Traffic Pattern Based Data Recovery Scheme for Cyber-Physical Systems

نویسندگان

  • Naushin Nower
  • Yasuo Tan
  • Azman Osman Lim
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust Establishment in Cooperating Cyber-Physical Systems

Cooperating systems are systems of systems that collaborate for a common purpose. In this work, we consider networked cooperating systems that base important decisions on data gathered from external sensors and use external actuators to enforce safety critical actions. Typical examples of cooperating cyberphysical systems are critical infrastructure process control systems. Such systems must no...

متن کامل

Mobile Big Data Meets Cyber-Physical System Mobile Crowdsensing based Cyber-Physical System for Smart Urban Traffic Control

The sheer number of user-companioned mobile devices (especially smartphones) and their inherent mobility and social interactions among devices enable a new and fast-growing mobile big data paradigm: the ability to acquire local knowledge through sensor-enhanced mobile devices (e.g., location, personal and surrounding context, noise level, traffic conditions and other information), and the possi...

متن کامل

Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems

Owing to the increasing number of vehicles in vehicular cyber-physical systems (VCPSs) and the growing popularity of various services or applications for vehicles, cellular networks are being severely overloaded. Offloading mobile data traffic through Wi-Fi or a vehicular ad hoc network (VANET) is a promising solution for partially solving this problem because it involves almost no monetary cos...

متن کامل

A Early Detection of Cyber Security Threats using Structured Behavior Modeling

The rapid evolution of network intrusions has rendered traditional Intrusion Detection Systems (IDS) insufficient for cyber attacks such as the Advanced Persistent Threats (APT), which are sophisticated and enduring network intrusion campaigns comprising multiple imperceptible steps of malicious cyber activities. Dealing with such elaborated network intrusions calls for novel and more proactive...

متن کامل

The Model of Structural Relationships of Cyber-Aggression Based on Family Communication Pattern with the Mediating Role of Addiction to Internet

Introduction: Family relationships play an incredibly important role in the lives of individuals and these relationships represent the most enduring social institution This study aimed the model of structural relations of cyber-aggression based on family communication pattern with the mediating  role of addiction to Internet. Methods: This study was descriptive-correlational and the statistical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 97-A  شماره 

صفحات  -

تاریخ انتشار 2014