supported by theHigher Education Research Project of Jilin Province:JGJX24C118;the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026).
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly important.Blockchain and smart contract technologies,with their decentralized nature,provide ...
Smart contracts on the Ethereum blockchain continue to revolutionize decentralized applications (dApps) by allowing for self-executing agreements. However, bad actors have continuously found ways to exploit smart cont...
This review examines human vulnerabilities in cybersecurity within Microfinance Institutions, analyzing their impact on organizational resilience. Focusing on social engineering, inadequate security training, and weak...
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...
supported by grants from the GuangDong Basic and Applied Basic Research Foundation(No.2023A1515030121,No.2021A1515111020,No.2023A1515010246);the National Natural Science Foundation of China(No.82273148,No.82103555,No.82301086);the Science and Technology Projects in Guangzhou(No.202206080009)。
Metabolic heterogeneity plays a central role in sustaining uncontrolled cancer cell proliferation and shaping the tumor microenvironment(TME),which significantly compromises the clinical outcomes and responses to ther...
supported in part by collaborative research funding from the National Research Council of Canada's Artificial Ir elligence for Logistics Program.
The Internet of Things(loT)has set the way for the continuing digitalization of society in various manners during the past decade.The IoT is a vast network of intelligent devices exchanging data online.The security co...
supported and funded by the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University(IMSIU)(Grant number IMSIU-RP23017).
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
The vulnerability of farms to the effects of climate change weighs heavily and indirectly on the living conditions of farming households in northern Benin. This article analyses the vulnerability of cotton-growing hou...
supported by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.KFU242068).
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues...
supported from a DKH grant(DKH 70113042);the CRC 1292(TP05)to K.R.K.R.
In a recent article published in Cell by Savage et al.,the authors developed a computational workflow for integrating multi-omics data from readily available public online databases to provide novel insights into the ...