Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Shar, Lwin Khin"'
Autor:
Cheng, Yiran, Shar, Lwin Khin, Zhang, Ting, Yang, Shouguo, Dong, Chaopeng, Lo, David, Lv, Shichao, Shi, Zhiqiang, Sun, Limin
Open-source software (OSS) has experienced a surge in popularity, attributed to its collaborative development model and cost-effective nature. However, the adoption of specific software versions in development projects may introduce security risks wh
Externí odkaz:
http://arxiv.org/abs/2408.07321
In the rapidly evolving realm of artificial intelligence, deploying large language models (LLMs) poses increasingly pressing computational and environmental challenges. This paper introduces MELODI - Monitoring Energy Levels and Optimization for Data
Externí odkaz:
http://arxiv.org/abs/2407.16893
Cyber-physical systems (CPS) are at the intersection of digital technology and engineering domains, rendering them high-value targets of sophisticated and well-funded cybersecurity threat actors. Prominent cybersecurity attacks on CPS have brought at
Externí odkaz:
http://arxiv.org/abs/2404.07527
Autor:
Fan, Jiani, Xu, Minrui, Guo, Jiale, Shar, Lwin Khin, Kang, Jiawen, Niyato, Dusit, Lam, Kwok-Yan
Publikováno v:
IEEE Transactions on Vehicular Technology (Volume: 73, Issue: 3, March 2024)
The Internet of Vehicles (IoV) has great potential to transform transportation systems by enhancing road safety, reducing traffic congestion, and improving user experience through onboard infotainment applications. Decentralized data sharing can impr
Externí odkaz:
http://arxiv.org/abs/2403.20218
This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, built-in hardware, and communication techno
Externí odkaz:
http://arxiv.org/abs/2403.20136
Publikováno v:
Proc. ITiCSE'22, pages 463-469. ACM, 2022
Cybersecurity education is considered an important part of undergraduate computing curricula, but many institutions teach it only in dedicated courses or tracks. This optionality risks students graduating with limited exposure to secure coding practi
Externí odkaz:
http://arxiv.org/abs/2204.12416
Publikováno v:
In Computers & Security January 2025 148
Publikováno v:
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems. ACM, 2018
Smartphone apps usually have access to sensitive user data such as contacts, geo-location, and account credentials and they might share such data to external entities through the Internet or with other apps. Confidentiality of user data could be brea
Externí odkaz:
http://arxiv.org/abs/1812.07894
Autor:
Mai, Phu X., Goknil, Arda, Shar, Lwin Khin, Pastore, Fabrizio, Briand, Lionel C., Shaame, Shaban
Publikováno v:
In Information and Software Technology August 2018 100:165-182