Results 31 to 40 of about 234,249 (179)

Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]

open access: yes, 2017
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq   +2 more
core   +1 more source

Waypoint Generation in Satellite Images Based on a CNN for Outdoor UGV Navigation

open access: yesMachines, 2023
Moving on paths or trails present in natural environments makes autonomous navigation of unmanned ground vehicles (UGV) simpler and safer. In this sense, aerial photographs provide a lot of information of wide areas that can be employed to detect paths ...
Manuel Sánchez   +2 more
doaj   +1 more source

User-centric Privacy Engineering for the Internet of Things [PDF]

open access: yes, 2018
User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should ...
Barhamgi, Mahmoud   +3 more
core   +3 more sources

Semantics of Cyber-Physical Systems [PDF]

open access: yes, 2012
The very recent development of Cyber-Physical Systems (CPS) provides a smart infrastructure connecting abstract computational artifacts with the physical world. The solution to CPS must transcend the boundary between the cyber world and the physical world by providing integrated models addressing issues from both worlds simultaneously.
Tharam S. Dillon   +3 more
openaire   +1 more source

Use of Augmented and Virtual Reality in Remote Higher Education: A Systematic Umbrella Review

open access: yesEducation Sciences, 2020
In this systematic umbrella review we aggregate the current knowledge of how virtual and augmented reality technologies are applicable to and impact remote learning in higher education; specifically, how they impact such learning outcomes as performance ...
Krisjanis Nesenbergs   +3 more
doaj   +1 more source

Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey

open access: yesIEEE Access, 2020
Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These features make the adoption of Blockchain attractive to enhance information security, privacy, and ...
Emanuele Bellini   +2 more
doaj   +1 more source

Enabling Remote Responder Bio-Signal Monitoring in a Cooperative Human–Robot Architecture for Search and Rescue

open access: yesSensors, 2022
The roles of emergency responders are challenging and often physically demanding, so it is essential that their duties are performed safely and effectively.
Pablo Vera-Ortega   +4 more
doaj   +1 more source

Probabilistic conformance for cyber-physical systems [PDF]

open access: yesProceedings of the ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021
In system analysis, conformance indicates that two systems simultaneously satisfy the same set of specifications of interest; thus, the results from analyzing one system automatically transfer to the other, or one system can safely replace the other in practice. In this work, we study the probabilistic conformance of cyber-physical systems (CPS).
Yu Wang 0044   +3 more
openaire   +2 more sources

Distributed and Communication-Efficient Spatial Auto-Correlation Subsurface Imaging in Sensor Networks

open access: yesSensors, 2019
A wireless seismic network can be effectively used as a tool for subsurface monitoring and imaging. By recording and analyzing ambient noise, a seismic network can image underground infrastructures and provide velocity variation information of the ...
Maria Valero   +3 more
doaj   +1 more source

Learning-based attacks in cyber-physical systems [PDF]

open access: yes, 2020
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems---the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller ...
Franceschetti, Massimo   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy