|
|
|
Bilgin Metin, Sefa Duran, Eda Telli, Meltem Mutlutürk and Martin Wynn
In today?s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment?based on information relating to business requirements, human elements, and th...
ver más
|
|
|
|
|
|
|
Davinder Malhotra and Srinivas Nippani
This study investigates the risk-adjusted performance of energy equity mutual funds across a 23-year period, employing the Cumulative Wealth Index (CWI) to gauge their long-term performance relative to benchmark indices. Despite inherent volatility due t...
ver más
|
|
|
|
|
|
|
Pierre Schambri, Didier Kleiber and Cecile Levasseur-Garcia
This study delves into the detection of the mycotoxin zearalenone (ZEA) in popcorn, aligning with the broader goal of ensuring food safety and security. Employing fast, non-destructive near-infrared spectroscopy, the research analyzes 88 samples collecte...
ver más
|
|
|
|
|
|
|
Mengjun Ku, Hao Jiang, Kai Jia, Xuemei Dai, Jianhui Xu, Dan Li, Chongyang Wang and Boxiong Qin
South China is dominated by mountainous agriculture and croplands that are at risk of flood disasters, posing a great threat to food security. Synthetic aperture radar (SAR) has the advantage of being all-weather, with the ability to penetrate clouds and...
ver más
|
|
|
|
|
|
|
Zhi Shan, Yuling Liang, Zhiwu Yu and Huihua Chen
China has emerged as a prominent global player in the field of railways, with numerous railway construction projects spanning across diverse locations. Railway bridges, as a crucial component of railway construction, warrant significant attention. Meta-a...
ver más
|
|
|
|
|
|
|
Jawhara Boodai, Aminah Alqahtani and Mounir Frikha
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas of co...
ver más
|
|
|
|
|
|
|
Emily Kate Parsons, Emmanouil Panaousis, George Loukas and Georgia Sakellari
The Internet of Things (IoT) continues to grow at a rapid pace, becoming integrated into the daily operations of individuals and organisations. IoT systems automate crucial services within daily life that users may rely on, which makes the assurance of s...
ver más
|
|
|
|
|
|
|
Pavlos Cheimonidis and Konstantinos Rantos
Traditional information security risk assessment (RA) methodologies and standards, adopted by information security management systems and frameworks as a foundation stone towards robust environments, face many difficulties in modern environments where th...
ver más
|
|
|
|
|
|
|
Yuhang Zhang and Ming Ni
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|