Results 151 to 160 of about 234,249 (179)
Some of the next articles are maybe not open access.

Security of Cyber Physical System

2015
Cyber Physical System (CPS), which is based on the environment perception, combines computing, communications, and control processes effectively. Through the interaction and the feedback loop between physical space and cyber space, it implements the function of real-time sensing and dynamic control.
Yaowen Zheng   +3 more
openaire   +1 more source

Cyber-Physical Systems Engineering

2016
Building complex embedded- and cyber-physical systems requires a holistic view on both product and process. The constructed system must interact with its physical environment and its human users in a smooth way. The development processes must provide a seamless transition between stages and views.
openaire   +1 more source

EDA for cyber-physical systems

2017 7th International Symposium on Embedded Computing and System Design (ISED), 2017
Over the years, electronic design automation (EDA) has been moving up the design abstraction ladder. Starting from automating tasks like placement, floor-planning and routing in integrated circuits design, EDA now encompasses many system-level design tasks.
openaire   +1 more source

Scheduling in Cyber-Physical Systems

2012
Cyber-physical systems (CPS) refer to a promising class of systems featuring intimate coupling between the ‘cyber’ intelligence and the ‘physical’ world. Enabled by the ubiquitous availability of computation and communication capabilities, such systems are widely envisioned to redefine the way that people interact with the physical world, similar to ...
openaire   +1 more source

Cyber-physical systems

XRDS: Crossroads, The ACM Magazine for Students, 2014
Haining Mo   +2 more
openaire   +1 more source

Cryptanalytical attacks on cyber-physical systems

2016 5th Mediterranean Conference on Embedded Computing (MECO), 2016
Abstract Cryptography finds its application in various objects used in our everyday life. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. However, many such objects are vulnerable to certain cryptanalytic attacks. In this review
openaire   +1 more source

A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design

IEEE Communications Surveys and Tutorials, 2022
Sangjun Kim   +2 more
exaly  

Application to Cyber-Physical Systems

2016
In this chapter we present examples of application of the consensus-based algorithms introduced in Chaps. 2 and 3 to representative Cyber-Physical Systems like: (i) mobile wireless body area networks for patient monitoring; (ii) wireless networked monitoring systems to estimate in a distributed way a physical variable of interest; and (iii) wireless ...
openaire   +2 more sources

Cybersecurity of Industrial Cyber-Physical Systems: A Review

ACM Computing Surveys, 2022
Hakan Kayan, Omer F Rana, Pete Burnap
exaly  

Deep Learning-based Anomaly Detection in Cyber-physical Systems

ACM Computing Surveys, 2022
Yuan Luo, Guojun Peng, Danfeng Yao
exaly  

Home - About - Disclaimer - Privacy