Results 11 to 20 of about 234,523 (279)

Gardening Cyber-Physical Systems [PDF]

open access: yes, 2012
cote interne IRCAM: Stepney12aNational audienceToday’s artefacts, from small devices to buildings and cities, are, or are becoming, cyber-physical socio-technical systems, with tightly interwoven material and computational parts. Currently, we have to la-
Diaconescu, Ada   +14 more
core   +4 more sources

Quantum cyber-physical systems. [PDF]

open access: yesSci Rep, 2022
AbstractThis paper aims to promote a quantum framework that analyzes Industry 4.0 cyber-physical systems more efficiently than traditional simulations used to represent integrated systems. The paper proposes a novel configuration of distributed quantum circuits in multilayered complex networks that enable the evaluation of industrial value creation ...
Villalba-Diez J   +2 more
europepmc   +8 more sources

Cyber-physical system [PDF]

open access: yesAI & SOCIETY, 2018
n ...
Garibaldo, Francesco, Rebecchi, Emilio
openaire   +2 more sources

Cyber-Insurance for Cyber-Physical Systems [PDF]

open access: yes2018 IEEE Conference on Control Technology and Applications (CCTA), 2018
In this paper we review the emerging role of cyber insurance for Cyber-Physical Systems (CPSs) and discuss the obstacles, the needs, and the avenues forward. Specifically we focus on the unique characteristics and challenges that cyber-physical systems provide to the cyber-insurance industry (compared to classical information technology risks) and show
Carlos A. Barreto   +2 more
openaire   +3 more sources

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research

open access: yesIEEE Access, 2022
This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. Due to the rapid development of Internet-connected systems and Artificial Intelligence in recent years,
Zhibo Zhang   +4 more
doaj   +1 more source

Potential-Driven Model for Influence Maximization in Social Networks

open access: yesIEEE Access, 2020
The adoption of a new technology, the spreading of ideologies, the transmission of contagions, are examples of spreading phenomena that can be modelled at two distinct levels of resolution, a macroscopic and a microscopic level.In the present work, we ...
Zineb Felfli   +3 more
doaj   +1 more source

Cyber-Physical Systems Security [PDF]

open access: yese & i Elektrotechnik und Informationstechnik, 2018
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and ...
openaire   +3 more sources

Community detection and unveiling of hierarchy in networks: a density-based clustering approach

open access: yesApplied Network Science, 2019
The unveiling of communities within a network or graph, and the hierarchization of its members that results is of utmost importance in areas ranging from social to biochemical networks, from electronic circuits to cybersecurity.
Zineb Felfli   +3 more
doaj   +1 more source

End-to-End One-Shot Path-Planning Algorithm for an Autonomous Vehicle Based on a Convolutional Neural Network Considering Traversability Cost

open access: yesSensors, 2022
Path planning plays an important role in navigation and motion planning for robotics and automated driving applications. Most existing methods use iterative frameworks to calculate and plan the optimal path from the starting point to the endpoint ...
Tongfei Bian   +2 more
doaj   +1 more source

Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust

open access: yesIEEE Access, 2023
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction.
Ashfaq Ahmed   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy