The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Million...
详细信息
Software security for critical infrastructure, such as electrical grid and SCADA systems is becoming an increasing important issue. Fuzzing techniques are widely used to detect software security vulnerability, from va...
详细信息
ISBN:
(纸本)9781509040766
Software security for critical infrastructure, such as electrical grid and SCADA systems is becoming an increasing important issue. Fuzzing techniques are widely used to detect software security vulnerability, from various approaches (mutation-based or grammar-based, blackbox or whitebox) depending on the information used to generate test input. Although existing studies have advantages, they also have limitations for software with structured inputs, such as SCADA protocol implementations. This paper presents a novel fuzzing method leveraging software input grammar for test and dynamic information extracted from target program execution. The proposed fuzzing method was evaluated for two applications using a Modbus protocol, which is widely used in SCADA systems, and showed improved code coverage, compared to current well-known fuzzing tools.
Due to the serious air pollution, the renewable energy sources had attracted more and more attention. In order to manage the renewable energy sources, the concept of microgrid is introduced. The IoT system can also be...
详细信息
Cadmium zinc telluride (CdZnTe) radiation detectors have found applications in medical imaging and in the detection of radiological and nuclear threats. While there has been success in developing CdZnTe detectors with...
详细信息
Cadmium zinc telluride (CdZnTe) radiation detectors have found applications in medical imaging and in the detection of radiological and nuclear threats. While there has been success in developing CdZnTe detectors with less than 1% FWHM energy resolution at the 662 keV gamma energy, charge collection can be improved through optimization of surface treatment techniques. The dominant surface species on CdZnTe are cadmium, tellurium, and tellurium oxide. The tellurium oxide is expected to produce a more chemically stable surface. This paper presents the quantification of the tellurium oxide species on CdZnTe wafers that are freshly etched in a mixture of hydrogen bromide in hydrogen peroxide and ethylene glycol solution. It also presents the effects of the tellurium oxide on surface current and detector performance. X-ray photoelectron spectroscopy (XPS) was used to quantify the tellurium oxide species on the wafer surface. The formation of tellurium oxide on the CdZnTe wafers immediately after etching contributes to an increase in the surface leakage current. The electron mobility-lifetime product was significantly reduced from 5.94 × 10~(-3) cm~2/V to 0.60 × 10~(-3) cm~2/V for a freshly etched wafer. The FWHM for a freshly etched wafer used in this study is 32% for the 59.5-keV gamma-peak of Am-241. The mobility-lifetime product and the energy resolution are expected to improve with time as the wafer surfaces become more stable.
cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently prop...
详细信息
We present a comprehensive study and evaluation of existing single image dehazing algorithms, using a new largescale benchmark consisting of both synthetic and real-world hazy images, called REalistic Single Image DEh...
详细信息
Vulnerability of critical infrastructures have increased with widespread use of information technologies. Although individual hackers whose major aims are self-satisfaction and financial gain are already on the stage,...
详细信息
ISBN:
(纸本)9781467387286
Vulnerability of critical infrastructures have increased with widespread use of information technologies. Although individual hackers whose major aims are self-satisfaction and financial gain are already on the stage, nation sponsored attacks are considered as important threats after Stuxnet attack. An important intention of targeted attacks by nation states may be the degradation of cyber physical systems of their enemies. After these developments, cyber-attacks have become an agenda item of the academics, practitioners and policy makers. In this study, we employed Monte-Carlo reliability analysis technique to quantify the impact of cyber-attacks on industrial control systems used in power generation systems. Economic value of cyber-attacks can help decision makers to decide if a cyber-security investment is feasible or not. The results showed that cyber-attacks may have significant impact on reliability of power generation systems.
IoT(Internet of Things) is global infrastructure that enables any object to communicate. The term IoT is being widely used and that technologies are being applied to various areas. IoT technologies is expected to incr...
详细信息
ISBN:
(纸本)9781509016723
IoT(Internet of Things) is global infrastructure that enables any object to communicate. The term IoT is being widely used and that technologies are being applied to various areas. IoT technologies is expected to increase many services' convenience, expandability, accessibility and interoperability, but existing ICT environment could be exposed new security threats due to increased openness and IoT device's specialty. Actually, IoT devices' vulnerabilities and exploits are reported. If attacks on IoT devices succeed, it can cause much damage over the various areas. Therefore, we categorize IoT devices and examines threats of each category. Finally we deduct security requirements of IoT devices.
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a te...
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a test first seems to be extremely hard, and proceeding with the small steps that the TDD cycle requires often demands explicit guidance. Coding Dojo is a dynamic and collaborative activity where people can practice programming, especially techniques related to agile methods. This paper discusses the two experiments conducted to find out how Coding Dojo methodology improves the code coverage of students programming and how it improves motivation in students to learn TDD.
This paper proposes the enhanced general fuzzy min-max neural network (EGFM) classification model to perform supervised classification of data. The aim is to overcome a number of limitations of the general fuzzy min-m...
详细信息
ISBN:
(纸本)9781538639016
This paper proposes the enhanced general fuzzy min-max neural network (EGFM) classification model to perform supervised classification of data. The aim is to overcome a number of limitations of the general fuzzy min-max neural network (GFMM) and improve its classification performance. New hyperbox expansion, overlap and contraction rules proposed in enhanced fuzzy min-max (EFMM) neural network algorithm are used to improve the GFMM learning algorithm. The proposed EGFM classifier is mainly a merging of GFMM and EFMM classifiers to overcome some unidentified cases of hyperboxes overlap and consequent contraction problems in some regions. Accuracy and efficiency of EGFM classifier are evaluated using different standard datasets taken from UCI machine learning repository and the results are better than those from GFMM classifier.
暂无评论