Machine Learning Algorithms for Attack and Anomaly Detection in IoT

R Kushwah, R Garg - … Conference on Information Security, Privacy and …, 2022 - Springer
With the invention of IoT and its range of smart applications, people's life has been reformed
drastically. IoT infrastructure consists of actuators and sensors that generate a massive …

Containerization: In the Context of Serverless Computing

SSV Pusapati - Serverless Computing Concepts, Technology and …, 2024 - igi-global.com
This chapter delves into the synergy between containerization and serverless computing,
pivotal for advancing cloud-native application deployment. It outlines the architectural …

Fast Resource Allocation for Resilient Service Coordination in an NFV-Enabled Internet-of-Things System

TM Pham, TM Nguyen - REV Journal on Electronics and …, 2023 - rev-jec.org
Abstract Network Functions Virtualization (NFV) is a new way of leveraging an Internet-of-
Things (IoT) system to provide real-time and highly flexible service creation. In an NFV …

[图书][B] Runtime Verification of Distributed Systems

R Ganguly - 2023 - search.proquest.com
Given the broad scale of distribution and complexity of today's system, an exhaustive model-
checking algorithm is computationally costly and testing is not exhaustive enough. Runtime …

[PDF][PDF] A Domain-Specific Language Approach for Quantitative Monitoring of Cyber-Physical Systems

Z Wang - 2022 - repository.rice.edu
Cyber-physical systems (CPS)[1] are systems characterized by a complex interaction
between hardware, software, and the physical environment [2]. Embedded computing …

[PDF][PDF] КАК ДИГИТАЛНИТЕ ТЕХНОЛОГИИ ОТ НОВО ПОКОЛЕНИЕ ТРАНСФОРМИРАТ ФАРМАЦЕВТИЧНАТА ИНДУСТРИЯ?

С Ценов - FOR HOSPITAL PHARMACY, 2022 - ohpb.eu
РЕЗЮМЕ Навлизането на новите дигитални технологии в различни бизнес отрасли
води до множество промени в бизнес средата. Една от най-осезаемите такива …

Identification of defective nodes in cyber-physical systems

V Agarwal, S Pal, N Sharma… - 2020 IEEE 17th …, 2020 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) comprise physical systems or objects incorporated with
computing functionalities and data storage systems. Different sensor nodes in a CPS …

[HTML][HTML] 2 5G and Beyond 5G Technology for Smart Factories

Z Chen, KC Chen, C Dong, Z Nie - journals.riverpublishers.com
The 5G mobile communication techniques were developed target at the critical industrial
applications such like factory automation. The three key components are enhanced mobile …

[PDF][PDF] Design & Methods Concept

C Schmittner, D Ratasich, M Matschnig - Transactions on Emerging …, 2018 - iot4cps.at
In the future it is not sufficient to interlink safety, security in the operational phase of a system.
For a dependable IoT system, all dependability attributes must be considered not only …

Towards a Secure and Resilient Vehicle Design: Methodologies, Principles and Guidelines

K Strandberg - 2022 - search.proquest.com
The advent of autonomous and connected vehicles has brought new cyber security
challenges to the automotive industry. It requires vehicles to be designed to remain …