-
81
Spatial Conflicts in ‘Production, Living, and Ecological Space’ Functions at Urban Fringes: The Case of Zengcheng, Guangzhou
Published 2025-03-01“…Using land-use data from 2010 to 2020, the study applies the optimal parameter geographic detector, chosen for its ability to untangle complex spatial interactions, to quantify conflict intensity and identify key drivers. …”
Get full text
Article -
82
Cybersecurity Challenges in PV-Hydrogen Transport Networks: Leveraging Recursive Neural Networks for Resilient Operation
Published 2025-04-01“…Furthermore, we analyze the cybersecurity risks specifically associated with the intermittency of PV-based hydrogen production, demonstrating how fluctuations in solar energy availability can create vulnerabilities that cyberattackers may exploit. We also explore the relationship between incident frequency, detection sensitivity, and the resulting false positive rates, revealing that the optimal adjustment of detection thresholds can reduce false positives by as much as 30%, even under peak load conditions. …”
Get full text
Article -
83
Multi-Index Assessment and Machine Learning Integration for Drought Monitoring Using Google Earth Engine
Published 2025-01-01“…By resolving sensor inconsistencies and enhancing reliability in complex environments, this work underscores the broader relevance of multisensor fusion for drought vulnerability assessments, where land-sea interactions demand integrated sensor networks and machine learning to mitigate ecological and climatic risks.…”
Get full text
Article -
84
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Published 2025-04-01“…A Long Short-Term Memory (LSTM)-based architecture accurately captures complex intrusion patterns. Federated learning is leveraged to enable collaborative model training across multiple IoT networks while maintaining data privacy and reducing vulnerability to data poisoning. …”
Get full text
Article -
85
Adaptive Variable Neighborhood Search-Based Supply Network Reconfiguration for Robustness Enhancement
Published 2020-01-01Get full text
Article -
86
The Peer Effects of the Usage of Credit Cards in Rural Areas of China: Evidence from Rural China
Published 2022-01-01Get full text
Article -
87
-
88
A machine learning-based efficient anomaly detection system for enhanced security in compromised and maligned IoT Networks
Published 2025-06-01“…The proliferation of the Internet of Things (IoT) has brought about unprecedented connectivity and automation, yet it has also introduced significant security vulnerabilities. Malicious actors exploit these vulnerabilities, posing a grave threat to IoT networks and their users. …”
Get full text
Article -
89
Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review
Published 2025-03-01“…Blockchain-based data storage methods offer strong data integrity, decentralized security, and transparent access control but also face scalability challenges, high computational costs, and complex data management. This study provides a comprehensive review of on-chain, off-chain, and hybrid storage architectures, analyzing their security vulnerabilities, performance trade-offs, and industry-specific applications. …”
Get full text
Article -
90
Improving Tax Administration of VAT on Timber Export
Published 2021-10-01“…The aim of the study is to identify the vulnerabilities of the current tax legislation in the field of value-added tax reimbursement and analyze the improvement and optimization of the mechanism for administering value-added tax to ensure national economic security and preserve federal budget revenues as a result of reducing the amount of budget funds reimbursed to taxpayers. …”
Get full text
Article -
91
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01“…The internet key exchange (IKE) protocol, integral to the authentication and key negotiation process within the Internet Protocol Security (IPSec) framework, has been utilized for the protection of IP communications. Given the complex protocol logic, security vulnerabilities in the implementation of the IKE protocol are inevitably present. …”
Get full text
Article -
92
SCM and SME: achieving competitive advantage through improving supply chain
Published 2024-12-01“…Key areas explored include supply chain risk management (SCRM), where proactive risk mitigation strategies help SMEs address vulnerabilities, and the adoption of digital technologies such as cloud computing, big data, and blockchain, which have become essential for supply chain optimization. …”
Get full text
Article -
93
Development of a method for automated 5G and beyond network slices penetration testing
Published 2025-02-01“…The results prove the operability and effectiveness of the proposed solutions, demonstrating improved vulnerability detection, optimized attack strategy generation, and a higher success rate of penetration tests in a complex network environment.…”
Get full text
Article -
94
Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications
Published 2025-04-01“…The analysis shows how edge computing improves secure communication, supports decentralized intelligence, and facilitates scalable energy optimization. Beyond these advantages, the review also identifies critical challenges such as interoperability issues, resource constraints, and security vulnerabilities. …”
Get full text
Article -
95
Towards Robust Speech Models: Mitigating Backdoor Attacks via Audio Signal Enhancement and Fine-Pruning Techniques
Published 2025-03-01“…First, we use a ComplexMTASS-based enhancement network to isolate and remove backdoor triggers by leveraging their unique spectral characteristics. …”
Get full text
Article -
96
Epidemiology of Medical Errors and Incidents in Emergency Medicine
Published 2022-09-01“…These include environmental complexity, suboptimal configuration of the workspace, technological interface complexity, the effects of acute stress on performers, and organizational vulnerabilities. …”
Get full text
Article -
97
Emergency scenario modeling for the analysis of dynamic risks in business parks
Published 2025-06-01“…The proposed model integrates the use of an information system for the generation of multiple emergency scenarios that include the capture of complex interactions among agents, resources and variable environmental conditions. …”
Get full text
Article -
98
Algorithm for the functioning of the analysis and evaluation software package security of software of automated systems internal affairs bodies
Published 2024-07-01“…An algorithm for the functioning of a software complex is proposed that allows for analysis and quantitative assessment of the security of software of automated systems of internal affairs bodies in relation to current vulnerabilities in real time. …”
Get full text
Article -
99
PictureGuard: Enhancing Software-Defined Networking–Internet of Things Security with Novel Image-Based Authentication and Artificial Intelligence-Powered Two-Stage Intrusion Detect...
Published 2025-02-01“…However, this platform faces critical limitations in ensuring scalability, optimizing energy consumption, and addressing persistent security vulnerabilities. …”
Get full text
Article -
100
Digital security risk identification and model construction of smart city based on deep learning
Published 2025-07-01“…In order to deal with these problems, this paper designs a flexible three-layer architecture framework, and introduces a new intrusion detection feature selection method that combines flock optimization (CSO) and genetic algorithm (GA) to reduce the complexity of feature selection and enhance the detection and processing power of security vulnerabilities through deep neural networks (DNN). …”
Get full text
Article