Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (182)

Search Parameters:
Keywords = security token

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 919 KiB  
Article
DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
by Shengmin Peng, Jialin Tian, Xiangyu Zheng, Shuwu Chen and Zhaogang Shu
Future Internet 2025, 17(8), 367; https://doi.org/10.3390/fi17080367 - 13 Aug 2025
Viewed by 206
Abstract
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a [...] Read more.
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a central controller, the SDN controller, to quickly direct the routing devices within the topology to forward data packets, thus providing flexible traffic management for communication between information sources. However, traditional Distributed Denial of Service (DDoS) attacks still significantly impact SDN systems. This paper proposes a novel dual-layer strategy capable of detecting and mitigating DDoS attacks in an SDN network environment. The first layer of the strategy enhances security by using blockchain technology to replace the SDN flow table storage container in the northbound interface of the SDN controller. Smart contracts are then used to process the stored flow table information. We employ the time window algorithm and the token bucket algorithm to construct the first layer strategy to defend against obvious DDoS attacks. To detect and mitigate less obvious DDoS attacks, we design a second-layer strategy that uses a composite data feature correlation coefficient calculation method and the Isolation Forest algorithm from unsupervised learning techniques to perform binary classification, thereby identifying abnormal traffic. We conduct experimental validation using the publicly available DDoS dataset CIC-DDoS2019. The results show that using this strategy in the SDN network reduces the average deviation of round-trip time (RTT) by approximately 38.86% compared with the original SDN network without this strategy. Furthermore, the accuracy of DDoS attack detection reaches 97.66% and an F1 score of 92.2%. Compared with other similar methods, under comparable detection accuracy, the deployment of our strategy in small-scale SDN network topologies provides faster detection speeds for DDoS attacks and exhibits less fluctuation in detection time. This indicates that implementing this strategy can effectively identify DDoS attacks without affecting the stability of data transmission in the SDN network environment. Full article
(This article belongs to the Special Issue DDoS Attack Detection for Cyber–Physical Systems)
Show Figures

Figure 1

41 pages, 1857 KiB  
Review
The Adaptive Ecosystem of MaaS-Driven Cookie Theft: Dynamics, Anticipatory Analysis Concepts, and Proactive Defenses
by Leandro Antonio Pazmiño Ortiz, Ivonne Fernanda Maldonado Soliz and Vanessa Katherine Guevara Balarezo
Future Internet 2025, 17(8), 365; https://doi.org/10.3390/fi17080365 - 11 Aug 2025
Viewed by 278
Abstract
The industrialization of cybercrime, principally through Malware-as-a-Service (MaaS), has elevated HTTP cookie theft to a critical cybersecurity challenge, enabling attackers to bypass multi-factor authentication and perpetrate large-scale account takeovers. Employing a Holistic and Integrative Review methodology, this paper dissects the intricate, adaptive ecosystem [...] Read more.
The industrialization of cybercrime, principally through Malware-as-a-Service (MaaS), has elevated HTTP cookie theft to a critical cybersecurity challenge, enabling attackers to bypass multi-factor authentication and perpetrate large-scale account takeovers. Employing a Holistic and Integrative Review methodology, this paper dissects the intricate, adaptive ecosystem of MaaS-driven cookie theft. We systematically characterize the co-evolving arms race between offensive and defensive strategies (2020–2025), revealing a critical strategic asymmetry where attackers optimize for speed and low cost, while effective defenses demand significant resources. To shift security from a reactive to an anticipatory posture, a multi-dimensional predictive framework is not only proposed but is also detailed as a formalized, testable algorithm, integrating technical, economic, and behavioral indicators to forecast emerging threat trajectories. Our findings conclude that long-term security hinges on disrupting the underlying cybercriminal economic model; we therefore reframe proactive countermeasures like Zero-Trust principles and ephemeral tokens as economic weapons designed to devalue the stolen asset. Finally, the paper provides a prioritized, multi-year research roadmap and a practical decision-tree framework to guide the implementation of these advanced, collaborative cybersecurity strategies to counter this pervasive and evolving threat. Full article
Show Figures

Figure 1

21 pages, 2365 KiB  
Article
Development of an Optimization Algorithm for Designing Low-Carbon Concrete Materials Standardization with Blockchain Technology and Ensemble Machine Learning Methods
by Zilefac Ebenezer Nwetlawung and Yi-Hsin Lin
Buildings 2025, 15(16), 2809; https://doi.org/10.3390/buildings15162809 - 8 Aug 2025
Viewed by 414
Abstract
This study presents SmartMix Web3, a framework combining ensemble machine learning and blockchain technology to optimize low-carbon concrete design. It addresses two key challenges: (1) the limitations of conventional models in predicting concrete performance, and (2) ensuring data reliability and overcoming collaboration issues [...] Read more.
This study presents SmartMix Web3, a framework combining ensemble machine learning and blockchain technology to optimize low-carbon concrete design. It addresses two key challenges: (1) the limitations of conventional models in predicting concrete performance, and (2) ensuring data reliability and overcoming collaboration issues in AI-driven sustainable construction. Validated with 61 real-world experiments in Cameroon and 752 mix designs, the framework shows major improvements in predictive accuracy and decentralized trust. To address the first research question, a stacked ensemble model comprising Extreme Gradient Boosting (XGBoost)–Random Forest and a Convolutional Neural Network (CNN) was developed, achieving a 22% reduction in Root Mean Square Error (RMSE) for compressive strength prediction and embodied carbon estimation compared to traditional methods. The 29% reduction in Mean Absolute Error (MAE) results confirms the superiority of Extreme Learning Machine (EML) in low-carbon concrete performance prediction. For the second research question, SmartMix Web3 employs blockchain to ensure tamper-proof traceability and promote collaboration. Deployed on Ethereum, it automates verification of tokenized Environmental Product Declarations via smart contracts, reducing disputes and preserving data integrity. Federated learning supports decentralized training across nine batching plants, with Secure Hash Algorithm (SHA)-256 checks ensuring privacy. Field implementation in Cameroon yielded annual cost savings of FCFA 24.3 million and a 99.87 kgCO2/m3 reduction per mix design. By uniting EML precision with blockchain transparency, SmartMix Web3 offers practical and scalable benefits for sustainable construction in developing economies. Full article
(This article belongs to the Section Building Materials, and Repair & Renovation)
Show Figures

Figure 1

35 pages, 4050 KiB  
Article
Blockchain-Based Secure and Reliable High-Quality Data Risk Management Method
by Chuan He, Yunfan Wang, Tao Zhang, Fuzhong Hao and Yuanyuan Ma
Electronics 2025, 14(15), 3058; https://doi.org/10.3390/electronics14153058 - 30 Jul 2025
Viewed by 316
Abstract
The collaborative construction of large-scale, diverse datasets is crucial for developing high-performance machine learning models. However, this collaboration faces significant challenges, including ensuring data security, protecting participant privacy, maintaining high dataset quality, and aligning economic incentives among multiple stakeholders. Effective risk management strategies [...] Read more.
The collaborative construction of large-scale, diverse datasets is crucial for developing high-performance machine learning models. However, this collaboration faces significant challenges, including ensuring data security, protecting participant privacy, maintaining high dataset quality, and aligning economic incentives among multiple stakeholders. Effective risk management strategies are essential to systematically identify, assess, and mitigate potential risks associated with data collaboration. This study proposes a federated blockchain-based framework designed to manage multiparty dataset collaborations securely and transparently, explicitly incorporating comprehensive risk management practices. The proposed framework involves six core entities—key distribution center (KDC), researcher (RA), data owner (DO), consortium blockchain, dataset evaluation platform, and the orchestrating model itself—to ensure secure, privacy-preserving and high-quality dataset collaboration. In addition, the framework uses blockchain technology to guarantee the traceability and immutability of data transactions, integrating token-based incentives to encourage data contributors to provide high-quality datasets. To systematically mitigate dataset quality risks, we introduced an innovative categorical dataset quality assessment method leveraging label reordering to robustly evaluate datasets. We validated this quality assessment approach using both publicly available (UCI) and privately constructed datasets. Furthermore, our research implemented the proposed blockchain-based management system within a consortium blockchain infrastructure, benchmarking its performance against existing methods to demonstrate enhanced security, reliability, risk mitigation effectiveness, and incentive alignment in dataset collaboration. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

24 pages, 4612 KiB  
Article
A Privacy Preserving Attribute-Based Access Control Model for the Tokenization of Mineral Resources via Blockchain
by Padmini Nemala, Ben Chen and Hui Cui
Appl. Sci. 2025, 15(15), 8290; https://doi.org/10.3390/app15158290 - 25 Jul 2025
Viewed by 231
Abstract
The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access control models, such as role-based access control, are too rigid because they assign [...] Read more.
The blockchain technology is transforming the mining industry by enabling mineral reserve tokenization, improving security, transparency, and traceability. However, controlling access to sensitive mining data remains a challenge. Existing access control models, such as role-based access control, are too rigid because they assign permissions based on predefined roles rather than real-world conditions like mining licenses, regulatory approvals, or investment status. To address this, this paper explores an attribute-based access control model for blockchain-based mineral tokenization systems. ABAC allows access permissions to be granted dynamically based on multiple attributes rather than fixed roles, making it more adaptable to the mining industry. This paper presents a high-level system design that integrates ABAC with the blockchain using smart contracts to manage access policies and ensure compliance. The proposed model is designed for permissioned blockchain platforms, where access control decisions can be automated and securely recorded. A comparative analysis between ABAC and RBAC highlights how ABAC provides greater flexibility, security, and privacy for mining operations. By introducing ABAC in blockchain-based mineral reserve tokenization, this paper contributes to a more efficient and secure way of managing data access in the mining industry, ensuring that only authorized stakeholders can interact with tokenized mineral assets. Full article
Show Figures

Figure 1

22 pages, 1195 KiB  
Article
Private Blockchain-Driven Digital Evidence Management Systems: A Collaborative Mining and NFT-Based Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Information 2025, 16(7), 616; https://doi.org/10.3390/info16070616 - 17 Jul 2025
Viewed by 401
Abstract
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain [...] Read more.
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain using Proof of Work (PoW) to securely manage digital evidence. Miners are assigned specific nonce ranges to accelerate the mining process, called collaborative mining, to enhance the scalability challenges in DEMSs. Transaction data includes digital evidence to generate a Non-Fungible Token (NFT). Miners use NFTs to solve the puzzle according to the assigned difficulty level d, so as to generate a hash using SHA-256 and add it to the ledger. Users can verify the integrity and authenticity of records by re-generating the hash and comparing it with the one stored in the ledger. Our results show that the data was verified with 100% precision. The mining time was 2.5 s, and the nonce iterations were as high as 80×103 for d=5. This approach improves the scalability and integrity of digital evidence management by reducing the overall mining time. Full article
(This article belongs to the Special Issue Blockchain and AI: Innovations and Applications in ICT)
Show Figures

Figure 1

20 pages, 2883 KiB  
Article
Sustainable Daily Mobility and Bike Security
by Sergej Gričar, Christian Stipanović and Tea Baldigara
Sustainability 2025, 17(14), 6262; https://doi.org/10.3390/su17146262 - 8 Jul 2025
Viewed by 321
Abstract
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from [...] Read more.
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from cycling. This study explores how advanced security measures can bolster sustainable urban mobility and tourism by addressing these challenges. A mixed-methods approach is utilised, incorporating primary survey data from Slovenia and secondary data on bicycle sales, imports and thefts from 2015 to 2024. Findings indicate that access to secure parking substantially enhances users’ sense of safety when commuting by bike. Regression analysis shows that for every 1000 additional bicycles sold, approximately 280 more thefts occur—equivalent to a 0.28 rise in reported thefts—highlighting a systemic vulnerability associated with sustainability-oriented behaviour. To bridge this gap, the study advocates for an innovative security framework that combines blockchain technology and Non-Fungible Tokens (NFTs) with encrypted Quick Response (QR) codes. Each bicycle would receive a tamper-proof QR code connected to a blockchain-verified NFT documenting ownership and usage data. This system facilitates real-time authentication, enhances traceability, deters theft, and builds trust in cycling as a dependable transport alternative. The proposed solution merges sustainable transport, digital identity, and urban security, presenting a scalable model for individual users and shared mobility systems. Full article
(This article belongs to the Collection Reshaping Sustainable Tourism in the Horizon 2050)
Show Figures

Figure 1

26 pages, 1804 KiB  
Article
Dependency-Aware Entity–Attribute Relationship Learning for Text-Based Person Search
by Wei Xia, Wenguang Gan and Xinpan Yuan
Big Data Cogn. Comput. 2025, 9(7), 182; https://doi.org/10.3390/bdcc9070182 - 7 Jul 2025
Viewed by 468
Abstract
Text-based person search (TPS), a critical technology for security and surveillance, aims to retrieve target individuals from image galleries using textual descriptions. The existing methods face two challenges: (1) ambiguous attribute–noun association (AANA), where syntactic ambiguities lead to incorrect associations between attributes and [...] Read more.
Text-based person search (TPS), a critical technology for security and surveillance, aims to retrieve target individuals from image galleries using textual descriptions. The existing methods face two challenges: (1) ambiguous attribute–noun association (AANA), where syntactic ambiguities lead to incorrect associations between attributes and the intended nouns; and (2) textual noise and relevance imbalance (TNRI), where irrelevant or non-discriminative tokens (e.g., ‘wearing’) reduce the saliency of critical visual attributes in the textual description. To address these aspects, we propose the dependency-aware entity–attribute alignment network (DEAAN), a novel framework that explicitly tackles AANA through dependency-guided attention and TNRI via adaptive token filtering. The DEAAN introduces two modules: (1) dependency-assisted implicit reasoning (DAIR) to resolve AANA through syntactic parsing, and (2) relevance-adaptive token selection (RATS) to suppress TNRI by learning token saliency. Experiments on CUHK-PEDES, ICFG-PEDES, and RSTPReid demonstrate state-of-the-art performance, with the DEAAN achieving a Rank-1 accuracy of 76.71% and an mAP of 69.07% on CUHK-PEDES, surpassing RDE by 0.77% in Rank-1 and 1.51% in mAP. Ablation studies reveal that DAIR and RATS individually improve Rank-1 by 2.54% and 3.42%, while their combination elevates the performance by 6.35%, validating their synergy. This work bridges structured linguistic analysis with adaptive feature selection, demonstrating practical robustness in surveillance-oriented TPS scenarios. Full article
Show Figures

Figure 1

24 pages, 3773 KiB  
Article
Smart Grid System Based on Blockchain Technology for Enhancing Trust and Preventing Counterfeiting Issues
by Ala’a Shamaseen, Mohammad Qatawneh and Basima Elshqeirat
Energies 2025, 18(13), 3523; https://doi.org/10.3390/en18133523 - 3 Jul 2025
Viewed by 501
Abstract
Traditional systems in real life lack transparency and ease of use due to their reliance on centralization and large infrastructure. Furthermore, many sectors that rely on information technology face major challenges related to data integrity, trust, and counterfeiting, limiting scalability and acceptance in [...] Read more.
Traditional systems in real life lack transparency and ease of use due to their reliance on centralization and large infrastructure. Furthermore, many sectors that rely on information technology face major challenges related to data integrity, trust, and counterfeiting, limiting scalability and acceptance in the community. With the decentralization and digitization of energy transactions in smart grids, security, integrity, and fraud prevention concerns have increased. The main problem addressed in this study is the lack of a secure, tamper-resistant, and decentralized mechanism to facilitate direct consumer-to-prosumer energy transactions. Thus, this is a major challenge in the smart grid. In the blockchain, current consensus algorithms may limit the scalability of smart grids, especially when depending on popular algorithms such as Proof of Work, due to their high energy consumption, which is incompatible with the characteristics of the smart grid. Meanwhile, Proof of Stake algorithms rely on energy or cryptocurrency stake ownership, which may make the smart grid environment in blockchain technology vulnerable to control by the many owning nodes, which is incompatible with the purpose and objective of this study. This study addresses these issues by proposing and implementing a hybrid framework that combines the features of private and public blockchains across three integrated layers: user interface, application, and blockchain. A key contribution of the system is the design of a novel consensus algorithm, Proof of Energy, which selects validators based on node roles and randomized assignment, rather than computational power or stake ownership. This makes it more suitable for smart grid environments. The entire framework was developed without relying on existing decentralized platforms such as Ethereum. The system was evaluated through comprehensive experiments on performance and security. Performance results show a throughput of up to 60.86 transactions per second and an average latency of 3.40 s under a load of 10,000 transactions. Security validation confirmed resistance against digital signature forgery, invalid smart contracts, race conditions, and double-spending attacks. Despite the promising performance, several limitations remain. The current system was developed and tested on a single machine as a simulation-based study using transaction logs without integration of real smart meters or actual energy tokenization in real-time scenarios. In future work, we will focus on integrating real-time smart meters and implementing full energy tokenization to achieve a complete and autonomous smart grid platform. Overall, the proposed system significantly enhances data integrity, trust, and resistance to counterfeiting in smart grids. Full article
Show Figures

Figure 1

33 pages, 8044 KiB  
Article
Building Ledger Dossier: Case Study of Seismic Damage Mitigation and Building Documentation Tracking Through a Digital Twin Approach
by Giovanni De Gasperis, Sante Dino Facchini and Asif Saeed
Systems 2025, 13(7), 529; https://doi.org/10.3390/systems13070529 - 1 Jul 2025
Viewed by 1106
Abstract
In recent years, numerous regions worldwide have experienced devastating natural disasters, leading to significant structural damage to buildings and loss of human lives. The reconstruction process highlights the need for a reliable method to document and track the maintenance history of buildings. This [...] Read more.
In recent years, numerous regions worldwide have experienced devastating natural disasters, leading to significant structural damage to buildings and loss of human lives. The reconstruction process highlights the need for a reliable method to document and track the maintenance history of buildings. This paper introduces a novel approach for managing and monitoring restoring interventions using a secure and transparent digital framework. We will also present an application aimed at improving building structures with respect to earthquake resistance. The proposed system, referred as the “Building Ledger Dossier”, leverages a Digital Twin approach applied to blockchain to establish an immutable record of all structural interventions. The framework models buildings using OpenSees, while all maintenance, repair activities, and documents are registered as Non-Fungible Tokens on a blockchain network, ensuring timestamping, transparency, and accountability. A Decentralized Autonomous Organization oversees identity management and work validation, enhancing security and efficiency in building restoration efforts. This approach provides a scalable and globally applicable solution for improving both ante-disaster monitoring and post-disaster reconstruction, ensuring a comprehensive, verifiable history of structural interventions and fostering trust among stakeholders. The proposed method is also applicable to other types of processes that require the aforementioned properties for document monitoring, such as the life-cycle management of tax credits and operations in the financial or banking sectors. Full article
Show Figures

Figure 1

19 pages, 1186 KiB  
Article
Blockchain in Sports: A Comparative Analysis of Applications and Perceptions in Football and Basketball
by Rocsana Bucea-Manea-Țoniș, Andrei Gabriel Antonescu and Constanța Mihăilă
Appl. Sci. 2025, 15(12), 6829; https://doi.org/10.3390/app15126829 - 17 Jun 2025
Viewed by 1235
Abstract
Blockchain technology is reshaping the sports industry by enhancing transparency, data security, and fan engagement through applications such as smart contracts, tokenized sponsorships, and decentralized ticketing. This study investigates blockchain adoption in Romanian team sports, specifically football and basketball, through a comparative analysis [...] Read more.
Blockchain technology is reshaping the sports industry by enhancing transparency, data security, and fan engagement through applications such as smart contracts, tokenized sponsorships, and decentralized ticketing. This study investigates blockchain adoption in Romanian team sports, specifically football and basketball, through a comparative analysis based on a survey of 293 sports professionals (213 from football and 80 from basketball). Using structural equation modeling (SEM) with SmartPLS and cluster analysis in SPSS, the study explores the perceived benefits of blockchain and its relationship with athlete performance. The findings reveal distinct adoption patterns: football shows higher use of blockchain in ticketing and fan engagement, while basketball leads in performance analytics and financial support mechanisms. Statistically significant differences were confirmed through MANOVA, and clustering revealed varied stakeholder perceptions across professional roles. Benchmarking against sectors like finance and healthcare highlights transferable best practices for blockchain integration in sports. Full article
(This article belongs to the Special Issue Sports Performance: Data Measurement, Analysis and Improvement)
Show Figures

Figure 1

24 pages, 2593 KiB  
Review
A Comprehensive Analysis of Integrating Blockchain Technology into the Energy Supply Chain for the Enhancement of Transparency and Sustainability
by Narendra Gariya, Anjas Asrani, Adhirath Mandal, Amir Shaikh and Dowan Cha
Energies 2025, 18(11), 2951; https://doi.org/10.3390/en18112951 - 4 Jun 2025
Cited by 1 | Viewed by 931
Abstract
The energy sector underwent a significant transformation with increasing demand for efficiency, transparency, and sustainability. The traditional or conventional system often faces several challenges, such as inefficient energy trading, a lack of transparency in renewable energy generation verification, and complex regulatory guidelines that [...] Read more.
The energy sector underwent a significant transformation with increasing demand for efficiency, transparency, and sustainability. The traditional or conventional system often faces several challenges, such as inefficient energy trading, a lack of transparency in renewable energy generation verification, and complex regulatory guidelines that affect its widespread adoption. Thus, blockchain technology has emerged as a potential solution to overcome these challenges, as it is known for its transparent, secure, and decentralized nature. However, despite the promising application of blockchain, its integration into the energy supply chain (ESC) is underexplored. The purpose of this research is to analyze the potential applications of blockchain technology in ESC in order to enhance efficiency, transparency, and sustainability in energy systems. The aim is to investigate the integration of blockchain with emerging technologies (such as IoTs, smart contracts, and P2P energy trading) in order to optimize energy production, distribution, and consumption. Furthermore, by comparing different blockchain platforms (like Ethereum, Solana, Hedera, and Hyperledger Fabric), this study discusses the security and scalability challenges of using blockchain in energy systems. It also examines the practical use cases of blockchain for the tokenization of RECs, dynamic energy pricing, and P2P energy trading by providing the Energy Web Foundation and Power Ledger as real-world examples. The article concludes that blockchain technology has the potential to transform ESC by enabling decentralized energy trading, which subsequently enhances transparency in energy transactions and the verification of renewable energy generation. It also identifies smart contracts and tokenization of energy assets as key parameters for dynamic pricing models and efficient trading mechanisms. However, regulatory and scalability challenges remain significant obstacles to its widespread adoption. Finally, this study provides the basis for future advancement in the adoption of blockchain technology in ESC, which offers a valuable resource for industry professionals, regulating authorities, and researchers. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

25 pages, 1932 KiB  
Article
Enhancing Facility Management with Emerging Technologies: A Study on the Application of Blockchain and NFTs
by Andrea Bongini, Marco Sparacino, Luca Marzi and Carlo Biagini
Buildings 2025, 15(11), 1911; https://doi.org/10.3390/buildings15111911 - 1 Jun 2025
Viewed by 549
Abstract
In recent years, Facility Management has undergone significant technological and methodological advancements, primarily driven by Building Information Modelling (BIM), Computer-Aided Facility Management (CAFM), and Computerized Maintenance Management Systems (CMMS). These innovations have improved process efficiency and risk management. However, challenges remain in asset [...] Read more.
In recent years, Facility Management has undergone significant technological and methodological advancements, primarily driven by Building Information Modelling (BIM), Computer-Aided Facility Management (CAFM), and Computerized Maintenance Management Systems (CMMS). These innovations have improved process efficiency and risk management. However, challenges remain in asset management, maintenance, traceability, and transparency. This study investigates the potential of blockchain technology and non-fungible tokens (NFTs) to address these challenges. By referencing international (ISO, BOMA) and European (EN) standards, the research develops an asset management process model incorporating blockchain and NFTs. The methodology includes evaluating the technical and practical aspects of this model and strategies for metadata utilization. The model ensures an immutable record of transactions and maintenance activities, reducing errors and fraud. Smart contracts automate sub-phases like progress validation and milestone-based payments, increasing operational efficiency. The study’s practical implications are significant, offering advanced solutions for transparent, efficient, and secure Facility Management. It lays the groundwork for future research, emphasizing practical implementations and real-world case studies. Additionally, integrating blockchain with emerging technologies like artificial intelligence and machine learning could further enhance Facility Management processes. Full article
Show Figures

Figure 1

29 pages, 2570 KiB  
Article
Detecting Zero-Day Web Attacks with an Ensemble of LSTM, GRU, and Stacked Autoencoders
by Vahid Babaey and Hamid Reza Faragardi
Computers 2025, 14(6), 205; https://doi.org/10.3390/computers14060205 - 26 May 2025
Cited by 2 | Viewed by 1677
Abstract
The increasing sophistication of web-based services has intensified the risk of zero-day attacks, exposing critical vulnerabilities in user information security. Traditional detection systems often rely on labeled attack data and struggle to identify novel threats without prior knowledge. This paper introduces a novel [...] Read more.
The increasing sophistication of web-based services has intensified the risk of zero-day attacks, exposing critical vulnerabilities in user information security. Traditional detection systems often rely on labeled attack data and struggle to identify novel threats without prior knowledge. This paper introduces a novel one-class ensemble method for detecting zero-day web attacks, combining the strengths of Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and stacked autoencoders through latent representation concatenation and compression. Additionally, a structured tokenization strategy based on character-level analysis is employed to enhance input consistency and reduce feature dimensionality. The proposed method was evaluated using the CSIC 2012 dataset, achieving 97.58% accuracy, 97.52% recall, 99.76% specificity, and 99.99% precision, with a false positive rate of just 0.2%. Compared to conventional ensemble techniques like majority voting, our approach demonstrates superior anomaly detection performance by fusing diverse feature representations at the latent level rather than the output level. These results highlight the model’s effectiveness in accurately detecting unknown web attacks with low false positives, addressing major limitations of existing detection frameworks. Full article
(This article belongs to the Special Issue Using New Technologies in Cyber Security Solutions (2nd Edition))
Show Figures

Figure 1

25 pages, 6255 KiB  
Article
Threat Intelligence Named Entity Recognition Based on Segment-Level Information Extraction and Similar Semantic Space Construction
by Long Chen, Hongli Deng, Jun Zhang, Bochuan Zheng and Rui Jiang
Symmetry 2025, 17(5), 783; https://doi.org/10.3390/sym17050783 - 19 May 2025
Viewed by 807
Abstract
Threat intelligence is crucial for the early detection of network security threats, and named entity recognition (NER) plays a critical role in this process. However, traditional NER models based on sequence tagging primarily focus on word-level information for single-token entities, which leads to [...] Read more.
Threat intelligence is crucial for the early detection of network security threats, and named entity recognition (NER) plays a critical role in this process. However, traditional NER models based on sequence tagging primarily focus on word-level information for single-token entities, which leads to the inefficient extraction of multi-token entities in intelligence texts. Moreover, traditional NER models provide only a single semantic representation of intelligence texts, meaning that polysemous entities in intelligence texts cannot be effectively classified. To address these problems, this paper proposes a novel model based on segment-level information extraction and similar semantic space construction (SSNER). First, SSNER retrains the traditional BERT model based on a threat intelligence corpus and modifies BERT’s mask mechanism to extract the segment-level word embedding so that the ability of the SSNER to recognize multi-token entities is enhanced. Second, SSNER designs a similar semantic space construction method, which obtains compound semantic representations with symmetrical properties by filtering out the set of similar words and integrating them using self-attention to generate more accurate labels for the polysemous entities. The experimental results on two datasets, DNRTI and Bridges, indicate that SSNER outperforms both baseline and related models. In particular, SSNER achieves an F1-score of 96.02% on the Bridges dataset, exceeding the previous best model by approximately 1.46%. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Back to TopTop