Skip to Content

Information, Volume 14, Issue 12

2023 December - 42 articles

Cover Story: This paper presents a residual cybersecurity risk management framework aligned with the framework presented in ISO/SAE 21434. A methodology is proposed to develop an integrated attack tree that considers multiple sub-systems within the CPS. Our previous approach utilises a flow graph to calculate the residual risk to a system before and after applying defences. This paper is an extension of our initial work. It defines the steps for applying the proposed framework and using adaptive cruise control (ACC) and adaptive light control (ALC) to illustrate the applicability of our work. This work is evaluated by comparing it with the requirements of the risk management framework discussed in the literature. Currently, our methodology satisfies more than 75% of their requirements. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (42)

  • Review
  • Open Access
24 Citations
10,511 Views
43 Pages

18 December 2023

The increasing complexity and connectivity of automotive systems have raised concerns about their vulnerability to security breaches. As a result, the integration of formal methods and validation techniques has become crucial in ensuring the security...

  • Review
  • Open Access
30 Citations
16,638 Views
24 Pages

Revolutionizing Vaccine Development for COVID-19: A Review of AI-Based Approaches

  • Aritra Ghosh,
  • Maria M. Larrondo-Petrie and
  • Mirjana Pavlovic

18 December 2023

The evolvement of COVID-19 vaccines is rapidly being revolutionized using artificial intelligence-based technologies. Small compounds, peptides, and epitopes are collected to develop new therapeutics. These substances can also guide artificial intell...

  • Article
  • Open Access
104 Citations
68,027 Views
30 Pages

17 December 2023

Artificial intelligence (AI) has rapidly emerged as a transformative force in multiple sectors, with digital marketing being a prominent beneficiary. As AI technologies continue to advance, their potential to reshape the digital marketing landscape b...

  • Article
  • Open Access
1 Citations
2,769 Views
19 Pages

16 December 2023

Drug side effects (DSEs) or adverse drug reactions (ADRs) are a major concern in the healthcare industry, accounting for a significant number of annual deaths in Europe alone. Identifying and predicting DSEs early in the drug development process is c...

  • Article
  • Open Access
9 Citations
3,380 Views
28 Pages

14 December 2023

Cloud computing and relevant emerging technologies have presented ordinary methods for processing edge-produced data in a centralized manner. Presently, there is a tendency to offload processing tasks as close to the edge as possible to reduce the co...

  • Article
  • Open Access
3 Citations
3,759 Views
20 Pages

14 December 2023

Within organizational settings, communication dynamics are influenced by various factors, such as email content, historical interactions, and interpersonal relationships. We introduce the Email MultiModal Architecture (EMMA) to model these dynamics a...

  • Article
  • Open Access
22 Citations
5,321 Views
28 Pages

Optimal Fusion of Multispectral Optical and SAR Images for Flood Inundation Mapping through Explainable Deep Learning

  • Jacob Sanderson,
  • Hua Mao,
  • Mohammed A. M. Abdullah,
  • Raid Rafi Omar Al-Nima and
  • Wai Lok Woo

14 December 2023

In the face of increasing flood risks intensified by climate change, accurate flood inundation mapping is pivotal for effective disaster management. This study introduces a novel explainable deep learning architecture designed to generate precise flo...

  • Article
  • Open Access
25 Citations
3,959 Views
31 Pages

Sentiment Analysis in the Age of COVID-19: A Bibliometric Perspective

  • Andra Sandu,
  • Liviu-Adrian Cotfas,
  • Camelia Delcea,
  • Liliana Crăciun and
  • Anca Gabriela Molănescu

13 December 2023

The global impact of the COVID-19 pandemic has been profound, placing significant challenges upon healthcare systems and the world economy. The pervasive presence of illness, uncertainty, and fear has markedly diminished overall life satisfaction. Co...

  • Article
  • Open Access
2 Citations
2,699 Views
20 Pages

12 December 2023

Apache Spark is a high-speed computing engine for processing massive data. With its widespread adoption, there is a growing need to analyze its correctness and temporal properties. However, there is scarce research focused on the verification of temp...

  • Article
  • Open Access
10 Citations
3,968 Views
18 Pages

12 December 2023

To identify objects in images, a complex set of skills is needed that includes understanding the context and being able to determine the borders of objects. In computer vision, this task is known as semantic segmentation and it involves categorizing...

  • Article
  • Open Access
3 Citations
2,692 Views
15 Pages

CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

  • Amir Hosein Afandizadeh Zargari,
  • Marzieh AshrafiAmiri,
  • Minjun Seo,
  • Sai Manoj Pudukotai Dinakarrao,
  • Mohammed E. Fouda and
  • Fadi Kurdahi

11 December 2023

Reverse engineering (RE) in Integrated Circuits (IC) is a process in which one will attempt to extract the internals of an IC, extract the circuit structure, and determine the gate-level information of an IC. In general, the RE process can be done fo...

  • Article
  • Open Access
16 Citations
8,642 Views
23 Pages

Advancing Tuberculosis Detection in Chest X-rays: A YOLOv7-Based Approach

  • Rabindra Bista,
  • Anurag Timilsina,
  • Anish Manandhar,
  • Ayush Paudel,
  • Avaya Bajracharya,
  • Sagar Wagle and
  • Joao C. Ferreira

10 December 2023

In this work, we propose a CAD (computer-aided diagnosis) system using advanced deep-learning models and computer vision techniques that can improve diagnostic accuracy and reduce transmission risks using the YOLOv7 (You Only Look Once, version 7) ob...

  • Article
  • Open Access
1 Citations
2,760 Views
15 Pages

9 December 2023

Offline handwritten text recognition (HTR) is a long-standing research project for a wide range of applications, including assisting visually impaired users, humans and robot interactions, and the automatic entry of business documents. However, due t...

  • Article
  • Open Access
1 Citations
2,588 Views
26 Pages

8 December 2023

The European Installation Bus(EIB) protocol, also known as KNX/EIB, is widely used in building and home automation. An extension of the KNX/EIB protocol, EIBsec, is primarily designed to meet the requirements for data transmission security in distrib...

  • Article
  • Open Access
3 Citations
2,475 Views
19 Pages

The Role of Trust in Dependence Networks: A Case Study

  • Rino Falcone and
  • Alessandro Sapienza

7 December 2023

In a world where the interconnection and interaction between human and artificial agents are continuously increasing, the dynamics of social bonds and dependence networks play a fundamental role. The core of our investigation revolves around the intr...

  • Article
  • Open Access
28 Citations
3,946 Views
21 Pages

6 December 2023

The inexorable march of technological advancement, particularly within the digital domain, continues to exert a profound influence on global economies, societies, and governance frameworks. This paper delves into the intricate coordination between di...

  • Article
  • Open Access
2,291 Views
17 Pages

6 December 2023

Trade embargoes, often imposed for political, economic, or security reasons, have long been a tool of international diplomacy. Transshipments may be employed as a strategic mechanism by nations and organizations to circumvent trade embargoes. Transsh...

  • Article
  • Open Access
4 Citations
3,899 Views
13 Pages

Semantic Integration of BPMN Models and FHIR Data to Enable Personalized Decision Support for Malignant Melanoma

  • Catharina Lena Beckmann,
  • Daniel Keuchel,
  • Wa Ode Iin Arliani Soleman,
  • Sylvia Nürnberg and
  • Britta Böckmann

6 December 2023

With digital patient data increasing due to new diagnostic methods and technology, showing the right data in the context of decision support at the point of care becomes an even greater challenge. Standard operating procedures (SOPs) modeled in BPMN...

  • Article
  • Open Access
2,409 Views
12 Pages

5 December 2023

Deep learning is used in various applications due to its advantages over traditional Machine Learning (ML) approaches in tasks encompassing complex pattern learning, automatic feature extraction, scalability, adaptability, and performance in general....

  • Article
  • Open Access
7 Citations
3,966 Views
17 Pages

Decentralized Federated Learning-Enabled Relation Aggregation for Anomaly Detection

  • Siyue Shuai,
  • Zehao Hu,
  • Bin Zhang,
  • Hannan Bin Liaqat and
  • Xiangjie Kong

3 December 2023

Anomaly detection plays a crucial role in data security and risk management across various domains, such as financial insurance security, medical image recognition, and Internet of Things (IoT) device management. Researchers rely on machine learning...

  • Article
  • Open Access
4 Citations
3,372 Views
16 Pages

Severity Grading and Early Detection of Alzheimer’s Disease through Transfer Learning

  • Saeed Alqahtani,
  • Ali Alqahtani,
  • Mohamed A. Zohdy,
  • Abdulaziz A. Alsulami and
  • Subramaniam Ganesan

3 December 2023

Alzheimer’s disease (AD) is an illness affecting the neurological system in people commonly aged 65 years and older. It is one of the leading causes of dementia and, subsequently, the cause of death as it gradually affects and destroys brain ce...

  • Article
  • Open Access
17 Citations
5,890 Views
18 Pages

1 December 2023

This paper proposes the concept of risk-aware actual value as a pivotal metric for evaluating the viability and desirability of AI projects and services in accordance with the AI Act. The framework establishes a direct correlation between the level o...

  • Article
  • Open Access
31 Citations
5,585 Views
16 Pages

Eye-Tracking System with Low-End Hardware: Development and Evaluation

  • Emanuele Iacobelli,
  • Valerio Ponzi,
  • Samuele Russo and
  • Christian Napoli

1 December 2023

Eye-tracking systems have emerged as valuable tools in various research fields, including psychology, medicine, marketing, car safety, and advertising. However, the high costs of the necessary specialized hardware prevent the widespread adoption of t...

  • Article
  • Open Access
1 Citations
2,465 Views
23 Pages

30 November 2023

In recent years, there has been rapid development in computer technology, leading to an increasing number of medical systems utilizing electronic medical records (EMRs) to store their clinical data. Because EMRs are very private, healthcare instituti...

  • Article
  • Open Access
41 Citations
7,690 Views
32 Pages

30 November 2023

Brain tumors (BT) present a considerable global health concern because of their high mortality rates across diverse age groups. A delay in diagnosing BT can lead to death. Therefore, a timely and accurate diagnosis through magnetic resonance imaging...

  • Review
  • Open Access
19 Citations
17,358 Views
19 Pages

Usable Security: A Systematic Literature Review

  • Francesco Di Nocera,
  • Giorgia Tempestini and
  • Matteo Orsini

30 November 2023

Usable security involves designing security measures that accommodate users’ needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems...

  • Review
  • Open Access
30 Citations
9,048 Views
15 Pages

29 November 2023

Emerging digital technologies, such as telemedicine, artificial intelligence, the Internet of Medical Things, blockchain, and visual and augmented reality, have revolutionized the delivery of and access to healthcare services. Such technologies allow...

  • Article
  • Open Access
2 Citations
6,551 Views
27 Pages

Integrated Attack Tree in Residual Risk Management Framework

  • Ahmed Nawaz Khan,
  • Jeremy Bryans,
  • Giedre Sabaliauskaite and
  • Hesamaldin Jadidbonab

29 November 2023

Safety-critical cyber-physical systems (CPSs), such as high-tech cars having cyber capabilities, are highly interconnected. Automotive manufacturers are concerned about cyber attacks on vehicles that can lead to catastrophic consequences. There is a...

  • Article
  • Open Access
37 Citations
17,466 Views
24 Pages

29 November 2023

The advent of Multilingual Language Models (MLLMs) and Large Language Models (LLMs) has spawned innovation in many areas of natural language processing. Despite the exciting potential of this technology, its impact on developing high-quality Machine...

  • Review
  • Open Access
21 Citations
7,862 Views
12 Pages

29 November 2023

Scientometrics is a quantitative and statistical approach that analyzes research on certain themes. It originated from information/library science but has been applied in various disciplines, including information science, library science, natural sc...

  • Article
  • Open Access
7 Citations
2,454 Views
16 Pages

28 November 2023

Enhancers are short DNA segments (50–1500 bp) that effectively activate gene transcription when transcription factors (TFs) are present. There is a correlation between the genetic differences in enhancers and numerous human disorders including...

  • Review
  • Open Access
12 Citations
4,609 Views
31 Pages

Bibliometric Analysis of IoT Lightweight Cryptography

  • Zenith Dewamuni,
  • Bharanidharan Shanmugam,
  • Sami Azam and
  • Suresh Thennadil

28 November 2023

In the rapidly developing world of the Internet of Things (IoT), data security has become increasingly important since massive personal data are collected. IoT devices have resource constraints, which makes traditional cryptographic algorithms ineffe...

  • Article
  • Open Access
10 Citations
4,070 Views
20 Pages

AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems

  • Amira Guesmi,
  • Muhammad Abdullah Hanif and
  • Muhammad Shafique

28 November 2023

Vision-based perception modules are increasingly deployed in many applications, especially autonomous vehicles and intelligent robots. These modules are being used to acquire information about the surroundings and identify obstacles. Hence, accurate...

  • Article
  • Open Access
16 Citations
12,811 Views
16 Pages

27 November 2023

The accurate classification of landfill waste diversion plays a critical role in efficient waste management practices. Traditional approaches, such as visual inspection, weighing and volume measurement, and manual sorting, have been widely used but s...

  • Article
  • Open Access
3 Citations
6,018 Views
22 Pages

25 November 2023

The selection of an appropriate development methodology is a critical strategic decision when managing a New Product Development (NPD) project. However, accurately estimating project duration based on the chosen methodology remains a challenge. This...

  • Article
  • Open Access
8 Citations
4,871 Views
33 Pages

24 November 2023

Personal Information Management Systems (PIMS) are acquiring a prominent role in the data economy by promoting services that help individuals to have more control over the processing of their personal data, in line with the European data protection l...

  • Article
  • Open Access
2,104 Views
18 Pages

24 November 2023

Image segmentation is the process of partitioning an image into multiple segments where the goal is to simplify the representation of the image and make the image more meaningful and easier to analyze. In particular, semantic segmentation is an appro...

  • Review
  • Open Access
8 Citations
9,619 Views
36 Pages

A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions

  • Khushi Gupta,
  • Damilola Oladimeji,
  • Cihan Varol,
  • Amar Rasheed and
  • Narasimha Shahshidhar

24 November 2023

Social media applications have been ubiquitous in modern society, and their usage has grown exponentially over the years. With the widespread adoption of these platforms, social media has evolved into a significant origin of digital evidence in the d...

  • Article
  • Open Access
2 Citations
3,937 Views
12 Pages

23 November 2023

Natural light continuously changes its correlated color temperature (CCT) from sunrise to sunset, providing the best color reproducibility and healthy light. In the lighting field, efforts have been made to improve the Color Rendering Index (CRI) to...

  • Article
  • Open Access
13 Citations
10,624 Views
32 Pages

23 November 2023

This study presents a new dataset for fake news analysis and detection, namely, the PolitiFact-Oslo Corpus. The corpus contains samples of both fake and real news in English, collected from the fact-checking website PolitiFact.com. It grew out of a n...

  • Article
  • Open Access
2,969 Views
21 Pages

Collaboration System for Multidisciplinary Research with Essential Data Analysis Toolkit Built-In

  • Laura I. Garay-Jiménez,
  • Jose Fausto Romero-Lujambio,
  • Amaury Santiago-Horta,
  • Blanca Tovar-Corona,
  • Pilar Gómez-Miranda and
  • Miguel Félix Mata-Rivera

21 November 2023

Environmental research calls for a multidisciplinary approach, where highly specialized research teams collaborate in data analysis. Nevertheless, managing the data lifecycle and research artifacts becomes challenging because the project teams requir...

  • Article
  • Open Access
1 Citations
4,059 Views
18 Pages

Predicting Abnormal Respiratory Patterns in Older Adults Using Supervised Machine Learning on Internet of Medical Things Respiratory Frequency Data

  • Pedro C. Santana-Mancilla,
  • Oscar E. Castrejón-Mejía,
  • Silvia B. Fajardo-Flores and
  • Luis E. Anido-Rifón

21 November 2023

Wearable Internet of Medical Things (IoMT) technology, designed for non-invasive respiratory monitoring, has demonstrated considerable promise in the early detection of severe diseases. This paper introduces the application of supervised machine lear...

XFacebookLinkedIn
Information - ISSN 2078-2489