Review on Testing of Cyber Physical Systems: Methods and Testbeds
Cyber physical systems (CPSs) are rapidly developing, with increasing scale, complexity and heterogeneity. However, testing CPSs systematically to ensure that they operate with high reliability remains a big challenge.
Xin Zhou +3 more
doaj +1 more source
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for.
Francesc Mateo Tudela +4 more
doaj +1 more source
Survey of Model-Based Security Testing Approaches in the Automotive Domain
Modern connected or autonomous vehicles (AVs) are highly complex cyber-physical systems. As a result of the high number of different technologies and connectivity features involved, testing these systems to identify security vulnerabilities is a big ...
Florian Sommer +2 more
doaj +1 more source
Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach [PDF]
The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted ...
Damiani, E., Maña, A., Spanoudakis, G.
core +1 more source
Intelligent building construction site safety inspection model based on YOLOX [PDF]
The construction industry is a high-risk and high accident rate industry, and it is crucial to conduct safety inspections on construction sites. Therefore, the study introduces an improved YOLOX algorithm and performs lightweight processing such as ...
Hairong Huang +3 more
doaj +1 more source
Determination and Analysis of 16 Mycotoxins in Medicinal and Edible Traditional Chinese Medicine
Objective: An analytical method was established for the determination of 16 mycotoxins in traditional Chinese medicines (TCM) by isotope labeling-ultra performance liquid chromatography tandem mass spectrometry (UPLC-MS/MS), and 483 medicinal and edible ...
Fenghua LI +7 more
doaj +1 more source
Finding a needle in a haystack: toward a psychologically informed method for aviation security screening [PDF]
Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts.
Dando, C.J. +3 more
core +1 more source
Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj +1 more source
Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E. +4 more
core
An Immune Inspired Approach to Anomaly Detection [PDF]
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core +4 more sources

