Intrusion Detection Systems (IDS) are a proven approach to secure networks. However, in a privately used network, it is difficult for users without cybersecurity expertise to understand …
Trigger-Action Platforms (TAPs) seamlessly connect a wide variety of otherwise unconnected devices and services, ranging from IoT devices to cloud services and social …
Behavior Trees (BTs) are gaining acceptance in robotics to specify action policies at the deliberative level. Their advantages include modularity, ease of use and increasing tool …
In this demonstration paper, we introduce the Multi-purpose Binding and Provisioning Platform (MBP), an open-source IoT platform developed for easy binding, provisioning, and …
The revolutionary advances of Internet of Things (IoT) devices and applications have helped IoT emerge as an increasingly important domain for end-user development (EUD). Past …
SJ Wang, K Pei, J Yang - 2024 IEEE Symposium on Security and …, 2024 - computer.org
Smart contracts are software programs that enable diverse business activities on the blockchain. Recent research has identified new classes of “machine un-auditable” bugs that …
Research on the Internet of Things (IoT) has devoted many efforts to technological aspects. Little social and practical benefits have emerged so far. IoT devices, so-called smart objects …
This paper focuses on developing a security mechanism geared towards appified smart- home platforms. Such platforms often expose programming interfaces for developing …
Compliance testing for RISC-V is very important. Therefore, an official hand-written compliance test-suite is being actively developed. However, besides requiring significant …