期刊文献+
共找到5,285篇文章
< 1 2 250 >
每页显示 20 50 100
Can“American Greatness”Be Restored by Alienating Allies and Confronting China?
1
作者 WILLIAM JONES 《China Today》 2026年第1期45-47,共3页
The American critic argues that the 2025 U.S.National Security Strategy,with its isolationist and confrontational approach towards allies and China,is a desperate fiction that undermines genuine American prosperity an... The American critic argues that the 2025 U.S.National Security Strategy,with its isolationist and confrontational approach towards allies and China,is a desperate fiction that undermines genuine American prosperity and security. 展开更多
关键词 SECURITY CONFRONTATION ISOLATIONISM PROSPERITY ALLIES china national security strategy
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
2
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUS irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Detecting Anomalies in FinTech: A Graph Neural Network and Feature Selection Perspective
3
作者 Vinh Truong Hoang Nghia Dinh +3 位作者 Viet-Tuan Le Kiet Tran-Trung Bay Nguyen Van Kittikhun Meethongjan 《Computers, Materials & Continua》 2026年第1期207-246,共40页
The Financial Technology(FinTech)sector has witnessed rapid growth,resulting in increasingly complex and high-volume digital transactions.Although this expansion improves efficiency and accessibility,it also introduce... The Financial Technology(FinTech)sector has witnessed rapid growth,resulting in increasingly complex and high-volume digital transactions.Although this expansion improves efficiency and accessibility,it also introduces significant vulnerabilities,including fraud,money laundering,and market manipulation.Traditional anomaly detection techniques often fail to capture the relational and dynamic characteristics of financial data.Graph Neural Networks(GNNs),capable of modeling intricate interdependencies among entities,have emerged as a powerful framework for detecting subtle and sophisticated anomalies.However,the high-dimensionality and inherent noise of FinTech datasets demand robust feature selection strategies to improve model scalability,performance,and interpretability.This paper presents a comprehensive survey of GNN-based approaches for anomaly detection in FinTech,with an emphasis on the synergistic role of feature selection.We examine the theoretical foundations of GNNs,review state-of-the-art feature selection techniques,analyze their integration with GNNs,and categorize prevalent anomaly types in FinTech applications.In addition,we discuss practical implementation challenges,highlight representative case studies,and propose future research directions to advance the field of graph-based anomaly detection in financial systems. 展开更多
关键词 GNN SECURITY ECOMMERCE FinTech abnormal detection feature selection
在线阅读 下载PDF
A brief review on comparative analysis of IoT-based healthcare system for breast cancer prediction
4
作者 Krishna Murari Rajiv Ranjan Suman 《Medical Data Mining》 2026年第1期46-58,共13页
The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare I... The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts. 展开更多
关键词 IOT healthcare system machine learning breast cancer prediction medical data mining security challenges
在线阅读 下载PDF
Impact of green energy development on climate change mitigation
5
作者 Kobiljon Khushvakht KHUSHVAKHTZODA Ilkhom Burkhonovich MAKHSUMOV +1 位作者 Muzaffar Boynazarovich KHOLNAZAROV Irina Mikhailovna KIRPICHNIKOVA 《Regional Sustainability》 2026年第1期11-22,共12页
This study examined the role of green energy development in mitigating climate change and fostering sustainable development in Central Asia including Kazakhstan,Uzbekistan,Kyrgyzstan,Tajikistan,and Turkmenistan.The re... This study examined the role of green energy development in mitigating climate change and fostering sustainable development in Central Asia including Kazakhstan,Uzbekistan,Kyrgyzstan,Tajikistan,and Turkmenistan.The region has substantial untapped potential in solar energy,wind energy,hydropower energy,as well as biomass and bioenergy,positioning it strategically for renewable energy deployment.The result demonstrated that integrating renewable energy can reduce greenhouse gas emissions,improve air quality,enhance energy security,and support rural development.Case studies from Kazakhstan,Uzbekistan,Kyrgyzstan,and Tajikistan showed measurable environmental and economic benefits.However,the large-scale use of renewable energy still faces numerous barriers,including outdated infrastructure,fragmented regulatory frameworks,limited investment,and shortages of technical expertise.Overcoming these obstacles requires institutional reform,stronger regional cooperation,and increasing engagement from international financial institutions and private investors.Modernizing grids,deploying storage systems,and investing in education,research,and innovation are critical for building human capacity in renewable energy sector.Accelerating the renewable energy transition is essential for Central Asia to meet climate goals,enhance environmental resilience,and ensure long-term socioeconomic development through innovation,investment,and regional collaboration. 展开更多
关键词 Renewable energy Climate change mitigation Green energy transition Sustainable development Energy security
在线阅读 下载PDF
前后端分离环境下Spring Security权限系统构建与实现
6
作者 何立富 《电脑编程技巧与维护》 2025年第10期3-7,共5页
通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器... 通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器及自定义表达式逻辑权限控制等规划,有效提升了系统的性能、安全性与灵活性。基于角色的访问控制权限(RBAC)的功能设计,借助可视化配置界面进一步增强了系统的易操作性。经测试验证,该系统具备高度的稳定性与有效性,能够精准地控制访问权限,为相关应用系统的权限管理提供了切实可靠的解决方案。 展开更多
关键词 Spring Security工具 前后端分离架构 动态化权限管理 JWT标准 基于角色的访问控制权限
在线阅读 下载PDF
The Internet of Things under Federated Learning:A Review of the Latest Advances and Applications 被引量:1
7
作者 Jinlong Wang Zhenyu Liu +2 位作者 Xingtao Yang Min Li Zhihan Lyu 《Computers, Materials & Continua》 SCIE EI 2025年第1期1-39,共39页
With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge... With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions. 展开更多
关键词 Federated learning Internet of Things SENSORS machine learning privacy security
在线阅读 下载PDF
Soil degradation:A global threat to sustainable use of black soils 被引量:4
8
作者 Rui LI Wenyou HU +8 位作者 Zhongjun JIA Hanqiang LIU Chao ZHANG Biao HUANG Shunhua YANG Yuguo ZHAO Yongcun ZHAO Manoj K.SHUKLA Miguel Angel TABOADA 《Pedosphere》 2025年第1期264-279,共16页
Black soils represent only one-sixth of the global arable land area but play an important role in maintaining world food security due to their high fertility and gigantic potential for food production.With the ongoing... Black soils represent only one-sixth of the global arable land area but play an important role in maintaining world food security due to their high fertility and gigantic potential for food production.With the ongoing intensification of agricultural practices and negative natural factors,black soils are confronting enhanced degradation.The holistic overview of black soil degradation and the underlying mechanisms for soil health improvement will be key for agricultural sustainability and food security.In this review,the current status and driving factors of soil degradation in the four major black soil regions of the world are summarized,and effective measures for black soil conservation are proposed.The Northeast Plain of China is the research hotspot with 41.5%of the published studies related to black soil degradation,despite its relatively short history of agricultural reclamation,followed by the East European Plain(28.3%),the Great Plains of North America(20.7%),and the Pampas of South American(7.9%).Among the main types of soil degradation,soil erosion and soil fertility decline(especially organic matter loss)have been reported as the most common problems,with 27.6%and 39.4%of the published studies,respectively.In addition to the natural influences of climate and topography,human activities have been reported to have great influences on the degradation of black soils globally.Unsustainable farming practices and excess in agrochemical applications are common factors reported to accelerate the degradation process and threaten the sustainable use of black soils.Global efforts for black soil conservation and utilization should focus on standardizing evaluation criteria including real-time monitoring and the measures of prevention and restoration for sustainable management.International cooperation in technology and policy is crucial for overcoming the challenges and thus achieving the protection,sustainable use,and management of global black soil resources. 展开更多
关键词 food security soil erosion sustainable agriculture sustainable management unsustainable farming practices
原文传递
On large language models safety,security,and privacy:A survey 被引量:3
9
作者 Ran Zhang Hong-Wei Li +2 位作者 Xin-Yuan Qian Wen-Bo Jiang Han-Xiao Chen 《Journal of Electronic Science and Technology》 2025年第1期1-21,共21页
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.De... The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.Despite their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant challenges.These challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy leakage.Previous works often conflated safety issues with security concerns.In contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of LLMs.Building on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in LLMs.Additionally,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats. 展开更多
关键词 Large language models Privacy issues Safety issues Security issues
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:2
10
作者 Xiaogang Zhu Wei Zhou +3 位作者 Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
The Security of Using Large Language Models:A Survey With Emphasis on ChatGPT 被引量:2
11
作者 Wei Zhou Xiaogang Zhu +4 位作者 Qing-Long Han Lin Li Xiao Chen Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期1-26,共26页
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec... ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users. 展开更多
关键词 Artificial intelligence(AI) ChatGPT large language models(LLMs) SECURITY
在线阅读 下载PDF
Integration of data science with the intelligent IoT(IIoT):Current challenges and future perspectives 被引量:2
12
作者 Inam Ullah Deepak Adhikari +3 位作者 Xin Su Francesco Palmieri Celimuge Wu Chang Choi 《Digital Communications and Networks》 2025年第2期280-298,共19页
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s... The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions. 展开更多
关键词 Data science Internet of things(IoT) Big data Communication systems Networks Security Data science analytics
在线阅读 下载PDF
The Looming Threat Blackout of the National Grid and Critical Infrastructure (A National Security Crisis) 被引量:1
13
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2025年第1期31-35,共5页
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy... The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy. 展开更多
关键词 National grid blackout critical infrastructure security EMP cyberattack resilience AI-powered grid protection ML in energy security power grid vulnerabilities physical attacks on infrastructure predictive maintenance for power grids energy crisis and national security
在线阅读 下载PDF
Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT) 被引量:1
14
作者 Hariharan Ramachandran Richard Smith +2 位作者 Kenny Awuson David Tawfik Al-Hadhrami Parag Acharya 《Computers, Materials & Continua》 2025年第2期3619-3641,共23页
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f... This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals. 展开更多
关键词 ICS/OT cyber Programmable Logic Controllers(PLC)security detection safety reliability proof testing gas compressor station ICS resilience security architecture ICS
在线阅读 下载PDF
South Sudan: The Perils of Security Governance and the Treacherous Path to Democratic Transition 被引量:1
15
作者 Luka Biong Deng Kuol 《International Relations and Diplomacy》 2025年第2期50-73,共24页
There is a growing recognition of the critical role of security governance in advancing democratic transition in the post-conflict environment.Despite such a recognition,the security sector reform concept has overshad... There is a growing recognition of the critical role of security governance in advancing democratic transition in the post-conflict environment.Despite such a recognition,the security sector reform concept has overshadowed the importance of the overarching strategic role of security governance in transition to democracy,particularly in Africa.This paper assesses the status and challenges facing security governance and how they thwarted the efforts to furthering the democratic transition in South Sudan.The paper shows a deterioration in security,safety and security governance outcomes since the independence of South Sudan in 2011 with such a trend unlikely to be abated in the near future without strategic interventions.Some of the challenges facing security governance in South Sudan include the legacies of some historical events including the“Big Tent Policy”,absence of strategic leadership,lack of overarching policy framework,impractical and tenuous security arrangements in the 2018 peace agreement,persistent postponement of the first elections,and dysfunctional justice sector.The paper provides some strategic and operational recommendations to improve security governance and advance democratic transition in South Sudan.These recommendations include formulation of an inclusive and people-centered national security policy,rigorous judicial reform,and early political agreement on new political infrastructure if conditions for holding the first national elections are not met in 2026. 展开更多
关键词 SECURITY GOVERNANCE South Sudan Peace Agreement POLICY JUSTICE REFORM Democratic Transition
在线阅读 下载PDF
A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain 被引量:1
16
作者 Hongliang Tian Meiruo Li 《Computers, Materials & Continua》 2025年第6期5539-5559,共21页
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili... The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure. 展开更多
关键词 Edge blockchain CP-ABE data security sharing IOT
在线阅读 下载PDF
Exploring the Interplay of Land Use Transformation and Its Environmental Impacts:A Case Study of Sonipat District,Haryana 被引量:1
17
作者 Niraj Kumar Tejbir Singh Rana Subhash Anand 《Journal of Environmental & Earth Sciences》 2025年第2期76-88,共13页
Land use transformations in Sonipat District,Haryana,driven by urbanization,industrialization,and land acquisitions,have posed significant ecological and socio-economic challenges,particularly concerning food security... Land use transformations in Sonipat District,Haryana,driven by urbanization,industrialization,and land acquisitions,have posed significant ecological and socio-economic challenges,particularly concerning food security.This study investigates the interplay between these land use changes and their environmental implications at macro(district)and micro(village)levels,focusing on agricultural productivity and resource sustainability.The study employs a mixed-method approach,integrating secondary data from official datasets and primary data gathered through structured household surveys,focus group discussions,and visual analysis techniques.Data from 20 villages,selected based on predominant land use characteristics,were analysed using statistical and geospatial tools,including ArcGIS and STATA,to quantify food grain losses and evaluate environmental degradation.Findings of this study reveal a 19%reduction in agricultural land over two decades(2000-2024),correlating with increased residential and industrial areas.Groundwater resources face severe overexploitation,with pollution from industrial clusters further degrading water and soil quality.The study estimates a total food grain loss of 1.5 million kilograms across surveyed villages due to land acquisitions.A strong positive correlation(R^(2)=0.98)between land acquisition and food loss underscores the direct impact of urbanization on agricultural output.The research underscores the urgency of sustainable land management practices,including preserving agricultural lands,optimizing groundwater usage,and enhancing community involvement in planning.By addressing these challenges,the study advocates for balanced urban expansion and food security to ensure ecological and economic resilience in the region. 展开更多
关键词 Environmental Impacts Food Security Land Acquisition Land Use URBANIZATION
在线阅读 下载PDF
The Cyberpsychology of Small and Medium-Sized Enterprises Cybersecurity: A Human-Centric Approach to Policy Development 被引量:1
18
作者 Troy C. Troublefield 《Journal of Information Security》 2025年第1期158-183,共26页
This study investigates the critical intersection of cyberpsychology and cybersecurity policy development in small and medium-sized enterprises (SMEs). Through a mixed-methods approach incorporating surveys of 523 emp... This study investigates the critical intersection of cyberpsychology and cybersecurity policy development in small and medium-sized enterprises (SMEs). Through a mixed-methods approach incorporating surveys of 523 employees across 78 SMEs, qualitative interviews, and case studies, the research examines how psychological factors influence cybersecurity behaviors and policy effectiveness. Key findings reveal significant correlations between psychological factors and security outcomes, including the relationship between self-efficacy and policy compliance (r = 0.42, p β = 0.37, p < 0.001). The study identifies critical challenges in risk perception, policy complexity, and organizational culture affecting SME cybersecurity implementation. Results demonstrate that successful cybersecurity initiatives require the integration of psychological principles with technical solutions. The research provides a framework for developing human-centric security policies that address both behavioral and technical aspects of cybersecurity in resource-constrained environments. 展开更多
关键词 Cyberpsychology CYBERSECURITY SMES Policy Development Human Factors Risk Perception Compliance Behavior Organizational Culture Psychological Resilience Security Awareness
在线阅读 下载PDF
Harnessing metabolomics for enhanced crop drought tolerance 被引量:1
19
作者 Ali Raza Muhammad Anas +10 位作者 Savita Bhardwaj Rakeeb Ahmad Mir Sidra Charagh Minhas Elahi Xinyue Zhang Reyazul Rouf Mir Wolfram Weckwerth Alisdair R.Fernie Kadambot H.M.Siddique Zhangli Hu Rajeev K.Varshney 《The Crop Journal》 2025年第2期311-327,共17页
Global crop productivity faces a significant threat from climate change-induced drought stress(DS),which is vital for sustainable agriculture and global food security.Uncovering DS adaptation and tolerance mechanisms ... Global crop productivity faces a significant threat from climate change-induced drought stress(DS),which is vital for sustainable agriculture and global food security.Uncovering DS adaptation and tolerance mechanisms in crops is necessary to alleviate climate challenges.Innovative plant breeding demands revolutionary approaches to develop stress-smart plants.Metabolomics,a promising field in plant breeding,offers a predictive tool to identify metabolic markers associated with plant performance under DS,enabling accelerated crop improvement.Central to DS adaptation is metabolomics-driven metabolic regulation,which is critical for maintaining cell osmotic potential in crops.Recent innovations allow rapid mapping of specific metabolites to their genetic pathways,providing a valuable resource for plant scientists.Metabolomics-driven molecular breeding,integrating techniques such as mQTL and mGWAS,enhances our ability to discover key genetic elements linked to stress-responsive metabolites.This integration offers a beneficial platform for plant scientists,yielding significant insights into the complex metabolic networks underlying DS tolerance.Therefore,this review discusses(1)insights into metabolic regulation for DS adaptation,(2)the multifaceted role of metabolites in DS tolerance and nutritional/yield trait improvement,(3)the potential of single-cell metabolomics and imaging,(4)metabolomics-driven molecular breeding,and(5)the application of metabolic and genetic engineering for DS-tolerant crops.We finally propose that the metabolomics-driven approach positions drought-smart crops as key contributors to future food production,supporting the vital goal of achieving“zero hunger”. 展开更多
关键词 Amino acids Climate change Food security mQTL and mGWAS Metabolic engineering Single-cell metabolomics Water scarcity
在线阅读 下载PDF
Smart Grid Innovations: Increasing Resilience, Security, and Sustainability in the Era of Energy Transition 被引量:1
20
作者 Yixin Yu Yanli Liu Didi Yu 《Engineering》 2025年第8期1-2,共2页
The accelerating global energy transition,driven by climate imperatives and technological advancements,demands fundamen-tal transformations in power systems.Smart grids,characterized by cyber-physical integration,dist... The accelerating global energy transition,driven by climate imperatives and technological advancements,demands fundamen-tal transformations in power systems.Smart grids,characterized by cyber-physical integration,distributed renewable resources,and data-driven intelligence,have emerged as the backbone of this evolution.This convergence,however,introduces unprecedented complexities in resilience,security,stability,and market operation.This special issue presents five pivotal studies addressing these interconnected challenges,offering novel methodologies and insights to advance the efficiency,resilience,and sustainability of modern power systems. 展开更多
关键词 SECURITY SUSTAINABILITY global energy transitiondriven smart grids RESILIENCE distributed renewable resources renewable resourcesand cyber physical integration
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部