Filters








982 Hits in 4.9 sec

CSRD has become SICS

Sabine Glesner
2019 SICS Software-Intensive Cyber-Physical Systems  
This journal takes these developments into account and, hence, puts a special focus on software-intensive cyber-physical systems.  ...  With the new journal Software-Intensive Cyber-Physical Systems (SICS), we want to put a special focus on these newly emerged systems and create a scientific and innovation oriented space to present cutting-edge  ...  This journal takes these developments into account and, hence, puts a special focus on software-intensive cyber-physical systems.  ... 
doi:10.1007/s00450-019-00406-9 dblp:journals/ife/Glesner19 fatcat:h6vte2hnqjdrlfrxvh2sz6pedm

The 13th advanced summer school on service-oriented computing

Schahram Dustdar
2020 SICS Software-Intensive Cyber-Physical Systems  
AG in Vienna (acquired by Engineering NetWorld AG), a venture capital co-funded software company focused on software for collaborative processes in teams.  ...  The subsequent one provides a suitable collection of transactional properties criteria to analyze permissioned blockchains and apply them to a prominent set of these systems.  ... 
doi:10.1007/s00450-019-00420-x fatcat:fm5ukefpwngvhii3d4u4sktv34

The 12th Advanced Summer School on Service-Oriented Computing

Bernhard Mitschang
2019 SICS Software-Intensive Cyber-Physical Systems  
Followed by a contribution using architectural modifiability tactics to examine evolution qualities of service-and microservice-based systems, the second last contribution focusses on mimicking FogDirector  ...  Followed by a contribution using architectural modifiability tactics to examine evolution qualities of service-and microservice-based systems, the second last contribution focusses on mimicking FogDirector  ... 
doi:10.1007/s00450-019-00405-w fatcat:pfadk5cydrbbhhillg47p6tq6u

Transactional properties of permissioned blockchains

Ghareeb Falazi, Vikas Khinchi, Uwe Breitenbücher, Frank Leymann
2019 SICS Software-Intensive Cyber-Physical Systems  
In this paper, we identify a suitable collection of TP criteria to analyze permissioned blockchains and apply them to a prominent set of these systems.  ...  Traditional distributed transaction processing (TP) systems, such as replicated databases, faced difficulties in getting wide adoption for scenarios of enterprise integration due to the level of mutual  ...  In fact, they can be viewed as software connectors providing communication, coordination and other services for the various software components of large distributed systems operated by different entities  ... 
doi:10.1007/s00450-019-00411-y fatcat:jxmk5p7j5banva5j3axogpkyqi

The essential deployment metamodel: a systematic review of deployment automation technologies

Michael Wurster, Uwe Breitenbücher, Michael Falkenthal, Christoph Krieger, Frank Leymann, Karoline Saatkamp, Jacopo Soldani
2019 SICS Software-Intensive Cyber-Physical Systems  
In recent years, a plethora of deployment technologies evolved, many following a declarative approach to automate the delivery of software components.  ...  According to UML, an artifact is a physical piece of information that is created to be used for deployment and operation of a system [31] .  ...  In general literature about software architectures (SAs), SAs are described as structures that comprise software elements, relations among them, and properties of both [38] .  ... 
doi:10.1007/s00450-019-00412-x fatcat:62t3xoegd5b7fdq6mdwaidamvi

TOSCA-based Intent modelling: goal-modelling for infrastructure-as-code

Damian A. Tamburri, Willem-Jan Van den Heuvel, Chris Lauwers, Paul Lipton, Derek Palma, Matt Rutkowski
2019 SICS Software-Intensive Cyber-Physical Systems  
DevOps entails a set of practices that speed up the time needed to rollout software product changes.  ...  In the era of cloud-based systems of systems, IoT (Internet-of-Things) and in general loosely coupled heterogeneous and flexible configurations of systems where XaaS (Everything as a Service) represents  ...  Towards intent modelling: design paradigms compared Imperative design The first evolution step in modelling and implementing software systems essentially consisted in moving from imperative to declarative  ... 
doi:10.1007/s00450-019-00404-x dblp:journals/ife/TamburriHLLPR19 fatcat:atf5bodzpvaazkpuzmm27t63si

RADON: rational decomposition and orchestration for serverless computing

G. Casale, M. Artač, W.-J. van den Heuvel, A. van Hoorn, P. Jakovits, F. Leymann, M. Long, V. Papanikolaou, D. Presenza, A. Russo, S. N. Srirama, D. A. Tamburri (+2 others)
2019 SICS Software-Intensive Cyber-Physical Systems  
Serverless computing is therefore rapidly shifting the attention of software vendors to the challenge of developing cloud applications deployable on FaaS platforms.  ...  -OpenReq 31 explores community-driven requirements engineering in the context of large and distributed software-intensive projects with tight inter-relations.  ...  are suboptimal design decisions made by developers that can affect the overall maintainability of a software system and make it more defect-prone [17] .  ... 
doi:10.1007/s00450-019-00413-w fatcat:q7mf6hhc7jauxfngrg57tjks7a

Design principles, architectural smells and refactorings for microservices: a multivocal review

Davide Neri, Jacopo Soldani, Olaf Zimmermann, Antonio Brogi
2019 SICS Software-Intensive Cyber-Physical Systems  
Additionally, communication fails from time to time in any kind of distributed system, and this is even more likely to occur in microservice-based systems, simply because of the amount of messages exchanged  ...  in the same partition, by preventing the rest of the system from being affected by such failure [35] .  ... 
doi:10.1007/s00450-019-00407-8 fatcat:hiaa266qubbqdcvcp7xjwgocxa

Live Fire Exercise: Preparing for Cyber War

Kenneth Geers
2010 Journal of Homeland Security and Emergency Management  
In May 2010, the Cooperative Cyber Defence Centre of Excellence and the Swedish National Defence College hosted the Baltic Cyber Shield (BCS) international cyber defense exercise (CDX).  ...  The scenario described a volatile geopolitical environment in which a hired-gun Rapid Response Team of network security personnel defended Critical Information Infrastructure (CII) from cyber attacks sponsored  ...  software.  ... 
doi:10.2202/1547-7355.1780 fatcat:6nwtm6crzbg3xnwx6o2uwn3yzm

Security Enhancement Against Insiders in Cyber-Manufacturing Systems

Jinwoo Song, Young Moon
2020 Procedia Manufacturing  
This paper presents a system architecture of an applied blockchain in Cyber-Manufacturing System, where the input data for PLC is stored and retrieved through the blockchain.  ...  This paper presents a system architecture of an applied blockchain in Cyber-Manufacturing System, where the input data for PLC is stored and retrieved through the blockchain.  ...  System (CMS), Cyber-Physical System (CPS), and Cloud-Manufacturing System (CLMS).  ... 
doi:10.1016/j.promfg.2020.05.124 fatcat:kmkzyreps5fcvepevzalxhhp6e

Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber

Glen Segell
2021 MCU Journal  
The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional.  ...  The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel's adversaries do not share the same policies with regular cyber and terror attacks against civilian  ...  Specialist training is required and provided for the specific weapon system; in cyber, it is the software. 42 Experience and lessons in the planning, preparing, procurement, and training from the navy  ... 
doi:10.21140/mcuj.20211201004 fatcat:eut2bbe2zfeczkca4pyv2uuoxa

Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, January 06-11 2019, Schloss Dagstuhl [article]

Joel Greenyer, Malte Lochau, Thomas Vogel
2019 arXiv   pre-print
This report documents the program and results of the GI-Dagstuhl Seminar 19023 on Explainable Software for Cyber-Physical Systems (ES4CPS).  ...  The seminar was concerned with the challenge that for future Cyber-Physical Systems (CPS), it will become increasingly relevant to explain their behavior (past, current, and future behavior, why a certain  ...  Bibliography [1] Cyber-Physical Systems Public Working Group NIST. Draft framework for cyber-physical systems.  ... 
arXiv:1904.11851v1 fatcat:r2r5ac6hmnel3f6weiynjwunni

Table of contents

2019 IEEE Internet of Things Journal  
Garcia-Haro 2288 Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Buyya 2400 Robust Energy-Efficient Resource Allocation for IoT-Powered Cyber-Physical-Social Smart Systems With Virtualization .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2019.2908315 fatcat:bunrlcg6m5ge5m6426453bwfq4

Forms and Consequences of the Cyber Threats and Extortion Phenomenon

Ioana Vasiu, Lucian Vasiu
2020 European Journal of Sustainable Development  
Cyber threats and extortionate communications usually aim to influence the behavior or obtain compliance from victims.  ...  The victimization is linked to personal insecurity or disruption, mental and physical health, work or school performance, may represent a high financial burden, affecting negatively the sustainable development  ...  Cyberviolence can be defined as the use of information systems to "cause, facilitate, or threaten violence against individuals that results in, or is likely to result in, physical, sexual, psychological  ... 
doi:10.14207/ejsd.2020.v9n4p295 fatcat:7e6wrejqaffrhnjozxkvktwatu

Reflections on the Fog of (Cyber)War

Diego Canabarro, Thiago Borne
2013 Social Science Research Network  
(Rid, 2012a:08) If it is most likely that no cyber offense has ever caused physical harm, on the other hand it is also hard to sustain that any cyber attack reported so far has forced the target to accept  ...  Even when there are no digital bridges that allow the access to a specific system, that isolation "can be defeated by those willing to penetrate physical security perimeters or by the insertion of rogue  ... 
doi:10.2139/ssrn.3155453 fatcat:njt3igdfv5bd5mcikku7hy2piy
« Previous Showing results 1 — 15 out of 982 results