In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Vehicle platooning has attracted growing attention for its potential to enhance traffic capacity and road safety. This paper proposes an innovative distributed Stochastic Model Predictive Control (SMPC) for a vehicle ...
详细信息
Vehicle platooning has attracted growing attention for its potential to enhance traffic capacity and road safety. This paper proposes an innovative distributed Stochastic Model Predictive Control (SMPC) for a vehicle platoon system to enhance the robustness and safety of the vehicles in uncertain traffic environments. In particular, considering the similarity between the acceleration or deceleration behaviour of neighbouring vehicles and the spring-scale properties, we use a two-mass spring system for the first time to construct an uncertain dynamic model of a formation system. In the presence of uncertain perturbations with known distributional attributes (expectation, variance), we propose an objective function in the form of expectation along with probabilistic chance constraints. Subsequently, a state feedback control mechanism is devised accordingly. Under the cumulative probability distribution function of stochastic perturbations, we theoretically derive a computationally tractable equivalent of the SMPC model. Finally, simulation experiments are designed to validate the control performance of the SMPC platoon controllers, along with an analysis of the stability performance under varying probabilities. The experimental findings demonstrate that the model can be efficiently solved in real-time with appropriately chosen prediction horizon lengths, ensuring robust and safe longitudinal vehicle formation control. IEEE
In a vehicular ad hoc network(VANET),a massive quantity of data needs to be transmitted on a large scale in shorter time *** the same time,vehicles exhibit high velocity,leading to more vehicle *** of these characteri...
详细信息
In a vehicular ad hoc network(VANET),a massive quantity of data needs to be transmitted on a large scale in shorter time *** the same time,vehicles exhibit high velocity,leading to more vehicle *** of these characteristics result in unreliable data communication in VANET.A vehicle clustering algorithm clusters the vehicles in groups employed in VANET to enhance network scalability and connection *** is considered one of the possible solutions for attaining effectual interaction in *** one such difficulty was reducing the cluster number under increasing transmitting *** article introduces an Evolutionary Hide Objects Game Optimization based Distance Aware Clustering(EHOGO-DAC)Scheme for *** major intention of the EHOGO-DAC technique is to portion the VANET into distinct sets of clusters by grouping *** addition,the DHOGO-EAC technique is mainly based on the HOGO algorithm,which is stimulated by old games,and the searching agent tries to identify hidden objects in a given *** DHOGO-EAC technique derives a fitness function for the clustering process,including the total number of clusters and Euclidean *** experimental assessment of the DHOGO-EAC technique was carried out under distinct *** comparison outcome stated the enhanced outcomes of the DHOGO-EAC technique compared to recent approaches.
Due to the risks associated with vulnerabilities in smart contracts, their security has gained significant attention in recent years. However, there is a lack of open datasets on smart contract vulnerabilities and the...
详细信息
Today's marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will a...
详细信息
The rapid growth of digital art has necessitated the development of secure ownership verification systems due to the inherent ease of duplication and distribution within the digital realm. This paper delves into the i...
详细信息
This paper presents a benchmark dataset of Bangla word analogies for evaluating the quality of existing Bangla word embeddings. Despite being the 7th largest spoken language in the world, Bangla is still a low-resourc...
详细信息
Teachers take attendance by having pupils sign in or check-in classes and transportation. Student absences often result from individual mistakes. This article examines a technology that records data from classroom pho...
详细信息
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho...
详细信息
Testing the reliability and trustworthiness of high-performance computing (HPC) applications has made Deep Learning Accelerators (DLAs) verification critically important. In this paper, we introduce a hardware verific...
详细信息
暂无评论