A survey on concepts, applications, and challenges in cyber-physical systems

V Gunes, S Peter, T Givargis, F Vahid - KSII Transactions on …, 2014 - koreascience.kr
Abstract The Cyber-Physical System (CPS) is a term describing a broad range of complex,
multi-disciplinary, physically-aware next generation engineered system that integrates …

A review on remote data auditing in single cloud server: Taxonomy and open issues

M Sookhak, H Talebian, E Ahmed, A Gani… - Journal of Network and …, 2014 - Elsevier
Cloud computing has emerged as a computational paradigm and an alternative to the
conventional computing with the aim of providing reliable, resilient infrastructure, and with …

Information fusion to defend intentional attack in internet of things

PY Chen, SM Cheng, KC Chen - IEEE Internet of Things journal, 2014 - ieeexplore.ieee.org
Robust network design against attacks is one of the most fundamental issues in Internet of
Things (IoT) architecture as IoT operations highly rely on the support of the underlaying …

[图书][B] High-performance embedded computing: applications in cyber-physical systems and mobile computing

M Wolf - 2014 - books.google.com
High-Performance Embedded Computing, Second Edition, combines leading-edge
research with practical guidance in a variety of embedded computing topics, including real …

Data integrity and privacy model in cloud computing

MF Al-Jaberi, A Zainal - 2014 International Symposium on …, 2014 - ieeexplore.ieee.org
Cloud computing is the future of computing industry and it is believed to be the next
generation of computing technology. Among the major concern in cloud computing is data …

Detecting malicious software execution in programmable logic controllers using power fingerprinting

C Aguayo Gonzalez, A Hinton - … Infrastructure Protection VIII: 8th IFIP WG …, 2014 - Springer
Traditional cyber security mechanisms, such as network-based intrusion detection systems
and signature-based antivirus software, have limited effectiveness in industrial control …

[PDF][PDF] Lightweight Optimal Technique for Auditable Secure Cloud Using Hybrid Artificial Intelligence

RR Palle - 2014 - academia.edu
In the era of big data, the exponential growth of data poses significant challenges for
storage, leading many entities to migrate their data to cloud storage services. While cloud …

Plc hardware discrimination using rf-dna fingerprinting

BC Wright - 2014 - scholar.afit.edu
Abstract Programmable Logic Controllers are used to control and monitor automated
process in many Supervisory Control and Data Acquisition (SCADA) critical applications. As …

关键基础设施网络安全技术研究进展

夏卓群, 朱培栋, 欧慧, 戴傲, 范开钦, 许曼琳 - 计算机应用研究, 2014 - cqvip.com
通过对关键基础设施的网络安全现状进行总结, 对关键基础设施的安全威胁进行了分类,
着重对信息物理融合系统在受到网络攻击时采用的数据词典, 证据理论, 博弈论等方法进行网络 …

[PDF][PDF] A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key

QA Kester, L Nana, AC Pascu, S Gire… - International Journal of …, 2014 - core.ac.uk
The high increase in the transmission of digital data over secured and unsecured
communications channels poses a lot of security and privacy concerns to both the …