Results 151 to 160 of about 234,249 (179)
Some of the next articles are maybe not open access.
Security of Cyber Physical System
2015Cyber Physical System (CPS), which is based on the environment perception, combines computing, communications, and control processes effectively. Through the interaction and the feedback loop between physical space and cyber space, it implements the function of real-time sensing and dynamic control.
Yaowen Zheng +3 more
openaire +1 more source
Cyber-Physical Systems Engineering
2016Building complex embedded- and cyber-physical systems requires a holistic view on both product and process. The constructed system must interact with its physical environment and its human users in a smooth way. The development processes must provide a seamless transition between stages and views.
openaire +1 more source
EDA for cyber-physical systems
2017 7th International Symposium on Embedded Computing and System Design (ISED), 2017Over the years, electronic design automation (EDA) has been moving up the design abstraction ladder. Starting from automating tasks like placement, floor-planning and routing in integrated circuits design, EDA now encompasses many system-level design tasks.
openaire +1 more source
Scheduling in Cyber-Physical Systems
2012Cyber-physical systems (CPS) refer to a promising class of systems featuring intimate coupling between the ‘cyber’ intelligence and the ‘physical’ world. Enabled by the ubiquitous availability of computation and communication capabilities, such systems are widely envisioned to redefine the way that people interact with the physical world, similar to ...
openaire +1 more source
Cryptanalytical attacks on cyber-physical systems
2016 5th Mediterranean Conference on Embedded Computing (MECO), 2016Abstract Cryptography finds its application in various objects used in our everyday life. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. However, many such objects are vulnerable to certain cryptanalytic attacks. In this review
openaire +1 more source
A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design
IEEE Communications Surveys and Tutorials, 2022Sangjun Kim +2 more
exaly
Application to Cyber-Physical Systems
2016In this chapter we present examples of application of the consensus-based algorithms introduced in Chaps. 2 and 3 to representative Cyber-Physical Systems like: (i) mobile wireless body area networks for patient monitoring; (ii) wireless networked monitoring systems to estimate in a distributed way a physical variable of interest; and (iii) wireless ...
openaire +2 more sources
Cybersecurity of Industrial Cyber-Physical Systems: A Review
ACM Computing Surveys, 2022Hakan Kayan, Omer F Rana, Pete Burnap
exaly
Deep Learning-based Anomaly Detection in Cyber-physical Systems
ACM Computing Surveys, 2022Yuan Luo, Guojun Peng, Danfeng Yao
exaly

