Results 31 to 40 of about 234,249 (179)
Software Engineering Challenges for Investigating Cyber-Physical Incidents [PDF]
Cyber-Physical Systems (CPS) are characterized by the interplay between digital and physical spaces. This characteristic has extended the attack surface that could be exploited by an offender to cause harm.
Alrimawi, Faeq +2 more
core +1 more source
Waypoint Generation in Satellite Images Based on a CNN for Outdoor UGV Navigation
Moving on paths or trails present in natural environments makes autonomous navigation of unmanned ground vehicles (UGV) simpler and safer. In this sense, aerial photographs provide a lot of information of wide areas that can be employed to detect paths ...
Manuel Sánchez +2 more
doaj +1 more source
User-centric Privacy Engineering for the Internet of Things [PDF]
User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should ...
Barhamgi, Mahmoud +3 more
core +3 more sources
Semantics of Cyber-Physical Systems [PDF]
The very recent development of Cyber-Physical Systems (CPS) provides a smart infrastructure connecting abstract computational artifacts with the physical world. The solution to CPS must transcend the boundary between the cyber world and the physical world by providing integrated models addressing issues from both worlds simultaneously.
Tharam S. Dillon +3 more
openaire +1 more source
Use of Augmented and Virtual Reality in Remote Higher Education: A Systematic Umbrella Review
In this systematic umbrella review we aggregate the current knowledge of how virtual and augmented reality technologies are applicable to and impact remote learning in higher education; specifically, how they impact such learning outcomes as performance ...
Krisjanis Nesenbergs +3 more
doaj +1 more source
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These features make the adoption of Blockchain attractive to enhance information security, privacy, and ...
Emanuele Bellini +2 more
doaj +1 more source
The roles of emergency responders are challenging and often physically demanding, so it is essential that their duties are performed safely and effectively.
Pablo Vera-Ortega +4 more
doaj +1 more source
Probabilistic conformance for cyber-physical systems [PDF]
In system analysis, conformance indicates that two systems simultaneously satisfy the same set of specifications of interest; thus, the results from analyzing one system automatically transfer to the other, or one system can safely replace the other in practice. In this work, we study the probabilistic conformance of cyber-physical systems (CPS).
Yu Wang 0044 +3 more
openaire +2 more sources
A wireless seismic network can be effectively used as a tool for subsurface monitoring and imaging. By recording and analyzing ambient noise, a seismic network can image underground infrastructures and provide velocity variation information of the ...
Maria Valero +3 more
doaj +1 more source
Learning-based attacks in cyber-physical systems [PDF]
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems---the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller ...
Franceschetti, Massimo +3 more
core +1 more source

