The identification of real and fake news has become difficult task in the recent years due to more similar feature between them. As the issues of fake news are leading the miscommunication to the reads, various automa...
详细信息
According to the spread of Multi-Level Inverter (MLI) in the high power and medium voltage applications and their advantages but at the cost of large number of components which also makes the system more complex. Comp...
详细信息
The technology inside modern vehicles is rapidly growing and poses newer security risks, as vehicle communication protocols are not yet fully secured and vulnerable to attacks. Consequently, the implementation of auto...
详细信息
ISBN:
(纸本)9783031492686;9783031492693
The technology inside modern vehicles is rapidly growing and poses newer security risks, as vehicle communication protocols are not yet fully secured and vulnerable to attacks. Consequently, the implementation of automotive cybersecurity systems has gained more attention. Controller Area Network (CAN) is one of the most studied communication protocols in the literature and lacks inherent cybersecurity measures. Several works proposed Intrusion Detection Systems (IDSs) using Machine Learning (ML) and Deep Learning (DL) algorithms to identify attacks on the CAN bus. Exploiting ML or DL techniques in a multi-class approach makes it possible to know the attack typology and to support developers' decisions to integrate concrete design methods in the software automotive development life-cycle. However, most automotive IDSs are tested on data sets that contain raw CAN messages without the possibility of decoding these messages to understand how the attack was generated. Based on these gaps, a Multi-class Random Forest for Automotive Intrusion Detection (MaREA) is presented, and a new Synthetic Automotive Hacking Dataset (SA-Hacking Dataset) is generated with a Database for CAN (DBC) file. First, the model is validated on the Car-Hacking dataset and compared with two other works in the literature that used the same classifier and dataset for the multi-class approach. Then, the Random Forest model is tested by concatenating the Survival Analysis Dataset and the SA-Hacking Dataset. The proposed approach presented better-quality results for both the Car-Hacking dataset and the aforementioned concatenated dataset.
software systems are increasingly being employed in people's lives and society. They can improve, but also negatively affect the quality of life and interfere with human rights by, e.g., undermining the individual...
详细信息
ISBN:
(纸本)9783031356803;9783031356810
software systems are increasingly being employed in people's lives and society. They can improve, but also negatively affect the quality of life and interfere with human rights by, e.g., undermining the individuals' and society's values and causing ethical issues. To prevent such issues, software architects need to take ethical considerations into account at the early stages of design, e.g., when making architecture design decisions. Such considerations regard stakeholders, ethical values and their relations, ethical concerns, and ethical decisions. Addressing ethical considerations is especially difficult for software architects because of (i) the lack of training in ethics and philosophy, (ii) the existence of inherent ambiguity in ethical values, and (iii) the lack of methodological support in dealing with ethical and social implications of software systems, and eliciting and operationalizing ethical values. This study employs a design science methodology for developing a card-based game (called Ethics-Aware DecidArch), helping software architects reflect on ethical considerations, and creating an atmosphere to foster inclusivity by supporting the values of different stakeholders when making group decisions. The game was played in four sessions, each including four professional software architects from two multinational IT companies. This study presents lessons learned from playing the game through a participant survey and qualitative data analysis. The results show that the game helped software architects (i) reflect on different solutions for resolving ethical concerns, (ii) make ethical decisions along with providing reasons behind such decisions, and (iii) reflect on the operationalization of ethical values and their trade-offs.
The feasibility of using blockchain technology as a method to improve cybersecurity through data security transactions and users' anonymity is discussed in this paper. It scans network traffic, sings out abnormiti...
详细信息
The study aimed to identify Cloud service evaluation metrics and evaluate the quality of cloud services in Governmental organizations, Non-Government Organizations, and Companies in Ethiopia. It found that the cloud s...
详细信息
Requirements-based testing (RBT) advocates the design of test cases in order to adequately exercise the behavior of a software system without regard to the internal details of the implementation. To address the challe...
详细信息
ISBN:
(纸本)9798350334586
Requirements-based testing (RBT) advocates the design of test cases in order to adequately exercise the behavior of a software system without regard to the internal details of the implementation. To address the challenge that requirements descriptions may be inaccurate in practice, we align requirements engineering and software testing in a novel way by not counting on a complete and up-to-date requirements documentation. Rather, we maintain the black-box nature of RBT to recommend features as the units of testing from software's graphical user interfaces (GUIs). In particular, we exploit optical character recognition (OCR) to identify the textual information from GUIs, and further build the GUI-feature correspondences based on software's user-centric documentation which may exhibit partial correctness. Such correspondences from multiple software systems in the same domain serve as a foundation for our recommendation engine, which suggests the to-be-tested features related to a given GUI. We demonstrate our recommender's feasibility with a study of five products in the web conferencing domain, and the results show the more complete set of features against which a GUI needs to be tested.
Agriculture is practiced in nearly every country in the world. Agricultural practices have changed over the years and this has also changed the way people live. Due to the growth of the world's population, the tra...
详细信息
The term 'cloudified era' refers to concept of computing at remote servers to perform everyday operations which involves data storage, processing and software applications been hosted on remote servers accesse...
详细信息
Among the several other approaches for gathering software requirements, co-creation is often used. The co-creation approach based on elements of participatory research is aimed at involving the end users during the re...
详细信息
ISBN:
(纸本)9783031616877;9783031616884
Among the several other approaches for gathering software requirements, co-creation is often used. The co-creation approach based on elements of participatory research is aimed at involving the end users during the requirements elicitation process. While this approach has many merits, certain limitations need to be addressed. Two limitations include (i) limitations induced due to the subjective judgment of requirements analysts during the analysis and translation of user statements, goals, and desires (gathered during co-creation) into software requirements, and (ii) limitations induced due to varying abilities of different users to conceptualize the systems being developed during early phases of the system development lifecycle, specifically during the co-creation workshops conducted for requirements gathering. To address these limitations the paper proposes a three-step task model-based approach for validation and refinement of requirements generated through co-creation. To instantiate the approach, the paper also presents an illustrative case study featuring the development of a novel electronic identity (e-ID) scheme.
暂无评论