Results 21 to 30 of about 1,298,703 (336)

Review on Testing of Cyber Physical Systems: Methods and Testbeds

open access: yesIEEE Access, 2018
Cyber physical systems (CPSs) are rapidly developing, with increasing scale, complexity and heterogeneity. However, testing CPSs systematically to ensure that they operate with high reliability remains a big challenge.
Xin Zhou   +3 more
doaj   +1 more source

On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications

open access: yesApplied Sciences, 2020
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for.
Francesc Mateo Tudela   +4 more
doaj   +1 more source

Survey of Model-Based Security Testing Approaches in the Automotive Domain

open access: yesIEEE Access, 2023
Modern connected or autonomous vehicles (AVs) are highly complex cyber-physical systems. As a result of the high number of different technologies and connectivity features involved, testing these systems to identify security vulnerabilities is a big ...
Florian Sommer   +2 more
doaj   +1 more source

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach [PDF]

open access: yes, 2012
The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted ...
Damiani, E., Maña, A., Spanoudakis, G.
core   +1 more source

Intelligent building construction site safety inspection model based on YOLOX [PDF]

open access: yesArchives of Civil Engineering
The construction industry is a high-risk and high accident rate industry, and it is crucial to conduct safety inspections on construction sites. Therefore, the study introduces an improved YOLOX algorithm and performs lightweight processing such as ...
Hairong Huang   +3 more
doaj   +1 more source

Determination and Analysis of 16 Mycotoxins in Medicinal and Edible Traditional Chinese Medicine

open access: yesShipin gongye ke-ji, 2022
Objective: An analytical method was established for the determination of 16 mycotoxins in traditional Chinese medicines (TCM) by isotope labeling-ultra performance liquid chromatography tandem mass spectrometry (UPLC-MS/MS), and 483 medicinal and edible ...
Fenghua LI   +7 more
doaj   +1 more source

Finding a needle in a haystack: toward a psychologically informed method for aviation security screening [PDF]

open access: yes, 2014
Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts.
Dando, C.J.   +3 more
core   +1 more source

Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]

open access: yesJisuanji kexue
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj   +1 more source

Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]

open access: yes, 2020
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E.   +4 more
core  

An Immune Inspired Approach to Anomaly Detection [PDF]

open access: yes, 2007
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core   +4 more sources

Home - About - Disclaimer - Privacy