Scientific open-source software (scientific OSS) has facilitated scientific research due to its transparent and collaborative nature. The sustainability of such software is becoming crucial given its pivotal role in s...
详细信息
The intersection of computer vision and natural language processing has seen remarkable progress, particularly in deep learning techniques. One of the captivating and burgeoning areas of research stemming from this ad...
详细信息
Web scraping, often known as web crawling, is employing software to gather data from websites automatically. It is a procedure that is very crucial in domains like business intelligence in the digital era. This techno...
详细信息
Numerous malwares have been studied and fortifications throughout decades. New research shows that hazardous software is being created quickly. Frequent network and Internet use spreads and improves this software. To ...
详细信息
This research investigates the impact of Denial of Service (DoS) attacks, specifically Internet Control Message Protocol (ICMP) flood attacks, on Autonomous Driving (AD) systems, focusing on their control modules. Two...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
This research investigates the impact of Denial of Service (DoS) attacks, specifically Internet Control Message Protocol (ICMP) flood attacks, on Autonomous Driving (AD) systems, focusing on their control modules. Two experimental setups were created: the first involved an ICMP flood attack on a Raspberry Pi running an AD software stack, and the second examined the effects of single and double ICMP flood attacks on a Global Navigation Satellite System Real-Time Kinematic (GNSS-RTK) device for high-accuracy localization of an autonomous vehicle that is available on the market. The results indicate a moderate impact of DoS attacks on the AD stack, where the increase in median computation time was marginal, suggesting a degree of resilience to these types of attacks. In contrast, the GNSS device demonstrated significant vulnerability: during DoS attacks, the sample rate dropped drastically to approximately 50% and 5% of the nominal rate for single and double attacker configurations, respectively. Additionally, the longest observed time increments were in the range of seconds during the attacks. These results underscore the vulnerability of AD systems to DoS attacks and the critical need for robust cybersecurity measures. This work provides valuable insights into the design requirements of AD software stacks and highlights that external hardware and modules can be significant attack surfaces.
Power electronics-based power systems Nowadays are of the Direct Current type and include more than one converter systems rather than a single-converter-type system. The stability of multi-converter power electronic s...
详细信息
The reliability of software interfaces has become increasingly recognized as a crucial factor impacting the quality, manageability, and efficiency of various software systems. Traditional approaches to software reliab...
详细信息
In this paper, we have developed a door analysis program which is pneumatically mechanised controlled by Lab- View programming to analyze the performance of the door. The impact test evaluates the validity of the stru...
详细信息
The development and availability of high-quality datasets are critical to the success of machine learning and artificial intelligence (AI) systems. Datasets provide the essential foundation for training, validating, a...
详细信息
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo...
详细信息
暂无评论