Multi-cyber framework for availability enhancement of cyber physical systems
With the rapid growth of wireless communication, the deployment of cyber-physical system (CPS) is increasing day by day. As a cyber-physical system involves a tight coupling between the physical and computational components, it is critical to ensure that the system, apart from being secure, is avail...
| Main Authors: | Parvin, Sazia, Hussain, Farookh Khadeer, Hussain, Omar, Thein, T., Park, J. |
|---|---|
| Format: | Journal Article |
| Published: |
Springer Vienna
2012
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/20919 |
Similar Items
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Event handling for distributed real-time cyber-physical systems
by: Singh, Jaipal, et al.
Published: (2012)
by: Singh, Jaipal, et al.
Published: (2012)
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)
by: Al Adwan, Ahmad
Published: (2012)
Small states and the strategic utility of cyber capabilities
by: Domingo, Francis Rico
Published: (2018)
by: Domingo, Francis Rico
Published: (2018)
A perspective on the applications of energy-cyber-physical systems (e-CPSs) in ultra-low emission coal-fired power plants
by: Zhao, Haitao, et al.
Published: (2019)
by: Zhao, Haitao, et al.
Published: (2019)
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)
by: Miller, Simon, et al.
Published: (2016)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
Allocating patrolling resources to effectively thwart intelligent attackers
by: Lowbridge, Thomas
Published: (2021)
by: Lowbridge, Thomas
Published: (2021)
Applying the Theory of Planned Behaviour to predicting online safety behaviour
by: Burns, Sarah, et al.
Published: (2013)
by: Burns, Sarah, et al.
Published: (2013)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
China’s Weibo: is faster different?
by: Sullivan, Jonathan
Published: (2013)
by: Sullivan, Jonathan
Published: (2013)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Trust-based Throughput in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Internet Outreach / A Guide for Health Promoters & Peer Educators
by: Hallett, Jonathan, et al.
Published: (2011)
by: Hallett, Jonathan, et al.
Published: (2011)
Semantics of Cyber-Physical Systems
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
The rationales behind free and proprietary software selection in organisations
by: Sticklen, D., et al.
Published: (2010)
by: Sticklen, D., et al.
Published: (2010)
Analyzing factors influencing customer satisfaction on purchased cybersecurity solutions within B2B organizations in Malaysia
by: Subramaniam, Nageswar Rao
Published: (2024)
by: Subramaniam, Nageswar Rao
Published: (2024)
Conceptual framework for ubiquitous cyber-physical assembly systems in airframe assembly
by: Sanderson, David, et al.
Published: (2018)
by: Sanderson, David, et al.
Published: (2018)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
RTPD/MACSC: a novel approach for effective pervasive information retrieval
by: Wu, R., et al.
Published: (2005)
by: Wu, R., et al.
Published: (2005)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Aggressive scrollers: investigating online aggression and its relationship with social media use, envy, self-control and aggressive behaviour
by: Sumarno, L.C.
Published: (2021)
by: Sumarno, L.C.
Published: (2021)
Enhanced Current Generation Using Mutualistic Interaction of Yeast-Bacterial Coculture in Dual Chamber Microbial Fuel Cell
by: Islam, M. Amirul, et al.
Published: (2018)
by: Islam, M. Amirul, et al.
Published: (2018)
Design and Finite Element Analysis of Hybrid Carbon/Glass Fiber-Reinforced Epoxy Composite Automotive Drive Shaft
by: M. Soliman, Mohamed A. Badie
Published: (2007)
by: M. Soliman, Mohamed A. Badie
Published: (2007)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cyber-physical systems for smart grid
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Part-timers’ perspectives on training:
a study of Thai students in Nottingham, United Kingdom
by: Angpaibul, Sirin
Published: (2016)
by: Angpaibul, Sirin
Published: (2016)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Similar Items
-
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017) -
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017) -
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023) -
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010) -
Event handling for distributed real-time cyber-physical systems
by: Singh, Jaipal, et al.
Published: (2012)