In recent years, our surface transportation infrastructure is suffering from overuse, extreme traffic congestion, and roadway disrepair. Instead of following the traditional infrastructure …
H Yang, H Yuan, L Zhang - Mobile Networks and Applications, 2023 - Springer
With the rapid development and widespread application of the Internet of things (IoT), how to comprehensively and effectively evaluate the risk of the host in the IoT is of great …
NR Pokhrel, H Rodrigo… - Journal of Information …, 2017 - scholarworks.utrgv.edu
Vulnerability forecasting models help us to predict the number of vulnerabilities that may occur in the future for a given Operating System (OS). There exist few models that focus on …
OV Bisikalo, VV Kovtun… - 2019 9th International …, 2019 - ieeexplore.ieee.org
Objective reasons for the introduction of multi-server architecture for the creation of information systems for critical use (ISCU) have led to complications in ensuring their …
F Alenezi, CP Tsokos - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
Information security is everyone's concern. Computer systems are used to store sensitive data. Any weakness in their reliability and security makes them vulnerable. The Common …
A Raynaud, T Serru, N Nguyen - ACM SIGAda Ada Letters, 2024 - dl.acm.org
To help automatize the security risk assessment process of Cyber-Physical Systems (CPS), we propose a tool based on Discrete Event Systems (DES) to model the architecture and the …