|
|
|
Zhiping Gao, Wenwen Kang, Xinghua Chen, Sheng Ding, Wei Xu, Degang He, Wenhu Chen and Da Xu
Advancements of the virtual power plant (VPP) concept have aggregated buildings as their power plants and/or service providers. This paper proposes a peer-to-peer transactive computation?electricity trading framework for multiple-building virtual power p...
ver más
|
|
|
|
|
|
|
Razvan Florea and Mitica Craus
Cybersecurity plays an increasing role in today?s digital space, and its methods must keep pace with the changes. Both public and private sector researchers have put efforts into strengthening the security of networks by proposing new approaches. This pa...
ver más
|
|
|
|
|
|
|
Burhan Ul Islam Khan, Farhat Anwar, Farah Diyana Bt. Abdul Rahman, Rashidah Funke Olanrewaju, Khang Wen Goh, Zuriati Janin and Md Arafatur Rahman
This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model?s central concept is to preclude the participation of mi...
ver más
|
|
|
|
|
|
|
Zhi-Xiang Jia and Jean-Fu Kiang
A war game between two matched fleets of equal size and capability is designed and simulated in this work. Each fleet is composed of a carrier vessel (CV), a guided missile cruiser (CG), and two guided-missile destroyers (DDGs). Each vessel is equipped w...
ver más
|
|
|
|
|
|
|
O. Brian Oyegbile and Mi G. Chorzepa
The Federal Highway Administration (FHWA) requires that states have less than 10% of the total deck area that is structurally deficient. It is a minimum risk benchmark for sustaining the National Highway System bridges. Yet, a decision-making framework i...
ver más
|
|
|
|
|
|
|
Stef Janssen, Diogo Matias and Alexei Sharpanskykh
Airports are attractive targets for terrorists, as they are designed to accommodate and process large amounts of people, resulting in a high concentration of potential victims. A popular method to mitigate the risk of terrorist attacks is through securit...
ver más
|
|
|
|
|
|
|
Iryna Sievidova,Tamila Oliynik,Oleksandra Mandych,Tetyana Kvyatko,Iryna Romaniuk,Larisa Leshchenko,Serhiy Vynohradenko,Serhii Plyhun
Pág. 47 - 56
The paper considers issues on the theoretical substantiation of options for choosing an optimal strategy to integrate an agricultural enterprise into the wholesale market by using methodological tools of the non-cooperative game theory. We have proposed ...
ver más
|
|
|
|
|
|
|
Yang Li, Leyi Shi and Haijie Feng
A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics are c...
ver más
|
|
|
|
|
|
|
Andrea Guazzini, Mirko Duradoni, Alessandro Lazzeri and Giorgio Gronchi
Collective problem-solving and decision-making, along with other forms of collaboration online, are central phenomena within ICT. There had been several attempts to create a system able to go beyond the passive accumulation of data. However, those system...
ver más
|
|
|
|
|
|
|
Ozkan Haykir
Pág. 148 - 153
In this paper, I investigate a recent asset pricing anomaly proposed by Bali et al. (2011) in the Turkish stock markets during the period between January 2011 and December 2017 using univariate and bivariate sorting methodologies. Bali et al. (2011) sugg...
ver más
|
|
|
|