Skip to Content

949 Results Found

  • Article
  • Open Access
25 Citations
4,813 Views
15 Pages

Burnout in Spanish Security Forces during the COVID-19 Pandemic

  • José Gómez-Galán,
  • Cristina Lázaro-Pérez,
  • Jose Ángel Martínez-López and
  • María del Mar Fernández-Martínez

Since the beginning of the COVID-19 pandemic in Spain, members of the State Security Forces and the Armed Forces have been mobilized to guarantee the security and mobility of the population and to support health institutions by providing personnel fo...

  • Article
  • Open Access
24 Citations
5,838 Views
16 Pages

COVID-19 Pandemic and Death Anxiety in Security Forces in Spain

  • Cristina Lázaro-Pérez,
  • José Ángel Martínez-López,
  • José Gómez-Galán and
  • María del Mar Fernández-Martínez

The pandemic caused by the SARS-CoV-2 coronavirus, which produces COVID-19 disease, has revealed to political and social circles a series of needs that have not yet been met. The workers of the State Security Forces and the Armed Forces have done an...

  • Article
  • Open Access
6 Citations
4,267 Views
11 Pages

12 March 2021

The preliminary credibility assessment screening system (PCASS) is a US-based program, which is currently being implemented by intelligence units of the North Atlantic Treaty Organization (NATO) to make the initial screening of individuals suspected...

  • Article
  • Open Access
4 Citations
2,844 Views
23 Pages

The safety assessment of ship cargo securing systems is of significant importance in preventing casualties, vessel instability, and economic losses resulting from the failure of securing systems during transportation in adverse sea conditions. In thi...

  • Article
  • Open Access
8 Citations
36,057 Views
15 Pages

A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks

  • Hyeonsu Byun,
  • Jueun Kim,
  • Yunseok Jeong,
  • Byoungjin Seok,
  • Seonghyeon Gong and
  • Changhoon Lee

Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually. However, many studies focus on large-s...

  • Article
  • Open Access
1 Citations
884 Views
20 Pages

9 July 2025

Ecological security underpins sustainable regional development and human well-being. Tianjin is in the eastern coastal area of China and features coastal wetlands and river systems. Over the past decade, Tianjin has undergone rapid urbanization. Tian...

  • Article
  • Open Access
2,490 Views
10 Pages

Brief Training of Technical Bleeding Control Skills—A Pilot Study with Security Forces

  • Jose Luis Manteiga-Urbón,
  • Felipe Fernández-Méndez,
  • Martín Otero-Agra,
  • María Fernández-Méndez,
  • Myriam Santos-Folgar,
  • Esther Insa-Calderon,
  • María Sobrido-Prieto,
  • Roberto Barcala-Furelos and
  • Santiago Martínez-Isasi

Uncontrolled external bleeding is a common cause of preventable death, and due to the environment in which these events often occur, e.g., in hostile environments, the state security forces are usually the first responders, and in many cases, if they...

  • Article
  • Open Access
2 Citations
2,277 Views
24 Pages

13 May 2025

This study investigates the effects of urbanisation-induced displacement on economic capital security by comparing evicted and non-evicted peri-urban farming households in Addis Ababa, Ethiopia. The research employed a mixed-methods approach. The mix...

  • Article
  • Open Access
16 Citations
4,723 Views
12 Pages

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

  • Xuanxuan Tang,
  • Yueming Cai,
  • Wendong Yang,
  • Weiwei Yang,
  • Dechuan Chen and
  • Junquan Hu

24 January 2018

In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensor...

  • Article
  • Open Access
6 Citations
3,441 Views
13 Pages

26 August 2019

Background and Objectives: This research analyzes the relationship between the lack of group support and burnout syndrome in workers of the State Security Forces and Corps, considering the role of personality traits in this relationship. In particula...

  • Article
  • Open Access
7 Citations
2,269 Views
19 Pages

27 February 2024

Ecological security is an important guarantee of human security and survival, closely related to sustainable development. However, the ecological security evaluation and driving force analysis of oases in arid areas is still insufficient. Ejina Oasis...

  • Article
  • Open Access
46 Citations
4,361 Views
18 Pages

20 December 2021

A large proportion of the cultivated land in China has been used for non-grain production purposes. As food insecurity is worsening worldwide, this issue has attracted attention from the Chinese government. In order to curb this trend and to ensure f...

  • Article
  • Open Access
1,489 Views
13 Pages

Objectives: The present study examined the sensory preferences adopted by students over three years of training in a specialized training program for security forces (STPSF). It determines their impact on karate performance metrics. Methods: Thirty-o...

  • Article
  • Open Access
10 Citations
7,728 Views
25 Pages

Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indica...

  • Article
  • Open Access
826 Views
23 Pages

Pilot Study of Stretch Film for Securing Palletized Loads

  • Sławomir Tkaczyk,
  • Juraj Jagelčák,
  • Mariusz Szpotański and
  • Radosław Sędrowicz

11 November 2025

This study examines the characteristics of stretch film used to secure palletized cargo, with the aim of rationalizing its use. Growing consumption of packaging materials requires scientifically substantiated film selection that accounts for the forc...

  • Article
  • Open Access
8 Citations
5,142 Views
12 Pages

Prospects for the Use of Hydrogen in the Armed Forces

  • Andrzej Soboń,
  • Daniel Słyś,
  • Mariusz Ruszel and
  • Alicja Wiącek

29 October 2021

The energy security landscape that we envisage in 2050 will be different from that of today. Meeting the future energy needs of the armed forces will be a key challenge, not least for military security. The World Energy Council’s World Energy Scenari...

  • Article
  • Open Access
558 Views
21 Pages

4 December 2025

This article addresses a critical security challenge in Internet of Things (IoT) systems, which are vulnerable to traffic detection attacks due to their reliance on shared wireless communication channels. We propose a novel cooperative covert transmi...

  • Article
  • Open Access
12 Citations
5,534 Views
15 Pages

13 March 2023

Conflicts such as the Boko Haram insurgency, herder–farmer conflicts, and armed banditry attacks are major concerns affecting the livelihoods and food security of households in Nigeria. In this paper, firstly, we reviewed and synthesized the na...

  • Article
  • Open Access
3,560 Views
29 Pages

Background: The cargo stowage and securing plan for non-standardized cargo is vital for ensuring safety at sea, as improper placement or inadequate lashing can compromise maritime transport safety. Due to the diverse size and type of cargo, efficient...

  • Article
  • Open Access
12 Citations
3,235 Views
8 Pages

Motivation for COVID-19 Vaccination in Priority Occupational Groups: A Cross-Sectional Survey

  • Ladislav Štěpánek,
  • Magdaléna Janošíková,
  • Marie Nakládalová,
  • Kateřina Ivanová,
  • Jakub Macík,
  • Alena Boriková and
  • Helena Vildová

Due to the limited availability of COVID-19 vaccines, occupational groups with priority access were identified prior to vaccination. The study aimed to analyze motives for vaccination in these occupational groups. Methods: Members of occupational gro...

  • Article
  • Open Access
6 Citations
2,426 Views
24 Pages

Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

  • Zhihui Shang,
  • Tao Zhang,
  • Yueming Cai,
  • Weiwei Yang,
  • Hao Wu,
  • Yu Zhang and
  • Liwei Tao

7 March 2020

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), whi...

  • Article
  • Open Access
681 Citations
57,161 Views
26 Pages

CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment

  • Euclides Carlos Pinto Neto,
  • Sajjad Dadkhah,
  • Raphael Ferreira,
  • Alireza Zohourian,
  • Rongxing Lu and
  • Ali A. Ghorbani

26 June 2023

Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number of IoT solutions in areas such as transportation and healthcare is increasing and new services are under de...

  • Article
  • Open Access
4,893 Views
25 Pages

6 August 2018

Geographical location and mobile phone numbers are important parts of user privacy and lots of studies have been working on the privacy leakage problems of these two aspects. However, no researchers have ever studied the security problems that can be...

  • Article
  • Open Access
3 Citations
2,603 Views
31 Pages

1 April 2025

Radio Frequency Fingerprint Identification (RFFI) is a promising device authentication technique that utilizes inherent hardware flaws in transmitters to achieve device identification, thus effectively maintaining the security of the Internet of Thin...

  • Article
  • Open Access
18 Citations
5,931 Views
32 Pages

29 July 2020

A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architect...

  • Article
  • Open Access
1,635 Views
20 Pages

1 October 2024

Since the rural revival, the return of the rural labor force has become a trend. Different ways of returning to the rural labor force contain different policy implications. Based on the data of 8209 households in the China Labor Force Dynamic Survey,...

  • Article
  • Open Access
42 Citations
12,638 Views
27 Pages

Exploring Connections—Environmental Change, Food Security and Violence as Drivers of Migration—A Critical Review of Research

  • Héctor Morales-Muñoz,
  • Srijna Jha,
  • Michelle Bonatti,
  • Henryk Alff,
  • Sabine Kurtenbach and
  • Stefan Sieber

15 July 2020

Migration, whether triggered by single events, such as violent conflict, or by long term pressures related to environmental change or food insecurity is altering sustainable development in societies. Although there is a large amount of literature, th...

  • Article
  • Open Access
5 Citations
4,790 Views
8 Pages

1 October 2020

Objectives: Peripheral intravenous catheters (PIVC) are the most frequently used invasive devices in medicine. PIVC failure before treatment completion is a significant concern and occurs in 33–69% of patients. Partial dislodgement and accident...

  • Article
  • Open Access
1 Citations
1,328 Views
19 Pages

27 August 2025

Rapid regional development and intensified human activities increasingly disturb ecosystems, posing substantial threats to the integrity of large-scale ecological zones. As a World Natural Heritage site and a crucial national ecological zone, the Zha...

  • Article
  • Open Access
73 Citations
30,938 Views
28 Pages

7 November 2012

The loss of genetic diversity of thousands of plants and crops has been well documented at least since the 1970s, and has been understood as a result of epistemological and political economic conditions of the Green Revolution. The political economic...

  • Article
  • Open Access
6 Citations
2,858 Views
25 Pages

19 February 2025

The Internet of Things (IoT) is developing quickly, which has led to the development of new opportunities in many different fields. As the number of IoT devices continues to expand, particularly in transportation and healthcare, the need for efficien...

  • Article
  • Open Access
12 Citations
3,484 Views
22 Pages

9 January 2022

The contradiction between urban expansion and ecological protection in the Beijing-Tianjin-Hebei region (BTH) is increasingly acute, which has become one of the main problems restricting regional development, and sustainable development of ecosystem...

  • Article
  • Open Access
27 Citations
8,989 Views
19 Pages

14 March 2021

Based on institutional theory, the current study examines the relationship of coordination, job security, psychological safety, and coercive pressure with employees’ performance. Further, coercive pressure is treated as a boundary condition between c...

  • Review
  • Open Access
63 Citations
11,726 Views
34 Pages

An Overview of Key Technologies in Physical Layer Security

  • Abraham Sanenga,
  • Galefang Allycan Mapunda,
  • Tshepiso Merapelo Ludo Jacob,
  • Leatile Marata,
  • Bokamoso Basutli and
  • Joseph Monamati Chuma

6 November 2020

The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives ri...

  • Article
  • Open Access
47 Citations
4,071 Views
15 Pages

23 November 2019

The vulnerability of ecological environment threatens social and economic development. Recent studies failed to reveal the driving mechanism behind it, and there is little analysis on the spatial clustering characteristics of the vulnerability of urb...

  • Article
  • Open Access
5 Citations
2,510 Views
22 Pages

2 November 2023

Revealing the characteristics of the spatial and temporal evolution of regional tourism-related ecological security and exploring its driving factors are of great theoretical and practical value to promoting the coordinated and sustainable developmen...

  • Article
  • Open Access
7 Citations
2,358 Views
22 Pages

13 September 2023

Tourism ecological security (TES) is an important measure of the sustainable development of the tourism industry. It is also an important indicator for evaluating the balance between economic growth and the environmental load of tourism destinations....

  • Article
  • Open Access
14 Citations
12,070 Views
21 Pages

BYOD Security: A Study of Human Dimensions

  • Kathleen Downer and
  • Maumita Bhattacharya

The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemi...

  • Article
  • Open Access
334 Views
49 Pages

27 January 2026

In this article, we employed a systematic approach to risk assessment and the adaptation of security measures to explore possibilities for more effective cybersecurity in the supply chains of the armed forces. Our focus was on developing a model with...

  • Article
  • Open Access
38 Citations
3,984 Views
23 Pages

26 February 2023

Climate change and human activities have caused a wide range of ecological risks in the Qinghai–Tibet Plateau (QTP) over the past two decades, such as land degradation and biodiversity loss. Therefore, it is imperative to assess the ecological...

  • Technical Note
  • Open Access
10 Citations
7,985 Views
18 Pages

Energy Analysis of Road Accidents Based on Close-Range Photogrammetry

  • Alejandro Morales,
  • Diego Gonzalez-Aguilera,
  • Miguel A. Gutiérrez and
  • Alfonso I. López

12 November 2015

This paper presents an efficient and low-cost approach for energy analysis of road accidents using images obtained using consumer-grade digital cameras and smartphones. The developed method could be used by security forces in order to improve the qua...

  • Proceeding Paper
  • Open Access
473 Views
9 Pages

The safe transport of cylindrical loads such as metal, paper, or polymer rollers requires specialized securing structures that address the complex dynamic forces encountered during rail movement. This paper presents a structured methodology for the d...

  • Review
  • Open Access
6 Citations
4,907 Views
14 Pages

24 September 2023

Surgical knots are sequences of half-knots (H) or half-hitches (S), defined by their number of throws, by an opposite or similar rotation compared with the previous one, and for half-hitches whether they are sliding (s) or blocking (b). Opposite rota...

  • Article
  • Open Access
33 Citations
212,299 Views
22 Pages

Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming

  • Ibrahim Alkhwaja,
  • Mohammed Albugami,
  • Ali Alkhwaja,
  • Mohammed Alghamdi,
  • Hussam Abahussain,
  • Faisal Alfawaz,
  • Abdullah Almurayh and
  • Nasro Min-Allah

12 May 2023

Studying password-cracking techniques is essential in the information security discipline as it highlights the vulnerability of weak passwords and the need for stronger security measures to protect sensitive information. While both methods aim to unc...

  • Article
  • Open Access
1,795 Views
19 Pages

15 June 2023

A bad randomness may cause catastrophic results in security; thus, it is of importance to make cryptographic systems secure against bad randomness. In this paper, we focus on a practical situation where an adversary is able to force participants in a...

  • Article
  • Open Access
13 Citations
4,395 Views
14 Pages

The Internet of Things (IoT) necessitates secure and lightweight firmware over-the-air (FOTA) update mechanisms for remote device management and timely mitigation of security vulnerabilities. This study introduces an FOTA update method to mitigate ma...

  • Article
  • Open Access
2 Citations
3,471 Views
10 Pages

A Multidisciplinary Vision of the Criminal, Social and Occupational Risk Consequences of the Use of Police Force

  • José C. Vera-Jiménez,
  • Domingo Villero-Carro,
  • Lucas González-Herrera,
  • José A. Álvarez and
  • Jesús Ayuso

22 July 2023

(1) Background: The use of force by public and private security forces is currently an issue of great relevance because of the potential injuries caused by any excessive use of force by either active or passive subjects or a deficit in the real maste...

  • Article
  • Open Access
75 Citations
9,857 Views
15 Pages

Development of Flexible Robot Skin for Safe and Natural Human–Robot Collaboration

  • Gaoyang Pang,
  • Jia Deng,
  • Fangjinhua Wang,
  • Junhui Zhang,
  • Zhibo Pang and
  • Geng Yang

5 November 2018

For industrial manufacturing, industrial robots are required to work together with human counterparts on certain special occasions, where human workers share their skills with robots. Intuitive human–robot interaction brings increasing safety c...

  • Article
  • Open Access
24 Citations
6,255 Views
16 Pages

In this paper, human security-related causes of large-scale forced migration (LSFM) in Africa are investigated for the period 2011–2017. As distinct from the conventional understanding of (national) security, human security involves economic, public...

  • Article
  • Open Access
5 Citations
3,285 Views
8 Pages

14 December 2019

We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system. In order to perform the decryption and...

of 19