Computer Science, Information Systems

Article Computer Science, Information Systems

Finding (s, d)-hypernetworks in F-hypergraphs is NP-hard

Reynaldo Gil-Pons, Max Ward, Loic Miller

Summary: This study considers the problem of computing an (s, d)-hypernetwork in an acyclic F-hypergraph. Previous research has explored this problem in general directed hypergraphs with cycles and acyclic B-hypergraphs, yielding insights into the complexity in these scenarios. However, this study finds that the problem is NP-hard in acyclic F-hypergraphs, which presents a striking complexity contrast with acyclic B-hypergraphs.

INFORMATION PROCESSING LETTERS (2024)

Article Computer Science, Information Systems

The facility location problem with maximum distance constraint

Xiaowei Li, Xiwen Lu

Summary: The facility location problem with maximum distance constraint is investigated and a (3,1)-approximation algorithm is proposed. The algorithm is compared with the previous one and is found to have lower memory requirements and is suitable for large-scale problems.

INFORMATION PROCESSING LETTERS (2024)

Article Computer Science, Information Systems

Robust biometric scheme against replay attacks using one-time biometric templates

Tanguy Gernot, Christophe Rosenberger

Summary: This paper proposes an original method for generating one-time biometric templates for user authentication applications. The method involves deep learning for feature extraction and biohashing for protection against replay attacks. The efficiency and robustness of the method are confirmed through testing on common biometric databases.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Deep learning-based software bug classification

Jyoti Prakash Meher, Sourav Biswas, Rajib Mall

Summary: Accurate bug classification is important for speeding up bug triage, code inspection, and repair tasks. To improve classification, this study proposes a novel bug classification approach based on deep learning. The approach includes building a bug taxonomy with eight bug classes using keywords, annotating a large set of bug resolution reports, and utilizing attention-based classification techniques. Experimental results show that the proposed technique outperforms existing methods in terms of F1-Score by an average of 16.88% on the considered dataset.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)

Article Computer Science, Information Systems

Developer and End-User Perspectives on Addressing Human Aspects in Mobile eHealth Apps

Md. Shamsujjoha, John Grundy, Hourieh Khalajzadeh, Qinghua Lu, Li Li

Summary: This paper investigates the challenges and benefits of incorporating human aspects into eHealth app development and usage from the perspectives of developers and end-users. The study used a mixed-method approach and gathered data from online surveys and interviews. The findings suggest that addressing human aspects throughout the app development life-cycle is beneficial for more effective eHealth apps.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)

Article Computer Science, Information Systems

A survey of approaches for event sequence analysis and visualization

Anton Yeshchenko, Jan Mendling

Summary: This paper presents the development of event sequence data analysis techniques in different fields and proposes an integrated framework to facilitate collaboration and research synergy across various domains.

INFORMATION SYSTEMS (2024)

Article Computer Science, Information Systems

Understanding the implementation issues when using deep learning frameworks

Chao Liu, Runfeng Cai, Yiqun Zhou, Xin Chen, Haibo Hu, Meng Yan

Summary: This paper conducts an empirical study on the implementation issues of deep learning frameworks, focusing on relevant questions on Stack Overflow. The study identifies various implementation issues and constructs a taxonomy, revealing that data processing, model setting, model training, and model prediction are the most common categories. The paper also provides suggestions for future research and aims to help developers and researchers understand these issues better.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)

Article Computer Science, Information Systems

Automated code-based test case reuse for software product line testing

Pilsu Jung, Seonah Lee, Uicheon Lee

Summary: This study proposes an automated code-based approach (ActSPL) for reusing SPL test cases by utilizing source code and test cases. The results show that ActSPL achieves high precision and recall, and significantly reduces the time required for testing a new product.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Exploring the optimality of byte-wise permutations of a piccolo-type block cipher

Shion Utsumi, Motoki Nakahashi, Kosei Sakamoto, Takanori Isobe

Summary: This paper explores the optimality of byte-based round permutation (RP) in the lightweight block cipher Piccolo from a security standpoint. The authors evaluate the security of differential, linear, impossible differential, and integral attacks for all byte-wise RPs using mixed integer linear programming (MILP). They show that the RP of Piccolo is optimal in terms of the number of rounds required to guarantee security against such attacks. Additionally, they introduce new classes of RPs that require fewer rounds for security against impossible differential attacks, but more rounds for security against differential and linear attacks.

INFORMATION PROCESSING LETTERS (2024)

Article Computer Science, Information Systems

Discovery, simulation, and optimization of business processes with differentiated resources

Orlenys Lopez-Pintado, Marlon Dumas, Jonas Berx

Summary: Business process simulation is a versatile technique that predicts the impact of changes on process performance. However, previous approaches have limitations due to their treatment of resources as undifferentiated entities. This article addresses this issue by proposing a new simulation approach that treats each resource as an individual entity with its own performance and availability. The article also presents methods for discovering simulation models with differentiated resources and optimizing resource availability calendars. Empirical evaluation demonstrates that differentiated resource models better replicate cycle time distributions and work rhythm, and iterative optimization of resource allocations and calendars leads to improved cost-time tradeoffs.

INFORMATION SYSTEMS (2024)

Article Computer Science, Information Systems

On reversing arcs to improve arc-connectivity

Pierre Hoppenot, Zoltan Szigeti

Summary: We demonstrate that if the arc-connectivity of a directed graph, D, is at most k+1/2 and the reorientation of an arc set, F, in D results in a k-arc-connected directed graph, then we can reorient one arc of F without decreasing the arc-connectivity of D. This improvement applies to the cases when k is either 2 or 3, enhancing the corollary of previous results by Fukuda, Prodon, Sakuma and Ito et al.

INFORMATION PROCESSING LETTERS (2024)

Article Computer Science, Information Systems

A deep learning technique to detect distributed denial of service attacks in software-defined networks

Waheed G. Gadallah, Hosny M. Ibrahim, Nagwa M. Omar

Summary: Software-Defined Network (SDN) separates the control plane from the data plane, improving network flexibility, management, performance, and scalability. This paper proposes an effective technique using deep learning models to detect DDoS attacks in both the control and data planes of SDN. Different features are utilized for detection in the control and data planes, and the technique mitigates DDoS effects by updating user trust values and blocking suspicious senders.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

How memory anxiety can influence password security behavior

Naomi Woods, Mikko Siponen

Summary: Users' anxiety about remembering passwords can lead to the adoption of password reuse and modification as memory strategies.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation

Nilufer Tuptuk, Stephen Hailes

Summary: In this paper, a novel methodology is proposed to identify vulnerabilities in industrial control systems. The method is evaluated on a benchmark chemical plant simulator and is shown to be effective in identifying vulnerable components and evaluating the performance of existing security mechanisms.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Improving domain-specific neural code generation with few-shot meta-learning

Zhen Yang, Jacky Wai Keung, Zeyu Sun, Yunfei Zhao, Ge Li, Zhi Jin, Shuo Liu, Yishu Li

Summary: This paper presents MetaCoder, a meta-learning code generation approach that efficiently extracts general-purpose knowledge from large-scale source languages and rapidly adapts to domain-specific scenarios.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Why and how bug blocking relations are breakable: An empirical study on breakable blocking bugs

Hao Ren, Yanhui Li, Lin Chen, Yuming Zhou, Changhai Nie

Summary: This study aims to explore the breakable blocking bugs (BBBs) through quantitative and qualitative analysis. The analysis reveals that BBBs have higher levels of involvement, longer fix time, and more complex source code compared to other bugs. The study also identifies four reasons for breaking blocking relationships between bugs and three measures adopted by developers to break these relationships.

INFORMATION AND SOFTWARE TECHNOLOGY (2024)