Medical robots are a groundbreaking advancement in healthcare, utilizing robotics and automation to improve precision, efficiency, and accessibility in medical procedures. They are utilized in various applications, in...
详细信息
Autonomous driving technology is progressing rapidly, largely due to complex End-To-End systems based on deep neural networks. While these systems are effective, their complexity can make it difficult to understand th...
详细信息
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due...
详细信息
There is a growing interest in sustainable ecosystem development, which includes methods such as scientific modeling, environmental assessment, and development forecasting and planning. However, due to insufficient su...
详细信息
Cloud-native technologies have been widely adopted, enabling organizations to build scalable, observable, resilient, and secure software systems within cloud environments. However, the rapid evolution of these technol...
详细信息
Aiming at the problem of insufficient consideration of skill rarity and worker skill coverage in the task allocation decision of the current software crowdsourcing platform, this paper proposes a task priority-based s...
详细信息
Business processes underpin enterprise execution, coordination, and management. However, differing levels of familiarity with modeling languages among users can create an understanding gap, potentially disrupting the ...
详细信息
ISBN:
(纸本)9789819608041;9789819608058
Business processes underpin enterprise execution, coordination, and management. However, differing levels of familiarity with modeling languages among users can create an understanding gap, potentially disrupting the process flow. Business process documentation bridges this gap. Current methods, such as manual writing and rule-based generation, face inefficiency, errors, and limitations. We innovate by harnessing large language models for documentation generation. Our approach involves defining a Refined Process Structure Tree (RPST) meta-model and mapping rules, then constructing fine-grained RPSTs and crafting sentences using a hierarchical construction method. Finally, global optimization enhances the documentation. Tested on 100 diverse process models, our method outperforms benchmarks in robustness, and it achieves 6% and 1% higher semantic similarity scores by n-gram and semantics metrics.
Networking paradigm known as "software-Defined Networking" (SDN) offers more flexibility with network management and is fast gaining popularity. Separating the control plane from the data plane is largely re...
详细信息
There has been an increasing number of malicious open-source packages in recent years. A recent backdoor attack on the Linux xz utility has highlighted the importance of security checks on open-source packages, especi...
详细信息
ISBN:
(纸本)9783031762727;9783031762734
There has been an increasing number of malicious open-source packages in recent years. A recent backdoor attack on the Linux xz utility has highlighted the importance of security checks on open-source packages, especially popular ones. While major security scanners focus on identifying vulnerabilities (CVEs) in open-source packages, there are very few studies on malware analysis techniques for them. Similar to traditional malware analysis, there are two types of analysis for open-source packages: static and dynamic analysis. Static analysis techniques mainly focus on analyzing the source code of a package while dynamic analysis techniques execute the code in an isolated environment. Dynamic analysis techniques seem more promising than static analysis techniques, as they can expose packages' behaviors at runtime. However, current dynamic analysis tools (e.g., package-analysis) make minimal effort to provide insight into the behaviors of open-source packages. In this paper, we attempt to analyze the dynamic behaviors of open-source packages on popular package repositories, including npm, PyPI, RubyGems, Packagist, and ***. We also analyze the discrepancies in behaviors between benign and malicious packages at runtime, which is helpful in building rules for malware detection. Our study finds that malicious packages perform a significantly higher number of domain communications and command executions. Malicious packages use simple techniques for malicious operations such as base64 or curl.
暂无评论