There are more than 7,000 public transit agencies in the U.S. (and many ...
Adversarial reconnaissance is a crucial step in sophisticated cyber-atta...
The MITRE ATT CK framework, a comprehensive knowledge base of adversar...
The offline pickup and delivery problem with time windows (PDPTW) is a
c...
Recently, bug-bounty programs have gained popularity and become a signif...
Although researchers have characterized the bug-bounty ecosystem from th...
In the wake of a cybersecurity incident, it is crucial to promptly disco...
Vehicle routing problems (VRPs) can be divided into two major categories...
Many transit agencies operating paratransit and microtransit services ha...
Internet of Things (IoT) devices and applications can have significant
v...
Power grid operation subject to an extreme event requires decision-makin...
Adversaries are often able to penetrate networks and compromise systems ...
Several attacks have been proposed against Proof-of-Work blockchains, wh...
Modern intelligent urban mobility applications are underpinned by
large-...
Public transit is central to cultivating equitable communities. Meanwhil...
To slow down the spread of COVID-19, governments around the world are tr...
We model and analyze blockchain miners who seek to maximize the compound...
As the number of personal computing and IoT devices grows rapidly, so do...
Public transit can have significantly lower environmental impact than
pe...
Due to increasing concerns about environmental impact, operating costs, ...
Vyper has been proposed as a new high-level language for Ethereum smart
...
The rapid proliferation of decentralized marketplace applications demand...
Mobile devices encroach on almost every part of our lives, including wor...
Moving target defense (MTD) is a proactive defense approach that aims to...
Transactive microgrids have emerged as a transformative solution for the...
We introduce a game-theoretic model to investigate the strategic interac...
Detection of malicious behavior is a fundamental problem in security. On...
In this paper, we perform a comprehensive study of 2,470 patched Android...
Blockchain based platforms are emerging as a transformative technology t...
Cryptocurrency exchanges are frequently targeted and compromised by
cybe...
This paper deals with resource constrained autonomous robots commonly fo...
The adoption of blockchain based distributed ledgers is growing fast due...
As the Industrial Internet of Things (IIot) becomes more prevalent in
cr...
In recent years, state-of-the-art traffic-control devices have evolved f...
Internet of Things and data sciences are fueling the development of
inno...
Blockchain-based distributed computing platforms enable the trusted exec...
For enhancing the privacy protections of databases, where the increasing...
Vendors in the Android ecosystem typically customize their devices by
mo...
The adoption of blockchain-based distributed computation platforms is gr...
In a smart city, real-time traffic sensors may be deployed for various
a...