Cyber-physical systems for facilities management: a Delphi study on the propelling measures

M Ikuabe, C Aigbavboa, C Anumba, AE Oke - Construction Innovation, 2024 - emerald.com
Purpose Through its advanced computational capabilities, cyber–physical systems (CPS)
proffer solutions to some of the cultural challenges plaguing the effective delivery of facilities …

Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)

T Speith, J Speith, S Becker, Y Zou… - 2024 IEEE 32nd …, 2024 - ieeexplore.ieee.org
In today's age of digital technology, ethical concerns regarding computing systems are
increasing. While the focus of such concerns currently is on requirements for software, this …

Systematic Risk Characterisation of Hardware Threats to Automotive Systems

J Pickford, R Attale, S Shaikh, HN Nguyen… - Journal on Autonomous …, 2024 - dl.acm.org
The increasing dependence of modern automotive systems on electronics and software
poses cybersecurity risks previously not factored into design and engineering of such …

Structural determinants of the uptake of cyber-physical systems for facilities management–a confirmatory factor analysis approach

MO Ikuabe, C Aigbavboa, C Anumba… - Smart and Sustainable …, 2024 - emerald.com
Purpose Cyber-physical systems (CPS) offer improved delivery of facilities management
(FM) mandates through their advanced computational capabilities. Using second-order …

Expanding explainability: from explainable artificial intelligence to explainable hardware

T Speith, J Speith, S Becker, Y Zou, A Biega… - arXiv preprint arXiv …, 2023 - arxiv.org
The increasing opaqueness of AI and its growing influence on our digital society highlight
the necessity for AI-based systems that are trustworthy, accountable, and fair. Previous …

An Analysis of Biometric ATM Adoption Using Game Theory

CR Sokol - 2023 - search.proquest.com
In this notably technologically advanced and modern society, where biometrics are used in
hundreds of mechanisms to facilitate the ease of daily living as a password replacement, this …

Data Protection in Organization by the Implementation of Cyber Security

SA Jawaid - 2022 - preprints.org
Background: Cyber security is used to save the important data from getting hacked, took by
some unknown access. It makes our environment a safe place for us to work out or share our …

Addressing automotive cybersecurity risks with an ARM Morello capability-enhanced prototype

HN Nguyen, SA Shaikh, E Kutsal… - Authorea …, 2024 - advance.sagepub.com
Modern vehicles are equipped with hundreds of ECUs deployed across vehicle networks.
Each ECU runs a variety of safety and cyber-critical workloads which is facing an …