Skip to Content

1,074 Results Found

  • Article
  • Open Access
4 Citations
2,079 Views
21 Pages

IoV Vulnerability Classification Algorithm Based on Knowledge Graph

  • Jiuru Wang,
  • Yifang Wang,
  • Jingcheng Song and
  • Hongyuan Cheng

23 November 2023

With the rapid development of smart technologies, the Internet of Vehicles (IoV) is revolutionizing transportation and mobility. However, the complexity and interconnectedness of IoV systems lead to a growing number of security incidents caused by vu...

  • Article
  • Open Access
69 Citations
7,924 Views
16 Pages

4 January 2021

Index-based approaches are widely employed for measuring flood vulnerability. Nevertheless, the uncertainties in the index construction are rarely considered. Here, we conducted a sensitivity analysis of a flood vulnerability index in the Maquin&eacu...

  • Article
  • Open Access
3 Citations
2,789 Views
18 Pages

15 January 2023

The rapid development of J2EE (Java 2 Platform Enterprise Edition) has brought unprecedented severe challenges to vulnerability mining. The current abstract syntax tree-based source code vulnerability classification method does not eliminate irreleva...

  • Article
  • Open Access
6 Citations
3,912 Views
20 Pages

The development of Distributed Ledger Technology (DLT) is pushing toward automating decentralized data exchange processes. One of the key components of this evolutionary step is facilitating smart contracts that, in turn, come with several additional...

  • Article
  • Open Access
3 Citations
3,474 Views
35 Pages

4 September 2024

Smart contracts are programs that reside and execute on a blockchain, like any transaction. They are automatically executed when preprogrammed terms and conditions are met. Although the smart contract (SC) must be presented in the blockchain for the...

  • Article
  • Open Access
8 Citations
5,409 Views
17 Pages

24 September 2015

The Social Vulnerability Index (SoVI) has served the hazards community well for more than a decade. Using Utah as a test case, a state with a population exposed to a variety of hazards, this study sought to build upon the SoVI approach by augmenting...

  • Article
  • Open Access
15 Citations
4,519 Views
18 Pages

11 May 2018

This study develops a systematic framework for assessing a country’s financial vulnerability using a predictive classification model of random forests. We introduce a new indicator that quantifies the potential loss in bank assets and measures...

  • Article
  • Open Access
7 Citations
5,718 Views
27 Pages

3 December 2021

The vegetative cover in and surrounding the Rohingya refugee camps in Ukhiya-Teknaf is highly vulnerable since millions of refugees moved into the area, which led to severe environmental degradation. In this research, we used a supervised image class...

  • Proceeding Paper
  • Open Access
2 Citations
2,485 Views
5 Pages

Radar Based Detection and Classification of Vulnerable Road Users

  • Tetiana Lavrenko,
  • Timo Gessler,
  • Thomas Walter,
  • Hubert Mantz and
  • Michael Schlick

Radar sensors accurately detect different objects; however, the reliable classification of these objects remains challenging. In this contribution, new approaches to extracting and interpreting unique spectral features of pedestrians and cyclists are...

  • Article
  • Open Access
1 Citations
1,519 Views
11 Pages

Food Consumption Inequalities in Primary Care in a Large Metropolis

  • Mariana Souza Lopes,
  • Priscila Lenita Candida dos Santos and
  • Aline Cristine Souza Lopes

The aim of this study was to examine the association between health vulnerability and food consumption according to the NOVA classification within primary care in a major Brazilian city. A cross-sectional study was conducted among adults over 20 year...

  • Article
  • Open Access
24 Citations
3,714 Views
23 Pages

This paper provides a discussion and thoughtful application on a large sample of the procedures for the classification of existing bridges recently adopted in Italy and defined within the Italian Guidelines for the classification, risk management, sa...

  • Letter
  • Open Access
20 Citations
3,658 Views
12 Pages

Deep Transfer Learning for Vulnerable Road Users Detection using Smartphone Sensors Data

  • Mohammed Elhenawy,
  • Huthaifa I. Ashqar,
  • Mahmoud Masoud,
  • Mohammed H. Almannaa,
  • Andry Rakotonirainy and
  • Hesham A. Rakha

25 October 2020

As the Autonomous Vehicle (AV) industry is rapidly advancing, the classification of non-motorized (vulnerable) road users (VRUs) becomes essential to ensure their safety and to smooth operation of road applications. The typical practice of non-motori...

  • Article
  • Open Access
5 Citations
2,343 Views
23 Pages

31 March 2024

The implementation of energy efficiency improvements in facades, such as ventilated facades or External Thermal Insulation Composite Systems (ETICS), is leading to a widespread modification of these structures. The lack of appropriate regulations to...

  • Article
  • Open Access
43 Citations
6,963 Views
18 Pages

Classification of Aquifer Vulnerability by Using the DRASTIC Index and Geo-Electrical Techniques

  • Syed Hassan Iqbal Ahmad Shah,
  • Jianguo Yan,
  • Israr Ullah,
  • Bilal Aslam,
  • Aqil Tariq,
  • Lili Zhang and
  • Faisal Mumtaz

4 August 2021

Vulnerability analysis in areas vulnerable to anthropogenic pollution has become a key element of sensible resource management and land use planning. This study is intended to estimate aquifer vulnerability using the DRASTIC model and using the verti...

  • Article
  • Open Access
5 Citations
10,680 Views
27 Pages

The widespread adoption of autonomous driving technology heavily relies on data acquisition and processing, which, while providing an intelligent experience for users, also raises concerns about data security, personal privacy, and data exploitation....

  • Article
  • Open Access
32 Citations
15,508 Views
24 Pages

18 September 2023

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive su...

  • Review
  • Open Access
17 Citations
5,038 Views
16 Pages

13 January 2023

Stroke is a massive public health problem. The rupture of vulnerable carotid atherosclerotic plaques is the most common cause of acute ischemic stroke (AIS) across the world. Currently, vessel wall high-resolution magnetic resonance imaging (VW-HRMRI...

  • Article
  • Open Access
2,829 Views
18 Pages

The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G enhances com...

  • Article
  • Open Access
7 Citations
6,675 Views
18 Pages

Earthquake Magnitude and Shaking Intensity Dependent Fragility Functions for Rapid Risk Assessment of Buildings

  • Marie-José Nollet,
  • Ahmad Abo El Ezz,
  • Oliver Surprenant,
  • Alex Smirnoff and
  • Miroslav Nastev

An integrated web application, referred to as ER2 for rapid risk evaluator, is under development for a user-friendly seismic risk assessment by the non-expert public safety community. The assessment of likely negative consequences is based on pre-pop...

  • Article
  • Open Access
19 Citations
8,589 Views
24 Pages

26 February 2019

The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service” and “code injection”. A review and an analysis of various attack dete...

  • Article
  • Open Access
26 Citations
6,318 Views
23 Pages

A Comparison of Approaches to Regional Land-Use Capability Analysis for Agricultural Land-Planning

  • Tara A. Ippolito,
  • Jeffrey E. Herrick,
  • Ekwe L. Dossa,
  • Maman Garba,
  • Mamadou Ouattara,
  • Upendra Singh,
  • Zachary P. Stewart,
  • P. V. Vara Prasad,
  • Idrissa A. Oumarou and
  • Jason C. Neff

24 April 2021

Smallholder agriculture is a major source of income and food for developing nations. With more frequent drought and increasing scarcity of arable land, more accurate land-use planning tools are needed to allocate land resources to support regional ag...

  • Article
  • Open Access
10 Citations
3,901 Views
15 Pages

In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors

  • Alexey Kashevnik,
  • Andrew Ponomarev,
  • Nikolay Shilov and
  • Andrey Chechulin

5 September 2020

This paper presents an analysis of modern research related to potential threats in a vehicle cabin, which is based on situation monitoring during vehicle control and the interaction of the driver with intelligent transportation systems (ITS). In the...

  • Article
  • Open Access
21 Citations
5,535 Views
14 Pages

18 February 2022

Oilfield drilling sites are the potential dispersive pollution source of groundwater, especially to shallow groundwater. The pollution risk assessment in these areas is an important reference for effective groundwater management and protection. The v...

  • Article
  • Open Access
30 Citations
4,586 Views
23 Pages

The seismic vulnerability assessment of existing reinforced concrete (RC) buildings is a significant source of disaster mitigation plans and rescue services. Different countries evolved various Rapid Visual Screening (RVS) techniques and methodologie...

  • Article
  • Open Access
27 Citations
4,627 Views
18 Pages

10 October 2022

Smart contracts are decentralized applications running on blockchain platforms and have been widely used in a variety of scenarios in recent years. However, frequent smart contract security incidents have focused more and more attention on their secu...

  • Article
  • Open Access
1,182 Views
22 Pages

12 September 2025

Desert regions face unique challenges under climate change, including the emerging phenomenon of sand dune expansion. This research investigates aeolian sand transport in the Seqale watershed (eastern Iran) using geostatistical and machine learning m...

  • Article
  • Open Access
12 Citations
6,173 Views
17 Pages

Prevalence of Milk Fraud in the Chinese Market and its Relationship with Fraud Vulnerabilities in the Chain

  • Yuzheng Yang,
  • Liebing Zhang,
  • Kasper A. Hettinga,
  • Sara W. Erasmus and
  • Saskia M. van Ruth

1 June 2020

This study aimed to assess the prevalence of ultra-high-temperature (UHT) processed milk samples suspected of being adulterated on the Chinese market and, subsequently, relate their geographical origin to the earlier determined fraud vulnerability. A...

  • Article
  • Open Access
21 Citations
4,561 Views
21 Pages

12 March 2020

The historic environmental vulnerability of traditional villages (HEVTVs) is distinctly differentiated; however, the priority of relevant emergency management practices still lacks appropriate evaluation. This study proposes a new assessment system t...

  • Article
  • Open Access
268 Views
23 Pages

12 February 2026

Humanitarian crises such as natural disasters and armed conflicts are increasing in frequency and intensity, posing major challenges to the sustainable protection of vulnerable populations. Rapid and equitable identification of individuals at highest...

  • Article
  • Open Access
18 Citations
6,094 Views
16 Pages

Comparative Evaluation of NLP-Based Approaches for Linking CAPEC Attack Patterns from CVE Vulnerability Information

  • Kenta Kanakogi,
  • Hironori Washizaki,
  • Yoshiaki Fukazawa,
  • Shinpei Ogata,
  • Takao Okubo,
  • Takehisa Kato,
  • Hideyuki Kanuka,
  • Atsuo Hazeyama and
  • Nobukazu Yoshioka

27 March 2022

Vulnerability and attack information must be collected to assess the severity of vulnerabilities and prioritize countermeasures against cyberattacks quickly and accurately. Common Vulnerabilities and Exposures is a dictionary that lists vulnerabiliti...

  • Article
  • Open Access
4 Citations
2,564 Views
22 Pages

Stemming vulnerabilities out of a smart contract prior to its deployment is essential to ensure the security of decentralized applications. As such, numerous tools and machine-learning-based methods have been proposed to help detect vulnerabilities i...

  • Article
  • Open Access
3 Citations
3,167 Views
14 Pages

23 October 2024

Software vulnerabilities in web applications are one of the sensitive points in data and application security. Although closing a vulnerability after it is detected in web applications seems to be a solution, detecting vulnerabilities in the source c...

  • Article
  • Open Access
5 Citations
2,561 Views
26 Pages

Vulnerability of Hydraulic Constructions in Flood-Prone Agricultural Areas

  • Chiara Biscarini,
  • Silvia Di Francesco,
  • Stefano Casadei,
  • Sara Venturi and
  • Piergiorgio Manciola

31 May 2021

The conditions of high hydraulic risk are mainly due to the interference between the river network and bridges, their relative access ramps and road embankments located in the floodplain. Actually, bridges are not always structurally adequate to with...

  • Article
  • Open Access
2 Citations
4,186 Views
25 Pages

14 December 2022

Recent efforts have shown that training data is not secured through the generalization and abstraction of algorithms. This vulnerability to the training data has been expressed through membership inference attacks that seek to discover the use of spe...

  • Article
  • Open Access
8 Citations
2,924 Views
17 Pages

30 March 2020

Historical seismic events show that water supply networks are increasingly vulnerable to seismic damage, especially in a violent earthquake, which leads to an unprecedented level of risk. Evaluation of vulnerability to seismic hazards can be consider...

  • Review
  • Open Access
2 Citations
5,867 Views
21 Pages

Recent Advances in Pineoblastoma Research: Molecular Classification, Modelling and Targetable Vulnerabilities

  • Zhe Jiang,
  • Michelle S. Allkanjari,
  • Philip E. D. Chung,
  • Hanna Tran,
  • Ronak Ghanbari-Azarnier,
  • Dong-Yu Wang,
  • Daniel J. Lin,
  • Jung Yeon Min,
  • Yaacov Ben-David and
  • Eldad Zacksenhaus

20 February 2025

Pineoblastoma (PB) is a rare yet lethal pediatric brain cancer of the pineal gland, a small endocrine organ that secretes melatonin to regulate the circadian rhythm. For PB patients ≤5 years of age, the overall survival rate is approximately 15%;...

  • Article
  • Open Access
16 Citations
6,317 Views
13 Pages

17 January 2023

Coastal areas and coastal communities are facing threats due to the impacts of climate change. Therefore, assessing their vulnerabilities and the potential for natural habitats to contribute to protecting coastal areas and communities is essential fo...

  • Article
  • Open Access
6 Citations
4,195 Views
18 Pages

Surreptitious Adversarial Examples through Functioning QR Code

  • Aran Chindaudom,
  • Prarinya Siritanawan,
  • Karin Sumongkayothin and
  • Kazunori Kotani

The continuous advances in the technology of Convolutional Neural Network (CNN) and Deep Learning have been applied to facilitate various tasks of human life. However, security risks of the users’ information and privacy have been increasing ra...

  • Article
  • Open Access
1 Citations
2,570 Views
16 Pages

2 August 2024

The investigation of lakes’ vulnerability to external impacts is essential for understanding and potentially mitigating the threats they face. By studying how lakes are affected by external factors, such as pollution, climate change and human a...

  • Review
  • Open Access
10 Citations
4,049 Views
17 Pages

State of the Art of Oil and Gas Pipeline Vulnerability Assessments

  • Han Zhang,
  • Qingshan Feng,
  • Bingchuan Yan,
  • Xianbin Zheng,
  • Yue Yang,
  • Jian Chen,
  • Hong Zhang and
  • Xiaoben Liu

13 April 2023

In recent years, the safety of oil and gas pipelines has become a primary concern for the pipeline industry. This paper presents a comprehensive study of the vulnerability concepts that may be used to measure the safety status of pipeline systems. Th...

  • Article
  • Open Access
19 Citations
4,952 Views
15 Pages

TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM

  • Zhaolei Shi,
  • Nurbol Luktarhan,
  • Yangyang Song and
  • Huixin Yin

19 May 2023

Traffic classification is the first step in network anomaly detection and is essential to network security. However, existing malicious traffic classification methods have several limitations; for example, statistical-based methods are vulnerable to...

  • Article
  • Open Access
19 Citations
7,308 Views
23 Pages

6 January 2023

Following advances in machine learning and deep learning processing, cyber security experts are committed to creating deep intelligent approaches for automatically detecting software vulnerabilities. Nowadays, many practices are for C and C++ program...

  • Review
  • Open Access
13 Citations
3,654 Views
38 Pages

9 September 2023

The increasing factors of uncertainty faced by the system are due to the deep coupling of the electric power cyber network and the physical network. Consequently, ensuring the efficient, secure, and stable operation of the cyber–physical power...

  • Article
  • Open Access
5 Citations
1,454 Views
23 Pages

9 July 2025

This study focuses on the Dongting Lake region in China and evaluates ecological vulnerability using the Sensitivity–Resilience–Pressure (SRP) framework, integrated with Spatial Principal Component Analysis (SPCA) to calculate the Ecologi...

  • Article
  • Open Access
4 Citations
2,728 Views
15 Pages

A Method for Grading the Hidden Dangers of Urban Gas Polyethylene Pipelines Based on Improved PLC Methods

  • Yunlong Wang,
  • Zhiting Liu,
  • Xinru Huang,
  • Haizhou Lv,
  • Yun Wu and
  • Kai Zhou

22 August 2022

The classification of hidden dangers in urban gas pipelines plays a vital role in the smooth operation of urban gas pipelines and in solving the problem of hidden safety dangers in urban gas pipelines. In recent years, the number and proportion of po...

  • Article
  • Open Access
28 Citations
4,597 Views
20 Pages

Geological disaster risk assessment can quantitatively assess the risk of disasters to hazard-bearing bodies. Visualizing the risk of geological disasters can provide scientific references for regional engineering construction, urban planning, and di...

  • Article
  • Open Access
11 Citations
3,684 Views
29 Pages

10 November 2023

As the threat of global risks has increased, the study of village heritage has begun to move away from the interpretation of traditional values or the presentation of historical wisdom to focus on the vulnerability of villages. Taking Chinese traditi...

  • Article
  • Open Access
5 Citations
3,430 Views
23 Pages

12 September 2024

Assessing the seismic vulnerability of existing buildings at the territorial scale is a crucial aspect for seismic-prone regions to properly plan effective strategies for disaster risk management. This paper presents a simplified methodology for the...

  • Article
  • Open Access
186 Views
31 Pages

Vulnerability severity assessment plays a critical role in cybersecurity risk management by quantifying risk based on vulnerability disclosure reports. However, interpreting these reports and assigning reliable risk levels remains challenging in Inte...

  • Article
  • Open Access
11 Citations
5,177 Views
9 Pages

Vulnerability and Risk Factors due to Tropical Cyclones in Coastal Cities of Baja California Sur, Mexico

  • Elvia Aida Marín-Monroy,
  • Víctor Hernández-Trejo,
  • Eleonora Romero-Vadillo and
  • Antonina Ivanova-Boncheva

10 December 2020

Coastal cities have seen an unprecedented growth with regional settlements due to development activities; that is why measures are needed to mitigate risk of adverse events such as tropical cyclones. Baja California Sur, a state known as a relevant e...

of 22