|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f...
ver más
|
|
|
|
|
|
|
Hengzhi Hu, Hanwei Yang, Jiahong Wen, Min Zhang and Yanjuan Wu
Under climate warming, the frequency and intensity of extreme rainstorms-induced urban pluvial floods are significantly increasing, leading to severe flooding risks in megacities. An integrated model that incorporates rainfall processing, waterlogging si...
ver más
|
|
|
|
|
|
|
Sohail Iqbal and Norio Tanaka
A flood protection dike blends seamlessly with natural surroundings. These dikes stand as vital shields, mitigating the catastrophic effects of floods and preserving both communities and ecosystems. Their design not only aids in controlling water flow bu...
ver más
|
|
|
|
|
|
|
Riccardo Lazzarini, Huaglory Tianfield and Vassilis Charissis
The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems (IDS...
ver más
|
|
|
|
|
|
|
Xiaolei Zhang, Zhengzheng Bi, Xiaoming Sun, Pengtao Wang, Zhiheng Xu and Benyou Jia
In the context of global climate change, the frequency of watershed flooding events resulting from extreme rainfall has significantly increased. Especially at river or lake confluences, the presence of backwater effects greatly amplifies the flood risk. ...
ver más
|
|
|
|
|
|
|
Brij Kishor Tiwari and Rajiv Sharma
The design process for Variable Buoyancy System (VBS) is not known in full, and existing approaches are not scalable. Furthermore, almost all the small size Autonomous Underwater Vehicles/Gliders (AUVs/G?s) use very low capacity of buoyancy change (in th...
ver más
|
|
|
|
|
|
|
Marco Petti, Silvia Bosa, Sara Pascolo and Erika Uliana
The morphological evolution of a tidal inlet is the combined result of tides and wind waves, which interact in a non-linear manner and over very different time-scales. Likewise, the presence of maritime structures built in the vicinity of the tidal inlet...
ver más
|
|
|
|
|
|
|
Svetlana Boudko, Peder Aursand and Habtamu Abie
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree ...
ver más
|
|
|
|
|
|
|
Clément Bouvier, Bruno Castelle and Yann Balouin
Coastal defense strategies based on structures are increasingly unpopular as they are costly, leave lasting scars on the landscape, and sometimes have limited effectiveness or even adverse impacts. While a clear improvement concerning aesthetic considera...
ver más
|
|
|
|