- Information and Cyber Security
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Safety Systems Engineering in Autonomy
- Cancer Immunotherapy and Biomarkers
- Risk and Safety Analysis
- Cybercrime and Law Enforcement Studies
- Cardiac electrophysiology and arrhythmias
- Privacy, Security, and Data Protection
- Cytokine Signaling Pathways and Interactions
- Ion channel regulation and function
- Smart Grid Security and Resilience
- Occupational Health and Safety Research
- Neonatal Respiratory Health Research
- Blockchain Technology Applications and Security
- Plant Pathogens and Fungal Diseases
- Software Engineering Techniques and Practices
- Wireless Body Area Networks
- Online Learning and Analytics
- Learning Styles and Cognitive Differences
- ECG Monitoring and Analysis
- Sleep and Work-Related Fatigue
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Electronic Health Records Systems
Zhejiang University
2023-2025
ZheJiang Academy of Agricultural Sciences
2025
Guizhou University
2003-2024
Second Xiangya Hospital of Central South University
2024
Central South University
2024
Queen Mary University of London
2024
University of Missouri
2023-2024
Chengdu University
2022-2024
Wenzhou Medical University
2024
Shaanxi University of Chinese Medicine
2024
Background COVID-19 has challenged the resilience of health care information system, which affected our ability to achieve global goal and well-being. The pandemic resulted in a number recent cyberattacks on hospitals, pharmaceutical companies, US Department Health Human Services, World Organization its partners, others. Objective aim this review was identify key cybersecurity challenges, solutions adapted by sector, areas improvement needed counteract increases (eg, phishing campaigns...
Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications with so far unresolved security issues. A particular example is vehicle. As vehicles evolve from simple means transportation smart entities new sensing communication capabilities, they become active members city. The Internet Vehicles (IoV) consists that communicate each other public networks through V2V (vehicle-to-vehicle), V2I...
Abstract There continue to be numerous breaches publicised pertaining cybersecurity despite security practices being applied within industry for many years. This paper is intended the first in a number of papers as research into assurance processes. compiled based on current related and impact human element it. The objective this work identify elements that would benefit from further development literature review findings. results outlined present need field look established areas effective...
The adoption of blockchain technology is taking place at a fast pace. Security features inherent in make it resistant to attack, but they do not immune, and security risks exists. This paper details the associated concerns blockchain. We explore relevant standards regulations related survey analyze 38 incidents determine root cause provide view most frequent vulnerabilities exploited. reviews six these greater detail. selection made by choosing with cause. In review incidents, what happened...
The e-learning recommender system in learning institutions is increasingly becoming the preferred mode of delivery, as it enables anytime, anywhere. However, delivering personalised course objects based on student's preferences still a challenge. Current mainstream recommendation algorithms, such Collaborative Filtering (CF) and Content-Based (CBF), deal with only two types entities, namely users items their ratings. these methods do not pay attention to preferences, styles, which are...
As organisations are vulnerable to cyberattacks, their protection becomes a significant issue. Capability Maturity Models can enable benchmark current maturity levels against best practices. Although many models have been already proposed in the literature, need for that integrate several regulations exists. This article presents light, web-based model be used as cybersecurity assessment tool Higher Education Institutes (HEIs) of United Kingdom. The novel Holistic Cybersecurity Assessment...
In theory, implementing an Enterprise Architecture (EA) should enable organizations to increase the accuracy of information security risk assessments. reality, however, struggle fully implement EA frameworks because requirements for and benefits commercial are unclear, overhead maintaining artifacts is unacceptable, especially smaller organizations. this paper, we describe a novel approach called CAESAR8 (Continuous Agile Security Review in 8 domains) that supports dynamic holistic reviews...
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern public. However, previous studies showed that organizations had not effectively learned lessons from incidents. Incident learning as an essential activity in “follow-up” phase incident response lifecycle long been addressed but given enough attention. This paper conducted case study organization China to explore their current obstacles practice learning....
The objective of the research was to establish data relating underlying causes human error which are most common cause information security incidents within a private sector healthcare organization. A survey questionnaire designed proactively apply IS-CHEC reliability analysis (HRA) technique. technique identified likely core that could result in incidents, their likelihood, tasks be affected, suggested remedial and preventative measures, systems or processes would affected by established...
Trichomes, the outward projection of plant epidermal tissue, provide an effective defense against stress and insect pests. Although numerous genes have been identified to be involved in trichome development, molecular mechanism for cell fate determination is not well enunciated. Here, we reported GoSTR functions as a master repressor stem formation, which was isolated by map-based cloning based on large F2 segregating population derived from cross between TM-1 (pubescent stem) J220 (smooth...
Summary The ‘6‐h on/6‐h off’ shift pattern could potentially disrupt the physiological rhythms and cognitive performance of seafarers, attributed to its shorter more frequent shifts. Conversely, light exposure has been demonstrated enhance abilities synchronise processes. Therefore, we studied fatigue, cognition, sleep rhythm seafarers with different shifts determine how can benefit their performance. A total 16 participated in a 2 × crossover study, which involved two types (Morning–Evening...
SUMMARY Recent advances in single‐cell transcriptomics have greatly expanded our knowledge of plant development and cellular responses. However, analyzing fiber cell differentiation plants, particularly cotton, remains a complex challenge. A spatial transcriptomic map ovule from −1 DPA, 0 1 DPA cotton was successfully constructed, which helps to explain the important role sucrose synthesis lipid metabolism during early development. Additionally, RNA sequencing (scRNA‐seq) further highlighted...