4.5 Article

Wireless Communications for Data Security: Efficiency Assessment of Cybersecurity Industry-A Promising Application for UAVs

Related references

Note: Only part of the references are listed.
Article Management

Efficiency measurement and productivity progress of regional green technology innovation in China: a comprehensive analytical framework

Yuhong Wang et al.

Summary: This study evaluates the performance of regional green technology innovation in China through the analysis of GTI activities. It highlights the fluctuation of overall GTI efficiency between GTR and TAT stages, emphasizing the crucial role of technological progress in improving GTI performance.

TECHNOLOGY ANALYSIS & STRATEGIC MANAGEMENT (2022)

Article Energy & Fuels

Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector

Mohammed Alghassab

Summary: Monitoring and control systems in the energy sector are crucial for ensuring the operation of important infrastructures. This research evaluates the cyber security assessments of industrial control systems using hesitant fuzzy-based Analytic Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), identifying the most effective cyber security projects.

ENERGIES (2022)

Article Automation & Control Systems

Efficacy of Unconventional Penetration Testing Practices

Bandar Abdulrhman Bin Arfaj et al.

Summary: The financial and confidential cost of cyberattacks has resulted in significant losses for organizations and governments. Comprehensive penetration testing, assessment techniques, and tools are crucial in supporting cybersecurity. Advanced penetration testing methods are needed to address emerging vulnerabilities and security threats in the dynamic cyberspace.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2022)

Article Green & Sustainable Science & Technology

Driving forces of the efficiency of forest carbon sequestration production: Spatial panel data from the national forest inventory in China

Shiwen Yin et al.

Summary: This study analyzed the dynamic changes and influencing factors of forest carbon sequestration efficiency at the provincial level in China, revealing regional differences in carbon sequestration potential and efficiency. It suggests enhancing carbon sinks in regions with high efficiency and respecting natural laws in regions with low efficiency, as well as promoting forestry technology services.

JOURNAL OF CLEANER PRODUCTION (2022)

Article Computer Science, Information Systems

Deep Learning in IoT Intrusion Detection

Stefanos Tsimenidis et al.

Summary: This article provides a detailed review of deep learning models proposed for IoT intrusion detection and comprehensively analyzes their applications in IoT cybersecurity and their unique contributions to the development of effective IoT intrusion detection solutions.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2022)

Article Computer Science, Interdisciplinary Applications

The other side of the coin: The declining of Chinese social science

Kun Chen et al.

Summary: This article explores the decrease in the number of Chinese social science papers amidst the backdrop of the booming natural science papers. It finds that while the publication of social science papers is dwindling, the number of social science full-time teachers, PhD students, fund grants, and grant funding in Chinese universities is increasing. Additionally, there has been a decrease in the number of Chinese papers published in domestic journals in both natural science and social science. The decline in the publication of Chinese social science papers can be attributed to the limitations of China's journal system in handling the increase in average article length caused by improvements in scientific research. Improving the academic journal system could promote the development of social science.

SCIENTOMETRICS (2022)

Article Chemistry, Analytical

Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity

Theyazn H. H. Aldhyani et al.

Summary: Rapid technological development has significantly changed the automotive industry, particularly in the transition of vehicles from machine-controlled to software-controlled technologies. However, the complexity of data and traffic behaviors still poses cybersecurity issues and weaknesses in the autonomous vehicle network. Developing a system capable of rapidly detecting message attacks in the controller area network (CAN) is a major challenge. This study presents a high-performance system that utilizes artificial intelligence and deep learning approaches to protect the vehicle network from cyber threats.

SENSORS (2022)

Article Chemistry, Analytical

Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System

Abdulaziz Fatani et al.

Summary: In this study, a new intrusion detection system was developed utilizing swarm intelligence algorithms for feature extraction and selection. The system employed neural networks and the Aquila optimizer for this purpose. Performance evaluation on four public datasets demonstrated the competitive nature of the developed approach.

SENSORS (2022)

Article Computer Science, Information Systems

Agile Approaches for Cybersecurity Systems, IoT and Intelligent Transportation

Yahya M. Tashtoush et al.

Summary: The paper reviews the application of agile software development in the context of IoT and ITS, highlighting its importance for security and risk management. It also provides an outline for designing future security-enhanced agile software development solutions for these systems.

IEEE ACCESS (2022)

Article Engineering, Multidisciplinary

Efficient road traffic anti-collision warning system based on fuzzy nonlinear programming

Fei Peng et al.

Summary: A research based on fuzzy nonlinear programming is proposed to improve the anti-collision warning system of road traffic. The method establishes a safety distance model to prevent rear-end collision, taking into account external environmental factors. The simulation test verifies the rationality of the safety distance model and parameter setting, effectively reducing false alarms and improving road traffic collision warning system.

INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2022)

Article Computer Science, Artificial Intelligence

The rise of ransomware: Forensic analysis for windows based ransomware attacks

Ilker Kara et al.

Summary: As information technologies continue to evolve, malware has become more efficient in attacking information systems. Attackers are now utilizing ransomware as a profitable method of cyberattack, encrypting files and demanding ransom for access. Existing security mechanisms have struggled to combat this threat, highlighting the need for more effective detection and analysis methods.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Article Automation & Control Systems

Federated Learning for Cybersecurity: Concepts, Challenges, and Future Directions

Mamoun Alazab et al.

Summary: This article presents the application of federated learning in enhancing cybersecurity and preventing cyberattacks in real-time scenarios. The authors conducted a comprehensive survey on various federated learning models developed by researchers for authentication, privacy, trust management, and attack detection. Real-time use cases and the adoption of federated learning for data privacy and system performance improvement are also discussed. The article concludes with prominent challenges and future directions for researchers to focus on.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning

Jiao Yin et al.

Summary: The study proposes an integrated consecutive batch learning framework for predicting the exploitation time of vulnerabilities in cybersecurity management. Experimental results show that the ASWWL algorithm in the framework can significantly enhance the performance of minority classes, while achieving the most robust and state-of-the-art performance compared to other algorithms.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2022)

Article Mathematics, Interdisciplinary Applications

Optimization of Meat and Poultry Farm Inventory Stock Using Data Analytics for Green Supply Chain Network

Rajnish Kler et al.

Summary: There is a significant imbalance between demand and supply in traditional meat and poultry farms, resulting in wastage of funds. Implementing a modern data analytics-based system can improve efficiency, reduce costs, and carbon emissions.

DISCRETE DYNAMICS IN NATURE AND SOCIETY (2022)

Article Remote Sensing

Deep Learning-Based Energy Optimization for Edge Device in UAV-Aided Communications

Chengbin Chen et al.

Summary: This paper proposes a deep learning-based energy optimization algorithm (DEO) to address the energy consumption issue in communication between edge devices and mobile relay UAVs. By utilizing the computing platform provided by the edge server and using deep learning to predict the UAV's position, the emission energy of the edge device is adjusted to achieve reliable communication while minimizing energy consumption.

DRONES (2022)

Article Remote Sensing

A Reinforcement Learning Approach Based on Automatic Policy Amendment for Multi-AUV Task Allocation in Ocean Current

Cheng Ding et al.

Summary: This paper studies the task allocation problem of multiple autonomous underwater vehicles (AUVs) in the ocean current environment using a novel reinforcement learning approach. A reward function is designed, considering ocean current, task emergency, and energy constraints, to find the optimal strategy for task allocation. An automatic policy amendment algorithm (APAA) is proposed to address the slow convergence issue in reinforcement learning. Simulation results validate the effectiveness of the proposed approach, showing better convergence performance compared to DDQN, PER, and PPO-Clip.

DRONES (2022)

Article Mathematics, Applied

A Two-Stage Multi-Criteria Supplier Selection Model for Sustainable Automotive Supply Chain under Uncertainty

Thanh-Tuan Dang et al.

Summary: Sustainable supplier selection (SSS) is gaining popularity in supply chain sustainability. This study proposes a framework that integrates spherical fuzzy Analytical Hierarchical Process (SF-AHP) and grey Complex Proportional Assessment (G-COPRAS) to assess and choose sustainable suppliers based on their adaptability to the COVID-19 epidemic. The findings highlight the importance of quality, use of personal protective equipment, cost/price, safety and health practices and wellbeing of suppliers, and economic recovery programs. A sensitivity study confirms the robustness of the proposed model.

AXIOMS (2022)

Article Remote Sensing

Optimal Navigation of an Unmanned Surface Vehicle and an Autonomous Underwater Vehicle Collaborating for Reliable Acoustic Communication with Collision Avoidance

Andrey V. Savkin et al.

Summary: This paper focuses on the safe navigation of an unmanned surface vehicle near a submerged autonomous underwater vehicle to maximize through-water data transmission while minimizing the risk of collision. A sliding mode navigation law is developed and rigorously proven to be optimal. The developed navigation algorithm is computationally simple and easily implemented in real time, as demonstrated through illustrative examples and extensive computer simulations.

DRONES (2022)

Review Computer Science, Information Systems

A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques

Vinay Chamola et al.

Summary: Unmanned Aerial Vehicles (UAVs) have revolutionized the aircraft industry, capable of various tasks and applications. Research is ongoing to enhance UAV robustness and increase battery life using energy harvesting techniques to prevent attacks. While UAV networks are often used for unmanned missions, there is a need for research to prevent unauthorized use causing harm to people and property.

AD HOC NETWORKS (2021)

Article Environmental Sciences

Spatial-Temporal Distribution Characteristics and Driving Mechanism of Green Total Factor Productivity in China's Logistics Industry

Minjie Li et al.

Summary: This study evaluated the green total factor productivity (GTFP) of the logistics industry in 30 provinces in China from 2004 to 2017 using the Epsilon-based measure model (EBM) and global Malmquist-Luenberger index (GML), and applied geographically and temporally weighted regression (GTWR) to analyze the influences of driving factors on GTFP. The study found significant spatial and temporal differences in the GTFP, with GTWR outperforming ordinary least squares (OLS) and geographically weighted regression (GWR) in terms of goodness of fit. The regression results showed that factors have different directions and intensities on GTFP in the logistics industry at different times and regions, indicating spatiotemporal non-stationarity.

POLISH JOURNAL OF ENVIRONMENTAL STUDIES (2021)

Article Chemistry, Analytical

Optimal Design for Compliant Mechanism Flexure Hinges: Bridge-Type

Chia-Nan Wang et al.

Summary: The study designed compliant mechanism flexure hinges using grey relational analysis, with experiment results confirming high consistency with predictions. Design dimensions significantly affected equivalent stress and displacement, with an obtained displacement amplification ratio of 65.36 times compared to the initial design.

MICROMACHINES (2021)

Article Computer Science, Hardware & Architecture

Identifying cyber insecurities in trustworthy space and energy sector for smart grids

Ishaani Priyadarshini et al.

Summary: The energy sector and the cloud computing environment both face cybersecurity challenges, with smart grids vulnerable due to their extensive networking and data delivery. This paper proposes using the Multi-Criteria Decision Making tool to analyze and prioritize the impact of insecurities on smart grids in both environments.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Computer Science, Hardware & Architecture

Worm computing: A blockchain-based resource sharing and cybersecurity framework

Leyi Shi et al.

Summary: This paper introduces a novel concept of worm computing, which integrates resources and enhances network security through a decentralized computing platform and blockchain technology. Experimental results validate the effectiveness of the model in improving resource utilization and network security.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Causative Cyberattacks on Online Learning-Based Automated Demand Response Systems

Samrat Acharya et al.

Summary: Power utilities and third-party aggregators are using AI to learn energy usage patterns of consumers and design optimal DR incentives, but this approach is vulnerable to data integrity attacks.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Mathematics, Applied

A Decision Support Model for Measuring Technological Progress and Productivity Growth: The Case of Commercial Banks in Vietnam

Chia-Nan Wang et al.

Summary: This paper evaluated the performance of the top 18 commercial banks in Vietnam during 2015-2019 using data envelopment analysis (DEA) and Malmquist measurement. Most banks were found to have decreased their Malmquist productivity indexes from 2015 to 2019, with both technical and technological indexes declining. B6-SHBank, B1-Vietinbank, and B18-PetrolimexGroup were identified as the most efficient banks during this period, while B16-BaoVietBank, B11-NationalCitizen, and B13-VietnamMaritime ranked least efficient. The research provides insights into the performance of Vietnamese commercial banks and offers strategic guidelines for sustainable development in the banking industry.

AXIOMS (2021)

Article Mathematics, Applied

Efficiency Assessment of Seaport Terminal Operators Using DEA Malmquist and Epsilon-Based Measure Models

Chia-Nan Wang et al.

Summary: Seaborne trade accounts for over 80% of global trade, with seaports and port operators playing a crucial role in the development of the marine economy and national economy. The Covid-19 pandemic has intensified competition among terminal operators, highlighting the importance of evaluating performance efficiency. The proposed hybrid DEA model combines the Malmquist method and EBM to provide an effective and equitable evaluation model for the maritime industry.

AXIOMS (2021)

Review Engineering, Electrical & Electronic

Review on the Technological Development and Application of UAV Systems

Bangkui Fan et al.

CHINESE JOURNAL OF ELECTRONICS (2020)

Article Computer Science, Hardware & Architecture

Towards a framework of key technologies for drones

Reda Nouacer et al.

MICROPROCESSORS AND MICROSYSTEMS (2020)

Article Environmental Sciences

Spatiotemporal Dynamics of Ecological Total-Factor Energy Efficiency and Their Drivers in China at the Prefecture Level

Guangdong Li

INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH (2019)

Article Computer Science, Theory & Methods

Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks

Raheleh Khanduzi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things

Andreas Burg et al.

PROCEEDINGS OF THE IEEE (2018)

Article Computer Science, Information Systems

Low Power Wide Area Network Analysis: Can LoRa Scale?

Orestis Georgiou et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2017)

Article Business

Scale, congestion, efficiency and effectiveness in e-commerce firms

Zhuofan Yang et al.

ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS (2016)

Article Operations Research & Management Science

Evaluation of the dynamic efficiency of Croatian towns using Data Envelopment Analysis

Dubravko Hunjet et al.

CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH (2015)

Proceedings Paper Business, Finance

Banking Efficiency Determinants in the Czech Banking Sector

Iveta Repkova

2ND GLOBAL CONFERENCE ON BUSINESS, ECONOMICS, MANAGEMENT AND TOURISM (2015)

Article Management

Performance modeling of mobile phone providers: a DEA-ANN combined approach

He-Boong Kwon

BENCHMARKING-AN INTERNATIONAL JOURNAL (2014)

Article Social Sciences, Interdisciplinary

Online banking performance evaluation using data envelopment analysis and axiomatic fuzzy set clustering

Lili Tao et al.

QUALITY & QUANTITY (2013)

Article Computer Science, Interdisciplinary Applications

Exploring the efficiency and effectiveness in global e-retailing companies

Wen-Min Lu et al.

COMPUTERS & OPERATIONS RESEARCH (2011)

Article Engineering, Environmental

Catalytic reduction of 4-nitrophenol by magnetically recoverable Au nanocatalyst

Yang-Chuang Chang et al.

JOURNAL OF HAZARDOUS MATERIALS (2009)

Article Management

Degree of scale economies and congestion: A unified DEA approach

K Tone et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2004)