Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definition...
详细信息
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definitions could hardly reach universal *** than providing a formal definition of the Metaverse,we list four must-have characteristics of the Metaverse:socialization,immersive interaction,real world-building,and *** characteristics not only carve the Metaverse into a novel and fantastic digital world,but also make it suffer from all security/privacy risks,such as personal information leakage,eavesdropping,unauthorized access,phishing,data injection,broken authentication,insecure design,and *** paper first introduces the four characteristics,then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic *** on the four characteristics and the findings of the current progress,the security and privacy issues in the Metaverse are *** then identify and discuss more potential critical security and privacy issues that can be caused by combining the four ***,the paper also raises some other concerns regarding society and humanity.
As modern software systems become more and more complex, bugs (also called faults) are prevalent and inevitable. Automated fault localization focuses on identifying faulty program elements that cause software failures...
详细信息
This study presents a novel translational method for suicide prevention research, employing customizable virtual reality (VR) simulations that mimic real-life situations. We aim to validate the usability of these VR s...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twi...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twin(DT)*** widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical *** create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT *** high volume of user data and the ubiquitous communication systems in DTNs come with their own set of *** most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data ***,currently,there is not enough literature that focuses on privacy and security issues in DTN *** this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their ***,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective *** then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the *** also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the ***,we provide some open research issues and problems in the field of DTN privacy and security.
Classifying Non-Functional Requirements (NFRs) in softwaredevelopment life cycle is critical. Inspired by the theory of transfer learning, researchers apply powerful pre-trained models for NFR classification. However...
详细信息
As modern software systems become more and more complex, bugs (also called faults) are prevalent and inevitable. Automated fault localization focuses on identifying faulty program elements that cause software failures...
As modern software systems become more and more complex, bugs (also called faults) are prevalent and inevitable. Automated fault localization focuses on identifying faulty program elements that cause software failures. Mutation-based fault localization (MBFL) is one popular approach and has been proved to be more effective in real bugs. However, MBFL brings a problem of execution cost since it requires the execution of the whole test suite against a huge number of generated mutants. In this paper, we propose FastMBFL, a novel technique to improve the efficiency of MBFL by considering the importance of the impact information originated from failed test while maintaining the similar accuracy. The experimental results show that in terms of the widely used evaluation metric Mutant-Test Pair (MTP), FastMBFL can reduce the mutation cost by 24%–40% compared with the state-of-the-art technique.
Bosom malignancy is the primary stage of disease detection. Classifiers are thus constantly wanted with higher accuracy. A highly accurate classifier gives fewer opportunities to misinterpret a malignant growth patien...
详细信息
Among major challenges that today's educator faces is how to motivate and engage their students. Problems of different nature regarding students' motivation have been extensively studied by researchers providi...
详细信息
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog...
详细信息
The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With th...
详细信息
暂无评论