|
|
|
Fiesta Octaviani,Renaldi Renaldi,Sabrina Oktaria Sihombing
Pág. 238 - 248
Abstract: This study aims to examine the factors that have the potential to influence student?s entrepreneurial intentions using the TPB theory model along with several other factors (i.e., attitude towards entrepreneurship, subjective norms, perceived b...
ver más
|
|
|
|
|
|
|
Daniel O. Aikhuele and Shahryar Sorooshian
Railway infrastructure is generally classified as either fixed or movable infrastructure assets. Failure in any of the assets could lead to the complete shutdown and disruption of the entire system, economic loss, inconvenience to passengers and the trai...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
|
Tobias Zeulner, Gerhard Johann Hagerer, Moritz Müller, Ignacio Vazquez and Peter A. Gloor
Current methods for assessing individual well-being in team collaboration at the workplace often rely on manually collected surveys. This limits continuous real-world data collection and proactive measures to improve team member workplace satisfaction. W...
ver más
|
|
|
|
|
|
|
Alexios Lekidis, Angelos Georgakis, Christos Dalamagkas and Elpiniki I. Papageorgiou
The scheduled maintenance of industrial equipment is usually performed with a low frequency, as it usually leads to unpredicted downtime in business operations. Nevertheless, this confers a risk of failure in individual modules of the equipment, which ma...
ver más
|
|
|
|
|
|
|
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual...
ver más
|
|
|
|
|
|
|
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi...
ver más
|
|
|
|
|
|
|
Yanfeng Li, Hsin Guan, Xin Jia and Chunguang Duan
A scenario vehicle in autonomous driving simulations is a dynamic entity that is expected to perform trustworthy bidirectional interaction tasks with the autonomous vehicle under test. Modeling interactive behavior can not only facilitate better predicti...
ver más
|
|
|
|
|
|
|
Algirdas Dobrovolskis, Egidijus Kazanavicius and Laura Ki?auskiene
The technological maturity of AI solutions has been consistently increasing over the years, expanding its application scope and domains. Smart home systems have evolved to act as proactive assistants for their residents, autonomously detecting behavioral...
ver más
|
|
|
|
|
|
|
Junkai Yi and Xiaoyan Liu
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse...
ver más
|
|
|
|