Trustworthiness in Mobile Cyber Physical Systems
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increa...
Saved in:
HerausgeberIn: | |
---|---|
Sonstige: | |
Year of Publication: | 2021 |
Language: | English |
Physical Description: | 1 electronic resource (190 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993546325404498 |
---|---|
ctrlnum |
(CKB)5400000000044261 (oapen)https://directory.doabooks.org/handle/20.500.12854/76545 (EXLCZ)995400000000044261 |
collection |
bib_alma |
record_format |
marc |
spelling |
Kang, Kyungtae edt Trustworthiness in Mobile Cyber Physical Systems Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021 1 electronic resource (190 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS. English Technology: general issues bicssc AUTOSAR DAG runnable scheduling control-scheduling codesign lagrange multiplier Mobile Cyber-Physical Systems (MCPS) industry Mobile Sink Groups (MSG) group mobility real-time data delivery Intelligent Transportation System (ITS) deep neural network Red Light Runner (RLR) dynamic signal control intersection safety mixed-criticality power-aware real-time scheduling DVFS security taxonomies event-based systems mobile cyber physical systems security flaws searchable encryption PEKS forward privacy trusted execution environment SGX data quality large-scale high-dimensionality linear discriminant analysis random projection bootstrapping controller area network bus authentication authenticity resiliency sustainability formal verification model checking in-vehicle network model compression adversarial robustness weight pruning adversarial training distillation embedded system secure AI 3-0365-1086-9 3-0365-1087-7 Son, Junggab edt Suh, Hyo-Joong edt Kang, Kyungtae oth Son, Junggab oth Suh, Hyo-Joong oth |
language |
English |
format |
eBook |
author2 |
Son, Junggab Suh, Hyo-Joong Kang, Kyungtae Son, Junggab Suh, Hyo-Joong |
author_facet |
Son, Junggab Suh, Hyo-Joong Kang, Kyungtae Son, Junggab Suh, Hyo-Joong |
author2_variant |
k k kk j s js h j s hjs |
author2_role |
HerausgeberIn HerausgeberIn Sonstige Sonstige Sonstige |
title |
Trustworthiness in Mobile Cyber Physical Systems |
spellingShingle |
Trustworthiness in Mobile Cyber Physical Systems |
title_full |
Trustworthiness in Mobile Cyber Physical Systems |
title_fullStr |
Trustworthiness in Mobile Cyber Physical Systems |
title_full_unstemmed |
Trustworthiness in Mobile Cyber Physical Systems |
title_auth |
Trustworthiness in Mobile Cyber Physical Systems |
title_new |
Trustworthiness in Mobile Cyber Physical Systems |
title_sort |
trustworthiness in mobile cyber physical systems |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute |
publishDate |
2021 |
physical |
1 electronic resource (190 p.) |
isbn |
3-0365-1086-9 3-0365-1087-7 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT kangkyungtae trustworthinessinmobilecyberphysicalsystems AT sonjunggab trustworthinessinmobilecyberphysicalsystems AT suhhyojoong trustworthinessinmobilecyberphysicalsystems |
status_str |
n |
ids_txt_mv |
(CKB)5400000000044261 (oapen)https://directory.doabooks.org/handle/20.500.12854/76545 (EXLCZ)995400000000044261 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Trustworthiness in Mobile Cyber Physical Systems |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796648777850814464 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03873nam-a2200925z--4500</leader><controlfield tag="001">993546325404498</controlfield><controlfield tag="005">20231214133657.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202201s2021 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000044261</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/76545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000044261</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kang, Kyungtae</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trustworthiness in Mobile Cyber Physical Systems</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (190 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">AUTOSAR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DAG</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">runnable scheduling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">control-scheduling codesign</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lagrange multiplier</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile Cyber-Physical Systems (MCPS)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industry</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile Sink Groups (MSG)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">group mobility</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">real-time data delivery</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligent Transportation System (ITS)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep neural network</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Red Light Runner (RLR)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic signal control</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intersection safety</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mixed-criticality</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">power-aware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">real-time scheduling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DVFS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security taxonomies</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">event-based systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mobile cyber physical systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security flaws</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">searchable encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">PEKS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">forward privacy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">trusted execution environment</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SGX</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data quality</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">large-scale</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">high-dimensionality</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">linear discriminant analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">random projection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bootstrapping</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">controller area network bus</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">authenticity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resiliency</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sustainability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">formal verification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">model checking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">in-vehicle network</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">model compression</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">adversarial robustness</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">weight pruning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">adversarial training</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">distillation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">embedded system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure AI</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-1086-9</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-1087-7</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Son, Junggab</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suh, Hyo-Joong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kang, Kyungtae</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Son, Junggab</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suh, Hyo-Joong</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 06:02:21 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338230180004498&Force_direct=true</subfield><subfield code="Z">5338230180004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338230180004498</subfield></datafield></record></collection> |