Early identification of plant diseases plays an important role in reducing the financial losses for farmers and enhancing the productivity and quality of crops. the present work proposes five machine learning (ML) alg...
详细信息
Blockchain technology is a popular solution for secure transactions in untrusted networks. However, withthe growing number of blockchain applications, how to ensure the security of the blockchain system itself has be...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
Blockchain technology is a popular solution for secure transactions in untrusted networks. However, withthe growing number of blockchain applications, how to ensure the security of the blockchain system itself has become an urgent problem. In this paper, we propose a novel security-testing framework for blockchain systems based on a vulnerability-detection model. Our study involves an analysis and comparison with existing software-vulnerability analysis methods. Our framework first addresses each factor that impacts the security of the blockchain system, with a vulnerability attack graph being constructed using model-checking to describe the complete exploitation process of system vulnerabilities. Reliability theory is used to quantitatively assess the vulnerability attack graph of the blockchain system, thereby providing a theoretical basis for evaluating its security. Finally, we verify the effectiveness and feasibility of the proposed security-testing framework for blockchain systems on an e-voting election blockchain system. the results from our extensive experiments show that our proposed method outperforms other formal-verification-based methods for detecting blockchain vulnerabilities, and also provides a scientific and reliable assessment of blockchain system security.
European Rail Traffic Management System (ERTMS) is a standard for the train control and signalling system whose application is spreading throughout Europe. the ETCS (European Train control System) level 3 is attractin...
详细信息
ISBN:
(纸本)9783031664557;9783031664564
European Rail Traffic Management System (ERTMS) is a standard for the train control and signalling system whose application is spreading throughout Europe. the ETCS (European Train control System) level 3 is attracting experts because it is still in the design phase. Many works provide formal models to the verification of ERTMS/ETCS using formal methods, but they did not investigate the validation problem. To deal withthis challenge we propose an iterative formal modeldriven approach that helps validating step-by-step a real formal specification of ERTMS/ETCS hybrid level 3. Our approach introduces Domain-Specific Languages (DSLs) to help system experts understand existing specifications that are already proven. To this purpose we extend and apply Meeduse, the only existing language workbench today that allows embedding formal semantics within DSLs. the paper presents this application and discusses the lessons learned from the railway and formal method experts' points of view.
In this paper, a controller based on a soft computing technique, specifically fuzzy logic, is presented and applied to a wind turbine. In the case of floating offshore wind turbines (FOWT), environmental disturbances,...
详细信息
the autonomous anti-sway control of the ship-mounted crane systems is a tough issue due to the under-actuated characteristic, strong coupling and base excitation. Furthermore, the ship-mounted crane systems are also s...
详细信息
ISBN:
(纸本)9789819770007;9789819770014
the autonomous anti-sway control of the ship-mounted crane systems is a tough issue due to the under-actuated characteristic, strong coupling and base excitation. Furthermore, the ship-mounted crane systems are also suffering from unknown dynamics and frictions etc. In some conditions, the ship-mounted cranes may exhibit spherical pendulum effects. these factors make the control problem even more challenging. To solve the above problems, this paper designed a Radical Basis Function Neural Network (RBFNN) based feedback control method for a 5-DOF ship-mounted rotary crane. Specially, the adaptive RBFNN is established to approximate the unknown dynamics online. After that, eschewing any simplification of the dynamic model, a feedback anti-sway control is designed to ensure the cargo could reach to desired position and dampening the payload spherical swing simultaneously. the closed-loop stability is analyzed and the effectiveness of the control method is validated via simulation experiment results.
We formulate intrusion tolerance for a system with service replicas as a two-level game: a local game models intrusion recovery and a global game models replication control. For both games, we prove the existence of e...
详细信息
ISBN:
(纸本)9783031748349;9783031748356
We formulate intrusion tolerance for a system with service replicas as a two-level game: a local game models intrusion recovery and a global game models replication control. For both games, we prove the existence of equilibria and show that the best responses have a threshold structure, which enables efficient computation of strategies. State-of-the-art intrusion-tolerant systems can be understood as instantiations of our game with heuristic control strategies. Our analysis shows the conditions under which such heuristics can be significantly improved through game-theoretic reasoning. this reasoning allows us to derive the optimal control strategies and evaluate them against 10 types of network intrusions on a testbed. the testbed results demonstrate that our game-theoretic strategies can significantly improve service availability and reduce the operational cost of state-of-the-art intrusion-tolerant systems. In addition, our game strategies can ensure any chosen level of service availability and time-to-recovery, bridging the gap between theoretical and operational performance.
A power grid log recorded the operating state of the system. A multi-dimensional characteristic anomaly detection model is proposed in response to the problem of low accuracy in detecting abnormal behavior in power gr...
详细信息
Withthe development of autonomous driving, the data security of the collaboration between vehicles plays a more important role. the research of auto drive systems is still in its infancy, this paper shows that the se...
详细信息
ISBN:
(纸本)9789819600540;9789819600557
Withthe development of autonomous driving, the data security of the collaboration between vehicles plays a more important role. the research of auto drive systems is still in its infancy, this paper shows that the security mechanisms either depend on hardware or introduce high latency. this paper proposes a novel data protection strategy for efficient coordination across vehicle systems. Our design is based on an observation that the security demand in different phases varies. Specifically, for the external system, this paper proposes an information security scheme with a fine-grained attribute selection mechanism, which has the flexibility of encryption attribute selection. For the internal system, this paper proposes a dual-channel RSA encryption scheme that makes the control information transmission more robust and saves encryption delay. Experimental results illustrate that both security and low latency can be ensured withthe proposed SACC.
In practices, test cases are often designed by test engineers based on the functionalities of the System under Test (SUT) in parallel and independently. this can lead to a lack of a comprehensive overview of the test ...
详细信息
ISBN:
(纸本)9783031664557;9783031664564
In practices, test cases are often designed by test engineers based on the functionalities of the System under Test (SUT) in parallel and independently. this can lead to a lack of a comprehensive overview of the test architecture, hampering the reuse of test functions when implementing new test cases. To address this challenge, we propose ATAG, an automated test architecture generation approach, which employs an optimization algorithm to retrieve highly cohesive and loosely coupled test functions based on control flows and data flows of test cases. We also equip ATAG with a newly proposed BERT-based model, i.e., FunBERT, for generating test function names. We conducted an empirical study withthree industrial datasets to evaluate the effectiveness of ATAG and FunBERT. Results show that test architectures generated with ATAG (benefiting from bothcontrol and data flows) improved, on average, approximate to 26-35% coupling and approximate to 28-50% cohesion of the original test architectures manually constructed by test engineers from our industrial partner. FunBERT achieves 97.9%, 98.3%, and 98.1% in Precision, Recall, and F1-score, and significantly outperforms the best baseline method BERT.
the electronic safety and arming device test system is developed to ensure the reliability of weapon systems. In view of the low test efficiency and high requirements for testers in manual testing during the current t...
详细信息
暂无评论