access
845 Views
29 Pages

Daily Consumption of Apigenin Prevents Acute Lymphoma/Lymphoblastic Leukemia in Male C57BL/6J Mice Exposed to Space-like Radiation

  • Tanat Peanlikhit,
  • Jingxuan Liu,
  • Tahmeena Ahmed,
  • James S. Welsh,
  • Tobias Karakach,
  • Kenneth R. Shroyer,
  • Elbert Whorton and
  • Kanokporn Noy Rithidech

31 October 2025

Introduction: The work presented here is part of our study series aimed at investigating the countermeasure effectiveness of apigenin (AP) against both early and late effects of heavy silicon (28Si) on the same cohort of exposed male C57BL/6 mice. We...

  • Proceeding Paper
  • Open Access
1 Citations
2,055 Views
7 Pages

Unsymmetrical Fault Analysis and Protection of 1.5 MW DFIG Wind Turbine Converters

  • Muhammad Uzair Khalid,
  • Hassan Abdullah Khalid,
  • Hasaan Farooq and
  • Afzaal Khan

Due to rapid increase in the installation of renewable energy resources in the grid, the use of power electronic-based devices is increasing day by day. Whenever a wind farm is installed and integrated with the grid, most of the work and control depe...

  • Communication
  • Open Access
24 Citations
4,572 Views
7 Pages

Human-Like Neutralizing Antibodies Protect Mice from Aerosol Exposure with Western Equine Encephalitis Virus

  • Crystal W. Burke,
  • Jeffrey W. Froude,
  • Sebastian Miethe,
  • Birgit Hülseweh,
  • Michael Hust and
  • Pamela J. Glass

24 March 2018

Western equine encephalitis virus (WEEV) causes symptoms in humans ranging from mild febrile illness to life-threatening encephalitis, and no human medical countermeasures are licensed. A previous study demonstrated that immune serum from vaccinated...

  • Article
  • Open Access
24 Citations
6,841 Views
25 Pages

The aim of this study is to assess the performances of different infrastructures as structural tsunami countermeasures in Sendai City, based on the lessons from the 11 March 2011, Great East Japan Tsunami, which is an example of a worst-case scenario...

  • Article
  • Open Access
8 Citations
14,490 Views
22 Pages

The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation

  • Warodom Werapun,
  • Tanakorn Karode,
  • Tanwa Arpornthip,
  • Jakapan Suaboot,
  • Esther Sangiamkul and
  • Pawita Boonrat

Decentralized finance (DeFi) has exploded in popularity with a billion-dollar market cap. While uncollateralized lending, known as a flash loan, emerged from DeFi, it has become a primary tool used by attackers to drain investment tokens from DeFi ne...

  • Article
  • Open Access
8 Citations
2,472 Views
14 Pages

Local Scour Patterns around a Bridge Pier with Cable-Wrapping

  • Valentine Muhawenimana,
  • Nadine Foad,
  • Pablo Ouro and
  • Catherine A. M. E. Wilson

21 December 2022

The performance of cable flow-altering bed scour countermeasures was experimentally evaluated based on the scour reduction, bed morphology, and the effects on the flow field. An unprotected 40 mm diameter pier was compared to piers protected with spi...

  • Article
  • Open Access
35 Citations
4,583 Views
27 Pages

A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data

  • Abdullah Alabdulatif,
  • Navod Neranjan Thilakarathne and
  • Kassim Kalinaki

In the context of healthcare, big data refers to a complex compilation of digital medical data collected from many sources that are difficult to manage with normal technology and software due to its size and complexity. These big data are useful in v...

  • Abstract
  • Open Access
1 Citations
1,894 Views
1 Page

This paper introduces the core ideas of the information ecological theory,analyzes the report recently released by British House of Commons Culture, Media and Sport Committee named “Cyber Security: Protection of Personal Data Online” by information e...

  • Review
  • Open Access
50 Citations
23,290 Views
32 Pages

5 May 2023

Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behav...

of 9