Browse Results

Showing 15,176 through 15,200 of 68,680 results

Cyber-Bullying: Issues and Solutions for the School, the Classroom and the Home

by Shaheen Shariff

This book looks in depth at the emerging issue of cyber-bullying. In this increasingly digital world cyber-bullying has emerged as an electronic form of bullying that is difficult to monitor or supervise because it often occurs outside the physical school setting and outside school hours on home computers and personal phones. These web-based and mobile technologies are providing young people with what has been described as: ‘an arsenal of weapons for social cruelty’. These emerging issues have created an urgent need for a practical book grounded in comprehensive scholarship that addresses the policy-vacuum and provides practical educational responses to cyber-bullying. Written by one of the few experts on the topic Cyber-Bullying develops guidelines for teachers, head teachers and administrators regarding the extent of their obligations to prevent and reduce cyber-bullying. The book also highlights ways in which schools can network with parents, police, technology providers and community organizations to provide support systems for victims (and perpetrators) of cyber-bullying.

Cyber Careers: The Basics of Information Technology and Deciding on a Career Path

by Pee Vululleh

The approach taken in this book emphasizes the basics of information technology and helps students decide whether to pursue an information technology career. Most students fail to pursue an IT career because of their limited knowledge (sometimes no knowledge) about the area. Similarly, most students pursuing a career in IT do not research the field before their pursuit. This book is purposely designed for students in this category. The book may be offered as a required text for an elective or core course to all bachelor's degree students regardless of specialization. Compared to other textbooks, this text guides students pursuing or wanting to pursue an IT degree/career. Most students often begin their study of IT without knowing the outside and inside of the area. Most of these students can change their minds to pursue a different career path after spending several semesters of studies, a waste of their time. If students are taught from the onset about what an IT career entails and what it takes to become successful, it will significantly help students and not waste their time. This book addresses the issue.

Cyber-Collaborative Algorithms and Protocols: Optimizing Agricultural Robotics (Automation, Collaboration, & E-Services #15)

by Shimon Y. Nof Puwadol Oak Dusadeerungsikul

Revolutionizing the field of complex system optimization and management, this book introduces the innovative concept of cyber-collaborative protocols (CCP), representing a new approach to managing the complexity of interconnected systems. Departing from traditional methods, this book emphasizes collaboration, efficiency, and intelligence within cyber-physical systems (CPS), with a specific focus on precision agriculture and agricultural robotics systems (ARS). With a combination of theoretical foundations and practical applications, the book explores CCP’s unique advantages and potential to enhance system effectiveness to address real-world critical issues such as food security. This book is an essential resource for diverse audiences, including academics and students in the fields of complex systems design and management, as well as professionals and practitioners. Importantly, the book provides a forward-looking perspective on the role of engineered collaboration in complex CPS.

Cyber Crime and Cyber Terrorism

by Robert Taylor Eric Fritsch John Liederbach Michael Saylor William Tafoya

This book is a comprehensive introduction to the acts and theories of cyber crime, cyber terrorism, and information warfare. Assuming no prior knowledge of technology, the authors cover the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other digital criminals, and investigative, research, and legal strategies targeting these acts. Like no other on the market, the text bridges the gap between criminal justice knowledge and the technical issues that arise during investigations of cyber crime. The 4th edition adds material on new technologies and trends, plus updated review questions and activities.

Cyber Criminology (Advanced Sciences and Technologies for Security Applications)

by Hamid Jahankhani

This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field.As Governments, corporations, security firms, and individuals look to tomorrow’s cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern. Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups. Due to the rapid changes in technology, cyber criminals’ behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals’ behaviour is evolving over time as they learn from their actions and others’ experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought. This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understanding of these motives, researchers, governments and practitioners can take effective measures to tackle cybercrime and reduce victimization.

Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World

by Eric Cole

Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day. Today, we live our lives—and conduct our business—online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. Cybersecurity attacks have increased exponentially, but because they're stealthy and often invisible, many underplay, ignore, or simply don't realize the danger. By the time they discover a breach, most individuals and businesses have been compromised for over three years. Instead of waiting until a problem surfaces, avoiding a data disaster means acting now to prevent one. In Cyber Crisis, Eric Cole gives readers a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience—as a professional hacker for the CIA, as the Obama administration's cybersecurity commissioner, and as a consultant to clients around the globe from Bill Gates to Lockheed Martin and McAfee—Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives—in healthcare and finance, for governments and private citizens—is both critical and vulnerable, and sooner or later, you or your company will be a target. This book is your guide to understanding the threat and putting together a proactive plan to minimize exposure and damage, and ensure the security of your business, your family, and your future

Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications)

by Hamid Jahankhani Stefan Kendzierskyj Nishan Chelvachandran Jaime Ibarra

This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework. A detailed view of the cyber-attack landscape will be garnered; touching on the tactics, techniques and procedures used, red and blue teaming initiatives, cyber resilience and the protection of larger scale systems. The integration of AI, smart societies, the human-centric approach and Augmented Humanity is discernible in the exponential growth, collection and use of [big] data; concepts woven throughout the diversity of topics covered in this publication; which also discusses the privacy and transparency of data ownership, and the potential dangers of exploitation through social media. As humans are become ever more interconnected, with the prolificacy of smart wearable devices and wearable body area networks, the availability of and abundance of user data and metadata derived from individuals has grown exponentially. The notion of data ownership, privacy and situational awareness are now at the forefront in this new age.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online (Not A Ser.)

by Mary Aiken

A groundbreaking exploration of how cyberspace is changing the way we think, feel, and behave Mary Aiken is the world's leading expert in forensic cyberpsychology--a discipline that combines psychology, criminology, and technology to investigate the intersection where technology and human behavior meet. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, security, and our perception of the world. Cyberspace is an environment full of surveillance, but who is looking out for us? The Cyber Effect offers a fascinating and chilling look at a future we can still do something about. Drawing on her own research and extensive experience with law enforcement, Mary Aiken covers a wide range of subjects from the impact of screens on the developing child to the explosion of teen sexting, and the acceleration of compulsive and addictive behaviors online (gaming, shopping, pornography). She examines the escalation of cyberchondria (anxiety produced by self-diagnosing online), cyberstalking, and organized cybercrime in the Deep Web. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us. The Cyber Effect will upend your assumptions about your online life and forever change the way you think about the technology you, your friends, and family use. Readers will gain a new understanding of the rapid change taking shape around us and come away with critical tools to become part of this very necessary conversation.Advance praise for The Cyber Effect"Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time."--Bob Woodward "Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace."--John R. Suler, PhD, author of The Psychology of Cyberspace"Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense. A must-read for this moment in time."--Steven D. Levitt, co-author of the New York Times bestseller Freakonomics"Figuring out how to guide kids in a hyperconnected world is one of the biggest challenges for today's parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives."--Peggy Orenstein, author of the New York Times bestseller Girls & Sex "Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today's digital tools can be exploited by criminals lurking in the Internet's Dark Net."--NewsweekFrom the Hardcover edition.

Cyber Forensics: Examining Emerging and Hybrid Technologies

by Albert J. Marcella

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

Cyber Intelligence and Information Retrieval: Proceedings of CIIR 2023, Volume 2 (Lecture Notes in Networks and Systems #1025)

by Satyajit Chakrabarti Abhishek Bhattacharya Soumi Dutta Celia Shahnaz

This book features selected research papers presented at the 2nd International Conference on Cyber Intelligence and Information Retrieval (CIIR 2023) held at the Institute of Engineering & Management, Kolkata, India, in association with CSI Kolkata section on 14-15 December 2023. Cyber intelligence and information retrieval are closely related fields that deal with the collection, analysis, and utilization of data and information from various digital sources. These fields are crucial in today's digital age, where vast amounts of data are generated and stored electronically. By combining the strengths of cyber intelligence and information retrieval, organizations can enhance their ability to detect, respond to, and mitigate cyber threats, while also improving their overall cybersecurity posture and decision-making processes. This book comprises high-quality research work by academicians and industrial experts in the field of artificial intelligence, data analytics, computing, and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data analytics, machine learning, Internet of Things (IoT), information security, etc.

Cyber Intelligence and Information Retrieval: Proceedings of CIIR 2021 (Lecture Notes in Networks and Systems #291)

by João Manuel R. S. Tavares Paramartha Dutta Soumi Dutta Debabrata Samanta

This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2021), held at Institute of Engineering & Management, Kolkata, India during 20–21 May 2021. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high-performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.

Cyber Kids, Cyber Bullying, Cyber Balance

by Constance Hanel Barbara C. Trolley

Emphasizing prevention, assessment, and evaluation, this proactive guide shows how to advance learning, reduce cyber bullying, and improve school climate by helping students use technology responsibly.

Cyber Knights 1.1

by Harold Coyle Jennifer Ellis

Cyber Knights 1.1 is the second part in a stunning two-part collection of stories based on true-life cyber vulnerabilities, by Harold Coyle and Jennifer EllisHere be Dragons. In the Age of Discovery, unexplored areas of a map were often marked with this warning. Today, such a warning could easily be applied to the internet. Hackers and cyber assassins present a constant threat to individuals, companies, and institutions. Protecting these targets requires a new kind of warrior, a cyber knight armed with the skills, weapons, and savvy needed to slay today's dragons. One such digital warrior is Andy Webb, a former British Army officer. Together with Karen Spencer, a shy, twenty-something American who is a wizard when it comes to software, and Tommy Tyler, a rough and ready ex-soldier and hardware expert, Webb forms Century Consultants. The cyber security firm must work to defend its clients from the hackers, criminals and hired cyber assassins who seek out victims on the world wide web.

Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms

by Aimee M. Bissonette

An essential overview of legal issues related to technology, this resource provides case summaries and proactive strategies on privacy, security, copyright, appropriate online behavior, and more.

Cyber Law and Ethics: Regulation of the Connected World

by Mark Grabowski Eric P. Robinson

A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in journalism, technology and legal practice, provide readers with expert insights into the nuts and bolts of cyber law. Cyber Law and Ethics: Regulation of the Connected World provides a practical presentation of legal principles, and is essential reading for non-specialist students dealing with the intersection of the internet and the law.

Cyber Malware: Offensive and Defensive Systems (Security Informatics and Law Enforcement)

by Iman Almomani Leandros A. Maglaras Mohamed Amine Ferrag Nick Ayres

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

Cyber Physical, Computer and Automation System: A Study of New Technologies (Advances in Intelligent Systems and Computing #1291)

by Endra Joelianto Arjon Turnip Augie Widyotriatmo

This book is a collection of extended papers presented at the Cyber Physical, Computer and Automation System (CPCAS 2019), Bali – Indonesia, 13–15 November 2019. The book includes chapters in three prime areas: (1) autonomous systems and controls; (2) human–machine interaction and human-related engineering; and (3) interconnected things. Autonomous systems and controls are systems of engineering that work with or without human intervention. Human–machine interaction involves sensor and actuator technology to detect human behavior, intentions, and decisions and also to provide the ability of a machine to interact with humans to achieve the expected performance. Interconnected things consist of a network of computer-controlled physical mechanisms communicating with each other for efficient operation and improving system capabilities.

Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications

by Huadong Mo Giovanni Sansavini Min Xie

CYBER-PHYSICAL DISTRIBUTED SYSTEMS Gather detailed knowledge and insights into cyber-physical systems behaviors from a cutting-edge reference written by leading voices in the field In Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications, distinguished researchers and authors Drs. Huadong Mo, Giovanni Sansavini, and Min Xie deliver a detailed exploration of the modeling and reliability analysis of cyber physical systems through applications in infrastructure and energy and power systems. The book focuses on the integrated modeling of systems that bring together physical and cyber elements and analyzing their stochastic behaviors and reliability with a view to controlling and managing them. The book offers a comprehensive treatment on the aging process and corresponding online maintenance, networked degradation, and cyber-attacks occurring in cyber-physical systems. The authors include many illustrative examples and case studies based on real-world systems and offer readers a rich set of references for further research and study. Cyber-Physical Distributed Systems covers recent advances in combinatorial models and algorithms for cyber-physical systems modeling and analysis. The book also includes: A general introduction to traditional physical/cyber systems, and the challenges, research trends, and opportunities for real cyber-physical systems applications that general readers will find interesting and useful Discussions of general modeling, assessment, verification, and optimization of industrial cyber-physical systems Explorations of stability analysis and enhancement of cyber-physical systems, including the integration of physical systems and open communication networks A detailed treatment of a system-of-systems framework for the reliability analysis and optimal maintenance of distributed systems with aging components Perfect for undergraduate and graduate students in computer science, electrical engineering, cyber security, industrial and system engineering departments, Cyber-Physical Distributed Systems will also earn a place on the bookshelves of students taking courses related to reliability, risk and control engineering from a system perspective. Reliability, safety and industrial control professionals will also benefit greatly from this book.

Cyber-Physical Energy and Power Systems: Modeling, Analysis and Application

by Yijia Cao Yong Li Xuan Liu Christian Rehtanz

This book discusses recent advances in cyber-physical power systems (CPPS) in the modeling, analysis and applications of smart grid. It introduces a series of models, such as an analysis of interaction between the power grid and the communication network, differential protection in smart distribution systems, data flow for VLAN-based communication in substations, a co-simulation model for investigating the impacts of cyber-contingency and distributed control systems as well as the analytical techniques used in different parts of cyber physical energy systems. It also discusses methods of cyber-attack on power systems, particularly false data injection. The results presented are a comprehensive summary of the authors’ original research conducted over a period of 5 years. The book is of interest to university researchers, R&D engineers and graduate students in power and energy systems.

Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership)

by Anuradha M. Annaswamy Pramod P. Khargonekar Françoise Lamnabhi‐Lagarrigue Sarah K. Spurgeon

Cyber–Physical–Human Systems A comprehensive edited volume exploring the latest in the interactions between cyber–physical systems and humans In Cyber–Physical–Human Systems: Fundamentals and Applications, a team of distinguished researchers delivers a robust and up-to-date volume of contributions from leading researchers on Cyber–Physical–Human Systems, an emerging class of systems with increased interactions between cyber–physical, and human systems communicating with each other at various levels across space and time, so as to achieve desired performance related to human welfare, efficiency, and sustainability. The editors have focused on papers that address the power of emerging CPHS disciplines, all of which feature humans as an active component during cyber and physical interactions. Articles that span fundamental concepts and methods to various applications in engineering sectors of transportation, robotics, and healthcare and general socio-technical systems such as smart cities are featured. Together, these articles address challenges and opportunities that arise due to the emerging interactions between cyber–physical systems and humans, allowing readers to appreciate the intersection of cyber–physical system research and human behavior in large-scale systems. In the book, readers will also find: A thorough introduction to the fundamentals of cyber–physical–human systems In-depth discussions of cyber–physical–human systems with applications in transportation, robotics, and healthcare A comprehensive treatment of socio-technical systems, including social networks and smart cities Perfect for cyber–physical systems researchers, academics, and graduate students, Cyber–Physical–Human Systems: Fundamentals and Applications will also earn a place in the libraries of research and development professionals working in industry and government agencies.

Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0

by Vikram Bali Vishal Bhatnagar Deepti Aggarwal Shivani Bali Mario José Diván

This book addresses topics related to the Internet of Things (IoT), machine learning, cyber-physical systems, cloud computing, and autonomous vehicles in Industry 4.0. It investigates challenges across multiple sectors and industries and considers Industry 4.0 for operations research and supply chain management.Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0 encourages readers to develop novel theories and enrich their knowledge to foster sustainability. It examines the recent research trends and the future of cyber-physical systems, IoT, and autonomous systems as they relate to Industry 4.0. This book is intended for undergraduates, postgraduates, academics, researchers, and industry individuals to explore new ideas, techniques, and tools related to Industry 4.0.

Cyber-Physical Laboratories in Engineering and Science Education

by Michael E. Auer Arthur Edwards Ton De Jong Abul K.M. Azad

This volume investigates a number of issues needed to develop a modular, effective, versatile, cost effective, pedagogically-embedded, user-friendly, and sustainable online laboratory system that can deliver its true potential in the national and global arenas. This allows individual researchers to develop their own modular systems with a level of creativity and innovation while at the same time ensuring continuing growth by separating the responsibility for creating online laboratories from the responsibility for overseeing the students who use them. The volume first introduces the reader to several system architectures that have proven successful in many online laboratory settings. The following chapters then describe real-life experiences in the area of online laboratories from both technological and educational points of view. The volume further collects experiences and evidence on the effective use of online labs in the context of a diversity of pedagogical issues. It also illustrates successful online laboratories to highlight best practices as case studies and describes the technological design strategies, implementation details, and classroom activities as well as learning from these developments. Finally the volume describes the creation and deployment of commercial products, tools and services for online laboratory development. It also provides an idea about the developments that are on the horizon to support this area.

Cyber-Physical Microgrids

by Yan Li

This textbook provides students with an overview of cyber-physical microgrid networks and an in-depth introduction to photovoltaics, batteries, flywheel, supercapacitor, micro-turbines, wind generation, power-electronic interfaces, modeling and stability analysis of microgrids, and cyber-communication networks and security. The text helps upper-level undergraduate and graduate students gain a foundational understanding of microgrids and renewable energy, and offers an introduction to the frontier of theoretical research and practical applications of cyber-physical systems, paving the way to uncover and understand the operational mechanism of cyber-physical microgrids. The book includes examples and test systems throughout for problem-solving and will be an essential resource for students, researchers, and professionals in power engineering.

Cyber Physical System 2.0: Communication and Computational Technologies

by Amitkumar Vidyakant Jha Bhargav Appasani

The book covers the emerging communication and computational technologies for future cyber-physical systems and discusses the security of in-vehicle communication protocols using automotive embedded systems, presenting an in-depth analysis across various domains, such as manufacturing, transportation, health-care, and smart cities.This book: Discusses how communication and computing co-design provides dynamic adaptability and centralized control. Presents the convergence of physical and digital realities within the metaverse and multiverse, setting the stage for the future of cyber-physical-social systems (CPSS). Presents emerging communication and computational technologies, such as 6G, software-defined networking, cloud computing, blockchain, artificial intelligence, machine learning, virtual reality, and blockchain, for the design and implementation of cyber-physical systems. Explores advanced topics such as security and privacy in industrial CPS, strategies for protecting serial industrial networks, and enhancing firmware update security in automotive systems. It is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science and engineering, and information technology.

Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan Meetings

by Jean-Pierre Talpin Shin Nakajima Masumi Toyoshima Huafeng Yu

Providing a wide variety of technologies for ensuring the safety and dependability of cyber-physical systems (CPS), this book offers a comprehensive introduction to the architecture-centric modeling, analysis, and verification of CPS. In particular, it focuses on model driven engineering methods including architecture description languages, virtual prototyping, and formal analysis methods. CPS are based on a new design paradigm intended to enable emerging software-intensive systems. Embedded computers and networks monitor and control the physical processes, usually with the help of feedback loops where physical processes affect computations and vice versa. The principal challenges in system design lie in this constant interaction of software, hardware and physics. Developing reliable CPS has become a critical issue for the industry and society, because many applications such as transportation, power distribution, medical equipment and tele-medicine are dependent on CPS. Safety and security requirements must be ensured by means of powerful validation tools. Satisfying such requirements, including quality of service, implies having formally proven the required properties of the system before it is deployed. The book is concerned with internationally standardized modeling languages such as AADL, SysML, and MARTE. As the effectiveness of the technologies is demonstrated with industrial sample cases from the automotive and aerospace sectors, links between the methods presented and industrial problems are clearly understandable. Each chapter is self-contained, addressing specific scientific or engineering problems, and identifying further issues. In closing, it includes perspectives on future directions in CPS design from an architecture analysis viewpoint.

Refine Search

Showing 15,176 through 15,200 of 68,680 results