Abstract: While the interest in low-code platforms grows, these technologies have mostly focused on administrative business applications, and other domains remain relatively untouched. We think much ...
Abstract: A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing ...
This repository contains the code implementation for the ICSE SEIP 2025 paper titled "Anomaly Detection in Large-Scale Cloud Systems: An Industry Case and Dataset." The preprint for the paper is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results