The moment equations are derived for a system of linear difference equations with Markov switching. One example illustrates the use of such systems for modeling the security of threats in cyberspace.
The moment equations are derived for a system of linear difference equations with Markov switching. One example illustrates the use of such systems for modeling the security of threats in cyberspace.
Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only public ledger called blockchain. The security of Bitcoin heavily relies on the incentivecompatible proof-of-work (PoW) bas...
详细信息
In this paper we study nonconvex and nonsmooth optimization problems with semi-algebraic data, where the variables vector is split into several blocks of variables. The problem consists of one smooth function of the e...
详细信息
The core vision of the smart grid concept is the realization of reliable two-way communications between smart devices (e.g., IEDs, PLCs, PMUs). The benefits of the smart grid also come with tremendous security risks a...
详细信息
Graph database systems are increasingly adapted for storing and processing heterogeneous network-like datasets. However, due to the novelty of such systems, no standard data model or query language has yet emerged. Co...
详细信息
A smart grid is nationwide industrial control system that combine IT and traditional electric system. The main hindrance to smart grid is security. To solve this problem we propose a novel approach for vulnerability a...
详细信息
ISBN:
(纸本)9781467391955
A smart grid is nationwide industrial control system that combine IT and traditional electric system. The main hindrance to smart grid is security. To solve this problem we propose a novel approach for vulnerability analysis of smart grid protocols using fuzzing test. The fuzzing test is widely used for vulnerability analysis, however, these studies do not consider the cross-protocol test and are not suitable to smart grid network. Therefore, we propose a novel test case generation method for fuzzing test. Before creating test cases, we classify the protocol fields into three categories by its characteristics. Based on the classification, we can easily create test case based on the categories without considering each fields. So, it helps to generate cross-field and cross-layer test case. To verify our approach, we examine the common used protocol library using the test case generated by proposed method and successfully find unknown abnormality.
Currently there are only limited data available on the habits and behaviour of pedestrians and cyclists towards private motor vehicles and public transport. The only data on cyclists' behaviour originates from spa...
详细信息
Biological processes, including cell differentiation, organism development, and disease progression, can be interpreted as attractors (fixed points or limit cycles) of an underlying networked dynamical system. In this...
详细信息
There are numerous social networks such as Facebook, LinkedIn, Google Plus and Twitter whose data sources are becoming larger every day holding an abundance of valuable information. Among these data, digital crime evi...
详细信息
The detection of frauds in credit card transactions is a major topic in financial research, of profound economic implications. While this has hitherto been tackled through data analysis techniques, the resemblances be...
详细信息
暂无评论