期刊文献+
共找到187,936篇文章
< 1 2 250 >
每页显示 20 50 100
Ligand-directed construction of cobalt-oxo cluster-based organic frameworks:Structural modulation,semiconductor,and antiferromagnetic properties
1
作者 SHI Jinlian LIU Xiaoru XU Zhongxuan 《无机化学学报》 北大核心 2026年第1期45-54,共10页
Under hydrothermal and solvothermal conditions,two novel cobalt-based complexes,{[Co_(2)(CIA)(OH)(1,4-dtb)]·3.2H_(2)O}n(HU23)and{[Co_(2)(CIA)(OH)(1,4-dib)]·3.5H2O·DMF}n(HU24),were successfully construct... Under hydrothermal and solvothermal conditions,two novel cobalt-based complexes,{[Co_(2)(CIA)(OH)(1,4-dtb)]·3.2H_(2)O}n(HU23)and{[Co_(2)(CIA)(OH)(1,4-dib)]·3.5H2O·DMF}n(HU24),were successfully constructed by coordinatively assembling the semi-rigid multidentate ligand 5-(1-carboxyethoxy)isophthalic acid(H₃CIA)with the Nheterocyclic ligands 1,4-di(4H-1,2,4-triazol-4-yl)benzene(1,4-dtb)and 1,4-di(1H-imidazol-1-yl)benzene(1,4-dib),respectively,around Co^(2+)ions.Single-crystal X-ray diffraction analysis revealed that in both complexes HU23 and HU24,the CIA^(3-)anions adopt aκ^(7)-coordination mode,bridging six Co^(2+)ions via their five carboxylate oxygen atoms and one ether oxygen atom.This linkage forms tetranuclear[Co4(μ3-OH)2]^(6+)units.These Co-oxo cluster units were interconnected by CIA^(3-)anions to assemble into 2D kgd-type structures featuring a 3,6-connected topology.The 2D layers were further connected by 1,4-dtb and 1,4-dib,resulting in 3D pillar-layered frameworks for HU23 and HU24.Notably,despite the similar configurations of 1,4-dtb and 1,4-dib,differences in their coordination spatial orientations lead to topological divergence in the 3D frameworks of HU23 and HU24.Topological analysis indicates that the frameworks of HU23 and HU24 can be simplified into a 3,10-connected net(point symbol:(4^(10).6^(3).8^(2))(4^(3))_(2))and a 3,8-connected tfz-d net(point symbol:(4^(3))_(2)((4^(6).6^(18).8^(4)))),respectively.This structural differentiation confirms the precise regulatory role of ligands on the topology of metal-organic frameworks.Moreover,the ultraviolet-visible absorption spectra confirmed that HU23 and HU24 have strong absorption capabilities for ultraviolet and visible light.According to the Kubelka-Munk method,their bandwidths were 2.15 and 2.08 eV,respectively,which are consistent with those of typical semiconductor materials.Variable-temperature magnetic susceptibility measurements(2-300 K)revealed significant antiferromagnetic coupling in both complexes,with their effective magnetic moments decreasing markedly as the temperature lowered.CCDC:2457554,HU23;2457553,HU24. 展开更多
关键词 semi-rigid carboxylic acid ligands three-dimensional framework tetranuclear cobalt-oxo cluster semiconductor material antiferromagnetic magnetism
在线阅读 下载PDF
Unveiling CyberFortis:A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer
2
作者 Kuncham Sreenivasa Rao Rajitha Kotoju +4 位作者 B.Ramana Reddy Taher Al-Shehari Nasser A.Alsadhan Subhav Singh Shitharth Selvarajan 《Computers, Materials & Continua》 2025年第10期1899-1916,共18页
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe... Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments. 展开更多
关键词 Industrial Internet of Things(IIoT) SCADA systems security intrusion detection system(IDS) optimization deep learning
在线阅读 下载PDF
Smart Security Framework for Educational Institutions Using Internet of Things(IoT) 被引量:2
3
作者 Afzal Badshah Anwar Ghani +1 位作者 Muhammad Ahsan Qureshi Shahaboddin Shamshirband 《Computers, Materials & Continua》 SCIE EI 2019年第7期81-101,共21页
Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a ... Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too. 展开更多
关键词 Internet of things smart security framework massacres TERRORISM smart emergency alert
在线阅读 下载PDF
Construction of iron manganese metal-organic framework-derived manganese ferrite/carbon-modified graphene composites toward broadband and efficient electromagnetic dissipation 被引量:3
4
作者 Baohua Liu Shuai Liu +1 位作者 Zaigang Luo Ruiwen Shu 《International Journal of Minerals,Metallurgy and Materials》 2025年第3期546-555,共10页
The preparation of carbon-based electromagnetic wave(EMW)absorbers possessing thin matching thickness,wide absorption bandwidth,strong absorption intensity,and low filling ratio remains a huge challenge.Metal-organic ... The preparation of carbon-based electromagnetic wave(EMW)absorbers possessing thin matching thickness,wide absorption bandwidth,strong absorption intensity,and low filling ratio remains a huge challenge.Metal-organic frameworks(MOFs)are ideal self-sacrificing templates for the construction of carbon-based EMW absorbers.In this work,bimetallic FeMn-MOF-derived MnFe_(2)O_(4)/C/graphene composites were fabricated via a two-step route of solvothermal reaction and the following pyrolysis treatment.The results re-veal the evolution of the microscopic morphology of carbon skeletons from loofah-like to octahedral and then to polyhedron and pomegran-ate after the adjustment of the Fe^(3+)to Mn^(2+)molar ratio.Furthermore,at the Fe^(3+)to Mn^(2+)molar ratio of 2:1,the obtained MnFe_(2)O_(4)/C/graphene composite exhibited the highest EMW absorption capacity.Specifically,a minimum reflection loss of-72.7 dB and a max-imum effective absorption bandwidth of 5.1 GHz were achieved at a low filling ratio of 10wt%.In addition,the possible EMW absorp-tion mechanism of MnFe_(2)O_(4)/C/graphene composites was proposed.Therefore,the results of this work will contribute to the construction of broadband and efficient carbon-based EMW absorbers derived from MOFs. 展开更多
关键词 metal-organic frameworks GRAPHENE magnetic composites morphology regulation electromagnetic dissipation
在线阅读 下载PDF
A Robust Security Detection Strategy for Next Generation IoT Networks
5
作者 Hafida Assmi Azidine Guezzaz +4 位作者 Said Benkirane Mourade Azrour Said Jabbour Nisreen Innab Abdulatif Alabdulatif 《Computers, Materials & Continua》 SCIE EI 2025年第1期443-466,共24页
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f... Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS. 展开更多
关键词 IoT security intrusion detection RF KNN SVM EL NSL-KDD Edge-IIoT
在线阅读 下载PDF
Ecological Security Assessment,Prediction,and Zoning Management:An Integrated Analytical Framework
6
作者 Bo Nan Yujia Zhai +2 位作者 Mengmeng Wang Hongjie Wang Baoshan Cui 《Engineering》 2025年第6期238-250,共13页
Enhancing ecological security for sustainable social,economic,and environmental development is a key focus of current research and a practical necessity for ecological management.However,the integration of retrospecti... Enhancing ecological security for sustainable social,economic,and environmental development is a key focus of current research and a practical necessity for ecological management.However,the integration of retrospective ecological security assessments with future trend predictions and fine-scale targeted regulations remains inadequate,limiting effective ecological governance and sustainable regional development.Guided by Social-Economic-Natural Complex Ecosystems(SENCE)theory,this study proposes an analytical framework that integrates ecological security assessment,prediction,and zoning management.The Daqing River Basin,a typical river basin in the North China Plain,was selected as a case study.The results indicate that overall ecological security in the Daqing River Basin improved from a“Moderate”level to a“Relatively Safe”level between 2000 and 2020;however,spatial heterogeneity persisted,with higher ecological security in northwestern and eastern regions and lower ecological security in the central region.Approximately 62% of the Basin experienced an improvement in ecological security level,except in the major urban areas of Beijing,Tianjin,and Hebei,where ecological security deteriorated.From 2025 to 2040,the overall ecological security of the Daqing River Basin is expected to improve and remain at the“Relatively Safe”level.However,spatial heterogeneity will be further aggravated as the ecological security of major urban areas continues to deteriorate.Ecological security management zones and regulation strategies are proposed at the regional and county scales to emphasize integrated regulation for the entire basin and major urban areas.The proposed analytical framework provides valuable insights for advancing theoretical research on ecological security.The case study offers a practical reference for ecological security enhancement in river basins and other regions facing significant human-land conflicts. 展开更多
关键词 Ecological security Analytical framework Assessment PREDICTION Zoning management
在线阅读 下载PDF
Design and Evaluation of a Distributed Security Framework for the Internet of Things 被引量:1
7
作者 Kelechi G. Eze Cajetan M. Akujuobi 《Journal of Signal and Information Processing》 2022年第1期1-23,共23页
The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementat... The adopters of IoT face challenges with the surging Internet-based attacks on their IoT assets and inefficiencies within the technology. Unfortunately, IoT is overly distributed, still evolving and facing implementation and security challenges. Given the above scenario, we argue that the IoT network should always be decentralized design, and security should be built by design. The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource sharing. The framework improves efficiency and scalability in IoT, exposes vulnerable subsystems and components as possible weak links to system compromise, and meets the requirements of a heterogeneous computing environment. Other features of the framework including efficient resource sharing, fault tolerance, and distributed storage support the Internet of Things. We discuss the design requirements and carry out the implementation of Proof of Concept and evaluation of our framework. Two underlying technologies: the actor model and the blockchain were used for the implementation. Our reason for choosing the actor model and blockchain is to compare its suitability for IoT integration in parallel. Hence, evaluation of the system is performed based on computational and memory efficiency, security, and scalability. We conclude from the evaluations that the actor-based implementation has better scalability than the block-chain-based implementation. Also, the blockchain seems to be computationally more intensive than the actors and less suitable for IoT systems. 展开更多
关键词 Actor Model Blockchain security framework Internet of Things
在线阅读 下载PDF
Ecological Security Assessment and Risk Management Framework for Recycled Water Systems in Landscape Hydration
8
作者 Xinmiao Wang 《Journal of Architectural Research and Development》 2025年第2期28-31,共4页
Against the backdrop of intensifying global water scarcity,reclaimed water reuse has emerged as a critical strategy for ecological replenishment of landscape water bodies.However,its potential ecological risks remain ... Against the backdrop of intensifying global water scarcity,reclaimed water reuse has emerged as a critical strategy for ecological replenishment of landscape water bodies.However,its potential ecological risks remain underexplored.This study aims to establish a multidimensional ecological safety evaluation framework for reclaimed water replenishment systems and propose hierarchical risk prevention strategies.By integrating ecotoxicological assays(algae growth inhibition,Daphnia behavioral anomalies,zebrafish embryo toxicity),multimedia exposure modeling,and Monte Carlo probabilistic simulations,the risk contributions and spatial heterogeneity of typical pollutants are quantitatively analyzed.Results revealed that sulfamethoxazole(RQ=2.3)and diclofenac(RQ=1.8)posed high ecological risks,with their effects nonlinearly correlated with hydraulic retention time(HRT<3 days)and nutrient loading(TN>1.2 mg/L).A three-tier risk prevention system was developed based on the“source-pathway-receptor”framework:ozone-activated carbon pretreatment achieved 85%removal efficiency for pharmaceutical contaminants,ecological floating beds enhanced nitrogen and phosphorus retention by 40%-60%,and hydraulic regulation(flow velocity>0.1 m/s)effectively suppressed pathogen proliferation.The innovation of this study lies in establishing a chemical-biological-hydrological coupled risk quantification model for reclaimed water reuse scenarios.The hierarchical prevention standards have been incorporated into local reclaimed water management regulations,providing a scientific foundation and technical paradigm for sustainable landscape water replenishment. 展开更多
关键词 Recycled water systems Landscape hydration Ecological security assessment Risk management framework
在线阅读 下载PDF
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
9
作者 Tawfeeq Shawly Ahmed A.Alsheikhy +4 位作者 Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani 《Computer Modeling in Engineering & Sciences》 2025年第3期3181-3212,共32页
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam. 展开更多
关键词 Email spam fraud light dual attention squeeze and excitation divide and conquer-generative adversarial network-squeeze and excitation-based framework security
在线阅读 下载PDF
Research on Railway 5G-R Network Security Technology
10
作者 ZHANG Song WANG Wei +3 位作者 TIAN Zhiji MA Jun SUN Bin SHEN Meiying(Translated) 《Chinese Railways》 2025年第1期29-36,共8页
The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.... The 5G-R network is on the verge of entering the construction stage.Given that the dedicated network for railways is closely linked to train operation safety,there are extremely high requirements for network security.As a result,there is an urgent need to conduct research on 5G-R network security.To comprehensively enhance the end-to-end security protection of the 5G-R network,this study summarized the security requirements of the GSM-R network,analyzed the security risks and requirements faced by the 5G-R network,and proposed an overall 5G-R network security architecture.The security technical schemes were detailed from various aspects:5G-R infrastructure security,terminal access security,networking security,operation and maintenance security,data security,and network boundary security.Additionally,the study proposed leveraging the 5G-R security situation awareness system to achieve a comprehensive upgrade from basic security technologies to endogenous security capabilities within the 5G-R system. 展开更多
关键词 5G-R network security security risks endogenous security situational awareness
原文传递
A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications
11
作者 Arshiya Sajid Ansari Ghadir Altuwaijri +3 位作者 Fahad Alodhyani Moulay Ibrahim El-Khalil Ghembaza Shahabas Manakunnath Devasam Paramb Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第6期3713-3752,共40页
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrai... IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks. 展开更多
关键词 security in IoT applications PRIVACY-PRESERVING blockchain AI-driven security mechanisms
在线阅读 下载PDF
Cost management based security framework in mobile ad hoc networks
12
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 network attacks Mobile ad hoc Cost management security framework
在线阅读 下载PDF
Exploring the Nuclear Power DCS Network Security Management Method and Its Application
13
作者 Yu Chen Yongjie Fu Yajie Wen 《Journal of Electronic Research and Application》 2025年第3期97-103,共7页
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c... Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future. 展开更多
关键词 network security DCS Nuclear power plant network security management
在线阅读 下载PDF
Security analysis and secured access design for networks of image remote sensing
14
作者 Juan Zhao Haibo Dai +3 位作者 Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li 《Digital Communications and Networks》 2025年第1期136-144,共9页
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens... The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach. 展开更多
关键词 Image remote sensing Secured access Energy efficiency Sensor transmit power Secured access design
在线阅读 下载PDF
Thickness-controllable synthesis of metal-organic framework based hollow nanofiowers with magnetic core via liquid phase epitaxy for phosphopeptides enrichment
15
作者 Ning Zhang Mengjie Qin +6 位作者 Jiawen Zhu Xuejing Lou Xiao Tian Wende Ma Youmei Wang Minghua Lu Zongwei Cai 《Chinese Chemical Letters》 2025年第4期622-626,共5页
A thickness-controllable method for preparing metal-organic framework hollow nanofiowers on magnetic cores(Fe_(3)O_(4)@MOFs HFs)was demonstrated for the first time.The petal of magnetic core with hollow nanofiower str... A thickness-controllable method for preparing metal-organic framework hollow nanofiowers on magnetic cores(Fe_(3)O_(4)@MOFs HFs)was demonstrated for the first time.The petal of magnetic core with hollow nanofiower structure served as medium for assembling Ui O-66-NH_(2)shell with different thickness.To further improve its performance,Zr^(4+)was immobilized on the surface of Fe_(3)O_(4)@Ui O-66-NH_(2).Compared with conventional Fe_(3)O_(4)@Ui O-66-NH_(2)-Zr^(4+)nanospheres,the Fe_(3)O_(4)@Ui O-66-NH2-Zr4+HFs showed increased enrichment performance for phosphopeptides.The Fe_(3)O_(4)@Ui O-66-NH2-Zr4+HFs served as an attractive restricted-access adsorption material exhibited good selectivity(m_(β-casein):m_(BSA)=1:1000),high sensitivity(1.0 fmol)and excellent size-exclusion effect(m)((β-casein digests):m_(BSA)=1:200).Furthermore,the Fe_(3)O_(4)@Ui O-66-NH_(2)-Zr^(4+)HFs was successfully applied to the specific capture of ultratrace phosphopeptide from complex biological samples,revealing the great potential for the identification and analysis of trace phosphopeptides in clinical analysis.This work can be easily extended to the fabrication of diverse mag-MOF HFs with multifunctional and easy to post-modify properties,and open up a new avenue for the design and construction of new MOFs material. 展开更多
关键词 Metal-organic framework Nanofiower PHOSPHOPEPTIDE Serum SALIVA
原文传递
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
16
作者 M. Mamun-Ibn-Abdullah M. Humayun Kabir 《Journal of Computer and Communications》 2021年第7期31-42,共12页
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi... Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily. 展开更多
关键词 Cloud Computing Data security Embedded Platform framework security Threat
在线阅读 下载PDF
EPVCNet:Enhancing privacy and security for image authentication in computing-sensitive 6G environment
17
作者 Muhammad Shafiq Lijing Ren +2 位作者 Denghui Zhang Thippa Reddy Gadekallu Mohammad Mahtab Alam 《Digital Communications and Networks》 2025年第5期1679-1688,共10页
As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust acces... As the 5G architecture gains momentum,interest in 6G is growing.The proliferation of Internet of Things(IoT)devices,capable of capturing sensitive images,has increased the need for secure transmission and robust access control mechanisms.The vast amount of data generated by low-computing devices poses a challenge to traditional centralized access control,which relies on trusted third parties and complex computations,resulting in intricate interactions,higher hardware costs,and processing delays.To address these issues,this paper introduces a novel distributed access control approach that integrates a decentralized and lightweight encryption mechanism with image transmission.This method enhances data security and resource efficiency without imposing heavy computational and network burdens.In comparison to the best existing approach,it achieves a 7%improvement in accuracy,effectively addressing existing gaps in lightweight encryption and recognition performance. 展开更多
关键词 ISAC IOT Privacy and security VC
在线阅读 下载PDF
Smart Grid Security Framework for Data Transmissions with Adaptive Practices Using Machine Learning Algorithm
18
作者 Shitharth Selvarajan Hariprasath Manoharan +2 位作者 Taher Al-Shehari Hussain Alsalman Taha Alfakih 《Computers, Materials & Continua》 2025年第3期4339-4369,共31页
This research presents an analysis of smart grid units to enhance connected units’security during data transmissions.The major advantage of the proposed method is that the system model encompasses multiple aspects su... This research presents an analysis of smart grid units to enhance connected units’security during data transmissions.The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring,data expansion,control association,throughput,and losses.In addition,all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks.Moreover,the quantitative analysis of the optimization algorithm is discussed concerning two case studies,thereby achieving early convergence at reduced complexities.The suggested method ensures that each communication unit has its own distinct channels,maximizing the possibility of accurate measurements.This results in the provision of only the original data values,hence enhancing security.Both power and line values are individually observed to establish control in smart grid-connected channels,even in the presence of adaptive settings.A comparison analysis is conducted to showcase the results,using simulation studies involving four scenarios and two case studies.The proposed method exhibits reduced complexity,resulting in a throughput gain of over 90%. 展开更多
关键词 Machine learning power systems security smart grid
在线阅读 下载PDF
An integrated decision-making approach to resilience-LCC Bridge network retrofitting using a genetic algorithm-based framework
19
作者 Pedram Omidian Naser Khaji Ali Akbar Aghakouchak 《Resilient Cities and Structures》 2025年第1期16-40,共25页
Bridge networks are essential components of civil infrastructure,supporting communities by delivering vital services and facilitating economic activities.However,bridges are vulnerable to natural disasters,particularl... Bridge networks are essential components of civil infrastructure,supporting communities by delivering vital services and facilitating economic activities.However,bridges are vulnerable to natural disasters,particularly earthquakes.To develop an effective disaster management strategy,it is critical to identify reliable,robust,and efficient indicators.In this regard,Life-Cycle Cost(LCC)and Resilience(R)serve as key indicators to assist decision-makers in selecting the most effective disaster risk reduction plans.This study proposes an innova-tive LCC-R optimization framework to identify the most optimal retrofit strategies for bridge networks facing hazardous events during their lifespan.The proposed framework employs both single-and multi-objective opti-mization techniques to identify retrofit strategies that maximize the R index while minimizing the LCC for the under-study bridge networks.The considered retrofit strategies include various options such as different mate-rials(steel,CFRP,and GFRP),thicknesses,arrangements,and timing of retrofitting actions.The first step in the proposed framework involves constructing fragility curves by performing a series of nonlinear time-history incre-mental dynamic analyses for each case.In the subsequent step,the seismic resilience surfaces are calculated using the obtained fragility curves and assuming a recovery function.Next,the LCC is evaluated according to the pro-posed formulation for multiple seismic occurrences,which incorporates the effects of complete and incomplete repair actions resulting from previous multiple seismic events.For optimization purposes,the Non-Dominated Sorting Genetic Algorithm II(NSGA-II)evolutionary algorithm efficiently identifies the Pareto front to represent the optimal set of solutions.The study presents the most effective retrofit strategies for an illustrative bridge network,providing a comprehensive discussion and insights into the resulting tactical approaches.The findings underscore that the methodologies employed lead to logical and actionable retrofit strategies,paving the way for enhanced resilience and cost-effectiveness in bridge network management against seismic hazards. 展开更多
关键词 Bridge network Infrastructures management Decision-making framework RESILIENCE Life-cycle cost
在线阅读 下载PDF
A Study and Evaluation of Network Security by Employing Decision-Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators
20
作者 Walid Emam Ubaid ur Rehman +1 位作者 Tahir Mahmood Faisal Mehmood 《CAAI Transactions on Intelligence Technology》 2025年第6期1703-1716,共14页
The evaluation and assessment of network security is a decision-making(DM)problem that occurs in an environment with multiple criteria,which have uncertainty,bipolarity,and extra-related information.The traditional ap... The evaluation and assessment of network security is a decision-making(DM)problem that occurs in an environment with multiple criteria,which have uncertainty,bipolarity,and extra-related information.The traditional approaches fail to address the need to acquire a wide range of information for the assessment,especially in situations where the criteria have both positive and negative aspects and contain extra fuzzy information.Therefore,in this manuscript,we aim to introduce a DM approach based on the concept of bipolar complex fuzzy(BCF)Yager aggregation operators(AOs).The related properties of these aggregation operators(AOs)are also discussed.Moreover,in this article,we diagnose the Yager operations in the setting of BCF.The basic idea of the interpreted operators and DM approach is to access the problem linked with the network security that is to evaluate and select the finest network security control and network security protocols for protecting and safeguarding the network of any organization or home(case studies).Finally,to exhibit the supremacy and success of the described theory,we examine them with the prevailing theories. 展开更多
关键词 fuzzy logic fuzzy set theory security
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部