標(biāo)題: Titlebook: Security and Privacy in Cyber-Physical Systems and Smart Vehicles; First EAI Internatio Yu Chen,Chung-Wei Lin,Qi Zhu Conference proceedings [打印本頁] 作者: Enkephalin 時間: 2025-3-21 19:09
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles影響因子(影響力)
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles影響因子(影響力)學(xué)科排名
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles網(wǎng)絡(luò)公開度
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles被引頻次
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles被引頻次學(xué)科排名
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles年度引用
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles年度引用學(xué)科排名
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles讀者反饋
書目名稱Security and Privacy in Cyber-Physical Systems and Smart Vehicles讀者反饋學(xué)科排名
作者: CURB 時間: 2025-3-21 21:53
Securing the?Future: Exploring Privacy Risks and?Security Questions in?Robotic Systemspresent existing applications and threats of robotics, anticipated future evolution, and the security and privacy issues they may imply. We present a series of open questions for researchers and practitioners to explore further.作者: 改變 時間: 2025-3-22 01:38 作者: Sarcoma 時間: 2025-3-22 04:59 作者: –DOX 時間: 2025-3-22 10:37
: A New Application Fingerprinting Technique via?mmWave Sensing and?Its Use in?Rowhammer Detectionlike TRRespass and Blacksmith. We find that the detection can reach a very high accuracy in practical scenarios. Specifically, the accuracy is 89% when exploiting CPU fan vibrations and nearly 100% when leveraging PSU fan vibrations.作者: intellect 時間: 2025-3-22 16:50
An Efficient and?Smooth Path Planner Based on?Hybrid A* Search and?Frenet Framesrenet Frame trajectory generator. The results also provide an insight that input preprocessing, even if it is a simple one, can affect Frenet Frame trajectory generator significantly, and it is worth future exploration.作者: 一回合 時間: 2025-3-22 21:03
Exploring Vulnerabilities in?Voice Command Skills for?Connected Vehiclesvoice commands. However, this innovation also brings about significant cyber-risks to voice-controlled vehicles. This paper presents a novel attack that showcases the ability of a “malicious” skill, utilizing the skill ranking system on the Alexa platform, to hijack voice commands originally intende作者: ablate 時間: 2025-3-22 21:23
Enabling Real-Time Restoration of?Compromised ECU Firmware in?Connected and?Autonomous Vehicleser systems, a CAV attack is more critical, as it does not only threaten confidential data or system access, but may endanger the lives of drivers and passengers. To control a vehicle, the attacker may inject malicious control messages into the vehicle’s controller area network. To make this attack p作者: 共同確定為確 時間: 2025-3-23 02:25
: A New Application Fingerprinting Technique via?mmWave Sensing and?Its Use in?Rowhammer Detectioniscover that the mechanical vibrations of cooling fans for both the CPU and power supply unit (PSU) in a system strongly correlate with the computational activities of running applications. In this study, we measure such vibrations with the help of mmWave sensing and design a new application fingerp作者: 壟斷 時間: 2025-3-23 06:46
ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on?Inertial Sensorstacks, where an attacker injects a carefully designed acoustic signal to trick the sensor readings. Traditional approaches to detecting and mitigating attacks rely on module redundancy, i.e., adding multiple sensor modules to increase robustness. However, this approach is not always feasible due to 作者: 諄諄教誨 時間: 2025-3-23 09:55 作者: FLUSH 時間: 2025-3-23 14:51
Application of?Large Language Models to?DDoS Attack Detection emergent solution lies in the application of large language models (LLMs), like OpenAI’s ChatGPT, which harness the power of artificial intelligence for enhanced security measures. As the proliferation of connected devices and systems increases, the potential for Distributed Denial of Service (DDoS作者: linear 時間: 2025-3-23 21:12
Embracing Semi-supervised Domain Adaptation for?Federated Knowledge Transferled data from the source domain is statistically different from the partially labeled target data. Most prior SSDA research is centrally performed, requiring access to both source and target data. However, data in many fields nowadays is generated by distributed end devices. Due to privacy concerns,作者: Mast-Cell 時間: 2025-3-23 23:18
A Lightweight Reputation System for?UAV Networks various applications, including delivery, transporting, inspection, and mapping. However, the reliability, security, and privacy of UAV devices are among the public’s top concerns as they operate close to each other and other objects. This paper proposes a .ghtweight .lockchain-based .putation (LIB作者: PLIC 時間: 2025-3-24 05:17 作者: Kindle 時間: 2025-3-24 07:30 作者: miscreant 時間: 2025-3-24 11:05 作者: 整頓 時間: 2025-3-24 16:51 作者: Anguish 時間: 2025-3-24 19:04 作者: nephritis 時間: 2025-3-25 01:19 作者: 音的強(qiáng)弱 時間: 2025-3-25 03:49 作者: 古代 時間: 2025-3-25 08:50 作者: Muffle 時間: 2025-3-25 14:16
Jianyi Zhang,Yuchen Wang,Yazhou Tu,Sara Rampazzi,Zhiqiang Lin,Insup Lee,Xiali Heiface of the positive view. Alternative method, the image of face angle to the direction of knowledge can improve performance based on non-frontal view technology. Human face location detection in the city plays an important role in the continuous application of the surveillance video, such as face r作者: 放肆的你 時間: 2025-3-25 15:52
rades human health. Thus, air pollution monitoring has become an essential requirement for cities worldwide. However, traditional fixed monitoring stations present challenges in terms of cost and installation difficulty. In this context, monitoring solutions based on emerging technologies such as th作者: Indict 時間: 2025-3-25 21:29
Pin-Wen Wang,Yi-Chi Tseng,Chung-Wei Linf the students. This research aims to present a virtual Internet of Things (IoT) sensor network to improve online education through a low-cost virtual IoT laboratory. This modular solution uses virtualization to replace hardware platforms, enabling the configuration of virtual nodes at the software 作者: CANON 時間: 2025-3-26 01:11 作者: irritation 時間: 2025-3-26 06:14 作者: CLASH 時間: 2025-3-26 10:42
Simeon Ogunbunmi,Mohsen Hatmai,Ronghua Xu,Yu Chen,Erik Blasch,Erika Ardiles-Cruz,Alexander Aved,Gensssue of trustworthiness of both the institutions promoting processes and the citizens participating in these processes. Trust is an important factor influencing all human decisions consciously or unconsciously. This also applies to decisions to engage in e-Participation activities. Trust is perceive作者: MILL 時間: 2025-3-26 14:34 作者: Antigen 時間: 2025-3-26 18:20
Diba Afroze,Yazhou Tu,Xiali Heiics are seen as being successful in influencing customer product choices. Businesses are sensitive to shifting customer preferences and environmental conditions, and a factor that may have an impact on consumer purchasing behaviour is whether or not they embrace green logistics in line with their gr作者: 誘拐 時間: 2025-3-27 00:03 作者: Infuriate 時間: 2025-3-27 04:35
d of education. However, it is important to emphasize that the definition of these levels may vary depending on the context and the tools employed. The design of initiatives to enhance these skills is influenced by the depth of the study, the approach taken, and the research methods utilized. This r作者: 不要嚴(yán)酷 時間: 2025-3-27 06:08 作者: Encoding 時間: 2025-3-27 11:36
above using the measures individually. The analysis of normalised interclass distance is shown to give new insight into how feature combination can be beneficial. As such, this provides a rich avenue for further research which will aim to capitalise on these new developments.作者: 絕種 時間: 2025-3-27 14:54 作者: 弄污 時間: 2025-3-27 21:05
Josh Dafoe,Harsh Singh,Niusen Chen,Bo Chenpixel at a particular threshold is the set of all those pixels whose fuzzy connectedness to the given one exceeds or equals the threshold. A potentially time-consuming step in fuzzy segmentation is the calculation of the fuzzy connectedness of all other pixels to the given one. Previously this was d作者: 共同給與 時間: 2025-3-28 00:05
Sisheng Liang,Zhengxiong Li,Chenxu Jiang,Linke Guo,Zhenkai Zhangre, we also studies the system frequency, the coil’s own parameters and the size of the capacitor. Totally, the importance of the distance characteristics is verified by analyzing these parameters, and lay a theoretical basis for future optimization programs.作者: 兩種語言 時間: 2025-3-28 02:18 作者: placebo 時間: 2025-3-28 09:35
ployed in Manta, Ecuador, to validate our proposal. Our purpose is to analyse the behaviour of the solution in two areas of high vehicular traffic. In particular, we monitor and analyze the levels of Carbon monoxide (CO), Sulfur dioxide (SO.), and Nitrogen dioxide (NO.). Experimental results show th作者: landmark 時間: 2025-3-28 12:03
Pin-Wen Wang,Yi-Chi Tseng,Chung-Wei Linbject in the Technology Degree in Network and Telecommunications. A laboratory practice establishes the guidelines for mounting the virtual IoT sensor network. Finally, a satisfaction survey submits the acceptance of the proposal in the academic period (October 2022 - March 2023). Furthermore, the i作者: 濃縮 時間: 2025-3-28 15:56
Michael Guastalla,Yiyi Li,Arvin Hekmati,Bhaskar KrishnamachariIoT platforms? and iii) What is the research approach in studies related to self-adaptive systems in IoT? First, 1136 primary studies were obtained through automatic and manual searches. Then, inclusion and exclusion criteria were applied to select 84 relevant studies on self-adaptation in IoT. Fina作者: gimmick 時間: 2025-3-28 22:49 作者: circuit 時間: 2025-3-29 02:58
Simeon Ogunbunmi,Mohsen Hatmai,Ronghua Xu,Yu Chen,Erik Blasch,Erika Ardiles-Cruz,Alexander Aved,Gens analyzes the factors that directly influence trust in e-Participation initiatives through an empirical research. Based on the model of trust for e-Participation by [.] the influence of “Technology” and “Participatory Processes” on trust and the decision to engage in an e-Participation is investigat作者: monogamy 時間: 2025-3-29 03:58
Yajie Bao,Dan Shen,Genshe Chen,Khanh Pham,Erik BlaschIoT platforms? and iii) What is the research approach in studies related to self-adaptive systems in IoT? First, 1136 primary studies were obtained through automatic and manual searches. Then, inclusion and exclusion criteria were applied to select 84 relevant studies on self-adaptation in IoT. Fina作者: 終止 時間: 2025-3-29 07:42 作者: abysmal 時間: 2025-3-29 14:31 作者: Mobile 時間: 2025-3-29 17:28 作者: 毀壞 時間: 2025-3-29 23:00
Enabling Real-Time Restoration of?Compromised ECU Firmware in?Connected and?Autonomous Vehiclesry mechanism using trusted hardware components equipped in ECUs. Especially, the firmware restoration utilizes the existing FTL in the flash storage device. This process is highly efficient by minimizing the necessary restored information. Further, the recovery is managed via a trusted application r作者: 團(tuán)結(jié) 時間: 2025-3-30 02:19 作者: 航海太平洋 時間: 2025-3-30 06:10
Application of?Large Language Models to?DDoS Attack DetectionICIDS 2017 and the more intricate Urban IoT Dataset. Our findings indicate that LLMs, when applied in a few-shot learning context or through fine-tuning, can not only detect potential DDoS threats with significant accuracy but also elucidate their reasoning. Specifically, fine-tuning achieved an acc作者: 疼死我了 時間: 2025-3-30 09:19