Results 51 to 60 of about 234,249 (179)
Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks
Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals ...
Steffen Peter +3 more
doaj +1 more source
Doppler Shift and SFO Robust Synchronization for LoRa-Like Acoustic Underwater Communication
Frequency shift chirp modulation (FSCM) is the modulation technique utilized by the LoRa physical layer, a widely used and relatively new communication technique for radio low-power wide area networks (LPWANs).
Fabian Steinmetz, Bernd-Christian Renner
doaj +1 more source
Wireless ICS Training Platform [PDF]
Indiana University - Purdue University IndianapolisEssential public services, such as Electric, Water and Gas Utilities, are becoming increasingly reliant on network connected devices to control their processes. Wireless control systems are becoming more
Cassandra Boman, Nick Pohlman
core
A Calculus of Cyber-Physical Systems [PDF]
We propose a hybrid process calculus for modelling and reasoning on cyber-physical systems (CPS{s}). The dynamics of the calculus is expressed in terms of a labelled transition system in the SOS style of Plotkin. This is used to define a bisimulation-based behavioural semantics which support compositional reasonings.
Lanotte, Ruggero, MERRO, Massimo
openaire +2 more sources
Design Space Exploration in Cyber-Physical Systems [PDF]
Cyber physical systems (CPS) integrate a variety of engineering areas such as control, mechanical and computer engineering in a holistic design effort.
Amir, Maral
core
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors ...
Choo, Kim-Kwang Raymond +2 more
core +1 more source
Accountability for Cyber-Physical Systems. [PDF]
The core problem is that there is no single universally accepted definition of accountability; but there exist many different definitions that are suitable in different situations. We offer a method to model accountability definitions for CPS and show how that method can be used to assess the accountability of CPS, understand trade-offs in the system ...
openaire +1 more source
Monetization of Services Provided by Public Fog Nodes Using Blockchain and Smart Contracts
Public fog nodes can be deployed in public places closer to the edge where many personal and commercial devices (e.g., a sensor, an application, or a device) can connect to.
Mazin Debe +3 more
doaj +1 more source
Renewable energy sources (RES) are becoming more attractive due to the global demand for the utilization of clean energy and their easy accessibility. The integration of renewable energy technologies into power systems has been made easy, such that RES ...
Saheed Lekan Gbadamosi +2 more
doaj +1 more source
Dual Rate Control for Security in Cyber-physical Systems
We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop.
Hirzallah, Nabil +2 more
core +1 more source

