Results 11 to 20 of about 234,523 (279)
Gardening Cyber-Physical Systems [PDF]
cote interne IRCAM: Stepney12aNational audienceToday’s artefacts, from small devices to buildings and cities, are, or are becoming, cyber-physical socio-technical systems, with tightly interwoven material and computational parts. Currently, we have to la-
Diaconescu, Ada +14 more
core +4 more sources
Quantum cyber-physical systems. [PDF]
AbstractThis paper aims to promote a quantum framework that analyzes Industry 4.0 cyber-physical systems more efficiently than traditional simulations used to represent integrated systems. The paper proposes a novel configuration of distributed quantum circuits in multilayered complex networks that enable the evaluation of industrial value creation ...
Villalba-Diez J +2 more
europepmc +8 more sources
Cyber-Insurance for Cyber-Physical Systems [PDF]
In this paper we review the emerging role of cyber insurance for Cyber-Physical Systems (CPSs) and discuss the obstacles, the needs, and the avenues forward. Specifically we focus on the unique characteristics and challenges that cyber-physical systems provide to the cyber-insurance industry (compared to classical information technology risks) and show
Carlos A. Barreto +2 more
openaire +3 more sources
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. Due to the rapid development of Internet-connected systems and Artificial Intelligence in recent years,
Zhibo Zhang +4 more
doaj +1 more source
Potential-Driven Model for Influence Maximization in Social Networks
The adoption of a new technology, the spreading of ideologies, the transmission of contagions, are examples of spreading phenomena that can be modelled at two distinct levels of resolution, a macroscopic and a microscopic level.In the present work, we ...
Zineb Felfli +3 more
doaj +1 more source
Cyber-Physical Systems Security [PDF]
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and ...
openaire +3 more sources
Community detection and unveiling of hierarchy in networks: a density-based clustering approach
The unveiling of communities within a network or graph, and the hierarchization of its members that results is of utmost importance in areas ranging from social to biochemical networks, from electronic circuits to cybersecurity.
Zineb Felfli +3 more
doaj +1 more source
Path planning plays an important role in navigation and motion planning for robotics and automated driving applications. Most existing methods use iterative frameworks to calculate and plan the optimal path from the starting point to the endpoint ...
Tongfei Bian +2 more
doaj +1 more source
Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction.
Ashfaq Ahmed +2 more
doaj +1 more source

