We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  2. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  3. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  4. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption

    Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate...

    Yao Pan, Zheng Chao, ... Wang Liming in Cybersecurity
    Article Open access 04 July 2024
  5. Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation

    Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...

    Baptiste Gueuziec, Jean-Pierre Gallois, Frédéric Boulanger in Innovations in Systems and Software Engineering
    Article 04 July 2024
  6. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud

    With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud...

    Miao Tian, Yushu Zhang, ... Wenying Wen in Cybersecurity
    Article Open access 03 July 2024
  7. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  8. An empirical study of reflection attacks using NetFlow data

    Reflection attacks are one of the most intimidating threats organizations face. A reflection attack is a special type of distributed...

    Edward Chuah, Neeraj Suri in Cybersecurity
    Article Open access 01 July 2024
  9. Distributed Petri nets ROS

    Verifying industrial robotic systems is a complex task because those systems are distributed and solely defined by their implementation instead of...

    Sebastian Ebert, Johannes Mey, ... Uwe Aßmann in Innovations in Systems and Software Engineering
    Article Open access 25 June 2024
  10. A novel parallel mammogram sharpening framework using modified Laplacian filter for lumps identification on GPU

    In medical diagnosis, mammographic imaging is mainly concerned with the breast parenchymal patterns (counterbalance of glandular tissue and fatty...

    Manas Pal, Tanmoy Biswas, ... Biswajit Biswas in Innovations in Systems and Software Engineering
    Article 19 June 2024
  11. Phishing behavior detection on different blockchains via adversarial domain adaptation

    Despite the growing attention on blockchain, phishing activities have surged, particularly on newly established chains. Acknowledging the challenge...

    Chuyi Yan, Xueying Han, ... Yuling Liu in Cybersecurity
    Article Open access 19 June 2024
  12. Handling class overlap and imbalance using overlap driven under-sampling with balanced random forest in software defect prediction

    Various techniques in machine learning have been used for building software defect prediction (SDP) models to identify the defective software...

    Abdul Waheed Dar, Sheikh Umar Farooq in Innovations in Systems and Software Engineering
    Article 18 June 2024
  13. Agile model-driven re-engineering

    In this paper we describe an Agile model-driven engineering (MDE) approach, AMDRE, for the re-engineering of legacy systems. The objective is to...

    Kevin Lano, Howard Haughton, ... Hessa Alfraihi in Innovations in Systems and Software Engineering
    Article Open access 18 June 2024
  14. Transitioning towards SysML v2 as a variability modeling language

    Systems engineers seek ways to reuse system models to accelerate the initial design development process on new complex projects. Despite its promise,...

    Jordan Epp, Thomas Robert, ... Alison Olechowski in Innovations in Systems and Software Engineering
    Article 14 June 2024
  15. Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis

    The Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other...

    Tin Lai, Farnaz Farid, ... Fariza Sabrina in Cybersecurity
    Article Open access 12 June 2024
  16. CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models

    Most of the adversarial attacks against speech recognition systems focus on specific adversarial perturbations, which are generated by adversaries...

    Zheng Sun, **xiao Zhao, ... Lei Ju in Cybersecurity
    Article Open access 05 June 2024
  17. Enhancing fairness of trading environment: discovering overlap** spammer groups with dynamic co-review graph optimization

    Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer groups to post misleading reviews or ratings, aiming to manipulate...

    Chaoqun Wang, Ning Li, ... Zhen Wang in Cybersecurity
    Article Open access 04 June 2024
  18. In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

    During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the...

    Huaxin Wang, Yiwen Gao, ... Yongbin Zhou in Cybersecurity
    Article Open access 03 June 2024
  19. Atomic cross-chain swap based on private key exchange

    Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two...

    Zeshuo Zhu, Rui Zhang, Yang Tao in Cybersecurity
    Article Open access 02 June 2024
  20. HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy

    Using deep learning models to deal with the classification tasks in network traffic offers a new approach to address the imbalanced Internet of...

    Yuantu Luo, Jun Tao, ... Yifan Xu in Cybersecurity
    Article Open access 01 June 2024
Did you find what you were looking for? Share feedback.