Showing 81 - 100 results of 229 for search 'complex optimization vulnerabilities', query time: 0.06s Refine Results
  1. 81

    Spatial Conflicts in ‘Production, Living, and Ecological Space’ Functions at Urban Fringes: The Case of Zengcheng, Guangzhou by Ziqing Feng, Shaoqiu Long, Yilun Liu

    Published 2025-03-01
    “…Using land-use data from 2010 to 2020, the study applies the optimal parameter geographic detector, chosen for its ability to untangle complex spatial interactions, to quantify conflict intensity and identify key drivers. …”
    Get full text
    Article
  2. 82

    Cybersecurity Challenges in PV-Hydrogen Transport Networks: Leveraging Recursive Neural Networks for Resilient Operation by Lei Yang, Saddam Aziz, Zhenyang Yu

    Published 2025-04-01
    “…Furthermore, we analyze the cybersecurity risks specifically associated with the intermittency of PV-based hydrogen production, demonstrating how fluctuations in solar energy availability can create vulnerabilities that cyberattackers may exploit. We also explore the relationship between incident frequency, detection sensitivity, and the resulting false positive rates, revealing that the optimal adjustment of detection thresholds can reduce false positives by as much as 30%, even under peak load conditions. …”
    Get full text
    Article
  3. 83

    Multi-Index Assessment and Machine Learning Integration for Drought Monitoring Using Google Earth Engine by Xulong Duan, Rana Waqar Aslam, Syed Ali Asad Naqvi, Dmitry E. Kucher, Zohaib Afzal, Danish Raza, Rana Muhammad Zulqarnain, Yahia Said

    Published 2025-01-01
    “…By resolving sensor inconsistencies and enhancing reliability in complex environments, this work underscores the broader relevance of multisensor fusion for drought vulnerability assessments, where land-sea interactions demand integrated sensor networks and machine learning to mitigate ecological and climatic risks.…”
    Get full text
    Article
  4. 84

    LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks by Shaymaa E. Sorour, Mohammed Aljaafari, Amany M. Shaker, Ahmed E. Amin

    Published 2025-04-01
    “…A Long Short-Term Memory (LSTM)-based architecture accurately captures complex intrusion patterns. Federated learning is leveraged to enable collaborative model training across multiple IoT networks while maintaining data privacy and reducing vulnerability to data poisoning. …”
    Get full text
    Article
  5. 85
  6. 86
  7. 87
  8. 88

    A machine learning-based efficient anomaly detection system for enhanced security in compromised and maligned IoT Networks by Anita Punia, Manish Tiwari, Sourabh Singh Verma

    Published 2025-06-01
    “…The proliferation of the Internet of Things (IoT) has brought about unprecedented connectivity and automation, yet it has also introduced significant security vulnerabilities. Malicious actors exploit these vulnerabilities, posing a grave threat to IoT networks and their users. …”
    Get full text
    Article
  9. 89

    Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review by Haluk Eren, Özgür Karaduman, Muharrem Tuncay Gençoğlu

    Published 2025-03-01
    “…Blockchain-based data storage methods offer strong data integrity, decentralized security, and transparent access control but also face scalability challenges, high computational costs, and complex data management. This study provides a comprehensive review of on-chain, off-chain, and hybrid storage architectures, analyzing their security vulnerabilities, performance trade-offs, and industry-specific applications. …”
    Get full text
    Article
  10. 90

    Improving Tax Administration of VAT on Timber Export by E. Yu. Mitusova

    Published 2021-10-01
    “…The aim of the study is to identify the vulnerabilities of the current tax legislation in the field of value-added tax reimbursement and analyze the improvement and optimization of the mechanism for administering value-added tax to ensure national economic security and preserve federal budget revenues as a result of reducing the amount of budget funds reimbursed to taxpayers. …”
    Get full text
    Article
  11. 91

    IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions by ZHENG Yonghui, ZHAO Dongliang, GU Chunxiang, ZHANG Xieli

    Published 2024-08-01
    “…The internet key exchange (IKE) protocol, integral to the authentication and key negotiation process within the Internet Protocol Security (IPSec) framework, has been utilized for the protection of IP communications. Given the complex protocol logic, security vulnerabilities in the implementation of the IKE protocol are inevitably present. …”
    Get full text
    Article
  12. 92

    SCM and SME: achieving competitive advantage through improving supply chain by Stefan Ugrinov, Dragan Ćoćkalo, Mila Kavalić, Mihalj Bakator, Sanja Stanisavljev, Luka Đorđević

    Published 2024-12-01
    “…Key areas explored include supply chain risk management (SCRM), where proactive risk mitigation strategies help SMEs address vulnerabilities, and the adoption of digital technologies such as cloud computing, big data, and blockchain, which have become essential for supply chain optimization. …”
    Get full text
    Article
  13. 93

    Development of a method for automated 5G and beyond network slices penetration testing by Roman Odarchenko, Maksim Iavich, Alla Pinchuk

    Published 2025-02-01
    “…The results prove the operability and effectiveness of the proposed solutions, demonstrating improved vulnerability detection, optimized attack strategy generation, and a higher success rate of penetration tests in a complex network environment.…”
    Get full text
    Article
  14. 94

    Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications by Fatma Yıldırım, Yunus Yalman, Kamil Çağatay Bayındır, Erman Terciyanlı

    Published 2025-04-01
    “…The analysis shows how edge computing improves secure communication, supports decentralized intelligence, and facilitates scalable energy optimization. Beyond these advantages, the review also identifies critical challenges such as interoperability issues, resource constraints, and security vulnerabilities. …”
    Get full text
    Article
  15. 95

    Towards Robust Speech Models: Mitigating Backdoor Attacks via Audio Signal Enhancement and Fine-Pruning Techniques by Heyan Sun, Qi Zhong, Minfeng Qi, Uno Fang, Guoyi Shi, Sanshuai Cui

    Published 2025-03-01
    “…First, we use a ComplexMTASS-based enhancement network to isolate and remove backdoor triggers by leveraging their unique spectral characteristics. …”
    Get full text
    Article
  16. 96

    Epidemiology of Medical Errors and Incidents in Emergency Medicine by Yu. E. Voskanyan

    Published 2022-09-01
    “…These include environmental complexity, suboptimal configuration of the workspace, technological interface complexity, the effects of acute stress on performers, and organizational vulnerabilities. …”
    Get full text
    Article
  17. 97

    Emergency scenario modeling for the analysis of dynamic risks in business parks by Rodríguez Pillaga Renán Teodoro, Víctor A. Bañuls

    Published 2025-06-01
    “…The proposed model integrates the use of an information system for the generation of multiple emergency scenarios that include the capture of complex interactions among agents, resources and variable environmental conditions. …”
    Get full text
    Article
  18. 98

    Algorithm for the functioning of the analysis and evaluation software package security of software of automated systems internal affairs bodies by A. D. Popova

    Published 2024-07-01
    “…An algorithm for the functioning of a software complex is proposed that allows for analysis and quantitative assessment of the security of software of automated systems of internal affairs bodies in relation to current vulnerabilities in real time. …”
    Get full text
    Article
  19. 99

    PictureGuard: Enhancing Software-Defined Networking–Internet of Things Security with Novel Image-Based Authentication and Artificial Intelligence-Powered Two-Stage Intrusion Detect... by Hazem (Moh’d Said) Hatamleh, As’ad Mahmoud As’ad Alnaser, Said S. Saloum, Ahmed Sharadqeh, Jawdat S. Alkasassbeh

    Published 2025-02-01
    “…However, this platform faces critical limitations in ensuring scalability, optimizing energy consumption, and addressing persistent security vulnerabilities. …”
    Get full text
    Article
  20. 100

    Digital security risk identification and model construction of smart city based on deep learning by Zhilei Zhao

    Published 2025-07-01
    “…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
    Get full text
    Article