A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems
2014
2015 IEEE Global Communications Conference (GLOBECOM)
New challenges have occurred because of the nature and the complexity of such systems in supporting heterogeneous physical and cyber components simultaneously. ...
The first set of S&D patterns includes the Reliability Component Composition (RCC) Patterns for designing reliable CPS. RCC patterns are encoded in Drools, which is a rule-based reasoning system. ...
The physical part of a CPS includes components such as physical plant, sensors and actuators. The cyber part contains communication and process components. ...
doi:10.1109/glocom.2014.7417794
dblp:conf/globecom/PetroulakisSAMT15
fatcat:qok7kmtjzrekfndqgtmzj2b6qa
A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems
2015
2015 IEEE Global Communications Conference (GLOBECOM)
New challenges have occurred because of the nature and the complexity of such systems in supporting heterogeneous physical and cyber components simultaneously. ...
The first set of S&D patterns includes the Reliability Component Composition (RCC) Patterns for designing reliable CPS. RCC patterns are encoded in Drools, which is a rule-based reasoning system. ...
The physical part of a CPS includes components such as physical plant, sensors and actuators. The cyber part contains communication and process components. ...
doi:10.1109/glocom.2015.7417794
fatcat:zmazuyqaengnzhhnnde4wkcf6m
Complex Patterns of Failure: Fault Tolerance via Complex Event Processing for IoT Systems
2019
2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
This paper proposes Complex Patterns of Failure (CPoF), an approach to providing FT support for IoT systems using Complex Event Processing (CEP) that promotes modularity and reusability in FT-support design ...
Fault-tolerance (FT) support is a key challenge for ensuring dependable Internet of Things (IoT) systems. ...
communications is vital for continuous system operation [27] . ...
doi:10.1109/ithings/greencom/cpscom/smartdata.2019.00173
dblp:conf/ithings/PowerK19
fatcat:3mpxcfwqtfanrd25t2dawmcmba
Modeling distributed automation systems in cyber-physical view
2015
2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA)
In the cyber-physical view, distributed systems are combination of control, computation and communication. ...
On the other hand, cyber-physical system is committed for solving complexities of networked embedded systems. ...
MODELING CYBER-PHYSICAL SYSTEMS The cyber-physical system combines computation, control and communication with physical processes. ...
doi:10.1109/iciea.2015.7334251
fatcat:7tetnkzppze73jkdjr4n7rpy2m
Challenges on Coordination for Cyber-Physical Systems
2013
Applied Mechanics and Materials
Cyber-physical systems integrate computing and communication with monitoring and control of physical entities. ...
The complex interaction with the physical world makes coordination models and languages very important for the analysis, design and development of cyber-physical systems. ...
A proper coordination model is very important for the design of cyber-physical systems. ...
doi:10.4028/www.scientific.net/amm.347-350.2942
fatcat:3t6wnlo4ibbrblgn36pz47xani
System-Aware Cyber Security
2011
2011 Eighth International Conference on Information Technology: New Generations
from
3 communities
-Cyber Security
-Fault-Tolerant Systems
-Automatic Control Systems (for physical systems)
• The System Aware solution designers need to
come from the communities related to ...
require very complex and high cost exploits
to defeat)
Focus on Defense Against Exploits that Impact System System Aware Cyber Security Design
Patterns
• Design Patterns combine design techniques ...
doi:10.1109/itng.2011.158
dblp:conf/itng/JonesH11
fatcat:fnkows5qjfdbzglzv5qiff6pmm
Critical components identification for cyber-physical power systems considering time-varying operational states
2021
Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems
Simulation studies are conducted on IEEE 39-bus and IEEE RTS-96 systems to evaluate the effectiveness of the proposed method for the identification of critical components at both cyber and physical layers ...
The security issues of Cyber-Physical power Systems (CPS) have attracted widespread attention from scholars. ...
For cyber-physical systems, if a cascading failure pattern frequently appears in D X , it means that the corresponding components play a critical role in the cascading process. ...
doi:10.1145/3470481.3472702
fatcat:pxwcajfzvbgblcdw52jvwb5jb4
A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution
2019
International Journal of Advanced Computer Research
& communication technology are applied to cyber battlefield. ...
Cyber battlefield will become more and more difficult to distinguish from physical space, and will be transformed into a hyper-connected, super- Review Article Abstract As science, technology is vertically ...
Acknowledgment This paper is a revised and expanded version of a paper entitled [Offensive Cyber Security Strategy according to the Evolution of Cyber Attack Technology] presented at [IDIW2018, Jeju and ...
doi:10.19101/ijacr.soc6
fatcat:m46g2qnb75bgfefoycxwkgvcpy
Cyber World as a Social System
[chapter]
2015
Intelligent Systems, Control and Automation: Science and Engineering
The purpose of this chapter is to form a hypothesis about how to identify patterns i.e., emergent phenomena about the cyber world for developing security in the society. ...
The results of the content analysis are patterns, i.e., emergent phenomena of the cyber world. ...
The Physical and the Cyber World Framework A framework for classifying roughly activities of the cyber and the physical worlds is outlined in Fig. 2 . ...
doi:10.1007/978-3-319-18302-2_2
fatcat:vpnysm6qqjewdmoa4pcgtyzycq
Anomaly Detection Methods for IIoT Networks
2018
2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)
IIoT networks have special features and face unique challenges in defending against cyber-attacks. ...
The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the ...
The special thanks are also given to SMRT Trains Ltd for providing domain knowledge and technical support. ...
doi:10.1109/soli.2018.8476769
fatcat:mmoyuzeb7vd67igmrhwlgjmtvu
Cloud computing based unsupervised fault diagnosis system in the context of Industry 4.0
2020
Gestão & Produção
Abstract: New online fault monitoring and alarm systems, with the aid of Cyber-Physical Systems (CPS) and Cloud Technology (CT), are examined in this article within the context of Industry 4.0. ...
As such, the purpose of this paper is to propose a Cloud Computing Platform containing three layers of technologies forming a Cyber-Physical System which receives unlabelled data to generate an interpreted ...
Acknowledgements The authors would like to thank CAPES for the support provided during this research. ...
doi:10.1590/0104-530x5378-20
fatcat:qtm552memjevfm3bnqsyib3whu
Industrial Control System Fingerprinting and Anomaly Detection
[chapter]
2015
IFIP Advances in Information and Communication Technology
An experimental testbed that incorporates real systems for the cyber domain and simulated systems for the physical domain is used to validate the methodology. ...
Leveraging the stable and persistent control flow communications patterns in industrial control systems, this chapter proposes an innovative control system fingerprinting methodology that analyzes industrial ...
Unlike pure simulation approaches described in the literature, an experimental testbed that incorporates real systems for the cyber domain and simulated systems for the physical domain is employed for ...
doi:10.1007/978-3-319-26567-4_5
fatcat:zuc7b4hapbfgtmbahym7kxeudy
BIG DATA IN HETEROGENEOUS CYBER PHYSICAL SYSTEMS: A REVIEW
2020
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
Cyber Physical System (CPS). ...
The autonomous networked computing system, that connects the physical and software components together to access, analyze and process the data for computing, communicating through networking is known as ...
So, they require the systems those help in computing and communications with the physical atmosphere as Cyber Physical Systems [XVI] . ...
doi:10.26782/jmcms.2020.08.00032
fatcat:tsib53yf6rbphaytxjnogud4fu
Distributed Runtime Verification Of Cyber-Physical Systems Based On Graph Pattern Matching
2017
Zenodo
In this paper we present a framework for distributed runtime verification of cyber-physical systems including the solution for executing queries on a distributed model stored on multiple nodes. ...
Cyber-physical systems are often critical, which means that their failure can lead to serious injuries or even loss of human lives. ...
CONCLUSION In this paper, we presented a framework for distributed runtime verification of cyber-physical systems based on graph Fig. 8 . ...
doi:10.5281/zenodo.291906
fatcat:ra5i6kxlwbbx7lwsvabzrxnh7i
Cyber Physical Systems (CPSs) – Opportunities and Challenges for Improving Cyber Security
2016
International Journal of Computer Applications
Keywords Cyber Physical System, Cyber Security, Stuxnet, Threats. layer or nervous system running through all other sectors [12], enabling them to communicate and function. ...
This paper introduces the idea of cyber physical system (CPS). Cyber-Physical Systems are integration of computation and physical processes. ...
A cyber physical system is an integration of physical world devices and cyber-world computing and communications capabilities, making the environment smarter. ...
doi:10.5120/ijca2016908877
fatcat:ckca73xplnbvniceokquxf7s7q
« Previous
Showing results 1 — 15 out of 38,141 results