Transformers: Intrusion detection data in disguise

J Boorman, B Green, D Prince - … , and ADIoT, Guildford, UK, September 14 …, 2020 - Springer
IoT cyber security deficiencies are an increasing concern for users, operators, and
developers. With no immediate and holistic device-level fixes in sight, alternative …

Use of robotic arms for automation of android-based mobile app testing through a truly black box perspective

AAR Pinheiro, B Miranda - … Estendidos do XXII Simpósio Brasileiro de …, 2023 - sol.sbc.org.br
2. Objectives The general objective of this thesis is to investigate the impact of using robotic
arms for test automation on software testing and to develop a comprehensive framework for …

Método de Referencia para Identificar Vulnerabilidades en Aplicaciones Android en PYMES utilizando Herramientas Automatizadas de Código Abierto

CE Miranda Quezada, F Vasquez Vasquez… - repositorioacademico.upc.edu.pe
Las PYMES, en su rápido avance hacia la digitalización, han adoptado en gran medida las
aplicaciones móviles para mejorar su competitividad y servicio. Sin embargo, esta adopción …

A Markov-Based Intrusion Tolerance Finite Automaton

F Li - Journal of computing and information technology, 2020 - hrcak.srce.hr
Sažetak It is inevitable for networks to be invaded during operation. The intrusion tolerance
technology comes into being to enable invaded networks to provide the necessary network …

SAVE ME EMERGENCY DETECTION IN MOBILE APPLICATION FOR TEENAGERS

NAA Sulaiman - Journal of Engineering & Technological Advances, 2022 - jeta.segi.edu.my
The smartphone comes with many advanced features such as Wi-Fi, Global Positioning
System (GPS) navigation, high-resolution cameras, and a touchscreen with broadband …

[PDF][PDF] Software Framework for the Development of Context-Aware Reconfigurable Systems

I der Naturwissenschaftlich-Technischen, S FKAIER - core.ac.uk
In this project we propose a new software framework for the development of context-aware
and secure controlling software of distributed reconfigurable systems. Context-awareness is …

[PDF][PDF] CONTEXT AWARE SECURE COLLABORATIVE BUSINESS INTELLIGENCE

V Jokhakar - 103.14.122.104
To enable efficient decision making, professionals need to collaborate with individuals with
data being a collected from various sources like distributed clouds for storage, very large …

Novel Attacks and Defenses for Enterprise Internet-of-Things (E-IoT) Systems

LC Puche Rondon - 2021 - digitalcommons.fiu.edu
This doctoral dissertation expands upon the field of Enterprise Internet-of-Things (E-IoT)
systems, one of the most ubiquitous and under-researched fields of smart systems. E-IoT …

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One

D Mohaisen, S Chen - … on Trust, Privacy and Security in …, 2019 - ieeexplore.ieee.org
Machine learning techniques are finding many applications in computer systems, including
many tasks that require decision making: network optimization, quality of service assurance …