A power grid log recorded the operating state of the system. A multi-dimensional characteristic anomaly detection model is proposed in response to the problem of low accuracy in detecting abnormal behavior in power gr...
详细信息
Withthe development of autonomous driving, the data security of the collaboration between vehicles plays a more important role. the research of auto drive systems is still in its infancy, this paper shows that the se...
详细信息
ISBN:
(纸本)9789819600540;9789819600557
Withthe development of autonomous driving, the data security of the collaboration between vehicles plays a more important role. the research of auto drive systems is still in its infancy, this paper shows that the security mechanisms either depend on hardware or introduce high latency. this paper proposes a novel data protection strategy for efficient coordination across vehicle systems. Our design is based on an observation that the security demand in different phases varies. Specifically, for the external system, this paper proposes an information security scheme with a fine-grained attribute selection mechanism, which has the flexibility of encryption attribute selection. For the internal system, this paper proposes a dual-channel RSA encryption scheme that makes the control information transmission more robust and saves encryption delay. Experimental results illustrate that both security and low latency can be ensured withthe proposed SACC.
In practices, test cases are often designed by test engineers based on the functionalities of the System under Test (SUT) in parallel and independently. this can lead to a lack of a comprehensive overview of the test ...
详细信息
ISBN:
(纸本)9783031664557;9783031664564
In practices, test cases are often designed by test engineers based on the functionalities of the System under Test (SUT) in parallel and independently. this can lead to a lack of a comprehensive overview of the test architecture, hampering the reuse of test functions when implementing new test cases. To address this challenge, we propose ATAG, an automated test architecture generation approach, which employs an optimization algorithm to retrieve highly cohesive and loosely coupled test functions based on control flows and data flows of test cases. We also equip ATAG with a newly proposed BERT-based model, i.e., FunBERT, for generating test function names. We conducted an empirical study withthree industrial datasets to evaluate the effectiveness of ATAG and FunBERT. Results show that test architectures generated with ATAG (benefiting from bothcontrol and data flows) improved, on average, approximate to 26-35% coupling and approximate to 28-50% cohesion of the original test architectures manually constructed by test engineers from our industrial partner. FunBERT achieves 97.9%, 98.3%, and 98.1% in Precision, Recall, and F1-score, and significantly outperforms the best baseline method BERT.
the electronic safety and arming device test system is developed to ensure the reliability of weapon systems. In view of the low test efficiency and high requirements for testers in manual testing during the current t...
详细信息
the integration of human-robot interaction (HRI) technologies with industrial automation has become increasingly essential for enhancing productivity and safety in manufacturing environments. In this paper, we propose...
详细信息
Ridesharing systems have become an important part of urban transportation. At the same time, electric vehicle (EV) adoption is also growing at a fast pace as an eco-friendly and sustainable transportation option. To o...
详细信息
the threat of malware is increasing and poses significant computer security risks to both individuals and organizations. Understanding the tactics employed by these malicious software entities and their dynamics durin...
详细信息
ISBN:
(纸本)9783031785993;9783031786006
the threat of malware is increasing and poses significant computer security risks to both individuals and organizations. Understanding the tactics employed by these malicious software entities and their dynamics during the epidemic process is crucial for designing robust defense strategies and ensuring the protection of computersystems. In this article, we investigate a population of digital nodes (such as phones, computers,...) under attack by modeling the network using a susceptible-infected-resistant (SI2R) compartmental model, where hosts can transition between susceptible, infected, or resistant states. Our model considers two types of infected nodes: active nodes, whose resources are exploited, and passive nodes, which spread the virus. Both active and passive nodes can develop resistance with certain probabilities, which are influenced by the resource utilization percentages set by the malware designer. thus, rather than optimizing resource utilization, the malware's goal is to maximize the number of active hosts at the end of the process. To achieve this objective, we aim to determine the optimal percentage of passive nodes to consider at each period, recognizing that the variation in the number of active nodes depends on the number of passive nodes.
Internet congestion control (CC) has long posed a challenging control problem in networking systems, with recent approaches increasingly incorporating deep reinforcement learning (DRL) to enhance adaptability and perf...
详细信息
A state-constrained optimal control problem is examined whose data depends on the time variable t. It is assumed that the dependence on the time-variable is measurable. Under the additional hypothesis that the control...
详细信息
Network Intrusion Detection systems (NIDS) are traditionally built to minimize the total number of misclassifications without considering financial implications. However, false positives and false negatives both impos...
详细信息
暂无评论