|
|
|
Lei Ma, Shaoying Ma, Guiping Chen, Xu Lu, Qiang Chai and Sheng Li
Legumes have important nutritional and economic values, but their production faces continuous cropping obstacles that seriously affect their yield formation. In order to reduce the negative impact of the continuous cropping obstacles of legumes, it is ne...
ver más
|
|
|
|
|
|
|
Maoli Wang, Yu Sun, Hongtao Sun and Bowen Zhang
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent transportati...
ver más
|
|
|
|
|
|
|
Afnan Alotaibi and Murad A. Rassam
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo...
ver más
|
|
|
|
|
|
|
Kwok Tai Chui, Brij B. Gupta, Jiaqi Liu, Varsha Arya, Nadia Nedjah, Ammar Almomani and Priyanka Chaurasia
The smart city vision has driven the rapid development and advancement of interconnected technologies using the Internet of Things (IoT) and cyber-physical systems (CPS). In this paper, various aspects of IoT and CPS in recent years (from 2013 to May 202...
ver más
|
|
|
|
|
|
|
Giacomo Gori, Lorenzo Rinieri, Amir Al Sadi, Andrea Melis, Franco Callegati and Marco Prandini
The correct and efficient measurement of security properties is key to the deployment of effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a system that combines different security metrics to design an attack detection...
ver más
|
|
|
|
|
|
|
Evangelos D. Spyrou, Ioannis Tsoulos and Chrysostomos Stylios
Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial...
ver más
|
|
|
|
|
|
|
Denis Rangelov, Philipp Lämmel, Lisa Brunzel, Stephan Borgert, Paul Darius, Nikolay Tcholtchev and Michell Boerger
The constant increase in volume and wide variety of available Internet of Things (IoT) devices leads to highly diverse software and hardware stacks, which opens new avenues for exploiting previously unknown vulnerabilities. The ensuing risks are amplifie...
ver más
|
|
|
|
|
|
|
Xiaolei Zhang, Zhengzheng Bi, Xiaoming Sun, Pengtao Wang, Zhiheng Xu and Benyou Jia
In the context of global climate change, the frequency of watershed flooding events resulting from extreme rainfall has significantly increased. Especially at river or lake confluences, the presence of backwater effects greatly amplifies the flood risk. ...
ver más
|
|
|
|
|
|
|
Abdul Sattar, Ahmad Sher, Muhammad Ijaz, Sami Ul-Allah, Tahira Abbas, Sajjad Hussain, Jamshad Hussain, Hala Badr Khalil, Basmah M. Alharbi, Ahmed Abou El-Yazied, Samy F. Mahmoud and Mohamed F. M. Ibrahim
Cadmium (Cd) toxicity is a serious threat to agronomic crop productivity worldwide. It raises severe concerns about the food and nutrient security required to meet the demands of a rapidly growing population, while also creating grave challenges for agri...
ver más
|
|
|
|
|
|
|
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner...
ver más
|
|
|
|