Results 61 to 70 of about 161,956 (247)

State-aware access control for cyber-physical-social space: Model and policy security assurance

open access: yesEgyptian Informatics Journal
The cyber–physical-social space provides its users with a comfortable and convenient environment for work or living, achieved through the integration of state information from the cyber world, the physical world and the social world.
Yan Cao   +5 more
doaj   +1 more source

A Security Analysis of Cyber-Physical Systems Architecture for Healthcare

open access: yesComputers, 2016
This paper surveys the available system architectures for cyber-physical systems. Several candidate architectures are examined using a series of essential qualities for cyber-physical systems for healthcare.
Darren Seifert, Hassan Reza
doaj   +1 more source

Review of cybersecurity for integrated energy systems with integration of cyber‐physical systems

open access: yesEnergy Conversion and Economics, 2023
The integrated energy system leverages advanced information, communication, and control technology to integrate various energy subsystems, including electricity, heat, and gas, to achieve efficient and coordinated operation of the entire energy system ...
Shixing Ding   +4 more
doaj   +1 more source

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Security of Cyber-Physical Systems [PDF]

open access: yes, 2017
Traditional control environments connected to physical systems are being upgraded with novel information and communication technologies. The resulting systems need to be adequately protected. Experimental testbeds are crucial for the study and analysis of ongoing threats against those resulting cyber-physical systems.
Jose Rubio-Hernan   +2 more
openaire   +1 more source

Cultivating Circularity: Harnessing Industry 4.0 and Stakeholder Engagement for a Sustainable Agrifood Future in Brazil

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem   +3 more
wiley   +1 more source

On the use of watermark-based schemes to detect cyber-physical attacks

open access: yesEURASIP Journal on Information Security, 2017
We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and security.
Jose Rubio-Hernan   +2 more
doaj   +1 more source

Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security

open access: yesCryptography, 2020
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data. This paper proposes a novel algorithm of information embedding into digital images that could be used to protect ...
Oleg Evsutin, Kristina Dzhanashia
doaj   +1 more source

A Taxonomy of Predictive Maintenance as a Basis for Supra‐Regional Sustainability Monitoring—Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The concept of predictive maintenance in advanced manufacturing systems is crucial from the point of view of resource efficiency in the era of high competitiveness forced by energy transformation in the digital economy. Against the backdrop of sustainability and the opportunities a data cooperative offers, the combination of predictive ...
Christian Schachtner   +6 more
wiley   +1 more source

Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions

open access: yesIEEE Access, 2020
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information security tasks in relation to multimedia data: protection against ...
Oleg Evsutin   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy