|
|
|
António Carlos Pinheiro Fernandes, Luís Filipe Sanches Fernandes, Daniela Patrícia Salgado Terêncio, Rui Manuel Vitor Cortes and Fernando António Leal Pacheco
Interactions between pollution sources, water contamination, and ecological integrity are complex phenomena and hard to access. To comprehend this subject of study, it is crucial to use advanced statistical tools, which can unveil cause-effect relationsh...
ver más
|
|
|
|
|
|
|
Nikola Pfauserová, Ondrej Slavík, Pavel Horký, Jitka Kolárová and Tomá? Randák
The introduction of non-native species and human-altered habitats are currently the main threats to freshwater ecosystems. Due to predation and competition, biological invaders can cause extinctions and imperil the status of native species, and this phen...
ver más
|
|
|
|
|
|
|
Jose Albors-Garrigos, Antonio Collado
Research Question: This article clarifies the role of clusters in industry agglomeration efficiency as well as the role that public and private agents play in their efficiency. Motivation: The automobile industry in Spain is an exception to the industria...
ver más
|
|
|
|
|
|
|
Francisco J. Ferrando A.
Pág. Pág. 17 - 23
Los riesgos son un constructo social en la medida que es el hombre el que se instala o construye en lugares inadecuados y con formas inadecuadas, respecto de la dinámica de la naturaleza, de las amenazas más frecuentes.
|
|
|
|
|
|
|
Poornima Mahadevappa, Redhwan Al-amri, Gamal Alkawsi, Ammar Ahmed Alkahtani, Mohammed Fahad Alghenaim and Mohammed Alsamman
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can ...
ver más
|
|
|
|
|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
|
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se...
ver más
|
|
|
|
|
|
|
Kaitano Dube
Oceans play a vital role in socioeconomic and environmental development by supporting activities such as tourism, recreation, and food provision while providing important ecosystem services. However, concerns have been raised about the threat that climat...
ver más
|
|
|
|
|
|
|
Keundug Park and Heung-Youl Youm
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve ...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|