The stability of fused filament fabrication (FFF), crucial for achieving high production efficiency, is considerably affected by the manner in which temperature distributes and propagates throughout the printed region...
详细信息
CryptBot, an infostealer malware first identified in 2019, poses a serious threat by stealing sensitive data, including login credentials and cryptocurrency wallet details, and transmitting them to command-and-control...
详细信息
The challenges of cost control in construction and installation projects have perennially been a significant concern for entities in the construction sector. The intricate interplay of various equipment, personnel, an...
详细信息
The proceedings contain 23 papers. The special focus in this conference is on Computer Science and Education in Computer Science. The topics include: Enabling Autonomy Through Voice control: AI-Assisted Mobile Platfor...
ISBN:
(纸本)9783031843112
The proceedings contain 23 papers. The special focus in this conference is on Computer Science and Education in Computer Science. The topics include: Enabling Autonomy Through Voice control: AI-Assisted Mobile Platform;maRz: A Fast, Transparent Fuzzy Machine Learning Technique;segmentation and data Extraction from Carte du Ciel Astrographic Maps;Quadratic Sets and (3mod5)-Arcs in PG(r,5);the Periodic Table: Chemical Properties and Mendeleev Meets Physical Properties and Machine Learning;large Language Models for Identification of Medical data in Unstructured Records;impact of the Iteration Length on the Software Quality;double-Stranded Differential Evolution and Particle Swarm Optimization with LibreOffice Nonlinear Programming Solver;analyzing the Geometric Ratios of Greek Vases;assessment of Segmentation Models on Panoramic Radiographic Dental Images;3D Cycle-Consistent Adversarial Network for Designing Dental Implant Crown;Eliminating Risk Involved in Using ChatGPT for Clinical Decision Support System;innovative Approaches for the Mental Development and Education of Children with Autism Through Mixed Reality;applications of Simulation modeling and Computer Visualizations for Studying Structured Crystals for Implementation in Technical Devices;harnessing Programmable Logic for Quaternion Multiplication;digital Transformation in Primary and Secondary Education in Bulgaria;building a Chatbot to Adopt an Effective Learning Strategy for Graduate Courses in Computer Science;Impact of the Self-training Over Formative Assessment in SQL Part of University database Course;teaching and Learning Python by Comparative Visualization;an Interdisciplinary Approach in Education of Master Students in Intelligent Sustainable Habitats;Cross-Continental Insights: Comparative analysis of Using AI for Information System Stakeholder analysis in Undergraduate Courses in the EU and USA.
The proceedings contain 25 papers. The special focus in this conference is on Software Engineering and Formal Methods. The topics include: User-Guided Verification of Security Protocols via Sound Animation;a...
ISBN:
(纸本)9783031773815
The proceedings contain 25 papers. The special focus in this conference is on Software Engineering and Formal Methods. The topics include: User-Guided Verification of Security Protocols via Sound Animation;a Policy Framework for Regulating External Calls in Smart Contracts;exploiting Assumptions for Effective Monitoring of Real-Time Properties Under Partial Observability;a Formal modeling Language for Smart Contracts;symbolic Execution for Precise Information Flow analysis of Timed Concurrent Systems;Validating Traces of Distributed Programs Against TLA+ Specifications;partially-Observable Security Games for Attack-Defence analysis in Software Systems;secure Smart Contracts with Isabelle/Solidity;Deductive Verification of SYCL in VerCors;minuska: Towards a Formally Verified Programming Language Framework;hierarchical Learning of Generative Automaton Models from Sequential data;composing Run-Time Variability Models;model-Checking the Implementation of Consent;grammarForge: Learning Program Input Grammars for Fuzz Testing;verified Configuration and Deployment of Layered Attestation Managers;right or Wrong – Understanding How Users Write Software Models in Alloy;an Operational Semantics for Yul;execution-Time Opacity control for Timed Automata;unlocking the Power of Environment Assumptions for Unit Proofs;towards Quantum Multiparty Session Types;automated Invariant Generation for Efficient Deductive Reasoning About Embedded Systems;formal analysis of Multi-Factor Authentication Schemes in Digital Identity Cards;leveraging Contracts for Failure Monitoring and Identification in Automated Driving Systems.
With the development of technology, the application of human motion prediction technology is becoming more and more extensive. In the virtual world, human motion prediction plays an increasingly important role in the ...
详细信息
The paper presents a novel speed control topology for 4-phase Switched Reluctance Motors (SRMs) for EVs. The design is based on a MOSFET-switching enhanced four-level converter providing four-modes of operation which ...
详细信息
The primary objective of the research is to explore the cybersecurity risks associated with AI-enabled intelligent transportation systems (Transportation 5.0) within the context of developing future smart cities. In T...
详细信息
ISBN:
(纸本)9798331518882
The primary objective of the research is to explore the cybersecurity risks associated with AI-enabled intelligent transportation systems (Transportation 5.0) within the context of developing future smart cities. In Transpiration 5.0, the critical infrastructure increasingly relies on automated systems, which enhances the threat of ransomware attacks, specifically targeting vital cyber-physical systems (CPS), smart grids, and intelligent transportation systems (ITS). The paper explores transportation ransomware attack data to incorporate advanced visualization and extract relevant data attributes for cyber risk evaluation. The study uses the NIST risk management framework and ISACA risk quantification to develop a cyber risk evaluation method. With the findings of the literature review, the research highlights ransomware as a significant threat to intelligent transportation systems (ITS), given the negative impact of malware on IoT, IIoT, and network-connected devices. While substantial research exists on malware detection techniques, performance, accuracy, and cloud-based strategies, it's crucial for organizations to comprehend the risks of ransomware attacks to implement effective security controls and enable cyber excellence. The research executes exploratory dataanalysis on the given dataset to find out the correlation between different attributes such as severity, data loss, affected systems, and ransom amount for evolving a risk method to evaluate cyber risk. The focus is to simplify the risk evaluation process by fitting the right data attributes into a standard risk management framework and risk formula for broader reusability. The method was applied to different transportation modes to calculate the risk scores respectively and generate insights accordingly. The overall analysis supports that effective risk predictions along with consistent monitoring can help to control ransomware attack incidents and improve cyber resiliency. This paper proposes a data-d
The proceedings contain 59 papers. The special focus in this conference is on Smart Grid Protection and control. The topics include: Intelligent Image Compression Method for Power Equipment Inspection Based on Object ...
ISBN:
(纸本)9789819616701
The proceedings contain 59 papers. The special focus in this conference is on Smart Grid Protection and control. The topics include: Intelligent Image Compression Method for Power Equipment Inspection Based on Object Detection and Area Adaptive Strategy;SCUC/SCED Autonomous and controllable modeling and Comparative analysis of Multiple Solvers;Identification of Sub/supersynchronous Oscillation Parameters Based on MSST and STD;optimal Scheduling Strategy of Ice Storage Air Conditioning Considering Dual Mode Switching;quantitative analysis of Low Voltage Ride-Through Safety of Wind Turbines Based on the Voltage Trajectory of Grid-Connected Point;IEC61850 CMS Protocol Server Public Library Application Design;transient Synchronization Stability analysis of Grid-Following Converter Power Systems Using Local Network Measurements;research on the Starting and Steady-State Operation control of Gravity Energy Storage System Based on Electrically Excitation Synchronous Motor Grid Connection;Virtual Energy Storage Operation Optimization Strategy for Distributed PV Local Consumption of Flexible Loads in Public Buildings;distributed Adaptive Voltage control Strategy for Remote Microgrids with Satellite Internet Considering System Uncertainties;a Model-data Hybrid Driven Method for Transient Stability Assessment of Power Systems;Capacity Configuration of CAES Based on Nonparametric Kernel Density Estimation;a day-ahead Optimal Dispatch Model for Large-Scale Wind Power Integration in Power Systems Considering Cold Wave Weather;research on Decision Making and Key Technologies for Electricity Purchase and Sale Transactions in Electricity Selling Companies Under the New Electricity Reform Framework;Improved Dynamic Short Circuit Ratio for Stability analysis of PMSG-Based Grid-Connected Wind Energy Conversion System;identifying Core Loads Clusters of Industrial Parks Considering Electricity Consumption Similarity.
The proceedings contain 28 papers. The special focus in this conference is on Information Systems Security. The topics include: S-RFUP: Secure Remote Firmware Update Protocol;securing Virtual Reality Apps Inter-proces...
ISBN:
(纸本)9783031800191
The proceedings contain 28 papers. The special focus in this conference is on Information Systems Security. The topics include: S-RFUP: Secure Remote Firmware Update Protocol;securing Virtual Reality Apps Inter-process Communication;Securing the Web: analysis of HTTP Security Headers in Popular Global Websites;Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications;BP-MAP: A Secure and Convenient Mutual Authentication Protocol;effects of Soft-Domain Transfer and Named Entity Information on Deception Detection;Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and analysis Framework (V2X-SAF);from Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric data;Identifying Insecure Network Configurations Through Attack modeling and Explainable AI;QIris: Quantum Implementation of Rainbow Table Attacks;insights from Running 24 Static analysis Tools on Open Source Software Repositories;REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training;semantics-Based Static Vulnerability Detection in Solidity Using Abstract Interpretation;web Privacy Perceptions Amongst Indian Users;Enabling Privacy in IT Service Operations;Privacy-Preserving Photo Sharing: An SSI Use Case;zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol;Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness;a Decoupling Mechanism for Transaction Privacy;Protecting Ownership of Trained DNN Models with Zero-Knowledge Proofs;MALAI: ML-Based Attack on Learning with Error Problem;patch Based Backdoor Attack on Deep Neural Networks;integrating Crypto-Based Payment Systems for data Marketplaces: Enhancing Efficiency, Security, and User Autonomy;IntelliSOAR: Intelligent Alert Enrichment Using Security Orchestration Automation and Response (SOAR);inTrust: An Asset Monitoring, analysis and Vulnerability Assessment System for Zero Trust Network.
暂无评论