Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more
    • by 
    •   19  
      Machine LearningData MiningCybercrimesAccess Control
The 21st century has witnessed precipitous changes spanning from the way of life to the technologies that emerged. We have entered anascent paradigmshift(industry 4.0) where sciencefictions have becomescience facts, and technologyfusion... more
    • by 
    •   20  
      Artificial IntelligenceAutonomous RoboticsBiotechnologyModeling and Simulation
Over the last years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical threats. Efficient models and techniques able to capture their complex structure and identify critical cyber-physical... more
    • by 
    •   8  
      Cyber-Physical SystemsCyber Physical SystemsSecurity MetricsIndustrial Control Systems
    • by 
    •   14  
      Game TheoryEnvironmental ManagementDecision Support SystemsDecision support system
With the significant development of mobile commerce, the integration of physical, social, and cyber worlds is increasingly common. The term Cyber Physical Social Systems is used to capture technology’s human-centric role. With the... more
    • by 
    •   5  
      Information SecurityMachine LearningAccess ControlCyber Physical Systems
    • by 
    •   8  
      Design TheoryHealth ManagementComputer NetworkCyber Physical Systems
Building on some of the growing literature exploring design and AI, our team proposes the concept of Progressive Cyber Human Intelligence (PCHI). We define PCHI as a design approach for interactive, cyber human systems. The approach aims... more
    • by 
    •   3  
      Artificial IntelligenceDesignCyber Physical Systems
    • by 
    •   15  
      Computer ArchitectureCyber Physical SystemsHardwareMicroarchitecture
This report is furnished to the Air Force Office of Scientific Research as the final deliverable for AFOSR Grant FA9550-­‐12-­‐1-­‐0097, “The Role of Benevolence in Trust of Autonomous Systems.” This report provides a summary of the... more
    • by 
    •   8  
      Human Computer InteractionAutonomous Cognitive AgentsTrustAutonomous Robotics
Artificial intelligence can be used to efficiently automate diagnostics, analytics, logging, administering and decision making in the healthcare industry which is facing a human resource crunch in the present times. Artificial... more
    • by 
    •   6  
      Artificial IntelligenceHuman ResourceHealthcareAnalytics
Blockchain has emerged as one of the finest and promising technologies in the last decade. Bitcoin started the journey in 2008 and soon blockchain technology paved the way much beyond cryptocurrencies in form of smart contracts... more
    • by 
    •   5  
      Cyber Physical SystemsDistributed Data StorageBitcoinBlockchain
The manner in which cyber-physical systems are being developed, and will be developed, is coupled strongly with the nature of the ambient economy. Currently, there is a mismatch between enthusiasm for technological change and caution... more
    • by 
    •   8  
      Climate ChangeCyber Physical SystemsPolitical Economy of Climate ChangeEconomic Change
RFID technology is one of the forerunners of pervasive computing, and as such is expected to play an important role in many applications of daily life in the near future, especially in the form of Smart Labels. Based on market... more
    • by 
    •   13  
      RFIDUbiquitous ComputingAccess ControlPervasive Computing
The current environmental, social, and political pressure for more efficient use of energy led to the emergence of new legislation and directives both at National and European levels and, as a consequence, to the creation of various... more
    • by  and +2
    •   4  
      Environmental MonitoringEnergy efficiencyCollaborative NetworksCyber Physical Systems
    • by 
    •   16  
      CardiologyAutomataVerification and ValidationCyber Physical Systems
    • by 
    •   50  
      Social MovementsComputer ScienceComputer Security And ReliabilityInformation Security
With cybercrime’s yearly revenues estimated at $1 trillion and national security networks probed daily and often breached, cyber security is a vital concern for public and private organizations globally. This research ponders the problem... more
    • by 
    •   18  
      Information SecurityMachine LearningData MiningInternational Security
    • by 
    •   6  
      Process ControlSafetyCyber Physical SystemsSafety Instrumented Systems
Model-based design methodologies are commonly used in industry for the development of complex cyber-physical systems (CPSs). There are many different languages, tools, and formalisms for model-based design, each with its strengths and... more
    • by 
    •   6  
      Hybrid SystemsPhilosophy of TimeDiscrete-Event SimulationCyber Physical Systems
We would like to invite you to join this exciting new project as a chapter contributor. Since this is a textbook, a great deal of this chapter entails a survey on the topic under the paradigm of cyber-physical systems, what can be done... more
    • by 
    •   164  
      RoboticsComputer ScienceComputer GraphicsRobotics (Computer Science)
Most of the government, industry, and academic efforts for protecting the power grid against computer attacks have focused on information security mechanisms for preventing and detecting attacks. In this article we give a short... more
    • by  and +1
    •   4  
      Power SystemControl SystemsCybersecurityCyber Physical Systems
    • by 
    •   13  
      Biomedical EngineeringPrincipal Component AnalysisSecurity and PrivacyCyber Physical Systems
In this paper we address the problem of generating a candidate role set for an RBAC configuration that enjoys the following two key features: it minimizes the admin-istration cost; and, it is a stable candidate role-set. To achieve these... more
    • by 
    •   17  
      Computer ScienceInformation SecurityMachine LearningData Mining
    • by  and +1
    •   8  
      Routing protocolsCyber Physical SystemsQuality of ServiceReal Time Systems
IEC61850 is the mainstream of the development for substation automation. This paper presents a practical consideration and analysis for implementing a secure sampled measured value (SeSV) message in substation automation system. Due to... more
    • by 
    •   14  
      Power SystemIntrusion Detection SystemsCryptographyAnomaly Detection
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing
This book collects the proceedings of the International Congress on Health Sciences and Medical Technologies (ICHSMT), held in Tlemcen, Algeria, from December 5 to 7, 2019. The proceedings present a forum for the latest projects and... more
    • by  and +2
    •   20  
      RoboticsArtificial IntelligenceBiomedical EngineeringImage Processing
    • by 
    •   11  
      Power SystemAgent BasedDigital CommunicationCyber Physical Systems
The Fifth Dimension of Conflictuality: The Rise of Cyberspace and Its Effects on In- ternational Politics Cyberspace has become a crucial element for political, social, financial and individual activities. The Information and... more
    • by 
    •   70  
      Information SystemsSociologyArtificial IntelligenceHuman Computer Interaction
The article describes the incentives that would motivate an opponent to incorporate a surprise cyber attack into a conventional operation to defeat US deterrent strategies by presenting the United States with a fait accompli.In describing... more
    • by 
    •   12  
      IntelligenceStrategic SurpriseCyberspaceStrategy
    • by 
    •   9  
      Information SystemsInformation TechnologyInformation SecurityInformation Security Auditing
    • by 
    • Cyber Physical Systems
A Cyber-Physical System (CPS) refers to the interconnection of control (actuation), computational nodes and sensors, in order to manage physical processes. In recent years, the CPS design methodology has been adopted in several... more
    • by 
    •   8  
      Smart GridAuthenticationCyber Physical SystemsCyber Security
An Emergency Response (ER) Cyber-Physical System (CPS) to avoid landslides and survey areas located on or near slopes is introduced that handles two problems: electronic waste disposal, and environmental disasters. Uncomplicated detection... more
    • by 
    •   20  
      Instrumentation EngineeringComputer VisionImage ProcessingInstrumentation and Measurement Science
    • by 
    •   20  
      EngineeringComputer ScienceHuman Computer InteractionEconometrics
The damage and the impact of natural disasters are becoming more destructive with the increase of urbanization. Today's metropolitan cities are not sufficiently prepared for the pre and post-disaster situations. Digital Twin... more
    • by 
    •   9  
      Computer ScienceDisaster ManagementCyber Physical SystemsSmart City
    • by 
    •   25  
      RoboticsMachine LearningData MiningRFID
    • by 
    •   3  
      Optimization MethodsCyber Physical SystemsFunctional generator
Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor... more
    • by  and +7
    •   20  
      RoboticsAerospace EngineeringComputer VisionRemote Sensing
It is very well collected project on Cloud Computing. no need to wandering on internet to search about Cloud computing, Just download it. thanxx A very New Technology In I.T. Industry & Very Important for Everyone i.e. For individuals As... more
    • by 
    •   43  
      Web 2.0Machine LearningData MiningAccess Control
Over the last decade, there has been a trend where water utility companies aim to make water distribution networks more intelligent in order to improve their quality of service, reduce water waste, minimize maintenance costs etc., by... more
    • by 
    •   3  
      Wireless Sensor NetworksCyber Physical SystemsInternet of Things (IoT)
    • by 
    •   180  
      Information SystemsElectronic EngineeringCommunication EngineeringSociology
    • by 
    •   33  
      CensorshipInformation SecurityMachine LearningData Mining
    • by 
    •   13  
      Machine LearningData MiningAccess ControlCloud Computing
With the advancement of Information and Communication Technology (ICT) along with the increase in the use of the internet among the people in our country, there has seen an increase in cybercrime. No one can claim safe from this problem... more
    • by 
    •   20  
      Digital DivideWomen's StudiesDemocracy and Cyber-Democracy Theory and PracticeCyberpsychology
In a digital society, shall we be the authors of our own experience, not only during our lifetime but also after we die? We ask this question because dying and bereavement have become even harder, and much less private, in the digital... more
    • by  and +2
    •   8  
      Human Computer InteractionInnovation PolicyCyber Physical SystemsDigital Zombies
Динамиката на новото дигитално общество създава редица нови предизвикателства пред съвременната сигурност. Днес те се развиват в сложната кибер-физическа смесена реалност, включваща информационното пространство и обективната реалност. В... more
    • by 
    •   5  
      Verification and ValidationSystem Analysis and DesignCyber Physical SystemsCyber Security
    • by 
    •   14  
      Machine LearningData MiningAccess ControlCloud Computing
“Human behaviour and lifestyle continue to change at a rapid pace, increasing over the past few years fuelled by the introduction of digital media and new technologies which have become embedded in the western culture to the degree that... more
    • by 
    •   36  
      Social MovementsPsychologyInformation TechnologyTechnology