Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,102)

Search Parameters:
Keywords = user access control

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 4148 KB  
Article
Self-Build Practices on University Campus: Socio-Psychological Effects on Care and Intention to Spend Time in Outdoor Spaces
by Andrea Manunza, Alessandro Lorenzo Mura, Marco Lauriola, Emanuel Muroni, Silvana Mula, Giulia Giliberto, Donatella Pirina, Ferdinando Fornara and Oriana Mosca
Urban Sci. 2026, 10(1), 23; https://doi.org/10.3390/urbansci10010023 (registering DOI) - 1 Jan 2026
Abstract
This study investigates the impact of a self-built architectural intervention implemented in three areas, two intervention sites and one control site of a university campus, focusing on how such interventions can influence the use and care of open spaces. Surveys were administered before [...] Read more.
This study investigates the impact of a self-built architectural intervention implemented in three areas, two intervention sites and one control site of a university campus, focusing on how such interventions can influence the use and care of open spaces. Surveys were administered before and after the intervention to a purposive sample of 54 habitual campus users, recruited through peer referrals and contacted via informal channels such as in-person interactions, phone calls, and shared student groups. The surveys were completed anonymously using Google Forms. Data were analyzed using mixed-effects models to evaluate changes over time, across sites, and time x site interaction. Results showed a significant increase over time in participants’ intention to care for the whole campus. Intentions to spend time in outdoor areas varied significantly across sites but did not change over time, and no time × site interaction was detected, indicating that observed changes were not confined to intervention sites. These findings highlight the potential of user-centered design interventions to enhance the quality, accessibility, and usability of open areas by providing empirical insights relevant to urban planning and the management of public spaces. Overall, this research suggests that self-build initiatives within university campuses can serve as scalable models for fostering sustainable urban environments, promoting citizen engagement, and improving urban well-being. Full article
Show Figures

Figure 1

26 pages, 9465 KB  
Article
A Lightweight DTDMA-Assisted MAC Scheme for Ad Hoc Cognitive Radio IIoT Networks
by Bikash Mazumdar and Sanjib Kumar Deka
Electronics 2026, 15(1), 170; https://doi.org/10.3390/electronics15010170 - 30 Dec 2025
Viewed by 27
Abstract
Ad hoc cognitive radio-enabled Industrial Internet of Things (CR-IIoT) networks offer dynamic spectrum access (DSA) to mitigate the spectrum shortage in wireless communication. However, spectrum utilization is limited by the spectrum availability and resource constraints. In the ad hoc CR-IIoT context, this challenge [...] Read more.
Ad hoc cognitive radio-enabled Industrial Internet of Things (CR-IIoT) networks offer dynamic spectrum access (DSA) to mitigate the spectrum shortage in wireless communication. However, spectrum utilization is limited by the spectrum availability and resource constraints. In the ad hoc CR-IIoT context, this challenge is further complicated by bandwidth fragmentation arising from small IIoT packet transmissions within primary user (PU) slots. For resource-constrained ad hoc CR-IIoT networks, a medium access control (MAC) scheme is essential to enable opportunistic channel access with a low computational complexity. This work proposes a lightweight DTDMA-assisted MAC scheme (LDCRM) to minimize the queuing delay and maximize transmission opportunities. LDCRM employs a lightweight channel-selection mechanism, an adaptive minislot duration strategy, and spectrum-energy-aware distributed clustering to optimize both energy and spectrum utilization. DTDMA scheduling was formulated using a multiple knapsack problem (MKP) framework and solved using a greedy heuristic to minimize the queuing delay with a low computational overhead. The simulation results under an ON/OFF PU-sensing model showed that LDCRM outperformed CogLEACH and DPPST achieving up to 89.96% lower queuing delay, maintaining a higher packet delivery ratio (between 58.47 and 92.48%) and achieving near-optimal utilization of the minislot and bandwidth. An experimental evaluation of the clustering stability and fairness indicated a 56.25% extended network lifetime compared to that of E-CogLEACH. These results demonstrate LDCRM’s scalability and robustness for Industry 4.0 deployments. Full article
(This article belongs to the Special Issue Recent Advancements in Sensor Networks and Communication Technologies)
Show Figures

Figure 1

17 pages, 488 KB  
Article
Empirical Atomic Data for Plasma Simulations
by Stephan Fritzsche, Houke Huang and Aloka Kumar Sahoo
Plasma 2026, 9(1), 2; https://doi.org/10.3390/plasma9010002 - 29 Dec 2025
Viewed by 34
Abstract
Recent advances in non-local thermodynamic equilibrium (non-LTE) plasma simulations, for example in modeling kilonova ejecta, have emphasized the need for consistent and reliable atomic data. Unlike LTE modeling, non-LTE calculations must include a consistent treatment of various photon-induced and collisional processes in order [...] Read more.
Recent advances in non-local thermodynamic equilibrium (non-LTE) plasma simulations, for example in modeling kilonova ejecta, have emphasized the need for consistent and reliable atomic data. Unlike LTE modeling, non-LTE calculations must include a consistent treatment of various photon-induced and collisional processes in order to describe realistic electron and photon distributions in the plasma. However, the available atomic data are often incomplete, inconsistently formatted, or even fail to indicate the main dependencies on the level structure and plasma parameters, thus limiting their practical use. To address these issues, we have extended Jac, the Jena Atomic Calculator (version v0.3.0), to provide direct access to relevant cross sections, plasma rates, and rate coefficients. Emphasis is placed on photoexcitation and ionization processes as well as their time-reversed counterparts—photo-de-excitation and photorecombination. Whereas most of these data are still based on empirical expressions, their dependence on the ionic level structure and plasma temperature is made explicit here. Moreover, the electron and photon distributions can be readily controlled and adjusted by the user. This transparent representation of atomic data for photon-mediated processes, together with a straightforward use, facilitates their integration into existing plasma codes and improves the interpretation of high-energy astrophysical phenomena. It may support also more accurate and flexible non-LTE plasma simulations. Full article
(This article belongs to the Special Issue Feature Papers in Plasma Sciences 2025)
Show Figures

Figure 1

38 pages, 5997 KB  
Article
Blockchain-Enhanced Network Scanning and Monitoring (BENSAM) Framework
by Syed Wasif Abbas Hamdani, Kamran Ali and Zia Muhammad
Blockchains 2026, 4(1), 1; https://doi.org/10.3390/blockchains4010001 - 26 Dec 2025
Viewed by 118
Abstract
In recent years, the convergence of advanced technologies has enabled real-time data access and sharing across diverse devices and networks, significantly amplifying cybersecurity risks. For organizations with digital infrastructures, network security is crucial for mitigating potential cyber-attacks. They establish security policies to protect [...] Read more.
In recent years, the convergence of advanced technologies has enabled real-time data access and sharing across diverse devices and networks, significantly amplifying cybersecurity risks. For organizations with digital infrastructures, network security is crucial for mitigating potential cyber-attacks. They establish security policies to protect systems and data, but employees may intentionally or unintentionally bypass these policies, rendering the network vulnerable to internal and external threats. Detecting these policy violations is challenging, requiring frequent manual system checks for compliance. This paper addresses key challenges in safeguarding digital assets against evolving threats, including rogue access points, man-in-the-middle attacks, denial-of-service (DoS) incidents, unpatched vulnerabilities, and AI-driven automated exploits. We propose a Blockchain-Enhanced Network Scanning and Monitoring (BENSAM) Framework, a multi-layered system that integrates advanced network scanning with a structured database for asset management, policy-driven vulnerability detection, and remediation planning. Key enhancements include device profiling, user activity monitoring, network forensics, intrusion detection capabilities, and multi-format report generation. By incorporating blockchain technology, and leveraging immutable ledgers and smart contracts, the framework ensures tamper-proof audit trails, decentralized verification of policy compliance, and automated real-time responses to violations such as alerts; actual device isolation is performed by external controllers like SDN or NAC systems. The research provides a detailed literature review on blockchain applications in domains like IoT, healthcare, and vehicular networks. A working prototype of the proposed BENSAM framework was developed that demonstrates end-to-end network scanning, device profiling, traffic monitoring, policy enforcement, and blockchain-based immutable logging. This implementation is publicly released and is available on GitHub. It analyzes common network vulnerabilities (e.g., open ports, remote access, and disabled firewalls), attacks (including spoofing, flooding, and DDoS), and outlines policy enforcement methods. Moreover, the framework anticipates emerging challenges from AI-driven attacks such as adversarial evasion, data poisoning, and transformer-based threats, positioning the system for the future integration of adaptive mechanisms to counter these advanced intrusions. This blockchain-enhanced approach streamlines security analysis, extends the framework for AI threat detection with improved accuracy, and reduces administrative overhead by integrating multiple security tools into a cohesive, trustworthy, reliable solution. Full article
Show Figures

Figure 1

26 pages, 2258 KB  
Article
Reinforcement Learning for Uplink Access Optimization in UAV-Assisted 5G Networks Under Emergency Response
by Abid Mohammad Ali, Petro Mushidi Tshakwanda, Henok Berhanu Tsegaye, Harsh Kumar, Md Najmus Sakib, Raddad Almaayn, Ashok Karukutla and Michael Devetsikiotis
Automation 2026, 7(1), 5; https://doi.org/10.3390/automation7010005 - 26 Dec 2025
Viewed by 176
Abstract
We study UAV-assisted 5G uplink connectivity for disaster response, in which a UAV (unmanned aerial vehicle) acts as an aerial base station to restore service to ground users. We formulate a joint control problem coupling UAV kinematics (bounded acceleration and velocity), per-subchannel uplink [...] Read more.
We study UAV-assisted 5G uplink connectivity for disaster response, in which a UAV (unmanned aerial vehicle) acts as an aerial base station to restore service to ground users. We formulate a joint control problem coupling UAV kinematics (bounded acceleration and velocity), per-subchannel uplink power allocation, and uplink non-orthogonal multiple access (UL-NOMA) scheduling with adaptive successive interference cancellation (SIC) under a minimum user-rate constraint. The wireless channel follows 3GPP urban macro (UMa) with probabilistic line of sight/non-line of sight (LoS/NLoS), realistic receiver noise levels and noise figure, and user equipment (UE) transmit-power limits. We propose a bounded-action proximal policy optimization with generalized advantage estimation (PPO-GAE) agent that parameterizes acceleration and power with squashed distributions and enforces feasibility by design. Across four user distributions (clustered, uniform, ring, and edge-heavy) and multiple rate thresholds, our method increases the fraction of users meeting the target rate by 8.2–10.1 percentage points compared to strong baselines (OFDMA with heuristic placement, PSO-based placement/power, and PPO without NOMA) while reducing median UE transmit power by 64.6%. The results are averaged over at least five random seeds, with 95% confidence intervals. Ablations isolate the gains from NOMA, adaptive SIC order, and bounded-action parameterization. We discuss robustness to imperfect SIC and CSI errors and release code/configurations to support reproducibility. Full article
Show Figures

Figure 1

26 pages, 5933 KB  
Article
Adaptive Trust-Based Access Control with Honey Objects and Behavior Analysis
by Amal S. Alamro and Fawaz A. Alsulaiman
Appl. Sci. 2026, 16(1), 242; https://doi.org/10.3390/app16010242 - 25 Dec 2025
Viewed by 127
Abstract
In recent years, the number of interconnected computers and resources has increased drastically. To ensure the privacy of these resources, a secure access control mechanism must be implemented. Traditional access control models lack adequate emergency handling. Threshold-based collaborative access control (T-CAC) addresses the [...] Read more.
In recent years, the number of interconnected computers and resources has increased drastically. To ensure the privacy of these resources, a secure access control mechanism must be implemented. Traditional access control models lack adequate emergency handling. Threshold-based collaborative access control (T-CAC) addresses the issue of handling emergencies without overriding the access control model by shifting trust from individuals to groups, thereby enforcing collaboration among different actors. Given the risks associated with improper and uncontrolled delegation of authority, along with the need to enforce the zero-trust principle of continuous verification, this study proposes a secure and adaptable model, Adaptive Trust-Based Access Control with Honey Objects and Behavior Analysis (ATACHOBA). It enables user delegation based on both trust and behavior analyses. In the proposed model, access decisions are determined by trust values and recommendations provided by the machine learning algorithm. ATACHOBA imposes penalties for any abnormal or malicious activity. Moreover, it utilizes honey objects and honey requests to ensure appropriate user behavior. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

24 pages, 2429 KB  
Article
Secure Streaming Data Encryption and Query Scheme with Electric Vehicle Key Management
by Zhicheng Li, Jian Xu, Fan Wu, Cen Sun, Xiaomin Wu and Xiangliang Fang
Information 2026, 17(1), 18; https://doi.org/10.3390/info17010018 - 25 Dec 2025
Viewed by 176
Abstract
The rapid proliferation of Electric Vehicle (EV) infrastructures has led to the massive generation of high-frequency streaming data uploaded to cloud platforms for real-time analysis, while such data supports intelligent energy management and behavioral analytics, it also encapsulates sensitive user information, the disclosure [...] Read more.
The rapid proliferation of Electric Vehicle (EV) infrastructures has led to the massive generation of high-frequency streaming data uploaded to cloud platforms for real-time analysis, while such data supports intelligent energy management and behavioral analytics, it also encapsulates sensitive user information, the disclosure or misuse of which can lead to significant privacy and security threats. This work addresses these challenges by developing a secure and scalable scheme for protecting and verifying streaming data during storage and collaborative analysis. The proposed scheme ensures end-to-end confidentiality, forward security, and integrity verification while supporting efficient encrypted aggregation and fine-grained, time-based authorization. It introduces a lightweight mechanism that hierarchically organizes cryptographic keys and ciphertexts over time, enabling privacy-preserving queries without decrypting individual data points. Building on this foundation, an electric vehicle key management and query system is further designed to integrate the proposed encryption and verification scheme into practical V2X environments. The system supports privacy-preserving data sharing, verifiable statistical analytics, and flexible access control across heterogeneous cloud and edge infrastructures. Analytical and experimental evidence show that the designed system attains rigorous security guarantees alongside excellent efficiency and scalability, rendering it ideal for large-scale electric vehicle data protection and analysis tasks. Full article
(This article belongs to the Special Issue Privacy-Preserving Data Analytics and Secure Computation)
Show Figures

Graphical abstract

24 pages, 2559 KB  
Article
A Privacy-Preserving Data Sharing Scheme with Traceability and Revocability for Health Data Space
by Zengwen Yu, Jiawei Zhang, Baoxin You and Lin Huang
Electronics 2026, 15(1), 63; https://doi.org/10.3390/electronics15010063 - 23 Dec 2025
Viewed by 118
Abstract
The Health Data Space (HDS) is a promising platform for the secure health data sharing among entities including patients and healthcare providers. However, health data is highly sensitive and critical for diagnosis, and unauthorized access or destruction by malicious users can lead to [...] Read more.
The Health Data Space (HDS) is a promising platform for the secure health data sharing among entities including patients and healthcare providers. However, health data is highly sensitive and critical for diagnosis, and unauthorized access or destruction by malicious users can lead to serious privacy leaks or medical negligence. Thus, robust access control, privacy preservation, and data integrity are essential for HDS. Although Ciphertext-Policy Attribute-Based Encryption (CP-ABE) supports secure sharing, it has limitations when directly applied to HDS. Many current schemes cannot simultaneously handle data integrity violations, trace and revoke malicious users, and protect against privacy leaks from plaintext access policies, with key escrow being another major risk. To overcome these issues, we put forward a Traceable and Revocable Privacy-Preserving Data Sharing (TRPPDS) scheme. Our solution uses a novel distributed CP-ABE with a large universe alongside data auditing to provide fine-grained, key-escrow-resistant access control over unbounded attributes and guarantee data integrity. It also features tracing-then-revocation and full policy hiding to thwart malicious users and protect policy privacy. Formal security analysis is presented for our proposal, with thorough performance assessment also demonstrates its feasibility in HDS. Full article
(This article belongs to the Special Issue Cryptography and Computer Security)
Show Figures

Figure 1

22 pages, 3358 KB  
Article
Driving into the Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment Systems
by Minrui Yan, George Crane, Dean Suillivan and Haoqi Shan
Sensors 2026, 26(1), 77; https://doi.org/10.3390/s26010077 - 22 Dec 2025
Viewed by 373
Abstract
The rise of connected and automated vehicles has transformed in-vehicle infotainment (IVI) systems into critical gateways linking user interfaces, vehicular networks, and cloud-based fleet services. A concerning architectural reality is that hardcoded credentials like access point names (APNs) in IVI firmware create a [...] Read more.
The rise of connected and automated vehicles has transformed in-vehicle infotainment (IVI) systems into critical gateways linking user interfaces, vehicular networks, and cloud-based fleet services. A concerning architectural reality is that hardcoded credentials like access point names (APNs) in IVI firmware create a cross-layer attack surface where local exposure can escalate into entire vehicle fleets being remotely compromised. To address this risk, we propose a cross-layer security framework that integrates firmware extraction, symbolic execution, and targeted fuzzing to reconstruct authentic IVI-to-backend interactions and uncover high-impact web vulnerabilities such as server-side request forgery (SSRF) and broken access control. Applied across seven diverse automotive systems, including major original equipment manufacturers (OEMs) (Mercedes-Benz, Tesla, SAIC, FAW-VW, Denza), Tier-1 supplier Bosch, and advanced driver assistance systems (ADAS) vendor Minieye, our approach exposes systemic anti-patterns and demonstrates a fully realized exploit that enables remote control of approximately six million Mercedes-Benz vehicles. All 23 discovered vulnerabilities, including seven CVEs, were patched within one month. In closed automotive ecosystems, we argue that the true measure of efficacy lies not in maximizing code coverage but in discovering actionable, fleet-wide attack paths, which is precisely what our approach delivers. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

40 pages, 11669 KB  
Article
An Open and Novel Low-Cost Terrestrial Laser Scanner Prototype for Forest Monitoring
by Jozef Výbošťok, Juliána Chudá, Daniel Tomčík, Dominik Gretsch, Julián Tomaštík, Michał Pełka, Janusz Bedkowski, Michal Skladan and Martin Mokroš
Sensors 2026, 26(1), 63; https://doi.org/10.3390/s26010063 - 21 Dec 2025
Viewed by 453
Abstract
Accurate and efficient forest inventory methods are crucial for monitoring forest ecosystems, assessing carbon stocks, and supporting sustainable forest management. Traditional field-based techniques, which rely on manual measurements such as diameter at breast height (DBH) and tree height (TH), remain labour-intensive and time-consuming. [...] Read more.
Accurate and efficient forest inventory methods are crucial for monitoring forest ecosystems, assessing carbon stocks, and supporting sustainable forest management. Traditional field-based techniques, which rely on manual measurements such as diameter at breast height (DBH) and tree height (TH), remain labour-intensive and time-consuming. In this study, we introduce and validate a fully open-source, low-cost terrestrial laser scanning system (LCA-TLS) built from commercially available components and based on the Livox Avia sensor. With a total cost of €2050, the system responds to recent technological developments that have significantly reduced hardware expenses while retaining high data quality. This trend has created new opportunities for broadening access to high-resolution 3D data in ecological research. The performance of the LCA-TLS was assessed under controlled and field conditions and benchmarked against three reference devices: the RIEGL VZ-1000 terrestrial laser scanner, the Stonex X120GO handheld mobile laser scanner, and the iPhone 15 Pro Max structured-light device. The LCA-TLS achieved high accuracy for estimating DBH (RMSE: 1.50 cm) and TH (RMSE: 0.99 m), outperforming the iPhone and yielding results statistically comparable to the Stonex X120GO (DBH RMSE: 1.32 cm; p > 0.05), despite the latter being roughly ten times more expensive. While the RIEGL system produced the most accurate measurements, its cost exceeded that of the LCA-TLS by a factor of about 30. The hardware design, control software, and processing workflow of the LCA-TLS are fully open-source, allowing users worldwide to build, modify, and apply the system with minimal resources. The proposed solution thus represents a practical, cost-effective, and accessible alternative for 3D forest inventory and LiDAR-based ecosystem monitoring. Full article
(This article belongs to the Section Environmental Sensing)
Show Figures

Graphical abstract

19 pages, 18266 KB  
Article
GECO: A Real-Time Computer Vision-Assisted Gesture Controller for Advanced IoT Home System
by Murilo C. Lopes, Paula A. Silva, Ludwing Marenco, Evandro C. Vilas Boas, João G. A. de Carvalho, Cristiane A. Ferreira, André L. O. Carvalho, Cristiani V. R. Guimarães, Guilherme P. Aquino and Felipe A. P. de Figueiredo
Sensors 2026, 26(1), 61; https://doi.org/10.3390/s26010061 - 21 Dec 2025
Viewed by 494
Abstract
This paper introduces GECO, a real-time, computer vision-assisted gesture controller for IoT-based smart home systems. The platform uses a markerless MediaPipe interface that combines gesture-driven navigation and command execution, enabling intuitive control of multiple domestic devices. The system integrates binary and analog gestures, [...] Read more.
This paper introduces GECO, a real-time, computer vision-assisted gesture controller for IoT-based smart home systems. The platform uses a markerless MediaPipe interface that combines gesture-driven navigation and command execution, enabling intuitive control of multiple domestic devices. The system integrates binary and analog gestures, such as continuous light dimming based on thumb–index angles, while operating on-device through a private MQTT network. Technical evaluations across multiple Android devices have demonstrated ultra-low latency times (<50 ms), enabling real-time responsiveness. A user experience study with seventeen participants reported high intuitiveness (9.5/10), gesture accuracy (9.2/10), and perceived inclusivity, mainly for individuals with speech impairments and low technological literacy. These results position GECO as a lightweight, accessible, and privacy-preserving interaction framework, advancing the integration of artificial intelligence and IoT within smart home environments. Full article
(This article belongs to the Special Issue AI-Empowered Internet of Things)
Show Figures

Figure 1

29 pages, 2341 KB  
Article
Social Value Measurement and Attribute Impact of Urban Complex Parks: A Case Study of Shanghai
by Junyu Pan, Siyuan Xue and Yanzhe Hu
Sustainability 2026, 18(1), 56; https://doi.org/10.3390/su18010056 - 19 Dec 2025
Viewed by 303
Abstract
Amidst the paradigm shift in park city development from quantitative metrics to spatial performance, urban complex parks—a novel green space type developed privately yet fulfilling public functions—present an innovative approach to park provision in high-density urban areas. However, systematic empirical evidence on their [...] Read more.
Amidst the paradigm shift in park city development from quantitative metrics to spatial performance, urban complex parks—a novel green space type developed privately yet fulfilling public functions—present an innovative approach to park provision in high-density urban areas. However, systematic empirical evidence on their social value remains scarce. This study characterizes urban complex parks as a new form of green public space that provides key ecosystem services and proposes a three-dimensional evaluation framework integrating “usage vitality, place attractiveness, and user satisfaction.” Analyzing 19 park-equipped complexes among 75 cases in Shanghai using LBS data and online reviews through controlled linear regression and comparative analysis, our results indicate complexes with parks were associated with significantly outperforming others in place attractiveness and user satisfaction. Key findings include associations with a 413.7 m increase in average OD distance, a 3.4–4.0% higher city-level visitor share, and 5.24 percentage points greater median positive review rate. Crucially, spatial location outweighs green ratio and size in determining social value. Ground-level parks, through superior spatial integration, function as effective “social-ecological interfaces,” significantly outperforming rooftop parks in attracting long-distance visitors, stabilizing foot traffic (≈3% lower fluctuation), and enhancing per-store visitation. This demonstrates that green space quality (experiential quality and spatial configuration) matters more than quantity. Our findings suggest that urban complex parks can create social value through perceivable naturalness and restorative environments, providing an empirical basis for optimizing park city implementation in high-density contexts and highlighting the need to reconcile broad attractiveness with equitable local access. Full article
(This article belongs to the Special Issue Green Landscape and Ecosystem Services for a Sustainable Urban System)
Show Figures

Figure 1

27 pages, 954 KB  
Article
SAFE-GUARD: Semantic Access Control Framework Employing Generative User Assessment and Rule Decisions
by Nastaran Farhadighalati, Luis A. Estrada-Jimenez, Sepideh Kalateh, Sanaz Nikghadam-Hojjati and Jose Barata
Informatics 2026, 13(1), 1; https://doi.org/10.3390/informatics13010001 - 19 Dec 2025
Viewed by 233
Abstract
Healthcare faces a critical challenge: protecting sensitive medical data while enabling necessary clinical access. Evolving user behaviors, dynamic clinical contexts, and strict regulatory requirements demand adaptive access control mechanisms. Despite strict regulations, healthcare remains the most breached industry, consistently facing severe security risks [...] Read more.
Healthcare faces a critical challenge: protecting sensitive medical data while enabling necessary clinical access. Evolving user behaviors, dynamic clinical contexts, and strict regulatory requirements demand adaptive access control mechanisms. Despite strict regulations, healthcare remains the most breached industry, consistently facing severe security risks related to unauthorized access. Traditional access control models cannot handle contextual variations, detect credential compromise, or provide transparent decision rationales. To address this, SAFE-GUARD (Semantic Access Control Framework Employing Generative User Assessment and Rule Decisions) is proposed as a two-layer framework that combines behavioral analysis with policy enforcement. The Behavioral Analysis Layer uses Retrieval-Augmented Generation (RAG) to detect contextual anomalies by comparing current requests against historical patterns. The Rule-Based Policy Evaluation Layer independently validates organizational procedures and regulatory requirements. Access is granted only when behavioral consistency and both organizational and regulatory policies are satisfied. We evaluate SAFE-GUARD using simulated healthcare scenarios with three LLMs (GPT-4o, Claude 3.5 Sonnet, and Gemini 2.5 Flash) achieving an anomaly detection accuracy of 95.2%, 94.1%, and 91.3%, respectively. The framework effectively identifies both compromised credentials and insider misuse by detecting deviations from established behavioral patterns, significantly outperforming conventional RBAC and ABAC approaches that rely solely on static rules. Full article
(This article belongs to the Special Issue Health Data Management in the Age of AI)
Show Figures

Figure 1

27 pages, 10063 KB  
Article
Evaluating Direct Georeferencing of UAV-LiDAR Data Through QGIS Tools: An Application to a Coastal Area
by Carmen Maria Giordano, Valentina Alena Girelli, Alessandro Lambertini, Emanuele Mandanici, Maria Alessandra Tini, Renata Archetti, Massimo Ponti and Antonio Zanutta
Remote Sens. 2026, 18(1), 7; https://doi.org/10.3390/rs18010007 - 19 Dec 2025
Viewed by 287
Abstract
Coastal monitoring requires a synthesis of accuracy, temporal and context flexibility. Unmanned aerial vehicles (UAVs) equipped with LiDAR (light detection and ranging) sensors are a valuable option, made more widespread by the commercialization of consumer-grade systems, although they often limit user control over [...] Read more.
Coastal monitoring requires a synthesis of accuracy, temporal and context flexibility. Unmanned aerial vehicles (UAVs) equipped with LiDAR (light detection and ranging) sensors are a valuable option, made more widespread by the commercialization of consumer-grade systems, although they often limit user control over data processing. This work quantifies the impact of the base station type (temporary, permanent, or virtual) and its distance from the survey site on UAV-LiDAR direct georeferencing accuracy. The comparison is carried out, in a specific coastal study site, on both the estimated trajectories and the final outputs, using novel QGIS tools (PT2DEM, DEM2DEM, T2T). While temporary base stations are affected by uncertainties of the base coordinates, virtual reference stations are affected by a wider range of errors, compromising the relative model reconstruction. In contrast, permanent stations may avoid base-coordinate uncertainties, but if their distance from the site exceeds the suggested limit (15 km), their use leads to a loss of accuracy in both the relative reconstruction of the model and the absolute georeferencing. Although the use of vertical constraints has proven to be a valuable tool for reducing the vertical bias induced by a suboptimal base station, their distribution may not be adequate for minimizing residual random deviations, and their deployment may be challenging in environmental contexts lacking stable and accessible areas. Full article
(This article belongs to the Special Issue Advancements in LiDAR Technology and Applications in Remote Sensing)
Show Figures

Figure 1

17 pages, 4452 KB  
Article
SAUCF: A Framework for Secure, Natural-Language-Guided UAS Control
by Nihar Shah, Varun Aggarwal and Dharmendra Saraswat
Drones 2025, 9(12), 860; https://doi.org/10.3390/drones9120860 - 14 Dec 2025
Viewed by 341
Abstract
Precision agriculture increasingly recognizes the transformative potential of unmanned aerial systems (UASs) for crop monitoring and field assessment, yet research consistently highlights significant usability barriers as the main constraints to widespread adoption. Complex mission planning processes, including detailed flight plan creation and way [...] Read more.
Precision agriculture increasingly recognizes the transformative potential of unmanned aerial systems (UASs) for crop monitoring and field assessment, yet research consistently highlights significant usability barriers as the main constraints to widespread adoption. Complex mission planning processes, including detailed flight plan creation and way point management, pose substantial technical challenges that mainly affect non-expert operators. Farmers and their teams generally prefer user-friendly, straightforward tools, as evidenced by the rapid adoption of GPS guidance systems, which underscores the need for simpler mission planning in UAS operations. To enhance accessibility and safety in UAS control, especially for non-expert operators in agriculture and related fields, we propose a Secure UAS Control Framework (SAUCF): a comprehensive system for natural-language-driven UAS mission management with integrated dual-factor biometric authentication. The framework converts spoken user instructions into executable flight plans by leveraging a language-model-powered mission planner that interprets transcribed voice commands and generates context-aware operational directives, including takeoff, location monitoring, return-to-home, and landing operations. Mission orchestration is performed through a large language model (LLM) agent, coupled with a human-in-the-loop supervision mechanism that enables operators to review, adjust, or confirm mission plans before deployment. Additionally, SAUCF offers a manual override feature, allowing users to assume direct control or interrupt missions at any stage, ensuring safety and adaptability in dynamic environments. Proof-of-concept demonstrations on a UAS plat-form with on-board computing validated reliable speech-to-text transcription, biometric verification via voice matching and face authentication, and effective Sim2Real transfer of natural-language-driven mission plans from simulation environments to physical UAS operations. Initial evaluations showed that SAUCF reduced mission planning time, minimized command errors, and simplified complex multi-objective workflows compared to traditional waypoint-based tools, though comprehensive field validation remains necessary to confirm these preliminary findings. The integration of natural-language-based interaction, real-time identity verification, human-in-the-loop LLM orchestration, and manual override capabilities allows SAUCF to significantly lower the technical barrier to UAS operation while ensuring mission security, operational reliability, and operator agency in real-world conditions. These findings lay the groundwork for systematic field trials and suggest that prioritizing ease of operation in mission planning can drive broader deployment of UAS technologies. Full article
(This article belongs to the Section Artificial Intelligence in Drones (AID))
Show Figures

Figure 1

Back to TopTop