Profile cover photo
Profile photo
Proceedings of the IEEE
3 followers
3 followers
About
Posts

Post has attachment
Advances in connectivity could leave industrial control systems (ICSs) potentially vulnerable to sophisticated cyber attacks. This article proposes a novel cyber–physical security framework for ICSs, incorporating data analytics for attack detection and a resilient control policy. bit.ly/2CdNq8i
Photo

Post has attachment
Modern system-on-chip (SoC) designs include a wide variety of highly sensitive assets which must be protected from unauthorized access. This article provides a comprehensive overview of platform security assurance requirements, resilient architecture, and security validation in modern SoC designs. http://bit.ly/2qhrPud
Photo

Post has attachment
Check out our top 10 most downloaded articles of the previous month: http://bit.ly/2mMSURT #MachineLearning #NeuralNetworks #SoftwareDefined #windenergy #5G #EnergyStorage #powersystems
Photo

Post has attachment
"The hyperconnected vehicles are mobile CPSs (cyber–physical systems) that can play a pivotal role in several scenarios that go well beyond classical autonomous driving." Learn about the privacy and data integrity issues in the operation of fleets of cooperating, autonomous vehicles. http://bit.ly/2CFKlyK
Photo

Post has attachment
Honeypots are internet computers that are set up as lures for attackers. This article introduces HoneyBot, a software hybrid interaction honeypot specifically designed for networked robotic systems. http://bit.ly/2DRF32M
Photo

Post has attachment
Forced Decryption and the Fifth Amendment: A Technical Perspective http://bit.ly/2qfsbBq

In this opinion piece, the author relies on the information-theoretic approach to cryptography developed by Shannon to address the question of whether compelled decryption implicates the Fifth Amendment under existing law.
Photo

Post has attachment
Researchers from the University of Pennsylvania present the design methodology for parameter-invariant monitors in safety-critical cyber-physical systems. Real-world applications include building actuator fault detection, meal detection in type I diabetes, and detecting hypoxia caused by pulmonary shunts in infants. http://bit.ly/2CtH6xN
Photo

Post has attachment
"Aliens From Planet Pittsburgh: How Two Young Roboticists From Carnegie Mellon Pioneered Digital Lighting"—Our history article this month tells the story of how the lighting industry was impacted by a radically different culture of innovation. http://bit.ly/2A8Hnjm
Photo

Post has attachment
Learn about the key issues in the safety and security of Cyber–Physical Systems and Internet-of-Things systems as well as design-time and runtime approaches to handle safety and security. http://bit.ly/2A6VhT7
Photo

Post has attachment
Just published: Our January 2018 special issue focuses on the key concepts and trends in the safety and security of cyber–physical systems. http://bit.ly/2DUDL6P
Wait while more posts are being loaded