|
|
|
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche...
ver más
|
|
|
|
|
|
|
Andry Alamsyah, Gede Natha Wijaya Kusuma and Dian Puteri Ramadhani
The future of the internet is moving toward decentralization, with decentralized networks and blockchain technology playing essential roles in different sectors. Decentralized networks offer equality, accessibility, and security at a societal level, whil...
ver más
|
|
|
|
|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Samreen Mahmood, Mehmood Chadhar and Selena Firmin
Purpose: The purpose of this research paper was to analyse the counterstrategies to mitigate cybersecurity challenges using organisational learning loops amidst major crises in the Higher Education and Research Sector (HERS). The authors proposed the lea...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
|
Jean Dagher, Nada Mallah Boustani and Chadi Khneyzer
This research investigates the intricacies of motivation and job satisfaction among military service members within the Lebanese Armed Forces (LAF) amidst various challenges. Employing an intrinsic?extrinsic framework, the study adopts a sequential mixed...
ver más
|
|
|
|
|
|
|
Ningning Liu, Danfeng Xie, Changlong Wang and Yun Bai
Scholars have paid considerable attention to the factors that affect the safety states of construction workers. However, only a few studies have focused on the safety assessment and security alerts of individual workers. In this study, the term ?frequenc...
ver más
|
|
|
|
|
|
|
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f...
ver más
|
|
|
|
|
|
|
Bowen He, Han Zheng and Qun Guan
This study examines the DCMA concerning the future risk of the water security status. We considered three risk factors: population growth, economic growth, and natural water supply?demand differences. In the risk analysis part, we consulted with experts ...
ver más
|
|
|
|
|
|
|
Jianjun Wu, Yuxue Hu, Zhongqiang Huang, Junsong Li, Xiang Li and Ying Sha
Link prediction is a critical prerequisite and foundation task for social network security that involves predicting the potential relationship between nodes within a network or graph. Although the existing methods show promising performance, they often i...
ver más
|
|
|
|