|
|
|
Bilgin Metin, Sefa Duran, Eda Telli, Meltem Mutlutürk and Martin Wynn
In today?s technology-centric business environment, where organizations encounter numerous cyber threats, effective IT risk management is crucial. An objective risk assessment?based on information relating to business requirements, human elements, and th...
ver más
|
|
|
|
|
|
|
Nan Fu, Dengfeng Liu, Hui Liu, Baozhu Pan, Guanghui Ming and Qiang Huang
Water, energy, food, and ecology are essential for achieving sustainable development in a region, and in order to achieve the Sustainable Development Goals, their security is also essential at a river basin scale. This study investigated the interrelatio...
ver más
|
|
|
|
|
|
|
Zhongze Hu, Hongjiang Liu, Yuefang Zhang, Ji Chen, Xian Wang, Daliu Yang, Jing Sheng, Liugen Chen and Jianchu Zheng
A multiple cropping system is beneficial for utilizing natural resources, while increasing the grain production and economic outputs. However, its impact on greenhouse gas emissions is unclear. The objective of this study was to evaluate the influence of...
ver más
|
|
|
|
|
|
|
Zhihui Tian, Ruoyi Zhang, Lili Wu, Yongji Wang, Jinjin Yang and Di Cao
Climate change, population growth, and socio-economic transformations present multifaceted challenges to the water resource systems in the four major river basins of Henan Province. Consequently, to gain a comprehensive understanding of water security wi...
ver más
|
|
|
|
|
|
|
Yuhang Zhang and Ming Ni
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Urvashi Sugandh, Swati Nigam, Manju Khari and Sanjay Misra
Regulatory authorities, consumers, and producers alike are alarmed by the issue of food safety, which is a matter of international concern. The conventional approaches utilized in food quality management demonstrate deficiencies in their capacity to suff...
ver más
|
|
|
|
|
|
|
Junkai Yi and Xiaoyan Liu
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse...
ver más
|
|
|
|
|
|
|
Martina Tuschl and Tomislav Kurevija
One of the important sources of renewable energy is geothermal heat. Its special feature of being independent 24/7 ensures the stability and security of the system, either for electricity or heat production. Geothermal energy has a local character and is...
ver más
|
|
|
|
|
|
|
Yohannes Geleta, Amare Haileslassie, Belay Simane, Engdawork Assefa and Amare Bantider
Individuals and communities use and value water in multiple and complex ways. In Sub-Saharan Africa (SSA), the pluralistic nature of water values is poorly documented, and the existing and potential value trade-offs are unidentified. This study was under...
ver más
|
|
|
|