|
|
|
Danlu Jiang, Dong Bai, Zhaowei Yin and Gongyuan Fan
With the rapid development of shale gas exploration (SGE) in China, there is an urgent need to evaluate the public?s preferences with respect to the environmental risks that go along with the exploration, which have not yet been studied in the literature...
ver más
|
|
|
|
|
|
|
Seung Oh Lee and Seung Ho Hong
Bridge pier scour is one of the main causes of bridge failure and a major factor that contributes to the total construction and maintenance costs of bridge. Recently, because of unexpected high water during extreme hydrologic events, the resilience and s...
ver más
|
|
|
|
|
|
|
Maria Goufa, Evaggelos Makeroufas, Maria Gerakari, Efi Sarri, Athanasios Ragkos, Penelope J. Bebeli, Alma Balestrazzi and Eleni Tani
Little progress has been made in translating the increased awareness of neglected and underutilized crops into a viable tool for advancing not just sustainable development in rural areas but also sustainable agricultural and secured food systems. This is...
ver más
|
|
|
|
|
|
|
Tao Feng, Taining Chen and Xiang Gong
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analy...
ver más
|
|
|
|
|
|
|
Ewa Szafraniec-Siluta, Agnieszka Strzelecka, Roman Ardan and Danuta Zawadzka
The objective of this study was to assess the level of financial security of farms and identify its determinants based on factor analysis. The data used in this research were obtained from the European FADN (Farm Accountancy Data Network). Factor analysi...
ver más
|
|
|
|
|
|
|
Håkon Harnes and Donn Morrison
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption and is now natively supported by al...
ver más
|
|
|
|
|
|
|
Meng Li, Jiqiang Liu and Yeping Yang
Data governance is an extremely important protection and management measure throughout the entire life cycle of data. However, there are still data governance issues, such as data security risks, data privacy breaches, and difficulties in data management...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Sharoug Alzaidy and Hamad Binsalleeh
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,...
ver más
|
|
|
|
|
|
|
Ji-Woon Lee and Hyun-Soo Kang
The escalating use of security cameras has resulted in a surge in images requiring analysis, a task hindered by the inefficiency and error-prone nature of manual monitoring. In response, this study delves into the domain of anomaly detection in CCTV secu...
ver más
|
|
|
|