Benzodiazepines(BDZs)are used in clinics for anxiolysis,anticonvulsants,sedative hypnosis,and muscle relaxation.They have high consumptions worldwide because of their easy availability and potential addiction.They are...Benzodiazepines(BDZs)are used in clinics for anxiolysis,anticonvulsants,sedative hypnosis,and muscle relaxation.They have high consumptions worldwide because of their easy availability and potential addiction.They are often used for suicide or criminal practices such as abduction and drug-facilitated sexual assault.The pharmacological effects of using small doses of BDZs and their detections from complex biological matrices are challenging.Efficient pretreatment methods followed by accurate and sensitive detections are necessary.Herein,pretreatment methods for the extraction,enrichment,and preconcentration of BDZs as well as the strategies for their screening,identification,and quantitation developed in the past five years have been reviewed.Moreover,recent advances in various methods are summarized.Characteristics and advantages of each method are encompassed.Future directions of the pretreatment and detection methods for BDZs are also reviewed.展开更多
Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di...Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average.展开更多
The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security co...The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data.Unfortunately,security is the primary challenge when adopting Internet of Things(loT)tech-nologies.As a result,manufacturers'and academics'top priority now is improving the security of IoT devices.A substantial body of literature on the subject encompasses several issues and po-tential remedies.However,most existing research fails to offer a comprehensive perspective on attacks inside the IoT.Hence,this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains,attack threat type,attack executions,software surfaces,IoT protocols,attacks based on device property,attacks based on adversary location and attacks based on information damage level.This is fol-lowed by a comprehensive analysis of the countermeasures offered in academic literature.In this discourse,the countermeasures proposed for the most significant security attacks in the IoT are investigated.Following this,a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things(IoT)is developed,accompanied by their respective remedies.In conclusion,the study has revealed several open research areas pertinent to the subject matter.展开更多
基金supported by the Scientific Research Project of the Department of Education of Liaoning Province,China(Grant No.:ZF2019036).
文摘Benzodiazepines(BDZs)are used in clinics for anxiolysis,anticonvulsants,sedative hypnosis,and muscle relaxation.They have high consumptions worldwide because of their easy availability and potential addiction.They are often used for suicide or criminal practices such as abduction and drug-facilitated sexual assault.The pharmacological effects of using small doses of BDZs and their detections from complex biological matrices are challenging.Efficient pretreatment methods followed by accurate and sensitive detections are necessary.Herein,pretreatment methods for the extraction,enrichment,and preconcentration of BDZs as well as the strategies for their screening,identification,and quantitation developed in the past five years have been reviewed.Moreover,recent advances in various methods are summarized.Characteristics and advantages of each method are encompassed.Future directions of the pretreatment and detection methods for BDZs are also reviewed.
基金Supported by the Key Program of Natural Science Foundation of China(050335020)
文摘Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average.
基金supported in part by collaborative research funding from the National Research Council of Canada's Artificial Ir elligence for Logistics Program.
文摘The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security component of IoT is crucial given its rapid expansion as a new technology paradigm since it may entail safety-critical procedures and the online storage of sensitive data.Unfortunately,security is the primary challenge when adopting Internet of Things(loT)tech-nologies.As a result,manufacturers'and academics'top priority now is improving the security of IoT devices.A substantial body of literature on the subject encompasses several issues and po-tential remedies.However,most existing research fails to offer a comprehensive perspective on attacks inside the IoT.Hence,this survey aims to establish a structure to guide researchers by categorizing attacks in the taxonomy according to various factors such as attack domains,attack threat type,attack executions,software surfaces,IoT protocols,attacks based on device property,attacks based on adversary location and attacks based on information damage level.This is fol-lowed by a comprehensive analysis of the countermeasures offered in academic literature.In this discourse,the countermeasures proposed for the most significant security attacks in the IoT are investigated.Following this,a comprehensive classification system for the various domains of security research in the IoT and Industrial Internet of Things(IoT)is developed,accompanied by their respective remedies.In conclusion,the study has revealed several open research areas pertinent to the subject matter.