Cyber-physical systems for facilities management: a Delphi study on the propelling measures
Purpose Through its advanced computational capabilities, cyber–physical systems (CPS)
proffer solutions to some of the cultural challenges plaguing the effective delivery of facilities …
proffer solutions to some of the cultural challenges plaguing the effective delivery of facilities …
Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)
In today's age of digital technology, ethical concerns regarding computing systems are
increasing. While the focus of such concerns currently is on requirements for software, this …
increasing. While the focus of such concerns currently is on requirements for software, this …
Systematic Risk Characterisation of Hardware Threats to Automotive Systems
The increasing dependence of modern automotive systems on electronics and software
poses cybersecurity risks previously not factored into design and engineering of such …
poses cybersecurity risks previously not factored into design and engineering of such …
Structural determinants of the uptake of cyber-physical systems for facilities management–a confirmatory factor analysis approach
Purpose Cyber-physical systems (CPS) offer improved delivery of facilities management
(FM) mandates through their advanced computational capabilities. Using second-order …
(FM) mandates through their advanced computational capabilities. Using second-order …
Expanding explainability: from explainable artificial intelligence to explainable hardware
The increasing opaqueness of AI and its growing influence on our digital society highlight
the necessity for AI-based systems that are trustworthy, accountable, and fair. Previous …
the necessity for AI-based systems that are trustworthy, accountable, and fair. Previous …
An Analysis of Biometric ATM Adoption Using Game Theory
CR Sokol - 2023 - search.proquest.com
In this notably technologically advanced and modern society, where biometrics are used in
hundreds of mechanisms to facilitate the ease of daily living as a password replacement, this …
hundreds of mechanisms to facilitate the ease of daily living as a password replacement, this …
Data Protection in Organization by the Implementation of Cyber Security
SA Jawaid - 2022 - preprints.org
Background: Cyber security is used to save the important data from getting hacked, took by
some unknown access. It makes our environment a safe place for us to work out or share our …
some unknown access. It makes our environment a safe place for us to work out or share our …
[PDF][PDF] AN INTERNET OF THINGS ENABLED SYSTEM FOR REAL-TIME MONITORING AND PREDICTIVE MAINTENANCE OF RAILWAY INFRASTRUCTURE
AQO GBADAMOSI - 2023 - uwe-repository.worktribe.com
Addressing automotive cybersecurity risks with an ARM Morello capability-enhanced prototype
HN Nguyen, SA Shaikh, E Kutsal… - Authorea …, 2024 - advance.sagepub.com
Modern vehicles are equipped with hundreds of ECUs deployed across vehicle networks.
Each ECU runs a variety of safety and cyber-critical workloads which is facing an …
Each ECU runs a variety of safety and cyber-critical workloads which is facing an …