Trustworthiness in Mobile Cyber Physical Systems

Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increa...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Sonstige:
Year of Publication:2021
Language:English
Physical Description:1 electronic resource (190 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993546325404498
ctrlnum (CKB)5400000000044261
(oapen)https://directory.doabooks.org/handle/20.500.12854/76545
(EXLCZ)995400000000044261
collection bib_alma
record_format marc
spelling Kang, Kyungtae edt
Trustworthiness in Mobile Cyber Physical Systems
Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021
1 electronic resource (190 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
English
Technology: general issues bicssc
AUTOSAR
DAG
runnable scheduling
control-scheduling codesign
lagrange multiplier
Mobile Cyber-Physical Systems (MCPS)
industry
Mobile Sink Groups (MSG)
group mobility
real-time data delivery
Intelligent Transportation System (ITS)
deep neural network
Red Light Runner (RLR)
dynamic signal control
intersection safety
mixed-criticality
power-aware
real-time scheduling
DVFS
security taxonomies
event-based systems
mobile cyber physical systems
security flaws
searchable encryption
PEKS
forward privacy
trusted execution environment
SGX
data quality
large-scale
high-dimensionality
linear discriminant analysis
random projection
bootstrapping
controller area network bus
authentication
authenticity
resiliency
sustainability
formal verification
model checking
in-vehicle network
model compression
adversarial robustness
weight pruning
adversarial training
distillation
embedded system
secure AI
3-0365-1086-9
3-0365-1087-7
Son, Junggab edt
Suh, Hyo-Joong edt
Kang, Kyungtae oth
Son, Junggab oth
Suh, Hyo-Joong oth
language English
format eBook
author2 Son, Junggab
Suh, Hyo-Joong
Kang, Kyungtae
Son, Junggab
Suh, Hyo-Joong
author_facet Son, Junggab
Suh, Hyo-Joong
Kang, Kyungtae
Son, Junggab
Suh, Hyo-Joong
author2_variant k k kk
j s js
h j s hjs
author2_role HerausgeberIn
HerausgeberIn
Sonstige
Sonstige
Sonstige
title Trustworthiness in Mobile Cyber Physical Systems
spellingShingle Trustworthiness in Mobile Cyber Physical Systems
title_full Trustworthiness in Mobile Cyber Physical Systems
title_fullStr Trustworthiness in Mobile Cyber Physical Systems
title_full_unstemmed Trustworthiness in Mobile Cyber Physical Systems
title_auth Trustworthiness in Mobile Cyber Physical Systems
title_new Trustworthiness in Mobile Cyber Physical Systems
title_sort trustworthiness in mobile cyber physical systems
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2021
physical 1 electronic resource (190 p.)
isbn 3-0365-1086-9
3-0365-1087-7
illustrated Not Illustrated
work_keys_str_mv AT kangkyungtae trustworthinessinmobilecyberphysicalsystems
AT sonjunggab trustworthinessinmobilecyberphysicalsystems
AT suhhyojoong trustworthinessinmobilecyberphysicalsystems
status_str n
ids_txt_mv (CKB)5400000000044261
(oapen)https://directory.doabooks.org/handle/20.500.12854/76545
(EXLCZ)995400000000044261
carrierType_str_mv cr
is_hierarchy_title Trustworthiness in Mobile Cyber Physical Systems
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1796648777850814464
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03873nam-a2200925z--4500</leader><controlfield tag="001">993546325404498</controlfield><controlfield tag="005">20231214133657.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202201s2021 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000044261</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/76545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000044261</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kang, Kyungtae</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trustworthiness in Mobile Cyber Physical Systems</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (190 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">AUTOSAR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DAG</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">runnable scheduling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">control-scheduling codesign</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lagrange multiplier</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile Cyber-Physical Systems (MCPS)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industry</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile Sink Groups (MSG)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">group mobility</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">real-time data delivery</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligent Transportation System (ITS)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep neural network</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Red Light Runner (RLR)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic signal control</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">intersection safety</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mixed-criticality</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">power-aware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">real-time scheduling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DVFS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security taxonomies</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">event-based systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">mobile cyber physical systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security flaws</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">searchable encryption</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">PEKS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">forward privacy</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">trusted execution environment</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SGX</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data quality</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">large-scale</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">high-dimensionality</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">linear discriminant analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">random projection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bootstrapping</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">controller area network bus</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">authenticity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">resiliency</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">sustainability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">formal verification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">model checking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">in-vehicle network</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">model compression</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">adversarial robustness</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">weight pruning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">adversarial training</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">distillation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">embedded system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">secure AI</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-1086-9</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-1087-7</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Son, Junggab</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suh, Hyo-Joong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kang, Kyungtae</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Son, Junggab</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suh, Hyo-Joong</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 06:02:21 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338230180004498&amp;Force_direct=true</subfield><subfield code="Z">5338230180004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338230180004498</subfield></datafield></record></collection>