Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Relay network-based cross-chain data interaction protocol with integrity audit
Computers and Electrical Engineering (CENG), Volume 117, Issue Chttps://doi.org/10.1016/j.compeleceng.2024.109262AbstractCross-chain interaction plays a crucial role in enhancing asset circulation and data sharing across diverse blockchain systems. However, achieving secure and stable cross-chain data transactions remains a significant challenge. Traditional ...
- ArticleJuly 2023
We Want AI to Help Us: An Explorative Study Regarding How AI Could Assist Operators in the Main Control Room of Nuclear Power Plants
AbstractArtificial intelligence is regarded as a very promising tool in nuclear power plants. While recent research has made progress in utilizing AI to improve digital systems’ performances in nuclear power plants, less research focuses on connecting AI ...
- short-paperJanuary 2023
ADEPT: A Testing Platform for Simulated Autonomous Driving
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 150, Pages 1–4https://doi.org/10.1145/3551349.3559528Effective quality assurance methods for autonomous driving systems ADS have attracted growing interests recently. In this paper, we report a new testing platform ADEPT, aiming to provide practically realistic and comprehensive testing facilities for ...
- research-articleOctober 2022
Research on Protocol Optimization of Wireless Ad Hoc Network for Smart Container
ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information EngineeringPages 71–76https://doi.org/10.1145/3558819.3558832Smart container transportation has gradually become the development trend of modern container transportation. A variety of wireless communication technologies have be used in smart containers, and wireless Ad Hoc network technology is widely recognized ...
- research-articleJanuary 2022
A User-Centered Medical Data Sharing Scheme for Privacy-Preserving Machine Learning
With the rapid development and application of artificial intelligence technology, medical data play an increasingly important role in the medical field. However, there are privacy protection and data ownership issues in the process of data sharing, which ...
- research-articleJanuary 2022
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 223–228https://doi.org/10.1145/3491396.3506528As research on blockchain deepens, privacy protection technologies of blockchain continue to develop. However, the use of these privacy protection technologies may cause supervisory problems since tracing and censoring malicious users and their ...
- ArticleJuly 2020
Cognitive-Based Severe Accident Information System Development in a Human Factors Project
Engineering Psychology and Cognitive Ergonomics. Cognition and DesignPages 104–113https://doi.org/10.1007/978-3-030-49183-3_9AbstractThe peaceful use of nuclear energy has been attractive around the world due to its advantages of high energy density, reliability and cleanliness. Although nuclear energy has the bright prospect of eventually becoming the vital approach to reduce ...
- research-articleJanuary 2020
Signal Game Analysis on the Effectiveness of Coal Mine Safety Supervision Based on the Affective Events Theory
The main cause of coal mine safety accidents is the unsafe behavior of miners who are affected by their emotional state. Therefore, the implementation of effective emotional supervision is important for achieving the sustainable development of coal mining ...
- research-articleOctober 2019
TransDroid: Automatic Client-based Service Evolving in Android Apps
Internetware '19: Proceedings of the 11th Asia-Pacific Symposium on InternetwareArticle No.: 3, Pages 1–8https://doi.org/10.1145/3361242.3361255Interoperability is a crucial feature of internetware. One approach to achieve interoperability in existing applications is generating services by analyzing the run-time behavior of the application(client). We call these services a client-based service. ...
- articleMarch 2018
Secure Virtualization Environment Based on Advanced Memory Introspection
Most existing virtual machine introspection VMI technologies analyze the status of a target virtual machine under the assumption that the operating system OS version and kernel structure information are known at the hypervisor level. In this paper, we ...
- research-articleSeptember 2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework
IEEE Transactions on Information Forensics and Security (TIFS), Volume 12, Issue 9Pages 2242–2255https://doi.org/10.1109/TIFS.2017.2704906Online identities (OIDs) refer to accounts that Internet users create on Web platforms. In investigations of OID-involved criminal cases, investigators often encounter multiple OIDs used by the same criminal among a number of suspect OIDs. Recognizing ...
- articleDecember 2016
An adaptive approach for Linux memory analysis based on kernel code reconstruction
EURASIP Journal on Information Security (EJOIS), Volume 2016, Issue 1Article No.: 38, Pages 1–13https://doi.org/10.1186/s13635-016-0038-zMemory forensics plays an important role in security and forensic investigations. Hence, numerous studies have investigated Windows memory forensics, and considerable progress has been made. In contrast, research on Linux memory forensics is relatively ...
- research-articleMay 2015
Measurement and Analysis of Mobile Web Cache Performance
WWW '15: Proceedings of the 24th International Conference on World Wide WebPages 691–701https://doi.org/10.1145/2736277.2741114The Web browser is a killer app on mobile devices such as smartphones. However, the user experience of mobile Web browsing is undesirable because of the slow resource loading. To improve the performance of Web resource loading, caching has been adopted ...
- ArticleNovember 2014
Characterizing cache usage for mobile web applications
Internetware '14: Proceedings of the 6th Asia-Pacific Symposium on InternetwarePages 68–71https://doi.org/10.1145/2677832.2677843Web application is a key app on mobile devices. However, the performance of mobile Web applications is known to be poor. Resource loading is a key factor influencing Web applications performance. Cache is an effective mechanism to accelerate resource ...
- ArticleNovember 2014
A KVM Virtual Machine Memory Forensics Method Based on VMCS
CIS '14: Proceedings of the 2014 Tenth International Conference on Computational Intelligence and SecurityPages 657–661https://doi.org/10.1109/CIS.2014.72As the use of virtual machine environments increases, virtual machines forensics is becoming more and more important and emergent. Current forensics solutions to virtualized environments mainly focus on static data analysis, which cannot provide a ...
- ArticleDecember 2013
A Method on Extracting Registry Information from Windows CE Memory Images
CSA '13: Proceedings of the 2013 International Conference on Computer Sciences and ApplicationsPages 728–732https://doi.org/10.1109/CSA.2013.175The Windows CE registry plays a very important role from physical memory and contains lots of important information that are of potential evidential value in forensic analysis. Memory acquisition and analysis is the most important in Windows CE devices ...
- ArticleDecember 2009
A Model of Computer Live Forensics Based on Physical Memory Analysis
ICISE '09: Proceedings of the 2009 First IEEE International Conference on Information Science and EngineeringPages 4647–4649https://doi.org/10.1109/ICISE.2009.69This paper provides a look at some of the shortcomings of current approaches to live forensics. On this basis, a model of computer live forensics based on physical memory analysis is proposed. The model can be used to effectively address many of the ...
- ArticleAugust 2009
Windows Memory Analysis Based on KPCR
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02Pages 677–680https://doi.org/10.1109/IAS.2009.103his paper briefly introduces the challenges facing collection of volatile data in a target computer. Resons to favor physical memory analysis are also given. After describing the related work of the memory analysis, details of a windows memory analysing ...
- ArticleJanuary 2006
Design and implementation of a service-oriented manufacturing grid system
APWeb'06: Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and ApplicationsPages 643–647https://doi.org/10.1007/11610496_85A Service-oriented Manufacturing Grid (MG) System according to OGSA named MGRID is presented and discussed in detail. In MGRID, various manufacturing resources compose the foundation of applications above it. To virtualize the resources, we present an ...