Database and expert systems applications : DEXA 2020 International Workshops BIOKDD, IWCFS and MLKgraphs, Bratislava, Slovakia, September 14-17, 2020, Proceedings /: DEXA 2020 International Workshops BIOKDD, IWCFS and MLKgraphs, Bratislava, Slovakia, September 14-17, 2020, Proceedings. (2020)
- Record Type:
- Book
- Title:
- Database and expert systems applications : DEXA 2020 International Workshops BIOKDD, IWCFS and MLKgraphs, Bratislava, Slovakia, September 14-17, 2020, Proceedings /: DEXA 2020 International Workshops BIOKDD, IWCFS and MLKgraphs, Bratislava, Slovakia, September 14-17, 2020, Proceedings. (2020)
- Main Title:
- Database and expert systems applications : DEXA 2020 International Workshops BIOKDD, IWCFS and MLKgraphs, Bratislava, Slovakia, September 14-17, 2020, Proceedings
- Further Information:
- Note: Gabriele Kotsis, A Min Tjoa, Ismail Khalil, Lukas Fischer, Bernhard Moser, Atif Mashkoor, Johannes Sametinger, Anna Fensel, Jorge Martinez-Gil (eds.).
- Other Names:
- Kotsis, Gabriele, 1967-
Tjoa, A Min
Khalil, Ismail, 1960-
Fischer, Lukas
Moser, Bernhard
Mashkoor, Atif
Sametinger, J (Johannes), 1961-
Fensel, Anna
Martinez-Gil, Jorge
Database and Expert Systems Applications Conference, 31st
BIOKDD (Workshop), 11th
IWCFS (Workshop), 4th
MLKgraphs (Workshop), 2nd - Contents:
- Intro -- Preface -- Organization -- Contents -- Biological Knowledge Discovery from Data -- An In-Memory Cognitive-Based Hyperdimensional Approach to Accurately Classify DNA-Methylation Data of Cancer -- 1 Background -- 2 Methods -- 2.1 Identifying HD Levels -- 2.2 Encoding Observations -- 2.3 Training -- 2.4 Classifying Dataset -- 3 Results -- 4 Discussion and Conclusion -- References -- TopicsRanksDC: Distance-Based Topic Ranking Applied on Two-Class Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data -- 3.2 Pre-processing -- 3.3 Topic Clustering 3.4 TopicsRanksDC Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Cyber-Security and Functional Safety in Cyber-Physical Systems -- YASSi: Yet Another Symbolic Simulator Large (Tool Demo) -- 1 Introduction -- 2 Background -- 3 The YASSi Tool -- 3.1 YASSi's Frontend -- 3.2 YASSi's Backends -- 4 Application of YASSi -- 5 Conclusion -- References -- Variational Optimization of Informational Privacy -- 1 Introduction -- 2 Deriving Optimal Noise Adding Mechanism -- 3 Variational Bayesian Fuzzy Data Modeling -- 4 Variational Approximation of Informational Privacy 5 A Simulation Study -- 6 Concluding Remarks -- References -- An Architecture for Automated Security Test Case Generation for MQTT Systems -- 1 Introduction -- 2 Background -- 2.1 Message Queuing Telemetry Transport (MQTT) -- 2.2 Automated Test Case Generation -- 2.3 Security Testing -- 3 Architecture Overview -- 3.1Intro -- Preface -- Organization -- Contents -- Biological Knowledge Discovery from Data -- An In-Memory Cognitive-Based Hyperdimensional Approach to Accurately Classify DNA-Methylation Data of Cancer -- 1 Background -- 2 Methods -- 2.1 Identifying HD Levels -- 2.2 Encoding Observations -- 2.3 Training -- 2.4 Classifying Dataset -- 3 Results -- 4 Discussion and Conclusion -- References -- TopicsRanksDC: Distance-Based Topic Ranking Applied on Two-Class Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data -- 3.2 Pre-processing -- 3.3 Topic Clustering 3.4 TopicsRanksDC Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Cyber-Security and Functional Safety in Cyber-Physical Systems -- YASSi: Yet Another Symbolic Simulator Large (Tool Demo) -- 1 Introduction -- 2 Background -- 3 The YASSi Tool -- 3.1 YASSi's Frontend -- 3.2 YASSi's Backends -- 4 Application of YASSi -- 5 Conclusion -- References -- Variational Optimization of Informational Privacy -- 1 Introduction -- 2 Deriving Optimal Noise Adding Mechanism -- 3 Variational Bayesian Fuzzy Data Modeling -- 4 Variational Approximation of Informational Privacy 5 A Simulation Study -- 6 Concluding Remarks -- References -- An Architecture for Automated Security Test Case Generation for MQTT Systems -- 1 Introduction -- 2 Background -- 2.1 Message Queuing Telemetry Transport (MQTT) -- 2.2 Automated Test Case Generation -- 2.3 Security Testing -- 3 Architecture Overview -- 3.1 System Under Test (MQTT Broker) -- 3.2 MQTT Adapter -- 3.3 Test Case Generation (Randoop) -- 3.4 Test Case Execution (JUnit) -- 4 Design Decisions -- 5 Attack Patterns -- 6 Evaluation -- 7 Related Work -- 8 Conclusions and Future Work -- References Mode Switching from a Security Perspective: First Findings of a Systematic Literature Review -- 1 Introduction -- 2 Mode Switching -- 3 Security Modes -- 4 Systematic Literature Review -- 4.1 Conditions and Requirements -- 4.2 Protocols for Single- and Multi-core Platforms -- 4.3 Component-Based Multi-Mode Systems -- 4.4 Programming and Specification Languages -- 5 Security and Safety -- 6 Conclusion -- References -- Exploiting MQTT-SN for Distributed Reflection Denial-of-Service Attacks -- 1 Introduction -- 2 Background -- 2.1 DoS Attack -- 2.2 Reflection Attack 2.3 Distributed Denial-of-Service (DDoS) Attack -- 2.4 Distributed Reflective Denial-of-Service (DRDoS) Attack -- 2.5 MQTT and MQTT-SN -- 3 DRDoS Attack Using MQTT-SN -- 4 Countermeasures and Protection Mechanisms -- 5 Summary and Future Work -- References -- Machine Learning and Knowledge Graphs -- Exploring the Influence of Data Aggregation in Parking Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Problem Formulation -- 3.2 LSTM -- 3.3 CNN -- 3.4 XGBoost -- 3.5 MLP -- 4 Experiments -- 4.1 Evaluation Protocol -- 4.2 Datasets -- 4.3 Feature Extraction … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 006.312
Database management -- Congresses
Expert systems (Computer science) -- Congresses
Database management
Expert systems (Computer science)
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030590284
3030590283 - Related ISBNs:
- 9783030590277
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.552683
- Ingest File:
- 03_171.xml