메뉴 건너뛰기




Volumn 95, Issue 10-11, 2013, Pages 927-948

Multi-cyber framework for availability enhancement of cyber physical systems

Author keywords

Availability; Computational part; Cyber physical system; Cybers; Security

Indexed keywords

COMPUTATIONAL COMPONENTS; COMPUTATIONAL PART; CYBER PHYSICAL SYSTEMS (CPSS); CYBER-PHYSICAL SYSTEMS (CPS); CYBERS; INFRASTRUCTURE SYSTEMS; SECURITY; WIRELESS COMMUNICATIONS;

EID: 84885579314     PISSN: 0010485X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00607-012-0227-7     Document Type: Article
Times cited : (33)

References (28)
  • 2
    • 84869073557 scopus 로고    scopus 로고
    • Accessed 24 Feb 2012
    • Baheti R, Gill H Cyber-physical Systems. http://ieeecss.org/sites/ ieeecss.org/files/documents/IoCT-Part3-02CyberphysicalSystems.pdf. Accessed 24 Feb 2012
    • Cyber-physical Systems
    • Baheti, R.1    Gill, H.2
  • 4
    • 83755207008 scopus 로고    scopus 로고
    • A cyber-physical integrated security framework with fuzzy logic assessment for cultural heritages
    • Anchorage, Alaska
    • Chen Y-J, Shih J-S, Cheng S-T (2011) A cyber-physical integrated security framework with fuzzy logic assessment for cultural heritages. In: Proceedings of the conference on systems, man, and cybernetics, Anchorage, Alaska, pp 1843-1847
    • (2011) Proceedings of the Conference on Systems, Man, and Cybernetics , pp. 1843-1847
    • Chen, Y.-J.1    Shih, J.-S.2    Cheng, S.-T.3
  • 5
    • 84863023833 scopus 로고    scopus 로고
    • A survey on security issues of M2M communications in cyber-physical systems
    • Chen D, Hang G (2012) A survey on security issues of M2M communications in cyber-physical systems. KSII Transact Internet and Inf Sys 6:24-45
    • (2012) KSII Transact Internet and Inf Sys , vol.6 , pp. 24-45
    • Chen, D.1    Hang, G.2
  • 7
    • 85029602140 scopus 로고    scopus 로고
    • Accessed 12 May 2010
    • Cyber Physical Systems Summit (2010) http://varma.ece.cmu.edu/Summit/. Accessed 12 May 2010
    • (2010) Cyber Physical Systems Summit
  • 9
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • 10.1016/S1570-8705(03)00008-8
    • Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2 - 3):293-315
    • (2003) Ad Hoc Netw , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 10
    • 84863162296 scopus 로고    scopus 로고
    • Reconfigurable and parallelized network coding decoder for VANETs
    • Kim S, Ro WW (2012) Reconfigurable and parallelized network coding decoder for VANETs. Mobile Inf Sys 8(1):45-59
    • (2012) Mobile Inf Sys , vol.8 , Issue.1 , pp. 45-59
    • Kim, S.1    Ro, W.W.2
  • 12
    • 70449623243 scopus 로고    scopus 로고
    • A general framework for quantitative modeling of dependability in cyber-physical systems: A proposal for doctoral research
    • Seattle,US
    • Lin J, Sedigh S, Miller A (2009) A general framework for quantitative modeling of dependability in cyber-physical systems: a proposal for doctoral research. In: Proceedings of the conference on computer software and applications, Seattle,US, pp 668-671
    • (2009) Proceedings of the Conference on Computer Software and Applications , pp. 668-671
    • Lin, J.1    Sedigh, S.2    Miller, A.3
  • 15
    • 84885632136 scopus 로고    scopus 로고
    • S3A: Secure system simplex architecture for enhanced security of cyber-physical systems
    • Mohan S, Bak S, Betti E, Yun H, Sha L, Caccamo M, S3A: secure system simplex architecture for enhanced security of cyber-physical systems. In: Proceedings of CoRR.2012. http://arxiv.org/pdf/1202.5722.pdf
    • (2012) Proceedings of CoRR
    • Mohan, S.1    Bak, S.2    Betti, E.3    Yun, H.4    Sha, L.5    Caccamo, M.6
  • 16
    • 84859448699 scopus 로고    scopus 로고
    • Cooperation as a service in VANET: Implementation and simulation results
    • Mousannif H, Khalil I, Olariu S (2012) Cooperation as a service in VANET: implementation and simulation results. Mobile Inf Sys 8(2):153-172
    • (2012) Mobile Inf Sys , vol.8 , Issue.2 , pp. 153-172
    • Mousannif, H.1    Khalil, I.2    Olariu, S.3
  • 18
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • 10.1145/990680.990707
    • Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Mag Commun ACM 47(6):53-57
    • (2004) Mag Commun ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 19
    • 77954320949 scopus 로고    scopus 로고
    • Towards a trust aware cognitive radio architecture, ACM SIGMOBILE
    • 10.1145/1621076.1621085
    • Qin T, Yu H, Leung C, Shen Z, Miao C (2009) Towards a trust aware cognitive radio architecture, ACM SIGMOBILE. Mobile Comput Commun 13(2):86-95
    • (2009) Mobile Comput Commun , vol.13 , Issue.2 , pp. 86-95
    • Qin, T.1    Yu, H.2    Leung, C.3    Shen, Z.4    Miao, C.5
  • 22
    • 65249174979 scopus 로고    scopus 로고
    • Availability analysis of application servers using software rejuvenation and virtualization
    • 10.1007/s11390-009-9228-1
    • Thein T, Park JS (2009) Availability analysis of application servers using software rejuvenation and virtualization. J Comput Sci Technol 24(2):339-346
    • (2009) J Comput Sci Technol , vol.24 , Issue.2 , pp. 339-346
    • Thein, T.1    Park, J.S.2
  • 24
    • 84855303509 scopus 로고    scopus 로고
    • A secured health care application architecture for cyber-physical systems
    • Wang J, Abid H, Lee S, Shu L, Xia F (2011) A secured health care application architecture for cyber-physical systems. J Control Eng Appl Inform 13(3):101-108
    • (2011) J Control Eng Appl Inform , vol.13 , Issue.3 , pp. 101-108
    • Wang, J.1    Abid, H.2    Lee, S.3    Shu, L.4    Xia, F.5
  • 26
    • 79960924365 scopus 로고    scopus 로고
    • From wireless sensor networks towards cyber physical systems
    • 10.1016/j.pmcj.2011.03.003
    • Wu FJ, Kao YF, Tseng YC (2011) From wireless sensor networks towards cyber physical systems. Pervasive Mobile Comput 7(4):397-413
    • (2011) Pervasive Mobile Comput , vol.7 , Issue.4 , pp. 397-413
    • Wu, F.J.1    Kao, Y.F.2    Tseng, Y.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.