K Meng, Z Wu, M Bilal, X Xia, X Xu - Expert Systems, 2025 - Wiley Online Library
In recent years, cloud manufacturing has brought both opportunities and challenges to the manufacturing industry. Cloud manufacturing enables global manufacturing resources to be …
Nowadays, modern service compositions are increasingly adopted in critical scenarios where advanced Quality of Services (QoS) such as low latency, security, and privacy are …
The conventional Public Key Infrastructure (PKI) has long been plagued by security issues stemming from its centralized and non-transparent design. In recent years, blockchain …
CA Ardagna, N Bena - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
The huge progress of ICT is radically changing distributed systems at their roots, modifying their operation and engineering practices and introducing new non-functional (eg, security …
Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new requirements and regulations …
To gain a comprehensive understanding of a patient's health, advanced analytics must be applied to the data collected by electronic health record (EHR) systems. However, managing …
Modern applications are increasingly driven by Machine Learning (ML) models whose non- deterministic behavior is affecting the entire application life cycle from design to operation …
Existing certification schemes implement continuous verification techniques aiming to prove non-functional (eg, security) properties of software systems over time. These schemes …
E Badidi, H Lamaazi… - 2024 20th International …, 2024 - ieeexplore.ieee.org
Modern healthcare organizations face various cy-bersecurity threats due to the digitization of their systems. These threats include data breaches, ransomware attacks, and unauthorized …