|
|
|
Samreen Mahmood, Mehmood Chadhar and Selena Firmin
Purpose: The purpose of this research paper was to analyse the counterstrategies to mitigate cybersecurity challenges using organisational learning loops amidst major crises in the Higher Education and Research Sector (HERS). The authors proposed the lea...
ver más
|
|
|
|
|
|
|
Sohail Iqbal and Norio Tanaka
A flood protection dike blends seamlessly with natural surroundings. These dikes stand as vital shields, mitigating the catastrophic effects of floods and preserving both communities and ecosystems. Their design not only aids in controlling water flow bu...
ver más
|
|
|
|
|
|
|
David W. Kim
Current scientific developments have reached the stage where human aspirations of space exploration are not science fiction but a reality involving travelling to the Earth?s orbit, the Moon and Mars. In the second half of the twentieth century, internati...
ver más
|
|
|
|
|
|
|
Weixiang Wu, Xusen Wan, Jinbao Zhang and Shi Cheng
The infection countermeasure, in which the main idea is to prevent adversaries from exploiting faulty ciphertexts to break the key by spreading the induced fault, is a very effective countermeasure against fault attacks. However, most existing infection ...
ver más
|
|
|
|
|
|
|
Giulia Bossi, Luca Schenato and Gianluca Marcato
Web-based platforms (WBPs) are online spaces where the user can interrogate and analyze data series gathered in quasi-real time from monitoring network/s. These online tools are increasingly used by government agencies, local authorities, contractors, an...
ver más
|
|
|
|
|
|
|
Lav Kumar Gupta, Manish Pandey, P. Anand Raj and Jaan H. Pu
Scouring around the bridge pier is a natural and complex phenomenon that results in bridge failure. Failure of bridges have potential devastation and public safety and economic loss, which lead to political consequences and environmental impacts. Therefo...
ver más
|
|
|
|
|
|
|
Yehia Miky, Usama Hamed Issa and Wael Elham Mahmod
Controlling the hydraulic heads along a coastal aquifer may help to effectively manage saltwater intrusion, improve the conventional barrier?s countermeasure, and ensure the coastal aquifer?s long-term viability. This study proposed a framework that util...
ver más
|
|
|
|
|
|
|
Warodom Werapun, Tanakorn Karode, Tanwa Arpornthip, Jakapan Suaboot, Esther Sangiamkul and Pawita Boonrat
Decentralized finance (DeFi) has exploded in popularity with a billion-dollar market cap. While uncollateralized lending, known as a flash loan, emerged from DeFi, it has become a primary tool used by attackers to drain investment tokens from DeFi networ...
ver más
|
|
|
|
|
|
|
Ernesto Cadena Muñoz, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno and Mónica Espinosa Buitrago
The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because the primary users (PU) and secondary users (SU) are unable to communicate if a malicious user (MU) is present. In the literature, so...
ver más
|
|
|
|
|
|
|
Mustafa Al Lail, Alejandro Garcia and Saul Olivo
Modern society has quickly evolved to utilize communication and data-sharing media with the advent of the internet and electronic technologies. However, these technologies have created new opportunities for attackers to gain access to confidential electr...
ver más
|
|
|
|