Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (7,737)

Search Parameters:
Keywords = network security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 1644 KiB  
Article
Evaluation and Prediction of Agricultural Water Use Efficiency in the Jianghan Plain Based on the Tent-SSA-BPNN Model
by Tianshu Shao, Xiangdong Xu and Yuelong Su
Agriculture 2025, 15(2), 140; https://doi.org/10.3390/agriculture15020140 (registering DOI) - 9 Jan 2025
Abstract
The Jianghan Plain (JHP) is a key agricultural area in China where efficient agricultural water use (AWUE) is vital for sustainable water management, food security, environmental sustainability, and economic growth. This study introduces a novel AWUE prediction model for the JHP, combining a [...] Read more.
The Jianghan Plain (JHP) is a key agricultural area in China where efficient agricultural water use (AWUE) is vital for sustainable water management, food security, environmental sustainability, and economic growth. This study introduces a novel AWUE prediction model for the JHP, combining a BP neural network with the Sparrow Search Algorithm (SSA) and an improved Tent Mixing Algorithm (Tent-SSA-BPNN). This hybrid model addresses the limitations of traditional methods by enhancing AWUE forecast accuracy and stability. By integrating historical AWUE data and environmental factors, the model provides a detailed understanding of AWUE’s spatial and temporal variations. Compared to traditional BP neural networks and other methods, the Tent-SSA-BPNN model significantly improves prediction accuracy and stability, achieving an accuracy (ACC) of 96.218%, a root mean square error (RMSE) of 0.952, and a coefficient of determination (R2) of 0.9939, surpassing previous models. The results show that (1) from 2010 to 2022, the average AWUE in the JHP fluctuated within a specific range, exhibiting a decrease of 0.69%, with significant differences in the spatial and temporal distributions across various cities; (2) the accuracy (ACC) of the Tent-SSA-BPNN prediction model was 96.218%, the root mean square error (RMSE) was 0.952, and the coefficient of determination (R²) value was 0.9939. (3) Compared with those of the preoptimization model, the ACC, RMSE, and R² values of the Tent-SSA-BPNN model significantly improved in terms of accuracy and stability, clearly indicating the efficacy of the optimization. (4) The prediction results reveal that the proportion of agricultural water consumption has a significant impact on AWUE. These results provide actionable insights for optimizing water resource allocation, particularly in water-scarce regions, and guide policymakers in enhancing agricultural water management strategies, supporting sustainable agricultural development. Full article
22 pages, 1173 KiB  
Article
DeepOP: A Hybrid Framework for MITRE ATT&CK Sequence Prediction via Deep Learning and Ontology
by Shuqin Zhang, Xiaohang Xue and Xinyu Su
Abstract
As the Industrial Internet of Things (IIoT) increasingly integrates with traditional networks, advanced persistent threats (APTs) pose significant risks to critical infrastructure. Traditional Intrusion Detection Systems (IDSs) and Anomaly Detection Systems (ADSs) are often inadequate in countering sophisticated multi-step APT attacks. This highlights [...] Read more.
As the Industrial Internet of Things (IIoT) increasingly integrates with traditional networks, advanced persistent threats (APTs) pose significant risks to critical infrastructure. Traditional Intrusion Detection Systems (IDSs) and Anomaly Detection Systems (ADSs) are often inadequate in countering sophisticated multi-step APT attacks. This highlights the necessity of studying attacker strategies and developing predictive models to mitigate potential threats. To address these challenges, we propose DeepOP, a hybrid framework for attack sequence prediction that combines deep learning and ontological reasoning. DeepOP leverages the MITRE ATT&CK framework to standardize attacker behavior and predict future attacks with fine-grained precision. Our framework’s core is a novel causal window self-attention mechanism embedded within a transformer-based architecture. This mechanism effectively captures local causal relationships and global dependencies within attack sequences, enabling accurate multi-step attack predictions. In addition, we construct a comprehensive dataset by extracting causally connected attack events from cyber threat intelligence (CTI) reports using ontological reasoning, mapping them to the ATT&CK framework. This approach addresses the challenge of insufficient data for fine-grained attack prediction and enhances the model’s ability to generalize across diverse scenarios. Experimental results demonstrate that the proposed model effectively predicts attacker behavior, achieving competitive performance in multi-step attack prediction tasks. Furthermore, DeepOP bridges the gap between theoretical modeling and practical security applications, providing a robust solution for countering complex APT threats. Full article
(This article belongs to the Special Issue AI-Based Solutions for Cybersecurity)
30 pages, 2272 KiB  
Article
Embedding Trust in the Media Access Control Protocol for Wireless Networks
by Chaminda Alocious, Hannan Xiao, Bruce Christianson and Joseph Spring
Sensors 2025, 25(2), 354; https://doi.org/10.3390/s25020354 - 9 Jan 2025
Abstract
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative [...] Read more.
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties. Full article
(This article belongs to the Special Issue Innovative Approaches to Cybersecurity for IoT and Wireless Networks)
Show Figures

Figure 1

20 pages, 7167 KiB  
Article
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho and Mohamed S. Abdallah
Abstract
Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. Their importance resides in their capacity to acquire hierarchical features, which is essential for recognizing complex patterns. [...] Read more.
Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. Their importance resides in their capacity to acquire hierarchical features, which is essential for recognizing complex patterns. Nevertheless, the intricate architectural design of CNNs leads to significant computing requirements. To tackle these issues, it is essential to construct a system based on field-programmable gate arrays (FPGAs) to speed up CNNs. FPGAs provide fast development capabilities, energy efficiency, decreased latency, and advanced reconfigurability. A facial recognition solution by leveraging deep learning and subsequently deploying it on an FPGA platform is suggested. The system detects whether a person has the necessary authorization to enter/access a place. The FPGA is responsible for processing this system with utmost security and without any internet connectivity. Various facial recognition networks are accomplished, including AlexNet, ResNet, and VGG-16 networks. The findings of the proposed method prove that the GoogLeNet network is the best fit due to its lower computational resource requirements, speed, and accuracy. The system was deployed on three hardware kits to appraise the performance of different programming approaches in terms of accuracy, latency, cost, and power consumption. The software programming on the Raspberry Pi-3B kit had a recognition accuracy of around 70–75% and relied on a stable internet connection for processing. This dependency on internet connectivity increases bandwidth consumption and fails to meet the required security criteria, contrary to ZYBO-Z7 board hardware programming. Nevertheless, the hardware/software co-design on the PYNQ-Z2 board achieved an accuracy rate of 85% to 87%. It operates independently of an internet connection, making it a standalone system and saving costs. Full article
(This article belongs to the Special Issue Artificial Intelligence-Based Image Processing and Computer Vision)
Show Figures

Figure 1

17 pages, 835 KiB  
Systematic Review
Data-Driven Social Security Event Prediction: Principles, Methods, and Trends
by Nuo Xu and Zhuo Sun
Appl. Sci. 2025, 15(2), 580; https://doi.org/10.3390/app15020580 - 9 Jan 2025
Abstract
Social security event prediction can provide critical early warnings and support for public policies and crisis responses. The rapid development of communication networks has provided a massive data analysis base, including social media, economic data, and historical event records, for social security event [...] Read more.
Social security event prediction can provide critical early warnings and support for public policies and crisis responses. The rapid development of communication networks has provided a massive data analysis base, including social media, economic data, and historical event records, for social security event prediction based on data-driven approaches. The advent of data-driven approaches has revolutionized the prediction of these events, offering new theoretical insights and practical applications. Aiming at offering a systematic review of current data-driven prediction methods used in social security, this paper delves into the progress of this research from three novel perspectives, prediction factors, technical methods, and interpretability, and then analyzes future development trends. This paper contributes key insights into how social security event prediction can be improved and hopefully offers a comprehensive analysis that goes beyond the existing literature. Full article
(This article belongs to the Special Issue Recent Advances in AI-Enabled Wireless Communications and Networks)
Show Figures

Figure 1

16 pages, 3690 KiB  
Article
A Study on Zone-Based Secure Multicast Protocol Technique to Improve Security Performance and Stability in Mobile Ad-Hoc Network
by Hwanseok Yang
Appl. Sci. 2025, 15(2), 568; https://doi.org/10.3390/app15020568 - 9 Jan 2025
Viewed by 113
Abstract
Since MANET consists of only nodes and is in wireless communication with limited resources, cooperation between nodes is very important. Multicasting technology supports various applications that allow data to be immediately transmitted to target nodes. In environments such as MANET, where nodes are [...] Read more.
Since MANET consists of only nodes and is in wireless communication with limited resources, cooperation between nodes is very important. Multicasting technology supports various applications that allow data to be immediately transmitted to target nodes. In environments such as MANET, where nodes are constantly moving, finding an efficient path from the source to the destination is a critical challenge. Providing integrity for the data transmitted from the source to the target node set is also an important part. Maintaining the state of neighbor nodes not only increases the communication and processing overhead but also requires more memory. In this paper, we propose a zone-based secure routing algorithm to improve the performance of routing protocols. We will also prove efficient management of node groups in an area and better scalability, performance, and security despite frequent topology changes by using group keys. To evaluate the proposed technique, detailed and extensive simulation performance with PAST-DM and MSZRP are evaluated. The simulation results show that the proposed technique, compared to other routing protocols, can achieve scalability by maintaining the routing load even if the speed of nodes, the number of sources, the number of group members, and the size of the network increase. Full article
Show Figures

Figure 1

18 pages, 1697 KiB  
Article
Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology
by Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan and Jaime Lloret
Viewed by 292
Abstract
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A [...] Read more.
Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. The core component of blockchain networks is the consensus algorithm because its efficiency, security, and scalability depend on it. A consensus problem is a difficult and significant task that must be considered carefully in a blockchain network. It has several practical applications such as distributed computing, load balancing, and blockchain transaction validation. Even though a lot of consensus algorithms have been proposed, the majority of them require many computational and communication resources. Similarly, they also suffer from high latency and low throughput. In this work, we proposed a new consensus algorithm for consortium blockchain for a leader selection using the reputation value of nodes and the voting process to ensure high performance. A security analysis is conducted to demonstrate the security of the proposed algorithm. The outcomes show that the proposed algorithm provides a strong defense against the network nodes’ abnormal behavior. The performance analysis is performed by using Hyperledger Fabric v2.1 and the results show that it performs better in terms of throughput, latency, CPU utilization, and communications costs than its rivals Trust-Varying Algo, FP-BFT, and Scalable and Trust-based algorithms. Full article
Show Figures

Figure 1

18 pages, 4015 KiB  
Article
Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm
by Tingzhe Pan, Jue Hou, Xin Jin, Chao Li, Xinlei Cai and Xiaodong Zhou
Algorithms 2025, 18(1), 32; https://doi.org/10.3390/a18010032 - 8 Jan 2025
Viewed by 216
Abstract
Load forecasting plays a fundamental role in the new type of power system. To address the data heterogeneity and security issues encountered in load forecasting for smart grids, this paper proposes a load-forecasting framework suitable for residential energy users, which allows users to [...] Read more.
Load forecasting plays a fundamental role in the new type of power system. To address the data heterogeneity and security issues encountered in load forecasting for smart grids, this paper proposes a load-forecasting framework suitable for residential energy users, which allows users to train personalized forecasting models without sharing load data. First, the similarity of user load patterns is calculated under privacy protection. Second, a complex network is constructed, and a federated user clustering method is developed based on the Louvain algorithm, which divides users into multiple clusters based on load pattern similarity. Finally, a personalized and adaptive differentially private federated learning Long Short-Term Memory (LSTM) model for load forecasting is developed. A case study analysis shows that the proposed method can effectively protect user privacy and improve model prediction accuracy when dealing with heterogeneous data. The framework can train load-forecasting models with a fast convergence rate and better prediction performance than current mainstream federated learning algorithms. Full article
(This article belongs to the Special Issue Intelligent Algorithms for High-Penetration New Energy)
Show Figures

Figure 1

24 pages, 886 KiB  
Article
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
by Conghuan Ye, Shenglong Tan, Jun Wang, Li Shi, Qiankun Zuo and Bing Xiong
Mathematics 2025, 13(2), 182; https://doi.org/10.3390/math13020182 - 8 Jan 2025
Viewed by 390
Abstract
The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. The unauthorized sharing of decrypted medical images remains uncontrollable, though image encryption can discourage privacy disclosure. This research proposes a double-level security scheme for medical images to overcome this [...] Read more.
The widespread distribution of medical images in smart healthcare systems will cause privacy concerns. The unauthorized sharing of decrypted medical images remains uncontrollable, though image encryption can discourage privacy disclosure. This research proposes a double-level security scheme for medical images to overcome this problem. The proposed joint encryption and watermarking scheme is based on singular-value decomposition (SVD) and chaotic maps. First, three different random sequences are used to encrypt the LL subband in the discrete wavelet transform (DWT) domain; then, HL and LH sub-bands are embedded with watermark information; in the end, we obtain the watermarked and encrypted image with the inverse DWT (IDWT) transform. In this study, SVD is used for watermarking and encryption in the DWT domain. The main originality is that decryption and watermark extraction can be performed separately. Experimental results demonstrate the superiority of the proposed method in key spaces (10225), PSNR (76.2543), and UACI (0.3329). In this implementation, the following key achievements are attained. First, our scheme can meet requests of different security levels. Second, encryption and watermarking can be performed separately. Third, the watermark can be detected in the encrypted domain. Thus, experiment results and security analysis demonstrate the effectiveness of the proposed scheme. Full article
(This article belongs to the Special Issue Mathematical Models in Information Security and Cryptography)
Show Figures

Figure 1

23 pages, 590 KiB  
Article
An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry
by Shah Khalid Khan, Nirajan Shiwakoti, Juntong Wang, Haotian Xu, Chenghao Xiang, Xiao Zhou and Hongwei Jiang
Viewed by 256
Abstract
In the rapidly evolving landscape of digital connectivity, airlines have integrated these advancements as indispensable tools for a seamless consumer experience. However, digitisation has increased the scope of risk in the cyber realm. Limited studies have systematically investigated cybersecurity risks in the airline [...] Read more.
In the rapidly evolving landscape of digital connectivity, airlines have integrated these advancements as indispensable tools for a seamless consumer experience. However, digitisation has increased the scope of risk in the cyber realm. Limited studies have systematically investigated cybersecurity risks in the airline industry. In this context, we propose a novel questionnaire model to investigate consumers’ perceptions regarding the cybersecurity of airlines. Data were collected from 470 Chinese participants in Nanjing City. The analytical approach encompassed a range of statistical techniques, including descriptive statistics, exploratory factor analysis, difference analysis, and correlation. The constructs based on Maddux’s Protective Motivation Theory and Becker’s Health Belief Model were reliable, indicating the suitability of the proposed scales for further research. The results indicate that gender significantly influences passengers’ perceptions of airline cybersecurity, leading to variations in their awareness and response to cybersecurity threats. Additionally, occupation affects passengers’ information protection behaviour and security awareness. On the other hand, factors such as age, education level, and Frequent Flyer Program participation have minimal impact on passengers’ cybersecurity perceptions. Based on questionnaire content and data analysis, we propose three recommendations for airlines to enhance consumer cybersecurity perception. First, airlines should provide personalised network security services tailored to different occupations and genders. Second, they should engage in regular activities to disseminate knowledge and notices related to network security, thereby increasing passengers’ attention to cybersecurity. Third, increased resources should be allocated to cybersecurity to establish a safer cyber environment. This study aims to improve the quality of transportation policy and bridge the gap between theory and practice in addressing cybersecurity risks in the aviation sector. Full article
Show Figures

Figure 1

24 pages, 3385 KiB  
Article
An Improved Binary Simulated Annealing Algorithm and TPE-FL-LightGBM for Fast Network Intrusion Detection
by Yafei Luo, Ruihan Chen, Chuantao Li, Derong Yang, Kun Tang and Jing Su
Viewed by 182
Abstract
With the rapid proliferation of the Internet, network security issues that threaten users have become increasingly severe, despite the widespread benefits of Internet access. Most existing intrusion detection systems (IDS) suffer from suboptimal performance due to data imbalance and feature redundancy, while also [...] Read more.
With the rapid proliferation of the Internet, network security issues that threaten users have become increasingly severe, despite the widespread benefits of Internet access. Most existing intrusion detection systems (IDS) suffer from suboptimal performance due to data imbalance and feature redundancy, while also facing high computational complexity in areas such as feature selection and optimization. To address these challenges, this study proposes a novel network intrusion detection method based on an improved binary simulated annealing algorithm (IBSA) and TPE-FL-LightGBM. First, by integrating Focal Loss into the loss function of the LightGBM classifier, we introduce cost-sensitive learning, which effectively mitigates the impact of class imbalance on model performance and enhances the model’s ability to learn difficult-to-classify samples. Next, significant improvements are made to the simulated annealing algorithm, including adaptive adjustments of the initial temperature and Metropolis criterion, the incorporation of multi-neighborhood search strategies, and the integration of an S-shaped transfer function. These improvements enable the IBSA method to achieve efficient optimal feature selection with fewer iterations. Finally, the Tree-structured Parzen Estimator (TPE) algorithm is employed to optimize the structure of the FL-LightGBM classifier, further enhancing its performance. Through comprehensive visual analysis, ablation studies, and comparative experiments on the NSL-KDD and UNSW-NB15 datasets, the reliability of the proposed network intrusion detection method is validated. Full article
(This article belongs to the Special Issue Artificial Intelligence in Cyberspace Security)
Show Figures

Figure 1

21 pages, 1040 KiB  
Article
AIDS-Based Cyber Threat Detection Framework for Secure Cloud-Native Microservices
by Heeji Park, Abir EL Azzaoui and Jong Hyuk Park
Viewed by 248
Abstract
Cloud-native architectures continue to redefine application development and deployment by offering enhanced scalability, performance, and resource efficiency. However, they present significant security challenges, particularly in securing inter-container communication and mitigating Distributed Denial of Service (DDoS) attacks in containerized microservices. This study proposes an [...] Read more.
Cloud-native architectures continue to redefine application development and deployment by offering enhanced scalability, performance, and resource efficiency. However, they present significant security challenges, particularly in securing inter-container communication and mitigating Distributed Denial of Service (DDoS) attacks in containerized microservices. This study proposes an Artificial Intelligence Intrusion Detection System (AIDS)-based cyber threat detection solution to address these critical security challenges inherent in cloud-native environments. By leveraging a Resilient Backpropagation Neural Network (RBN), the proposed solution enhances system security and resilience by effectively detecting and mitigating DDoS attacks in real time in both the network and application layers. The solution incorporates an Inter-Container Communication Bridge (ICCB) to ensure secure communication between containers. It also employs advanced technologies such as eXpress Data Path (XDP) and the Extended Berkeley Packet Filter (eBPF) for high-performance and low-latency security enforcement, thereby overcoming the limitations of existing research. This approach provides robust protection against evolving security threats while maintaining the dynamic scalability and efficiency of cloud-native architectures. Furthermore, the system enhances operational continuity through proactive monitoring and dynamic adaptability, ensuring effective protection against evolving threats while preserving the inherent scalability and efficiency of cloud-native environments. Full article
Show Figures

Figure 1

14 pages, 382 KiB  
Article
Smart Wireless Sensor Networks with Virtual Sensors for Forest Fire Evolution Prediction Using Machine Learning
by Ahshanul Haque and Hamdy Soliman
Viewed by 289
Abstract
Forest fires are among the most devastating natural disasters, causing significant environmental and economic damage. Effective early prediction mechanisms are critical for minimizing these impacts. In our previous work, we developed a smart and secure wireless sensor network (WSN) utilizing physical sensors to [...] Read more.
Forest fires are among the most devastating natural disasters, causing significant environmental and economic damage. Effective early prediction mechanisms are critical for minimizing these impacts. In our previous work, we developed a smart and secure wireless sensor network (WSN) utilizing physical sensors to emulate forest fire dynamics and predict fire scenarios using machine learning. Building on this foundation, this study explores the integration of virtual sensors to enhance the prediction capabilities of the WSN. Virtual sensors were generated using polynomial regression models and incorporated into a supervector framework, effectively augmenting the data from physical sensors. The enhanced dataset was used to train a multi-layer perceptron neural network (MLP NN) to classify multiple fire scenarios, covering both early warning and advanced fire states. Our experimental results demonstrate that the addition of virtual sensors significantly improves the accuracy of fire scenario predictions, especially in complex situations like “Fire with Thundering” and “Fire with Thundering and Lightning”. The extended model’s ability to predict early warning scenarios such as lightning and smoke is particularly promising for proactive fire management strategies. This paper highlights the potential of combining physical and virtual sensors in WSNs to achieve superior prediction accuracy and scalability of the field without any extra cost. Such findings pave the way for deploying scalable (cost-effective), intelligent monitoring systems capable of addressing the growing challenges of forest fire prevention and management. We obtained significant results in specific scenarios based on the number of virtual sensors added, while in some scenarios, the results were less promising compared to using only physical sensors. However, the integration of virtual sensors enables coverage of much larger areas, making it a highly promising approach despite these variations. Future work includes further optimization of the virtual sensor generation process and expanding the system’s capability to handle large-scale forest environments. Moreover, utilizing virtual sensors will alleviate many challenges associated with the huge number of deployed physical sensors. Full article
Show Figures

Figure 1

22 pages, 18757 KiB  
Article
CSGD-YOLO: A Corn Seed Germination Status Detection Model Based on YOLOv8n
by Wenbin Sun, Meihan Xu, Kang Xu, Dongquan Chen, Jianhua Wang, Ranbing Yang, Quanquan Chen and Songmei Yang
Viewed by 180
Abstract
Seed quality testing is crucial for ensuring food security and stability. To accurately detect the germination status of corn seeds during the paper medium germination test, this study proposes a corn seed germination status detection model based on YOLO v8n (CSGD-YOLO). Initially, to [...] Read more.
Seed quality testing is crucial for ensuring food security and stability. To accurately detect the germination status of corn seeds during the paper medium germination test, this study proposes a corn seed germination status detection model based on YOLO v8n (CSGD-YOLO). Initially, to alleviate the complexity encountered in conventional models, a lightweight spatial pyramid pooling fast (L-SPPF) structure is engineered to enhance the representation of features. Simultaneously, a detection module dubbed Ghost_Detection, leveraging the GhostConv architecture, is devised to boost detection efficiency while simultaneously reducing parameter counts and computational overhead. Additionally, during the downsampling process of the backbone network, a downsampling module based on receptive field attention convolution (RFAConv) is designed to boost the model’s focus on areas of interest. This study further proposes a new module named C2f-UIB-iAFF based on the faster implementation of cross-stage partial bottleneck with two convolutions (C2f), universal inverted bottleneck (UIB), and iterative attention feature fusion (iAFF) to replace the original C2f in YOLOv8, streamlining model complexity and augmenting the feature fusion prowess of the residual structure. Experiments conducted on the collected corn seed germination dataset show that CSGD-YOLO requires only 1.91 M parameters and 5.21 G floating-point operations (FLOPs). The detection precision(P), recall(R), mAP0.5, and mAP0.50:0.95 achieved are 89.44%, 88.82%, 92.99%, and 80.38%. Compared with the YOLO v8n, CSGD-YOLO improves performance in terms of accuracy, model size, parameter number, and floating-point operation counts by 1.39, 1.43, 1.77, and 2.95 percentage points, respectively. Therefore, CSGD-YOLO outperforms existing mainstream target detection models in detection performance and model complexity, making it suitable for detecting corn seed germination status and providing a reference for rapid germination rate detection. Full article
(This article belongs to the Section Precision and Digital Agriculture)
Show Figures

Figure 1

36 pages, 543 KiB  
Review
Defense and Security Mechanisms in the Internet of Things: A Review
by Sabina Szymoniak, Jacek Piątkowski and Mirosław Kurkowski
Appl. Sci. 2025, 15(2), 499; https://doi.org/10.3390/app15020499 - 7 Jan 2025
Viewed by 277
Abstract
The Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network attacks and communication protocol weaknesses. [...] Read more.
The Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network attacks and communication protocol weaknesses. While several surveys have addressed these aspects, there remains a lack of understanding of integrating all potential defense mechanisms, such as intrusion detection systems (IDSs), anomaly detection frameworks, and authentication protocols, into a comprehensive security framework. To overcome this, the following survey aims to critically review existing security mechanisms in IoT environments and significantly fill these gaps. In particular, this paper reviews state-of-the-art approaches for intrusion detection, key agreement protocols, and anomaly detection systems, pointing out their advantages and disadvantages and identifying the gaps in each field requiring more research. We identify innovative strategies by systematically analysing existing approaches and propose a roadmap for enhancing IoT security. This work contributes to the field by offering a fresh perspective on defense mechanisms and delivering actionable insights for researchers and practitioners securing IoT ecosystems. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

Back to TopTop