The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpose, we bind every entity with a unique identity in the blockchain and employ the blockchain as a delegated authenticator by mapping every reporting action to a non-fungible token transfer. Moreover, we present a detailed specification to clearly define the behavior of systems and to apply model checking.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8271983 | PMC |
http://dx.doi.org/10.3390/s21134393 | DOI Listing |
BMC Health Serv Res
March 2024
School of Medicine and Public Health, University of Newcastle, Newcastle, NSW, Australia.
Background: Translating research, achieving impact, and assessing impact are important aspirations for all research collaboratives but can prove challenging. The Hunter Cancer Research Alliance (HCRA) was funded from 2014 to 2021 to enhance capacity and productivity in cancer research in a regional centre in Australia. This study aimed to assess the impact and benefit of the HCRA to help inform future research investments of this type.
View Article and Find Full Text PDFTop Cogn Sci
October 2023
Department of Humanities and Social Sciences, New Jersey Institute of Technology.
Artificial intelligence (AI) is often used to predict human behavior, thus potentially posing limitations to individuals' and collectives' freedom to act. AI's most controversial and contested applications range from targeted advertisements to crime prevention, including the suppression of civil disorder. Scholars and civil society watchdogs are discussing the oppressive dangers of AI being used by centralized institutions, like governments or private corporations.
View Article and Find Full Text PDFBioinform Adv
July 2023
Institute of Informatics, Ludwig-Maximilians-Universität München, Amalienstr. 17, Munich 80333, Germany.
Motivation: To date, no methods are available for the targeted identification of genomic subregions with differences in sequencing read distributions between two conditions. Existing approaches either only determine absolute read number changes, require predefined subdivisions of input windows or average across multiple genes.
Results: Here, we present RegCFinder, which automatically identifies subregions of input windows with differences in read density between two conditions.
Sci Rep
March 2023
Max Planck Institute for Geoanthropology, DogStudies, Kahlaische Strasse 10, 07745, Jena, Germany.
Dogs have an extraordinary relationship with humans. We understand, communicate, and cooperate remarkably with our dogs. But almost all we know about dog-human bonds, dog behaviour, and dog cognition is limited to Western, Educated, Industrialized, Rich, Democratic (WEIRD) societies.
View Article and Find Full Text PDFPathogens
December 2022
Department of Infectious Diseases and Pathobiology, Vetsuisse-Faculty, Institute of Parasitology, University of Bern, CH-3012 Bern, Switzerland.
Background: and are major protozoan parasites of worldwide distribution and significance in veterinary medicine and, for , in public health. Cats and dogs, as final hosts for and respectively, have a key function in environmental contamination with oocysts and, thus, in parasite transmission. Very little is known about the prevalence of infections in dogs and cats in Egypt, and even less about the prevalence of in the same hosts.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!