Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they off...Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they offer.However,due to distributed communication,flexible network topologies and lack of central control,the traditional security strategies are inadequate formeeting the unique characteristics ofDCS.Moreover,malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network.Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node,which reduces the risk and increases network lifetime.In this research,we offer TRUSED,a trust-based security evaluation scheme that both,directly and indirectly,estimates each node’s level of trustworthiness,incorporating the cumulative trust concept.In addition,simulation results show that the proposed technique can effectively identify malicious nodes,determine their node’s trustworthiness rating,and improve the packet delivery ratio.展开更多
Routing strategies and security issues are the greatest challenges in Wireless Sensor Network(WSN).Cluster-based routing Low Energy adaptive Clustering Hierarchy(LEACH)decreases power consumption and increases net-wor...Routing strategies and security issues are the greatest challenges in Wireless Sensor Network(WSN).Cluster-based routing Low Energy adaptive Clustering Hierarchy(LEACH)decreases power consumption and increases net-work lifetime considerably.Securing WSN is a challenging issue faced by researchers.Trust systems are very helpful in detecting interfering nodes in WSN.Researchers have successfully applied Nature-inspired Metaheuristics Optimization Algorithms as a decision-making factor to derive an improved and effective solution for a real-time optimization problem.The metaheuristic Elephant Herding Optimizations(EHO)algorithm is formulated based on ele-phant herding in their clans.EHO considers two herding behaviors to solve and enhance optimization problem.Based on Elephant Herd Optimization,a trust-based security method is built in this work.The proposed routing selects routes to destination based on the trust values,thus,finding optimal secure routes for transmitting data.Experimental results have demonstrated the effectiveness of the proposed EHO based routing.The Average Packet Loss Rate of the proposed Trust Elephant Herd Optimization performs better by 35.42%,by 1.45%,and by 31.94%than LEACH,Elephant Herd Optimization,and Trust LEACH,respec-tively at Number of Nodes 3000.As the proposed routing is efficient in selecting secure routes,the average packet loss rate is significantly reduced,improving the network’s performance.It is also observed that the lifetime of the network is enhanced with the proposed Trust Elephant Herd Optimization.展开更多
[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and Natio...[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and National Security期刊中筛选出核心著者,运用履历分析法将国外核心著者履历划分为学科背景、研究方向、科研成果和工作经历4个核心类属进行比较分析,采用LDA主题模型对发文进行主题挖掘,系统识别出情报研究者关注的核心议题。[结果/结论]核心著者群体呈现显著的男性主导、中老年资深学者为主、机构高度集中、学科背景偏重传统人文社科的特征;安全情报研究面临跨学科深度融合不足、学界与实践存在隔阂、技术伦理与法律探讨滞后等问题。展开更多
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr...Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.展开更多
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)...Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.展开更多
Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in ...Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide.展开更多
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B...Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years.展开更多
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser...The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.展开更多
In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced....In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.Frequent regional conflicts and political instability have triggered a deep sense of insecurity,while latent risks have emerged one after another,exacerbating turbulence and disorder.Some countries still cling to a zero-sum mindset,selectively applying or discarding international rules based on their interests.Hegemonism and unilateralism have severely undermined the UN-centered international system,leading to a resurgence of geopolitical rivalry and intensified bloc confrontation.The provision of global public goods remains severely inadequate,security risks continue to accumulate,and the journey toward effective global security governance remains long and challenging.展开更多
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta...This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments.展开更多
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin...As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results.展开更多
Climate change,natural disasters,pollution,and fast urbanization have made environmental security a more serious international issue.Timely,accurate,and multi-dimensional information is essential in the effective moni...Climate change,natural disasters,pollution,and fast urbanization have made environmental security a more serious international issue.Timely,accurate,and multi-dimensional information is essential in the effective monitoring and management of such complex challenges in the environment.The Earth Observation(EO)systems,including optical sensors,radar sensors,Light Detection and Ranging(LiDAR)sensors,thermal sensors,Unmanned Aerial Vehicle(UAV)sensors,and in-situ sensors,offer a good coverage of space and time,as well as provide useful information on land,water,and atmospheric processes.But the shortcomings or weaknesses of individual sensors,such as their vulnerability to weather conditions,spectral or spatial resolution,and gaps in time,can tend to limit their ability to provide a complete picture of the environment.One of the solutions has been multi-sensor fusion,which combines heterogeneous data and makes it more accurate,robust,and interpretable.This systematic review analyzes the latest methods of multi-sensor fusion,which are machine learning,deep learning,probabilistic models,and hybrid approaches,in terms of methodological principles,preprocessing needs,and computational frameworks.Applications in environmental security are highlighted,which include monitoring natural disasters,monitoring of climate and ecosystem,pollution monitoring,monitoring of land use change,and early warning systems.The review also covers evaluation measures,validation plans,and uncertainty measures,where a strict measure of evaluation is vital to making actionable decisions.Lastly,emerging issues,e.g.,data heterogeneity,computational needs,sensor interoperability,and prospects in the future,e.g.,AI-based adaptive fusion,UAVs and Internet of Things(IoT)integration,and scalable cloud-based systems,are discussed.The synthesis has highlighted the transformational capability of multi-sensor EO in terms of improving the environment in the context of environmental security and sustainable management.展开更多
International trade serves as a crucial pathway for enhancing global food security and equality amid severe food crises worldwide.Under globalization,economic development has profoundly influenced food trade,while dis...International trade serves as a crucial pathway for enhancing global food security and equality amid severe food crises worldwide.Under globalization,economic development has profoundly influenced food trade,while disparities in food purchasing power among different economic development groups have led to uneven food security outcomes.However,the varying contributions of international trade to food security across these groups remain to be quantitatively elucidated.This study categorized countries into four economic development groups—high,high-medium,medium-low,and low—and examined changes in their food security scores from 2010 to 2019.The cross-group contributions of international trade to food security across these groups were compared.The results revealed that the food security score of the high economic development group was 9.22 times higher than that of the low economic development group.From 2010 to 2019,the high economic development group exhibited a significant upward trend in food security scores,whereas the low economic development group showed a significant decline.Moreover,international trade contributed significantly to both cross-group and within-group food security in the high economic development group,while its contribution to the low economic development group remained negligible.These findings demonstrated that international trade has further widened the food security gap between the high and low economic development groups,and its limited contribution to the low economic development group has failed to reverse the declining trend in their food security scores.This study quantified the divergent impacts of international trade on food security across economic development groups,providing valuable insights for optimizing global food trade policies—particularly in addressing the food security challenges faced by low econominc development group.展开更多
Rapid urbanization and digital transformation are reshaping how cities address challenges related to security,governance,and sustainable development.Geospatial information technology(GIT)has become a base infrastructu...Rapid urbanization and digital transformation are reshaping how cities address challenges related to security,governance,and sustainable development.Geospatial information technology(GIT)has become a base infrastructure for smart cities,where the gathering,synthesis,and examination of spatially explicit information are used to deliver data to make decisions in cities.Even after its increasing significance,the current body of research on geospatial innovation is still divided into the spheres of urban security,spatial governance,and smart city development.Such fragmentation restricts the integration of theoretical work,as well as limits the possibility of developing coherent policies and governance institutions.This article includes a systematic and integrative review of innovation in geospatial information technology to analyze the relationship between technological,data-driven,and institutional innovation and urban security practices,spatial governance processes,and smart city initiatives.Based on peer-reviewed sources on urban studies,geography,planning,and information science,the review generalizes the main trends in real-time spatial analytics,artificial intelligence,participatory geospatial platforms,and urban digital twins.The review shows that geospatial systems facilitate anticipatory governance,cross-sector coordination,and evidence-based urban management,and that it provides an integrative conceptual lens on the existing literature on smart cities and urban governance,as it positions geospatial information technology as a socio-technical infrastructure,as opposed to a technical tool.The paper recognizes the voids in critical research and the directions into the future on how to build ethical,inclusive,and context-sensitive geospatial systems that can allow the creation of secure,governable,and sustainable urban futures.展开更多
The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces ma...The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces major security and privacy concerns across domains such as healthcare,transportation,and smart cities.This Systemic Literature Review(SLR)addresses three research questions:identifying major threats and challenges in AIoT ecosystems,reviewing state-of-the-art security and privacy techniques,and evaluating their effectiveness.An SLR covering the period from 2020 to 2025 was conducted using major academic digital libraries,including IEEE Xplore,ACM Digital Library,ScienceDirect,SpringerLink,and Wiley Online Library,with a focus on security-and privacy-enhancing techniques such as blockchain,federated learning,and edge AI.The SLR identifies key challenges including data privacy leakage,authentication,cloud dependency,and attack surface expansion,and finds that emerging techniques,while promising,often involve trade-offs related to latency,scalability,and compliance.The study highlights future directions including lightweight cryptography,standardization,and explainable AI to support secure and trustworthy AIoT-enabled smart societies.展开更多
In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow t...In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow the Málaga distribution.Further,we scrutinize the influence of non-zero boresight pointing errors and angle-of-arrival fluctuations on the PLS performance for the first time.We derived the probability density function and cumulative density function of the FSO link,followed by the closed-form expressions of the secrecy outage probability(SOP)and the probability of strictly positive secrecy capacity(SPSC).The asymptotic SOP expression at the high signal-to-noise ratio regime and diversity order are also provided to reveal the physical mechanism of the PLS of the considered system.Finally,Monte Carlo simulation results are presented to verify the correctness of the analytical expressions.The results afford helpful insights for the future design of satellite FSO communication systems.展开更多
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)...The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments.展开更多
The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it ana...The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it analyzes a paradox:all participants speak about the same values but do not hear one another.As a solution,the Philosophical Matrix is proposed-a system of maximally general comparative concepts(the identical,the different,the correlative,the opposite,the orthogonal)that explicates a universal language of thinking,which the author calls the“language of Elohim”.The cultural-historical roots of this language are traced in the first chapter of Genesis,in Heraclitus,in Laozi,and in the Sefer Yetzirah.An analysis of the March 2 speeches allows us to diagnose at which levels of thinking(reason,practical mind,pure mind,wisdom)today’s educators and politicians operate.The conclusion proposes the“Wise School”project as a practical path for returning to the“language of Elohim”through education starting from early childhood.展开更多
In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed ...In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput.展开更多
基金The research that produced these findings received Project Funding from The Sultan Qaboos University,the Sultanate of Oman,under Research Agreement No[IG/EPS/INFS/21/04].
文摘Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they offer.However,due to distributed communication,flexible network topologies and lack of central control,the traditional security strategies are inadequate formeeting the unique characteristics ofDCS.Moreover,malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network.Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node,which reduces the risk and increases network lifetime.In this research,we offer TRUSED,a trust-based security evaluation scheme that both,directly and indirectly,estimates each node’s level of trustworthiness,incorporating the cumulative trust concept.In addition,simulation results show that the proposed technique can effectively identify malicious nodes,determine their node’s trustworthiness rating,and improve the packet delivery ratio.
文摘Routing strategies and security issues are the greatest challenges in Wireless Sensor Network(WSN).Cluster-based routing Low Energy adaptive Clustering Hierarchy(LEACH)decreases power consumption and increases net-work lifetime considerably.Securing WSN is a challenging issue faced by researchers.Trust systems are very helpful in detecting interfering nodes in WSN.Researchers have successfully applied Nature-inspired Metaheuristics Optimization Algorithms as a decision-making factor to derive an improved and effective solution for a real-time optimization problem.The metaheuristic Elephant Herding Optimizations(EHO)algorithm is formulated based on ele-phant herding in their clans.EHO considers two herding behaviors to solve and enhance optimization problem.Based on Elephant Herd Optimization,a trust-based security method is built in this work.The proposed routing selects routes to destination based on the trust values,thus,finding optimal secure routes for transmitting data.Experimental results have demonstrated the effectiveness of the proposed EHO based routing.The Average Packet Loss Rate of the proposed Trust Elephant Herd Optimization performs better by 35.42%,by 1.45%,and by 31.94%than LEACH,Elephant Herd Optimization,and Trust LEACH,respec-tively at Number of Nodes 3000.As the proposed routing is efficient in selecting secure routes,the average packet loss rate is significantly reduced,improving the network’s performance.It is also observed that the lifetime of the network is enhanced with the proposed Trust Elephant Herd Optimization.
文摘[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and National Security期刊中筛选出核心著者,运用履历分析法将国外核心著者履历划分为学科背景、研究方向、科研成果和工作经历4个核心类属进行比较分析,采用LDA主题模型对发文进行主题挖掘,系统识别出情报研究者关注的核心议题。[结果/结论]核心著者群体呈现显著的男性主导、中老年资深学者为主、机构高度集中、学科背景偏重传统人文社科的特征;安全情报研究面临跨学科深度融合不足、学界与实践存在隔阂、技术伦理与法律探讨滞后等问题。
基金supported by scientific research projects of China Academy of Railway Sciences Co.,Ltd.(grant no.2024YJ117).
文摘Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.
基金appreciation to the National Natural Science Foundation of China(72071074)Natural Science Foundation of Hunan Province,China(2025JJ30031)for their financial support。
文摘Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.
基金supported by the National Natural Science Foundation of China[Grant No.42361040].
文摘Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide.
文摘Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years.
文摘The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.
文摘In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.Frequent regional conflicts and political instability have triggered a deep sense of insecurity,while latent risks have emerged one after another,exacerbating turbulence and disorder.Some countries still cling to a zero-sum mindset,selectively applying or discarding international rules based on their interests.Hegemonism and unilateralism have severely undermined the UN-centered international system,leading to a resurgence of geopolitical rivalry and intensified bloc confrontation.The provision of global public goods remains severely inadequate,security risks continue to accumulate,and the journey toward effective global security governance remains long and challenging.
基金supported by the National Science and Technology Council of under Grant NSTC 114-2221-E-130-007.
文摘This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments.
文摘As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results.
文摘Climate change,natural disasters,pollution,and fast urbanization have made environmental security a more serious international issue.Timely,accurate,and multi-dimensional information is essential in the effective monitoring and management of such complex challenges in the environment.The Earth Observation(EO)systems,including optical sensors,radar sensors,Light Detection and Ranging(LiDAR)sensors,thermal sensors,Unmanned Aerial Vehicle(UAV)sensors,and in-situ sensors,offer a good coverage of space and time,as well as provide useful information on land,water,and atmospheric processes.But the shortcomings or weaknesses of individual sensors,such as their vulnerability to weather conditions,spectral or spatial resolution,and gaps in time,can tend to limit their ability to provide a complete picture of the environment.One of the solutions has been multi-sensor fusion,which combines heterogeneous data and makes it more accurate,robust,and interpretable.This systematic review analyzes the latest methods of multi-sensor fusion,which are machine learning,deep learning,probabilistic models,and hybrid approaches,in terms of methodological principles,preprocessing needs,and computational frameworks.Applications in environmental security are highlighted,which include monitoring natural disasters,monitoring of climate and ecosystem,pollution monitoring,monitoring of land use change,and early warning systems.The review also covers evaluation measures,validation plans,and uncertainty measures,where a strict measure of evaluation is vital to making actionable decisions.Lastly,emerging issues,e.g.,data heterogeneity,computational needs,sensor interoperability,and prospects in the future,e.g.,AI-based adaptive fusion,UAVs and Internet of Things(IoT)integration,and scalable cloud-based systems,are discussed.The synthesis has highlighted the transformational capability of multi-sensor EO in terms of improving the environment in the context of environmental security and sustainable management.
基金supported by National Natural Science Foundation of China(Grants No.42361144888 and 42401308)National Key Research and Development Program of China(Grant No.2024YFF1309200).
文摘International trade serves as a crucial pathway for enhancing global food security and equality amid severe food crises worldwide.Under globalization,economic development has profoundly influenced food trade,while disparities in food purchasing power among different economic development groups have led to uneven food security outcomes.However,the varying contributions of international trade to food security across these groups remain to be quantitatively elucidated.This study categorized countries into four economic development groups—high,high-medium,medium-low,and low—and examined changes in their food security scores from 2010 to 2019.The cross-group contributions of international trade to food security across these groups were compared.The results revealed that the food security score of the high economic development group was 9.22 times higher than that of the low economic development group.From 2010 to 2019,the high economic development group exhibited a significant upward trend in food security scores,whereas the low economic development group showed a significant decline.Moreover,international trade contributed significantly to both cross-group and within-group food security in the high economic development group,while its contribution to the low economic development group remained negligible.These findings demonstrated that international trade has further widened the food security gap between the high and low economic development groups,and its limited contribution to the low economic development group has failed to reverse the declining trend in their food security scores.This study quantified the divergent impacts of international trade on food security across economic development groups,providing valuable insights for optimizing global food trade policies—particularly in addressing the food security challenges faced by low econominc development group.
基金project supported by the Scientific Research Fund of the Zhejiang Provincial Education Department(grant number Y202456064).
文摘Rapid urbanization and digital transformation are reshaping how cities address challenges related to security,governance,and sustainable development.Geospatial information technology(GIT)has become a base infrastructure for smart cities,where the gathering,synthesis,and examination of spatially explicit information are used to deliver data to make decisions in cities.Even after its increasing significance,the current body of research on geospatial innovation is still divided into the spheres of urban security,spatial governance,and smart city development.Such fragmentation restricts the integration of theoretical work,as well as limits the possibility of developing coherent policies and governance institutions.This article includes a systematic and integrative review of innovation in geospatial information technology to analyze the relationship between technological,data-driven,and institutional innovation and urban security practices,spatial governance processes,and smart city initiatives.Based on peer-reviewed sources on urban studies,geography,planning,and information science,the review generalizes the main trends in real-time spatial analytics,artificial intelligence,participatory geospatial platforms,and urban digital twins.The review shows that geospatial systems facilitate anticipatory governance,cross-sector coordination,and evidence-based urban management,and that it provides an integrative conceptual lens on the existing literature on smart cities and urban governance,as it positions geospatial information technology as a socio-technical infrastructure,as opposed to a technical tool.The paper recognizes the voids in critical research and the directions into the future on how to build ethical,inclusive,and context-sensitive geospatial systems that can allow the creation of secure,governable,and sustainable urban futures.
文摘The convergence of Artificial Intelligence(AI)and the Internet of Things(IoT)has enabled Artificial Intelligence of Things(AIoT)systems that support intelligent and responsive smart societies,but it also introduces major security and privacy concerns across domains such as healthcare,transportation,and smart cities.This Systemic Literature Review(SLR)addresses three research questions:identifying major threats and challenges in AIoT ecosystems,reviewing state-of-the-art security and privacy techniques,and evaluating their effectiveness.An SLR covering the period from 2020 to 2025 was conducted using major academic digital libraries,including IEEE Xplore,ACM Digital Library,ScienceDirect,SpringerLink,and Wiley Online Library,with a focus on security-and privacy-enhancing techniques such as blockchain,federated learning,and edge AI.The SLR identifies key challenges including data privacy leakage,authentication,cloud dependency,and attack surface expansion,and finds that emerging techniques,while promising,often involve trade-offs related to latency,scalability,and compliance.The study highlights future directions including lightweight cryptography,standardization,and explainable AI to support secure and trustworthy AIoT-enabled smart societies.
基金National Natural Science Foundation of China(Grant No.62271202,62027802)Zhejiang Provincial Natural Science Foundation of China(Grant No.LZ25F010004)。
文摘In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow the Málaga distribution.Further,we scrutinize the influence of non-zero boresight pointing errors and angle-of-arrival fluctuations on the PLS performance for the first time.We derived the probability density function and cumulative density function of the FSO link,followed by the closed-form expressions of the secrecy outage probability(SOP)and the probability of strictly positive secrecy capacity(SPSC).The asymptotic SOP expression at the high signal-to-noise ratio regime and diversity order are also provided to reveal the physical mechanism of the PLS of the considered system.Finally,Monte Carlo simulation results are presented to verify the correctness of the analytical expressions.The results afford helpful insights for the future design of satellite FSO communication systems.
基金funded and supported by the Ongoing Research Funding program(ORF-2025-314),King Saud University,Riyadh,Saudi Arabia.
文摘The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments.
文摘The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it analyzes a paradox:all participants speak about the same values but do not hear one another.As a solution,the Philosophical Matrix is proposed-a system of maximally general comparative concepts(the identical,the different,the correlative,the opposite,the orthogonal)that explicates a universal language of thinking,which the author calls the“language of Elohim”.The cultural-historical roots of this language are traced in the first chapter of Genesis,in Heraclitus,in Laozi,and in the Sefer Yetzirah.An analysis of the March 2 speeches allows us to diagnose at which levels of thinking(reason,practical mind,pure mind,wisdom)today’s educators and politicians operate.The conclusion proposes the“Wise School”project as a practical path for returning to the“language of Elohim”through education starting from early childhood.
基金supported by National Key Basic Research Program(973 Program) under Grant No.2011CB302903National Natural Science Foundation under Grant No.60873231+1 种基金Key Program of Natural Science for Universities of Jiangsu Province under Grant No.10KJA510035Scientific Research Foundation of NJUPT under Grant No.NY209016,China
文摘In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput.