Skip Content
You are currently on the new version of our website. Access the old version .

808 Results Found

  • Article
  • Open Access
6 Citations
2,234 Views
17 Pages

25 November 2022

With the rapid development of Industrial Internet of Things technology, the industrial control system (ICS) faces more and more security threats, which may lead to serious risks and extensive damage. Naturally, it is particularly important to constru...

  • Article
  • Open Access
16 Citations
3,275 Views
13 Pages

27 April 2023

When studying an unfamiliar system, we first look for the symmetry that the system has, so that we can make many predictions about the possible properties of the system. The symmetry in ship network security needs to maintain a stable state and maint...

  • Article
  • Open Access
2 Citations
1,972 Views
35 Pages

6 February 2024

Earlier protection methods mainly focused on using communication channels to transmit trip signals between the protective devices (PDs), with no solutions provided in the case of communication failure. Therefore, this paper introduces a dual-layer pr...

  • Review
  • Open Access
9 Citations
5,177 Views
30 Pages

A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords

  • Zena Mohammad Saadi,
  • Ahmed T. Sadiq,
  • Omar Z. Akif and
  • Alaa K. Farhan

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or gr...

  • Article
  • Open Access
2 Citations
1,443 Views
26 Pages

A Novel Data Obfuscation Framework Integrating Probability Density and Information Entropy for Privacy Preservation

  • Haolan Cheng,
  • Chenyi Qiang,
  • Lin Cong,
  • Jingze Xiao,
  • Shiya Liu,
  • Xingyu Zhou,
  • Huijun Wang,
  • Mingzhuo Ruan and
  • Chunli Lv

26 January 2025

Data privacy protection is increasingly critical in fields like healthcare and finance, yet existing methods, such as Fully Homomorphic Encryption (FHE), differential privacy (DP), and federated learning (FL), face limitations like high computational...

  • Article
  • Open Access
936 Views
21 Pages

2 November 2025

Electric aircraft powered by lithium batteries (LIBs) have seen rapid development in recent years, making research into their thermal runaway (TR) characteristics crucial for ensuring flight safety. This study focused on the individual battery cells...

  • Article
  • Open Access
9 Citations
3,774 Views
18 Pages

16 June 2019

Cropland loss resulting from land use change has drawn great attention in China due to the threat to food security. However, little is known about future magnitude and quality of cropland of China. In this study, the dynamic conversion of land use an...

  • Article
  • Open Access
19 Citations
2,951 Views
20 Pages

In order to achieve the coordinated development of ecological protection and cultivated land use, ecological security and cultivated land use functions (CLUFs) in the study area were evaluated by constructing a comprehensive evaluation index system....

  • Article
  • Open Access
2 Citations
1,757 Views
19 Pages

27 November 2023

The rapid proliferation of handheld intelligent devices and the advent of 5G technology have brought about convenient and fast services for people. In perception-oriented application services, participating users will upload sensitive mobile data in...

  • Article
  • Open Access
16 Citations
2,664 Views
16 Pages

14 February 2022

The internal threat to nuclear security is one of the most serious problems in the physical protection supervision of spent fuel reprocessing plants. Both insiders and nuclear security departments have obvious characteristics of situational decision...

  • Article
  • Open Access
6 Citations
5,987 Views
13 Pages

7 July 2022

It is undeniable that most business organizations rely on the Internet to conduct their highly competitive businesses nowadays. Cyber security is one of the important elements for companies to guarantee the normal operation of their business activiti...

  • Review
  • Open Access
24 Citations
5,259 Views
12 Pages

Advancements and Research Trends in Microgrids Cybersecurity

  • Giovanni Battista Gaggero,
  • Paola Girdinio and
  • Mario Marchese

10 August 2021

Microgrids are growing in importance in the Smart Grid paradigm for power systems. Microgrid security is becoming crucial since these systems increasingly rely on information and communication technologies. Many technologies have been proposed in the...

  • Article
  • Open Access
7 Citations
3,618 Views
19 Pages

11 May 2018

A new collaborative filtered recommendation strategy was proposed for existing privacy and security issues in location services. In this strategy, every user establishes his/her own position profiles according to their daily position data, which is p...

  • Review
  • Open Access
60 Citations
23,856 Views
22 Pages

Due to the widespread use of the Internet of Things (IoT), organizations should concentrate their efforts on system security. Any vulnerability could lead to a system failure or cyberattack, which would have a large-scale impact. IoT security is a pr...

  • Review
  • Open Access
129 Citations
10,439 Views
27 Pages

Cyber-Security of Smart Microgrids: A Survey

  • Farzam Nejabatkhah,
  • Yun Wei Li,
  • Hao Liang and
  • Rouzbeh Reza Ahrabi

23 December 2020

In this paper, the cyber-security of smart microgrids is thoroughly discussed. In smart grids, the cyber system and physical process are tightly coupled. Due to the cyber system’s vulnerabilities, any cyber incidents can have economic and physi...

  • Article
  • Open Access
23 Citations
29,951 Views
31 Pages

Protection of Personal Data in the Context of E-Commerce

  • Zlatan Morić,
  • Vedran Dakic,
  • Daniela Djekic and
  • Damir Regvart

20 September 2024

This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal...

  • Article
  • Open Access
2,061 Views
20 Pages

A Secure GNN Training Framework for Partially Observable Graph

  • Dongdong An,
  • Yi Yang,
  • Wenyan Liu,
  • Qin Zhao,
  • Jing Liu,
  • Hongda Qi and
  • Jie Lian

Graph Neural Networks (GNNs) are susceptible to adversarial injection attacks, potentially compromising the model integrity, reducing accuracy, and posing security risks. However, most of the current countermeasures focus on enhancing the robustness...

  • Article
  • Open Access
45 Citations
19,041 Views
49 Pages

23 February 2024

As financial institutions navigate an increasingly complex cyber threat landscape and regulatory ecosystem, there is a pressing need for a robust and adaptive security architecture. This paper introduces a comprehensive, Zero Trust model-based framew...

  • Article
  • Open Access
418 Views
21 Pages

4 December 2025

This article addresses a critical security challenge in Internet of Things (IoT) systems, which are vulnerable to traffic detection attacks due to their reliance on shared wireless communication channels. We propose a novel cooperative covert transmi...

  • Review
  • Open Access
20 Citations
6,249 Views
16 Pages

13 June 2024

Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenge...

  • Article
  • Open Access
2 Citations
654 Views
21 Pages

23 September 2025

Security systems are essential for maintaining public safety and protecting critical assets, yet most existing evaluation approaches remain static, capture only partial interactions among assets, security systems, and offenders, and lack qualitative...

  • Article
  • Open Access
18 Citations
2,684 Views
16 Pages

29 April 2023

Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from...

  • Article
  • Open Access
2 Citations
1,778 Views
22 Pages

30 April 2024

Ensuring source location privacy is crucial for the security of underwater acoustic sensor networks amid the growing use of marine environmental monitoring. However, the traditional source location privacy scheme overlooks multi-attacker cooperation...

  • Article
  • Open Access
9 Citations
4,538 Views
29 Pages

11 March 2023

Cultural landscape security is important to national spatial and cultural security. However, compared with the many achievements in the study of ecological security, transregional cultural landscape security research lacks enough attention to match i...

  • Article
  • Open Access
10 Citations
3,683 Views
26 Pages

As the main bearing area of the ecological crisis in resource-rich cities, it is essential for the urban fringe to enhance regional ecological security during a city’s transformation. This paper takes Daqing City, the largest oilfield in China&...

  • Systematic Review
  • Open Access
1,699 Views
12 Pages

Cybersecurity Issues in Electrical Protection Relays: A Systematic Review

  • Giovanni Battista Gaggero,
  • Paola Girdinio and
  • Mario Marchese

17 July 2025

The increasing digitalization of power systems has revolutionized the functionality and efficiency of electrical protection relays. These digital relays enhance fault detection, monitoring, and response mechanisms, ensuring the reliability and stabil...

  • Article
  • Open Access
1,340 Views
24 Pages

7 July 2025

In increasingly competitive digital markets, software firms must strategically balance cybersecurity investments and pricing decisions to attract consumers while safeguarding their platforms. This study develops a game-theoretic model in which two co...

  • Article
  • Open Access
7 Citations
1,238 Views
21 Pages

This paper presents a novel finite-time projective synchronization (FTPS) control strategy for fractional-order inertial memristive neural networks (FOIMNNs), exploring its application in image encryption. A sufficient condition for ensuring FTPS in...

  • Article
  • Open Access
12 Citations
6,899 Views
33 Pages

30 December 2020

The water and wastewater sector is an important lifeline upon which other economic sectors depend. Securing the sector’s critical infrastructure is therefore important for any country’s economy. Like many other nations, South Africa has a...

  • Article
  • Open Access
44 Citations
5,400 Views
29 Pages

A Multi-Layer Security Scheme for Mitigating Smart Grid Vulnerability against Faults and Cyber-Attacks

  • Jian Chen,
  • Mohamed A. Mohamed,
  • Udaya Dampage,
  • Mostafa Rezaei,
  • Saleh H. Salmen,
  • Sami Al Obaid and
  • Andres Annuk

25 October 2021

To comply with electric power grid automation strategies, new cyber-security protocols and protection are required. What we now experience is a new type of protection against new disturbances namely cyber-attacks. In the same vein, the impact of dist...

  • Review
  • Open Access
79 Citations
8,132 Views
30 Pages

Progress on Protection Strategies to Mitigate the Impact of Renewable Distributed Generation on Distribution Systems

  • Mohamad Norshahrani,
  • Hazlie Mokhlis,
  • Ab. Halim Abu Bakar,
  • Jasrul Jamani Jamian and
  • Shivashankar Sukumar

14 November 2017

The benefits of distributed generation (DG) based on renewable energy sources leads to its high integration in the distribution network (DN). Despite its well-known benefits, mainly in improving the distribution system reliability and security, there...

  • Review
  • Open Access
6 Citations
4,120 Views
17 Pages

4 November 2021

As digital instrumentation in Nuclear Power Plants (NPPs) is becoming increasingly complex, both attack vectors and defensive strategies are evolving based on new technologies and vulnerabilities. Continued efforts have been made to develop a variety...

  • Article
  • Open Access
4 Citations
4,731 Views
24 Pages

Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that...

  • Review
  • Open Access
115 Views
43 Pages

2 February 2026

The rapid digital transformation of healthcare has improved clinical efficiency, patient engagement, and data accessibility, but it has also introduced significant cyber security and data privacy challenges. Healthcare IT systems increasingly rely on...

  • Article
  • Open Access
10 Citations
3,968 Views
17 Pages

16 July 2023

Wild edible fruits from the forest have often been regarded as poverty food; however, there has been a notable shift in recent years as these wild edible fruits have gained increasing recognition for their significance in global food security, especi...

  • Feature Paper
  • Article
  • Open Access
9 Citations
8,797 Views
12 Pages

As technology evolves, businesses face new threats and opportunities in the areas of information and information assets. These areas include information creation, refining, storage, and dissemination. Governments and other organizations around the wo...

  • Article
  • Open Access
2 Citations
1,273 Views
25 Pages

29 April 2025

Ecological security is integral to national security strategies, making the construction of ecological security patterns essential for mitigating ecological risks. However, predictive research on ecological security patterns (ESPs) remains limited. T...

  • Review
  • Open Access
155 Citations
33,809 Views
16 Pages

The idea and perception of good cyber security protection remains at the forefront of many organizations’ information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals t...

  • Article
  • Open Access
515 Views
27 Pages

6 January 2026

Information security is currently a key pillar of information protection in organizations and a fundamental element of functioning organizational strategy. The aim of this article is to analyze how the integration of an information security managemen...

  • Article
  • Open Access
3 Citations
4,699 Views
22 Pages

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

  • Abhrajit Sengupta,
  • Mohammed Nabeel,
  • Mohammed Ashraf,
  • Johann Knechtel and
  • Ozgur Sinanoglu

Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various att...

  • Article
  • Open Access
6 Citations
2,109 Views
13 Pages

11 August 2022

Based on its national conditions and food availability, China has embarked on the road to establishing food security in a way by implementing the concepts of innovative, coordinated, green, open and inclusive development, and the requirements of high...

  • Article
  • Open Access
24 Citations
4,373 Views
13 Pages

7 January 2021

This paper deals with the design of the secure network in an Enhanced Internet of Vehicles by using the Blockchain Governance Game (BGG). The BGG is a system model of a stochastic game to find best strategies towards preparation of preventing a netwo...

  • Article
  • Open Access
14 Citations
3,659 Views
25 Pages

A Secure Scheme Based on a Hybrid of Classical-Quantum Communications Protocols for Managing Classical Blockchains

  • Ang Liu,
  • Xiu-Bo Chen,
  • Shengwei Xu,
  • Zhuo Wang,
  • Zhengyang Li,
  • Liwei Xu,
  • Yanshuo Zhang and
  • Ying Chen

17 May 2023

Blockchain technology affords data integrity protection and building trust mechanisms in transactions for distributed networks, and, therefore, is seen as a promising revolutionary information technology. At the same time, the ongoing breakthrough in...

  • Article
  • Open Access
5 Citations
10,450 Views
27 Pages

The widespread adoption of autonomous driving technology heavily relies on data acquisition and processing, which, while providing an intelligent experience for users, also raises concerns about data security, personal privacy, and data exploitation....

  • Article
  • Open Access
1,074 Views
12 Pages

When Access Is Not Enough: The Role of Utilization Barriers in Nutrition Security and Cardiometabolic Risk

  • Maha Almohamad,
  • Ruosha Li,
  • Natalia I. Heredia,
  • Jayna M. Dave,
  • Eric E. Calloway,
  • Anjail Z. Sharrief and
  • Shreela V. Sharma

18 June 2025

Background: Food and nutrition security are key social determinants of cardiometabolic health. While food security reflects access to sufficient food, nutrition security incorporates the quality, consistency, and usability of food that supports long-...

  • Article
  • Open Access
2 Citations
1,818 Views
18 Pages

1 October 2024

Food security is a cornerstone of national development, and farmland protection and rationale are crucial for its assurance. However, integrating primary, secondary, and tertiary industries (IPSTI) in rural areas places significant pressure on farmla...

  • Article
  • Open Access
9 Citations
2,441 Views
17 Pages

Empirical Wavelet Transform-Based Intelligent Protection Scheme for Microgrids

  • Syed Basit Ali Bukhari,
  • Abdul Wadood,
  • Tahir Khurshaid,
  • Khawaja Khalid Mehmood,
  • Sang Bong Rhee and
  • Ki-Chai Kim

27 October 2022

Recently, the concept of the microgrid (MG) has been developed to assist the penetration of large numbers of distributed energy resources (DERs) into distribution networks. However, the integration of DERs in the form of MGs disturbs the operating co...

  • Article
  • Open Access
4 Citations
3,184 Views
17 Pages

In this paper, we examine efforts by health organizations seeking comprehensive smokefree ordinances over Louisiana casinos and bars between 2010 and 2020 to determine best practices for increasing coverage. Bars and casinos remain less protected fro...

  • Feature Paper
  • Article
  • Open Access
10 Citations
4,686 Views
13 Pages

6 February 2021

The aim of the article is to prove that sustainable development goals can be supported by security and safety education, where security refers to the state of being free from danger or threats and safety applies to creating protection from risks or d...

  • Article
  • Open Access
60 Citations
11,086 Views
18 Pages

An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

  • Angelo Catalano,
  • Francesco Antonio Bruno,
  • Marco Pisco,
  • Antonello Cutolo and
  • Andrea Cusano

29 September 2014

We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, repre...

of 17