Biblio

Found 19604 results

Artwork
[Anonymous].  2014.  Title.
Book
Suh, Sang C, Tanik, U John, Carbone, John N, Eroglu, Abdullah.  2014.  Applied cyber-physical systems.

Applied Cyber-Physical Systems presents the latest methods and technologies in the area of cyber-physical systems including medical and biological applications. Cyber-physical systems (CPS) integrate computing and communication capabilities by monitoring, and controlling the physical systems via embedded hardware and computers.

This book brings together unique contributions from renowned experts on cyber-physical systems research and education with applications. It also addresses the major challenges in CPS, and then provides a resolution with various diverse applications as examples.

Advanced-level students and researchers focused on computer science, engineering and biomedicine will find this to be a useful secondary text book or reference, as will professionals working in this field.

Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., Weippl, E..  2017.  Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools - IEEE Conference Publication.

In this paper, we quantify the effectiveness of third-party tracker blockers on a large scale. First, we analyze the architecture of various state-of-the-art blocking solutions and discuss the advantages and disadvantages of each method. Second, we perform a two-part measurement study on the effectiveness of popular tracker-blocking tools. Our analysis quantifies the protection offered against trackers present on more than 100,000 popular websites and 10,000 popular Android applications. We provide novel insights into the ongoing arms race between trackers and developers of blocking tools as well as which tools achieve the best results under what circumstances. Among others, we discover that rule-based browser extensions outperform learning-based ones, trackers with smaller footprints are more successful at avoiding being blocked, and CDNs pose a major threat towards the future of tracker-blocking tools. Overall, the contributions of this paper advance the field of web privacy by providing not only the largest study to date on the effectiveness of tracker-blocking tools, but also by highlighting the most pressing challenges and privacy issues of third-party tracking.
 

Suzuki, Junichi, Boonma, Pruet, Omura, Shingo, Munehira, Toshimi.  2016.  Cloud-integrated Cyber-Physical Systems.

This book provides a medium for researchers and practitioners to understand the synergy of cloud computing with various technologies enabling cyber-physical systems. These technologies comprise sensor-actuator networks, Internet of Things, machine-to-machine communication, or Supervisory Control and Data Acquisition. The technologies are applied to agriculture, atmospheric engineering, automotive/avionics systems, biomedical monitoring, computer vision, emergency response, entertainment, energy engineering, environmental informatics, green engineering, healthcare, industrial process control, logistics and transportation, marine science, manufacturing, mechanical engineering, nanoscience, pervasive computing, prosthetics, robotics, smart garments, sports science, and surveillance.

Sardar, Muhammad, Fetzer, Christof.  2021.  Confidential Computing and Related Technologies: A Review.
With a broad spectrum of technologies for the protection of personal data, it is important to be able to reliably compare these technologies to choose the most suitable one for a given problem. Although technologies like Homomorphic Encryption have matured over decades, Confidential Computing is still in its infancy with not only informal but also incomplete and even conflicting definitions by the Confidential Computing Consortium (CCC). In this work, we present key issues in definitions and comparison among existing technologies by CCC. We also provide recommendations to achieve clarity and precision in the definitions as well as fair and scientific comparison among existing technologies. We emphasize on the need of formal definitions of the terms and pose it as an open challenge to the community.
Robling Denning, Dorothy Elizabeth.  1982.  Cryptography and Data Security. :414.

Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these systems to process and store data, we have also come to wonder about their ability to protect valuable data.

Data security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles. There are many references for those who would like to study specific topics further.

Data security has evolved rapidly since 1975. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. We have developed techniques for verifying that programs do not leak confidential data, or transmit classified data to users with lower security clearances. We have found new controls for protecting data in statistical databases--and new methods of attacking these databases. We have come to a better understanding of the theoretical and practical limitations to security.

This article was identified by the SoS Best Scientific Cybersecurity Paper Competition Distinguished Experts as a Science of Security Significant Paper. The Science of Security Paper Competition was developed to recognize and honor recently published papers that advance the science of cybersecurity. During the development of the competition, members of the Distinguished Experts group suggested that listing papers that made outstanding contributions, empirical or theoretical, to the science of cybersecurity in earlier years would also benefit the research community.

Khaitan, Siddhartha Kumar, McCalley, James D, Liu, Chen Ching.  2015.  Cyber physical systems approach to smart electric power grid.

This book documents recent advances in the field of modeling, simulation, control, security and reliability of Cyber- Physical Systems (CPS) in power grids. The aim of this book is to help the reader gain insights into working of CPSs and understand their potential in transforming the power grids of tomorrow. This book will be useful for all those who are interested in design of cyber-physical systems, be they students or researchers in power systems, CPS modeling software developers, technical marketing professionals and business policy-makers.

Liu, Chi Harold, Zhang, Yan.  2015.  Cyber Physical Systems: Architectures, Protocols and Applications. 22

Cyber Physical Systems: Architectures, Protocols and Applications helps you understand the basic principles and key supporting standards of CPS. It analyzes different CPS applications from the bottom up, extracting the common characters that form a vertical structure. It presents mobile sensing platforms and their applications toward interrelated paradigms, highlighting and briefly discussing different types of mobile sensing platforms and the functionalities they offer. It then looks at the naming, addressing, and profile services of CPS and proposes a middleware component to meet the requirements of dynamic applications and sensors/actuators deployment/configurations across different platforms.

Ragunathan(Raj) Rajkumar, Dionisio de Niz, Mark Klein.  2017.  Cyber-Physical Systems.

The only book of its kind, Cyber-Physical Systems addresses CPS from three perspectives. First, it presents the challenges and innovations associated with this class of systems as they have arisen in a wide spectrum of application domains. Second, it describes the foundations that underlie CPS solutions, both in terms of what we know and emerging research challenges. Finally, it offers offer guiding principles for all levels, from specific design and analysis advice for practitioners to high-level perspectives that can guide the direction of new innovations.

Siddesh, Gaddadevara Matt, Deka, Ganesh Chandra, Srinivasa, Krishnarajanagar GopalaIyengar, Patnaik, Lalit Mohan.  2015.  Cyber-Physical Systems: A Computational Perspective.

In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous feedback system. This allows distributed computing using wireless devices. Cyber-Physical Systems—A Computational Perspective examines various developments of CPS that are impacting our daily lives and sets the stage for future directions in this domain.

The book is divided into six sections. The first section covers the physical infrastructure required for CPS, including sensor networks and embedded systems. The second section addresses energy issues in CPS with the use of supercapacitors and reliability assessment. In the third section, the contributors describe the modeling of CPS as a network of robots and explore issues regarding the design of CPS. The fourth section focuses on the impact of ubiquitous computing and cloud computing in CPS and the fifth section discusses security and privacy issues in CPS. The final section covers the role of CPS in big data analytics, social network analysis, and healthcare.

As CPS are becoming more complex, pervasive, personalized, and dependable, they are moving beyond niche laboratories to real-life application areas, such as robotics, smart grids, green computing, and healthcare. This book provides you with a guide to current CPS research and development that will contribute to a "smarter" planet.

Walid M. Taha, Abd-Elhamid M. Taha, Johan Thunberg.  2021.  Cyber-Physical Systems: A Model-Based Approach. :187.
Offers a unique perspective to gain the skills needed for learning, applying, and developing a wide range of scientific, engineering, and social knowledge that are key to engineering future systems Introduces key concepts from different areas in an efficient manner. The disciplines considered include physical modeling, control, hybrid systems, computational modeling, and game theory Focuses on modeling, and uses simulation rather than analytical methods to provide generality and avoid the need for specialized mathematical skills. Assumes very little mathematical prerequisites, and offers the opportunity to review and sharpen mathematical skills.
Siozios, Kostas, Soudris, Dimitrios, Kosmatopoulos, Elias.  2017.  Cyber-Physical Systems: Decision Making Mechanisms and Applications.

As systems continue to evolve they rely less on human decision-making and more on computational intelligence. This trend in conjunction with the available technologies for providing advanced sensing, measurement, process control, and communication lead towards the new field of the CyberPhysical System (CPS). CyberPhysical systems are expected to play a major role in the design and development of future engineering platforms with new capabilities that far exceed today's levels of autonomy, functionality and usability. Although these systems exhibit remarkable characteristics, their design and implementation is a challenging issue, as numerous (heterogeneous) components and services have to be appropriately modeled and simulated together. The problem of designing efficient CPS becomes far more challenging in case the target system has to meet also real-time constraints.

CyberPhysical Systems: Decision Making Mechanisms and Applications describes essential theory, recent research and large-scale user cases that addresses urgent challenges in CPS architectures. In particular, it includes chapters on:

  • Decision making for large scale CPS
  • Modeling of CPS with emphasis at the control mechanisms
  • Hardware/software implementation of the control mechanisms
  • Fault-tolerant and reliability issues for the control mechanisms
  • CyberPhysical user-cases that incorporate challenging decision making
Rodrigues, Joel Jose PC, Stojmenovic, Ivan, Rawat, Danda B.  2015.  Cyber-physical systems: from theory to practice.

Cyber-Physical Systems: From Theory to Practice provides state-of-the-art research results and reports on emerging trends related to the science, technology, and engineering of CPS, including system architecture, development, modeling, simulation, security, privacy, trust, and energy efficiency. It presents the research results of esteemed professionals on cutting-edge advances in cyber-physical systems that include communications, computing, and control.

Hu, Fei.  2013.  Cyber-physical systems: integrated computing and engineering design.

Cyber-Physical Systems: Integrated Computing and Engineering Design supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there.

  • Emphasizes the integration of cyber computing and physical objects control
  • Covers important CPS theory foundations and models
  • Includes interesting case studies of several important civilian and health care applications that illustrate the CPS design process
  • Addresses the collaboration of the sensing and controlling of a physical system with robust software architecture
  • Explains how to account for random failure events that can occur in a real CPS environment

Presented in a systematic manner, the book begins by discussing the basic concept underlying CPSs and examining some challenging design issues. It then covers the most important design theories and modeling methods for a practical CPS. Next, it moves on to sensor-based CPSs, which use embedded sensors and actuators to interact with the physical world.

The text presents concrete CPS designs for popular civilian applications, including building and energy management. Reflecting the importance of human health care in society, it includes CPS examples of rehabilitation applications such as virtual reality-based disability recovery platforms.

Nazli Choucri.  2012.  Cyberpolitics in International Relations.
An examination of the ways cyberspace is changing both the theory and the practice of international relations. Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics—background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics—national security, core institutions, and critical decision processes. In this book, Nazli Choucri investigates the implications of this new cyberpolitical reality for international relations theory, policy, and practice. The ubiquity, fluidity, and anonymity of cyberspace have already challenged such concepts as leverage and influence, national security and diplomacy, and borders and boundaries in the traditionally state-centric arena of international relations. Choucri grapples with fundamental questions of how we can take explicit account of cyberspace in the analysis of world politics and how we can integrate the traditional international system with its cyber venues. After establishing the theoretical and empirical terrain, Choucri examines modes of cyber conflict and cyber cooperation in international relations; the potential for the gradual convergence of cyberspace and sustainability, in both substantive and policy terms; and the emergent synergy of cyberspace and international efforts toward sustainable development. Choucri's discussion is theoretically driven and empirically grounded, drawing on recent data and analyzing the dynamics of cyberpolitics at individual, state, international, and global levels.
S. Petcy Carolin, M. Somasundaram.  2016.  Data loss protection and data security using agents for cloud environment - IEEE Conference Publication.

Cyber infrastructures are highly vulnerable to intrusions and other threats. The main challenges in cloud computing are failure of data centres and recovery of lost data and providing a data security system. This paper has proposed a Virtualization and Data Recovery to create a virtual environment and recover the lost data from data servers and agents for providing data security in a cloud environment. A Cloud Manager is used to manage the virtualization and to handle the fault. Erasure code algorithm is used to recover the data which initially separates the data into n parts and then encrypts and stores in data servers. The semi trusted third party and the malware changes made in data stored in data centres can be identified by Artificial Intelligent methods using agents. Java Agent Development Framework (JADE) is a tool to develop agents and facilitates the communication between agents and allows the computing services in the system. The framework designed and implemented in the programming language JAVA as gateway or firewall to recover the data loss.
 

Sardar, Muhammad, Musaev, Saidgani, Fetzer, Christof.  2021.  Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification.
In August 2020, Intel asked the research community for feedback on the newly offered architecture extensions, called Intel Trust Domain Extensions (TDX), which give more control to Trust Domains (TDs) over processor resources. One of the key features of these extensions is the remote attestation mechanism, which provides a unified report verification mechanism for TDX and its predecessor Software Guard Extensions (SGX). Based on our experience and intuition, we respond to the request for feedback by formally specifying the attestation mechanism in the TDX using ProVerif's specification language. Although the TDX technology seems very promising, the process of formal specification reveals a number of subtle discrepancies in Intel's specifications that could potentially lead to design and implementation flaws. After resolving these discrepancies, we also present fully automated proofs that our specification of TD attestation preserves the confidentiality of the secret and authentication of the report by considering the state-of-the-art Dolev-Yao adversary in the symbolic model using ProVerif. We have submitted the draft to Intel, and Intel is in the process of making the changes.
Honggang, Zhao, Chen, Shi, Leyu, Zhai.  2018.  Design and Implementation of Lightweight 6LoWPAN Gateway Based on Contiki - IEEE Conference Publication.

6LoWPAN technology realizes the IPv6 packet transmission in the IEEE 802.15.4 based WSN. And 6LoWPAN is regarded as one of the ideal technologies to realize the interconnection between WSN and Internet, which is the key to build the IoT. Contiki is an open source and highly portable multitasking operating system, in which the 6LoWPAN has been implemented. In contiki, only several K Bytes of code and a few hundred bytes of memory are required to provide a multitasking environment and built-in TCP/IP support. This makes it especially suitable for memory constrained embedded platforms. In this paper, a lightweight 6LoWPAN gateway based on Contiki is designed and its designs of hardware and software are described. A complex experiment environment is presented, in which the gateway's capability of accessing the Internet is verified, and its performance about the average network delay and jitter are analyzed. The experimental results show that the gateway designed in this paper can not only realize the interconnection between 6LoWPAN networks and Internet, but also have good network adaptability and stability.

Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto, Koji Kawamura.  2020.  Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning.

In recent years, the damage caused by unauthorized access using bots has increased. Compared with attacks on conventional login screens, the success rate is higher and detection of them is more difficult. CAPTCHA is commonly utilized as a technology for avoiding attacks by bots. But user's experience declines as the difficulty of CAPTCHA becomes higher corresponding to the advancement of the bot. As a solution, adaptive difficulty setting of CAPTCHA combining with bot detection technologies is considered. In this research, we focus on Capy puzzle CAPTCHA, which is widely used in commercial service. We use a supervised machine learning approach to detect bots. As a training data, we use access logs to several Web services, and add flags to attacks by bots detected in the past. We have extracted vectors fields like HTTP-User-Agent and some information from IP address (e.g. geographical information) from the access logs, and the dataset is investigated using supervised learning. By using XGBoost and LightGBM, we have achieved high ROC-AUC score more than 0.90, and further have detected suspicious accesses from some ISPs that has no bot discrimination flag.

Marwedel, Peter.  2006.  Embedded system design. 1

A unique feature of this textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This third edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems and the Internet of things, the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.

Dykstra, J..  2015.  Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems. :190.

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.

Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments.

  • Learn the steps necessary to conduct scientific experiments in cybersecurity
  • Explore fuzzing to test how your software handles various inputs
  • Measure the performance of the Snort intrusion detection system
  • Locate malicious “needles in a haystack” in your network and IT environment
  • Evaluate cryptography design and application in IoT products
  • Conduct an experiment to identify relationships between similar malware binaries
  • Understand system-level security requirements for enterprise networks and web services
Sardar, Muhammad, Faqeh, Rasha, Fetzer, Christof.  2020.  Formal Foundations for Intel SGX Data Center Attestation Primitives.
Intel has recently offered third-party attestation services, called Data Center Attestation Primitives (DCAP), for a data center to create its own attestation infrastructure. These services address the availability concerns and improve the performance as compared to the remote attestation based on Enhanced Privacy ID (EPID). Practical developments, such as Hyperledger Avalon, have already planned to support DCAP in their roadmap. However, the lack of formal proof for DCAP leads to security concerns. To fill this gap, we propose an automated, rigorous, and sound formal approach to specify and verify the remote at-testation based on Intel SGX DCAP under the assumption that there are no side-channel attacks and no vulnerabilities inside the enclave. In the proposed approach, the data center configuration and operational policies are specified to generate the symbolic model, and security goals are specified as security properties to produce verification results. The evaluation of non-Quoting Verification Enclave-based DCAP indicates that the confidentiality of secrets and integrity of data is preserved against a Dolev-Yao adversary in this technology. We also present a few of the many inconsistencies found in the existing literature on Intel SGX DCAP during formal specification.