Search
Search Results
-
Regional Water Resource Security in China Based on a New Fuzzy Method with Combination Weighting
As one of the important natural resources, water resources are related to the future survival and development of human beings. In recent years, the...
-
Promoting Surface Runoff Management for Enhancing Water Security: A Case Study of Solapur District Maharashtra
The present investigation is an attempt to demarcate the micro-watersheds in the Solapur district and prioritize them based on their runoff...
-
Assessment of Water Security for a Sustainable Environment: An Indicator-Based Approach Applied in Penang, Malaysia
When risks to water security increase it is necessary to enhance the management response. Water and climate change are closely related as water form... -
Towards the Testbed and Dataset for Analysis of Water Treatment Systems Security
The security of cyber physical systems is highly relevant now. Due to tight connection between physical sensors of the technological processes and... -
Assessment of Spring Water Security for Small Community Using Internet of Things (IoT)
The securing of clean and sustainable water sources is a fundamental entitlement of individuals and an essential factor in the sustained advancement... -
An OSINT-Driven Security Analysis of Intelligent Construction of Water Conservancy Projects in China
China’s major plan to build a modernised economic and ecological system puts water resources at the top of major infrastructure networks, but... -
Intelligent LSTM (iLSTM)-Security Model for HetIoT
Distributed denial-of-service (DDoS) is the most recent lethal threat, and several industrial and academic researchers are concentrating on defending...
-
Security Enhancement in IoT with an Application of Water Monitoring
In recent years, numerous innovations have been observed in IOT-based process management systems. There are smart management technologies and... -
Optimizing the Water-Energy-Food Nexus System Considering the Human Development Index
Water, energy, and food are essential resources for meeting basic human needs and for socio-economic development. The water-energy-food nexus studies...
-
Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning
Wireless local area networks (WLANs) play a crucial role in the internet of things (IoT) landscape, facilitating constant data exchange among...
-
Medical Image Data Security Risk Identification Based on 6G Wireless Sensor Networks and AI-Assisted Technology
This study presents a novel technique to protect medical image data from security risks under 6G wireless technology-based communications called...
-
Security Clouds to Improve Privacy and Conduct Continuous Audits in 6G Networked Environments Smart Cities
Data auditing in the cloud, along with files and authentication server Deduplication, may protect the integrity of cloud storage and substantially...
-
Traditional and Blockchain Based IoT and IIoT Security in the Context of Agriculture: A Survey
Agriculture is an inevitable area for research that must be prioritized as the world population is continuously growing. To meet agricultural product...
-
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...
-
Water Quality Security Guarantee and Monitoring System Based on Cloud Technology
In recent years, with the rapid development of social economy, water quality and safety issues are very common, and they are also a topic of our... -
Low Power Blockchain in Industry 4.0 Case Study: Water Management in Tunisia
Industry has undergone, during this decade, significant technological changes and improvements. The industrial sector is further moving towards IIoT...
-
Integrating the dynamic frequency security in the real-time scheduling considering the accurate models and network constraints
The frequency security issue has become more critical in recent decades for various reasons, especially the reduced and degraded primary frequency...
-
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
Maximizing the security of the cloud system is most important need of this world. Similarly, the data controllers are also increased stealing the...
-
A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It...
-
Smart City IoT System Network Level Routing Analysis and Blockchain Security Based Implementation
This paper demonstrates, network-level performance analysis and implementation of smart city Internet of Things (IoT) system with Infrastructure as a...