Trustworthiness in Mobile Cyber Physical Systems

Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the 'cyberworld' of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously,...

Full description

Saved in:
Bibliographic Details
Other Authors: Kang, Kyungtae (Editor), Son, Junggab (Editor), Suh, Hyo-Joong (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_76545
005 20220111
003 oapen
006 m o d
007 cr|mn|---annan
008 20220111s2021 xx |||||o ||| 0|eng d
020 |a books978-3-0365-1087-3 
020 |a 9783036510866 
020 |a 9783036510873 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-1087-3  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a TB  |2 bicssc 
100 1 |a Kang, Kyungtae  |4 edt 
700 1 |a Son, Junggab  |4 edt 
700 1 |a Suh, Hyo-Joong  |4 edt 
700 1 |a Kang, Kyungtae  |4 oth 
700 1 |a Son, Junggab  |4 oth 
700 1 |a Suh, Hyo-Joong  |4 oth 
245 1 0 |a Trustworthiness in Mobile Cyber Physical Systems 
260 |a Basel, Switzerland  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2021 
300 |a 1 electronic resource (190 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the 'cyberworld' of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
653 |a AUTOSAR 
653 |a DAG 
653 |a runnable scheduling 
653 |a control-scheduling codesign 
653 |a lagrange multiplier 
653 |a Mobile Cyber-Physical Systems (MCPS) 
653 |a industry 
653 |a Mobile Sink Groups (MSG) 
653 |a group mobility 
653 |a real-time data delivery 
653 |a Intelligent Transportation System (ITS) 
653 |a deep neural network 
653 |a Red Light Runner (RLR) 
653 |a dynamic signal control 
653 |a intersection safety 
653 |a mixed-criticality 
653 |a power-aware 
653 |a real-time scheduling 
653 |a DVFS 
653 |a security taxonomies 
653 |a event-based systems 
653 |a mobile cyber physical systems 
653 |a security flaws 
653 |a searchable encryption 
653 |a PEKS 
653 |a forward privacy 
653 |a trusted execution environment 
653 |a SGX 
653 |a data quality 
653 |a large-scale 
653 |a high-dimensionality 
653 |a linear discriminant analysis 
653 |a random projection 
653 |a bootstrapping 
653 |a controller area network bus 
653 |a authentication 
653 |a authenticity 
653 |a resiliency 
653 |a sustainability 
653 |a formal verification 
653 |a model checking 
653 |a in-vehicle network 
653 |a model compression 
653 |a adversarial robustness 
653 |a weight pruning 
653 |a adversarial training 
653 |a distillation 
653 |a embedded system 
653 |a secure AI 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/3991  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/76545  |7 0  |z DOAB: description of the publication