Gotowa bibliografia na temat „Cyber-physic systems”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cyber-physic systems”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cyber-physic systems"
Moro, Thiago Carreta, Fabio Roberto Chavarette, Roberto Outa, Igor Feliciano Merizio i Estevão Fuzaro Almeida. "Detection, Location and Quantification of Structural Faults in a Two-Story Building Using the Artificial Immunological System". Journal of Advances in Applied & Computational Mathematics 9 (24.05.2022): 49–61. http://dx.doi.org/10.15377/2409-5761.2022.09.4.
Pełny tekst źródłaKachanova, T. L., i B. F. Fomin. "Ontologies and Physical Analogues of Two-Particle Intrasystem Interactions Based on Doublets Models". LETI Transactions on Electrical Engineering & Computer Science 16, nr 2 (2023): 54–75. http://dx.doi.org/10.32603/2071-8985-2023-16-2-54-75.
Pełny tekst źródłaKachanova, T. L., i B. F. Fomin. "Ontologies of Actual States and Ontologies of Intrasystem Two-Particle Interactions in Open Systems". LETI Transactions on Electrical Engineering & Computer Science 15, nr 10 (2022): 67–78. http://dx.doi.org/10.32603/2071-8985-2022-15-10-67-78.
Pełny tekst źródłaWang, Wei, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar i Wei Wei. "A Multi-graph Convolutional Network Framework for Tourist Flow Prediction". ACM Transactions on Internet Technology 21, nr 4 (22.07.2021): 1–13. http://dx.doi.org/10.1145/3424220.
Pełny tekst źródłaJin, Tae-Hwan, Ki-Yeol Shin, Mo Chung i Geon-Pyo Lim. "Development and Performance Verification of Frequency Control Algorithm and Hardware Controller Using Real-Time Cyber Physical System Simulator". Energies 15, nr 15 (6.08.2022): 5722. http://dx.doi.org/10.3390/en15155722.
Pełny tekst źródłaKovarikova, Zuzana, Frantisek Duchon, Marek Trebula, Frantisek Nagy, Martin Dekan, Dusan Labat i Andrej Babinec. "Prototyping an intelligent robotic welding workplace by a cyber-physic tool". International Journal of Advanced Manufacturing Technology, 9.02.2023. http://dx.doi.org/10.1007/s00170-023-10986-1.
Pełny tekst źródłaRozprawy doktorskie na temat "Cyber-physic systems"
Trabelsi, Oualid. "Méthodes pour la modélisation des injections de fautes électromagnétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT021.
Pełny tekst źródłaFault injection attacks represent a considerable threat to cyber-physical systems.Therefore, protection against these attacks is required to ensure a high level of security in sensitive applications such as the Internet of Things, smart devices or connected cars.Developing protection requires a good understanding of the attack mechanisms in order to propose effective countermeasures.In terms of fault injection methods, electromagnetic interference has proven to be an effective source of disruption, being less intrusive and with a low cost setup.Besides the adjustment of the injection parameters, the effectiveness of this attack mean lies in the choice of the probe that generates the electromagnetic radiation.The state of the art already proposes many works related to the design and characterization of this type of injector.However, the corresponding results point out to some difference between those from simulation and those from experimental tests.The first part of the thesis addresses the question of the efficiency of magnetic probes, with a focus on their properties.In order to compare the probes, we propose to observe the impact of electromagnetic pulses at the logic level, on particular targets such as FPGA.The characterization is also established according to the variation of the injection parameters such as the amplitude and the polarity of the pulse, the number of pulses or the injection time.These results allowed to converge on the optimal parameters that maximize the effect of the magnetic probes.The characterization is then extended to the architecture level on microcontroller targets.The purpose of the second contribution is to present an analysis approach, based on three generic methods, which are used to determine the vulnerabilities of microcontrollers with respect to instructions or data.These methods concern the identification of vulnerable elements at the architecture level, the analysis of fault models at the bit level, and finally the definition of the temporal fault status, i.e. transient or semi-persistent.Establishing the fault patterns, as well as the number of the impacted instructions or data, is an important milestone for the design of more robust countermeasures.Regarding the latter, instruction-level countermeasures have been proposed against software fault models.Currently, the most common mechanism is to apply a redundant execution of the program to be protected.However, this type of countermeasure is based on the assumption that a fault injection imply a single instruction jump.With respect to our observations, these countermeasures based on instruction-level duplication present vulnerabilities, which we identify and then correct
Costeira, Ivo Micael Frazão. "Applying machine learning techniques on the detection of cyber-physic attacks". Master's thesis, 2018. http://hdl.handle.net/10316/86748.
Pełny tekst źródłaA sociedade atual tem tido uma confiança crescente em Sistemas de Controlo Industrial (e de Automação), especialmente no controlo de Infraestruturas Críticas, tais como a geração, transmissão e distribuição de energia elétrica, ou tratamento de águas, onde o trabalho ininterrupto da infraestrutura é essencial para a segurança e manutenção de uma sociedade moderna. A disrupção das operações normais de tais infraestruturas, devido a uma falha ou ataque, tem o potencial de ter sérias consequências, pelo que estes sistemas têm um significado estratégico que não pode ser ignorado. Estas infraestruturas foram pensadas assumindo que existia uma separação do mundo exterior, contudo, o crescente uso de equipamentos comerciais, e de tecnologias e protocolos abertos tem-nas exposto a ameaças que antigamente não eram uma preocupação.Vários estudos têm proposto várias estratégias para proteger estas infraestruturas, focando-se principalmente em algoritmos novos ou adaptação de algoritmos já conhecidos ao domínio destas infraestruturas. Contudo, as restrições das mesmas têm impedido a existência de conjuntos de dados comuns, dos quais seria possível realizar uma comparação do seu desempenho. Este trabalho procura apresentar alguma introspeção sobre como os algoritmos mais usados na literatura se comportam quando algumas das características dos conjuntos de dados variam, nomeadamente o tamanho da captura de tráfego e o tamanho relativo dos ataques nesses dados. São também estudados os efeitos da afinação de hiperparâmetros desses algoritmos. Finalmente, é também apresentada uma estrutura genérica para a deteção de ataques Man-in-the-Middle, baseada nos tempos de resposta dos pacotes TCP dentro da rede.
Today’s society has had an increasing reliance on Industrial (Automation and) Control Systems, especially in the control of Critical Infrastructures, such as generation, transmission and distribution of electrical energy, or water treatment, and where the uninterrupted work of the infrastructure is essential for the safety and livelihood of a modern society. A disruption of the normal operation of such infrastructures, due to a fault or an attack, has the potential to create serious consequences, whereby these systems have strategic significance, which cannot be ignored. These infrastructures were designed with the assumption that an airgap from the outside world was in place, however, their increasing reliance on Commercial, Off-The-Shelf equipment, open technologies and open protocols has exposed them to threats that previously were not a concern.Several studies have proposed many strategies to secure these infrastructures, which mainly rely on novel algorithms or domain-adaptations of known algorithms. However, the constraints of these infrastructures prevent the existence of common datasets from which a comparison of their performances can be made. This work aims at presenting some insight on how many of the most used algorithms in the literature behave when some of the characteristics of datasets are varied, namely the size of the traffic captures and the relative size of the attacks within those captures. An insight on the effects of hyperparameter tuning of the algorithms is also studied. Finally, a generalized framework for the detection of Man-in-the-Middle attacks is presented based on the Time-To-Response of the TCP packets within the network.
Części książek na temat "Cyber-physic systems"
Domingues, Diana Maria G., i Mateus Rodrigues Miranda. "Affective Presence in Enactive Immersive Space". W Advances in Multimedia and Interactive Technologies, 23–51. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5696-1.ch002.
Pełny tekst źródła