|
|
|
António Carlos Pinheiro Fernandes, Luís Filipe Sanches Fernandes, Daniela Patrícia Salgado Terêncio, Rui Manuel Vitor Cortes and Fernando António Leal Pacheco
Interactions between pollution sources, water contamination, and ecological integrity are complex phenomena and hard to access. To comprehend this subject of study, it is crucial to use advanced statistical tools, which can unveil cause-effect relationsh...
ver más
|
|
|
|
|
|
|
Nikola Pfauserová, Ondrej Slavík, Pavel Horký, Jitka Kolárová and Tomá? Randák
The introduction of non-native species and human-altered habitats are currently the main threats to freshwater ecosystems. Due to predation and competition, biological invaders can cause extinctions and imperil the status of native species, and this phen...
ver más
|
|
|
|
|
|
|
Jose Albors-Garrigos, Antonio Collado
Research Question: This article clarifies the role of clusters in industry agglomeration efficiency as well as the role that public and private agents play in their efficiency. Motivation: The automobile industry in Spain is an exception to the industria...
ver más
|
|
|
|
|
|
|
Francisco J. Ferrando A.
Pág. Pág. 17 - 23
Los riesgos son un constructo social en la medida que es el hombre el que se instala o construye en lugares inadecuados y con formas inadecuadas, respecto de la dinámica de la naturaleza, de las amenazas más frecuentes.
|
|
|
|
|
|
|
Poornima Mahadevappa, Redhwan Al-amri, Gamal Alkawsi, Ammar Ahmed Alkahtani, Mohammed Fahad Alghenaim and Mohammed Alsamman
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can ...
ver más
|
|
|
|
|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
|
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se...
ver más
|
|
|
|
|
|
|
Kaitano Dube
Oceans play a vital role in socioeconomic and environmental development by supporting activities such as tourism, recreation, and food provision while providing important ecosystem services. However, concerns have been raised about the threat that climat...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Qasem Abu Al-Haija and Ahmed Al-Tamimi
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia...
ver más
|
|
|
|