All Stories

  1. Hybrid knowledge-based decision support system for intrusion response in industrial cyber-physical systems
  2. Opportunities and Risks of Generative AI in Model-Based Engineering of Railway Systems
  3. CPN-Based Modelling to Assess Dependability of Train-to-Train Wireless Communication for Virtual Coupling
  4. Run-Time Monitoring of ERTMS/ETCS Control Flow by Process Mining
  5. EFU: Enforcing Federated Unlearning via Functional Encryption
  6. Self-adaptive fault diagnosis for unseen working conditions based on digital twins and domain generalization
  7. Process Mining for Digital Twin Development of Industrial Cyber-Physical Systems
  8. Spearman and Jaccard‐Based Convolutional Deep Neural Learning for Early Parkinson’s Diagnosis
  9. An Intelligent Diagnostic Framework Based on Digital Twins and Partial Transfer Learning: Methodology and Industrial Application
  10. Experimental Evaluation of Road-Crossing Decisions by Autonomous Wheelchairs Against Environmental Factors
  11. From Roads to Rails: Bridging the Gap in Signal Recognition Through Computer Vision
  12. LogGenST: A Framework for Synthetic Log Generation Using LLMs for Smart-Troubleshooting
  13. Similarity Feature Construction for Semantic Sensor Ontology Integration via Light Genetic Programming
  14. Railway Switch Control Modeling in European Train Control System Level 3
  15. Journey tracker: driver alerting system with a deep learning approach
  16. Balancing privacy and performance in federated learning: A systematic literature review on methods and metrics
  17. A Discrete Congruence Levenberg–Marquardt Deep Convoluted Neural Learning Classifier for the Automatic Detection of Autism Spectrum Disorder
  18. Experimental Evaluation of Road-Crossing Decisions by Autonomous Wheelchairs against Environmental Factors
  19. Prediction of Mobile Phone Prices using Machine Learning
  20. An Analysis of Car Price Prediction using Machine Learning
  21. Rating Prediction of Football Players using Machine Learning
  22. A study on the application of convolutional neural networks for the maintenance of railway tracks
  23. Guest Editorial Navigating the Nexus of Cyber Security and Resilience
  24. Integrating AI and DTs: challenges and opportunities in railway maintenance application and beyond
  25. New modeling approaches to evaluate reliability, safety and security in smart-factories
  26. A Two-Level Fusion Framework for Cyber-Physical Anomaly Detection
  27. Blockchain‐Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
  28. Ridge Regressive Data Preprocessed Quantum Deep Belief Neural Network for Effective Trajectory Planning in Autonomous Vehicles
  29. A Comprehensive Review of Face Recognition Techniques, Trends, and Challenges
  30. A Novel Hybrid Symbolic Fuzzy Interval-Based Clustering Approach for Microarray Image Spot Segmentation
  31. Analysis of Log Files to Enable Smart-Troubleshooting in Industry 4.0: A Systematic Mapping Study
  32. Safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation
  33. Situation Awareness in the Cloud-Edge Continuum
  34. Distance education boosting interdisciplinarity and internationalization: an experience report from “Ethics, Law and Privacy in Data and Analytics” at SUPSI
  35. A hybrid behavior- and Bayesian network-based framework for cyber–physical anomaly detection
  36. Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept
  37. A community detection approach based on network representation learning for repository mining
  38. RETRACTED ARTICLE: Machine learning based 64-QAM classification techniques for enhanced optical communication
  39. Detecting malicious reviews and users affecting social reviewing systems: A survey
  40. Music Recommendation via Hypergraph Embedding
  41. A Review of Intelligent Infrastructure Surveillance to Support Safe Autonomy in Smart-Railways
  42. Fault detection and state estimation in robotic automatic control using machine learning
  43. Hessian Distributed Ant Optimized Perron–Frobenius Eigen Centrality for Social Networks
  44. Intelligent detection of warning bells at level crossings through deep transfer learning for smarter railway maintenance
  45. Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems - A Survey
  46. Probabilistic Modelling for Trustworthy Artificial Intelligence in Drone-Supported Autonomous Wheelchairs
  47. LSTM-based failure prediction for railway rolling stock equipment
  48. Optimized Paillier Homomorphic Encryption in Federated Learning for Speech Emotion Recognition
  49. COVID-19 Sentiment Analysis Based on Tweets
  50. Digital Twin for Sustainability Assessment and Policy Evaluation: A Systematic Literature Review
  51. TaughtNet: Learning Multi-Task Biomedical Named Entity Recognition From Single-Task Teachers
  52. Multi-task learning for few-shot biomedical relation extraction
  53. YOLO-Based Light-Weight Deep Learning Models for Insect Detection System with Field Adaption
  54. Iterative Reflect Perceptual Sammon and Machine Learning-Based Bagging Classification for Efficient Tumor Detection
  55. Decision Fault Tree Learning and Differential Lyapunov Optimal Control for Path Tracking
  56. Secure Modern Wireless Communication Network Based on Blockchain Technology
  57. A deep attention based approach for predictive maintenance applications in IoT scenarios
  58. A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0
  59. An action–reaction influence model relying on OSN user-generated content
  60. System and Method for Driver Drowsiness Detection Using Behavioral and Sensor-Based Physiological Measures
  61. A Systematic Literature Review on Transfer Learning for Predictive Maintenance in Industry 4.0
  62. Collaborative Energy-Efficient Routing Protocol for Sustainable Communication in 5G/6G Wireless Sensor Networks
  63. DeepSkin: A Deep Learning Approach for Skin Cancer Classification
  64. Route Planning for an Autonomous Robotic Vehicle Employing a Weight-Controlled Particle Swarm-Optimized Dijkstra Algorithm
  65. Spatial Kernel Fuzzy Clustering Methods for Microarray Image Spot Segmentation
  66. A Comparative Performance Evaluation of Various Classification Models for Detection and Classification of Flying Insects
  67. Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition
  68. Genuine Forgery Signature Detection using Radon Transform and K-Nearest Neighbour
  69. Evaluating eXplainable artificial intelligence tools for hard disk drive predictive maintenance
  70. An anomalous sound detection methodology for predictive maintenance
  71. An end-to-end framework for information extraction from Italian resumes
  72. Evaluating time series encoding techniques for Predictive Maintenance
  73. Prediction of Phishing Websites Using AI Techniques
  74. Fault diagnosis in industrial rotating equipment based on permutation entropy, signal processing and multi-output neuro-fuzzy classifier
  75. Bridging the gap between complexity and interpretability of a data analytics-based process for benchmarking energy performance of buildings
  76. Community detection over feature-rich information networks: An eHealth case study
  77. Artificial Intelligence in Railway Transport: Taxonomy, Regulations, and Applications
  78. Providing Authentication and Privacy for University Certificates using Smart Contracts in Blockchain Technology
  79. Statistical Channel Model and Systematic Random Linear Network Coding Based QoS Oriented and Energy Efficient UWSN Routing Protocol
  80. Improving Resilience in Cyber-Physical Systems based on Transfer Learning
  81. A literature review of Artificial Intelligence applications in railway systems
  82. A Research Agenda for Smarter Cyber-Physical Systems
  83. Using log analytics and process mining to enable self-healing in the Internet of Things
  84. HyCASTLE: A Hybrid ClAssification System based on Typicality, Labels and Entropy
  85. A comprehensive Benchmark for fake news detection
  86. Analysis of Finger Vein Recognition using Deep Learning Techniques
  87. A novel influence diffusion model under temporal and content constraints on Business Social Network
  88. Classification and Merging Techniques to Reduce Brokerage Using Multi-Objective Optimization
  89. A Survey on Audio-Video Based Defect Detection Through Deep Learning in Railway Maintenance
  90. A Vision of Intelligent Train Control
  91. Automatic Generation of Domain-Aware Control Plane Logic for Software Defined Railway Communication Networks
  92. Prediction of Aptamer Protein Interaction Using Random Forest Algorithm
  93. Securing personal identity using blockchain
  94. Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives
  95. COSINER: COntext SImilarity data augmentation for Named Entity Recognition
  96. Deep Learning for HDD Health Assessment: An Application Based on LSTM
  97. Railway Digital Twins and Artificial Intelligence: Challenges and Design Guidelines
  98. Trustworthiness Assessment of Users in Social Reviewing Systems
  99. Deep Learning-Based Community Detection Approach on Multimedia Social Networks
  100. Compositional modeling of railway Virtual Coupling with Stochastic Activity Networks
  101. A Systematic Review of Artificial Intelligence Public Datasets for Railway Applications
  102. Digital twins as run-time predictive models for the resilience of cyber-physical systems: a conceptual framework
  103. Towards symbiotic autonomous systems
  104. Resilience learning through self adaptation in digital twins of human-cyber-physical systems
  105. Machine Learning for Threat Recognition in Critical Cyber-Physical Systems
  106. A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing
  107. Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature Review
  108. Virtualization Technology for LoRaWAN Roaming Simulation in Smart Cities
  109. Bayesian Networks for Online Cybersecurity Threat Detection
  110. LoRa WAN Roaming for Intelligent Shipment Tracking
  111. Safety integrity through self-adaptation for multi-sensor event detection: Methodology and case-study
  112. Smart-troubleshooting connected devices: Concept, challenges and opportunities
  113. Low-Power Wide-Area Networks in Intelligent Transportation: Review and Opportunities for Smart-Railways
  114. Towards Model-Based Performability Evaluation of Production Systems
  115. ERTMS/ETCS Virtual Coupling: Proof of Concept and Numerical Analysis
  116. A Deep Learning Approach to Fake News Detection
  117. White Paper on Industry Experiences in Critical Information Infrastructure Security: A Special Session at CRITIS 2019
  118. Data-Driven Fault Diagnosis of Once-through Benson Boilers
  119. A Review of Intelligent Cybersecurity with Bayesian Networks
  120. Complex, Resilient and Smart Systems
  121. Towards Railway Virtual Coupling
  122. Strategies for Social Networks Modeling
  123. From traditional manufacturing and automation systems to holonic intelligent systems
  124. On the development of intelligent railway information and safety systems: an overview of current research
  125. Smart Systems for the Protection of Individuals
  126. Ensuring cyber-security in smart railway surveillance with SHIELD
  127. Ensuring cyber-security in smart railway surveillance with SHIELD
  128. A Novel Influence Diffusion Model based on User Generated Content in Online Social Networks
  129. Railway infrastructure monitoring by drones
  130. Technical Committee Reports: The Future of Homeland Security
  131. Preface to the special issue on Formal Methods for Industrial Critical Systems (FMICS'2014)
  132. Towards Automated Drone Surveillance in Railways: State-of-the-Art and Future Directions
  133. Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring
  134. On synergies of cyber and physical security modelling in vulnerability assessment of railway systems
  135. Improving the Dependability of Distributed Surveillance Systems Using Diverse Redundant Detectors
  136. Non-Markovian Performability Evaluation of ERTMS/ETCS Level 3
  137. Using Bayesian Networks to evaluate the trustworthiness of ‘2 out of 3’ decision fusion mechanisms in multi-sensor applications
  138. Formal methods for railway control systems
  139. Towards Model-Driven V&V assessment of railway control systems
  140. A MULTIFORMALISM MODULAR APPROACH TO ERTMS/ETCS FAILURE MODELING
  141. A Petri Net Pattern-Oriented Approach for the Design of Physical Protection Systems
  142. Formal Methods for Industrial Critical Systems
  143. Enabling the usage of UML in the verification of railway systems: The DAM-rail approach
  144. SAFECOMP'11 post-conference special issue
  145. Effective Surveillance for Homeland Security
  146. Challenges and Emerging Paradigms for Augmented Surveillance
  147. White Paper on Industrial Applications of Computer Vision and Pattern Recognition
  148. Theory and Practice of Model Transformations
  149. Automatic Train Protection Systems
  150. Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios
  151. Performance Evaluation of Video Analytics for Surveillance On-Board Trains
  152. Petri Net Modelling of Physical Vulnerability
  153. Empty Vehicle Detection with Video Analytics
  154. Critical Infrastructure Security: Assessment, Prevention, Detection, Response
  155. Critical Infrastructure Security edited by Francesco Flammini
  156. Freight Train monitoring: A Case-Study for the pSHIELD Project
  157. Formal Methods for Intelligent Transportation Systems
  158. Evaluating the Effects of MJPEG Compression on Motion Tracking in Metro Railway Surveillance
  159. Model-Driven V&V Processes for Computer Based Control Systems: A Unifying Perspective
  160. On the use of models for the dependability and security of transit systems and infrastructures: a multi-year industrial experience report
  161. Railway Safety, Reliability, and Security
  162. The Role of Formal Methods in Software Development for Railway Applications
  163. A robust approach for on-line and off-line threat detection based on event tree similarity analysis
  164. Modeling of Railway Logics for Reverse Engineering, Verification and Refactoring
  165. Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection
  166. Model-Driven Availability Evaluation of Railway Control Systems
  167. On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems
  168. Computer Safety, Reliability, and Security
  169. Optimisation of security system design by quantitative risk assessment and genetic algorithms
  170. Reducing Complexity of Data Flow Testing in the Verification of a IEC-62304 Flexible Workflow System
  171. Towards Wireless Sensor Networks for railway infrastructure monitoring
  172. Multiformalism techniques for critical infrastructure modelling
  173. A new modeling approach to the safety evaluation of N-modular redundant computer systems in presence of imperfect maintenance
  174. Dependable integrated surveillance systems for the physical security of metro railways
  175. Model-Based Approaches for Railway Safety, Reliability and Security: The Experience of Ansaldo STS
  176. A Study on Multiformalism Modeling of Critical Infrastructures
  177. Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures
  178. Automatic instantiation of abstract tests on specific configurations for large critical control systems
  179. The software architecture of the OsMoSys Multisolution Framework
  180. UML Based Reverse Engineering for the Verification of Railway Control Logics
  181. Using repairable fault trees for the evaluation of design choices for critical repairable systems
  182. A Grey-Box Approach to the Functional Testing of Complex Automatic Train Protection Systems
  183. A Hybrid Testing Methodology for Railway Control Systems
  184. Wireless Sensor Data Fusion for Critical Infrastructure Security
  185. The Simulation of Anomalies in the Functional Testing of the ERTMS/ETCS Trackside System