To see the other types of publications on this topic, follow the link: Tactile Cyber-Physical Systems.

Journal articles on the topic 'Tactile Cyber-Physical Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 journal articles for your research on the topic 'Tactile Cyber-Physical Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Di Marco, Piergiuseppe, and Pangun Park. "Architectures and Protocols for Wireless Sensor and Actuator Networks." Journal of Sensor and Actuator Networks 10, no. 3 (2021): 52. http://dx.doi.org/10.3390/jsan10030052.

Full text
Abstract:
Recent advances in wireless networking, sensing, computing, and control are revolutionizing how physical systems interact with information and physical processes such as Cyber-Physical Systems (CPS), Internet of Things (IoT), and Tactile Internet [...]
APA, Harvard, Vancouver, ISO, and other styles
2

Polachan, Kurian, Joydeep Pal, Chandramani Singh, T. V. Prabhakar, and Fernando A. Kuipers. "TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems." IEEE/ACM Transactions on Networking 30, no. 2 (2022): 796–811. http://dx.doi.org/10.1109/tnet.2021.3124767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Puliafito, Antonio, Giuseppe Tricomi, Anastasios Zafeiropoulos, and Symeon Papavassiliou. "Smart Cities of the Future as Cyber Physical Systems: Challenges and Enabling Technologies." Sensors 21, no. 10 (2021): 3349. http://dx.doi.org/10.3390/s21103349.

Full text
Abstract:
A smart city represents an improvement of today’s cities, both functionally and structurally, that strategically utilizes several smart factors, capitalizing on Information and Communications Technology (ICT) to increase the city’s sustainable growth and strengthen the city’s functions, while ensuring the citizens’ enhanced quality of life and health. Cities can be viewed as a microcosm of interconnected “objects” with which citizens interact daily, which represents an extremely interesting example of a cyber physical system (CPS), where the continuous monitoring of a city’s status occurs thro
APA, Harvard, Vancouver, ISO, and other styles
4

Constantin, Anghel, and Gheorghe Ion Gheorghe. "New Concepts of Modeling and Complex Simulation of Electronic Circuits for Interfacing Tactile Sensors in Cyber-mechatronic Systems." Scientific Bulletin of Valahia University - Materials and Mechanics 14, no. 11 (2016): 39–44. http://dx.doi.org/10.1515/bsmm-2016-0007.

Full text
Abstract:
Abstract The paper presents an original concept for interfacing tactile force sensors in modern cyber-mechatronic systems. The authors show the results and conclusions of a PSPICE simulation of an original patented circuit. In the simulations, in models used were introduced some circuit components corresponding to the physical implementation for a practical mechatronic system which has already been used for the analysis of human walking. After these simulations were revealed important aspects of dynamic behavior and was proposed an optimal variant of the interface circuit as a non-typically in
APA, Harvard, Vancouver, ISO, and other styles
5

Mourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (2021): 3175. http://dx.doi.org/10.3390/electronics10243175.

Full text
Abstract:
For many applications deployed in manufacturing networks, communication latency has been a significant barrier. Despite the constant development of improved communication protocols and standards during Industry 4.0, the latency problem persists, lowering quality of services (QoS) and quality of experience (QoE). Tactile internet (TI), with its high availability, security, and ultra-low latency, will add a new dimension to human-machine interaction (HMI) by enabling haptic and tactile sensations. The tactile internet (TI) is a cutting-edge technology that uses 5G and beyond (B5G) communications
APA, Harvard, Vancouver, ISO, and other styles
6

Villalón-Huerta, Antonio, Ismael Ripoll-Ripoll, and Hector Marco-Gisbert. "CNA Tactics and Techniques: A Structure Proposal." Journal of Sensor and Actuator Networks 10, no. 1 (2021): 14. http://dx.doi.org/10.3390/jsan10010014.

Full text
Abstract:
Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence gathering. While in CNE operations the main tactics and techniques are defined and well structured, in CNA there is a lack of such consensuated approaches. This situation hinders the modeling of threat actors, which prevents an accurate definition of control to identify and to neutralize malicious act
APA, Harvard, Vancouver, ISO, and other styles
7

Amro, Ahmed, and Vasileios Gkioulos. "Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases." Journal of Marine Science and Engineering 11, no. 4 (2023): 744. http://dx.doi.org/10.3390/jmse11040744.

Full text
Abstract:
In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment of cyber risks in a CPS is a popular research area with many existing approaches that aim to suggest relevant methods and practices. However, few works have addressed the extensive and objective evaluation of the proposed approaches. In this paper, a standard-aligned evaluation methodology is presented and empirically conducted to evaluate a newly proposed cyber risk asses
APA, Harvard, Vancouver, ISO, and other styles
8

Cervini, James, Aviel Rubin, and Lanier Watkins. "Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 19–25. http://dx.doi.org/10.34190/iccws.17.1.29.

Full text
Abstract:
Water treatment represents an essential critical infrastructure sector which has a direct impact on the health and well-being of its customers. Water treatment is often performed by municipalities with very limited budgets for cybersecurity resources. These underfunded, high-impact, targets represent an emerging cyber warfare attack-surface paradigm which poses a direct threat to the quality of life for millions of people. On February 5th, 2021, a water treatment plant in Oldsmar, Florida was the victim of an attempted cyberattack. This attack commanded the system to add a dangerous amount ofs
APA, Harvard, Vancouver, ISO, and other styles
9

Ur Rahman, Hafiz, Guojun Wang, Md Zakirul Alam Bhuiyan, and Jianer Chen. "In-network generalized trustworthy data collection for event detection in cyber-physical systems." PeerJ Computer Science 7 (May 4, 2021): e504. http://dx.doi.org/10.7717/peerj-cs.504.

Full text
Abstract:
Sensors in Cyber-Physical Systems (CPS) are typically used to collect various aspects of the region of interest and transmit the data towards upstream nodes for further processing. However, data collection in CPS is often unreliable due to severe resource constraints (e.g., bandwidth and energy), environmental impacts (e.g., equipment faults and noises), and security concerns. Besides, detecting an event through the aggregation in CPS can be intricate and untrustworthy if the sensor's data is not validated during data acquisition, before transmission, and before aggregation. This paper introdu
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, M. Imran, Ahmed Ibrahim, Peter Hannay, and Leslie F. Sikos. "Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions." Computers 12, no. 4 (2023): 79. http://dx.doi.org/10.3390/computers12040079.

Full text
Abstract:
Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains such as smart grid, healthcare, the military, and telecommunication. These systems are continually threatened by malicious software (malware) attacks by adversaries due to their improvised tactics and attack methods. A minor configuration change in a CPS through malware has devastating effects, which the world has seen in Stuxnet, BlackEnergy, Industroyer, and Triton. This paper is a comprehensive review of malware analysis practices currently being used and their limitations and efficacy in securing CP
APA, Harvard, Vancouver, ISO, and other styles
11

Motghare, Sarita M., and Pramod S. Nair. "Empirical Analysis of Privacy Preservation Models for Cyber Physical Deployments from a Pragmatic Perspective." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3s (2023): 19–29. http://dx.doi.org/10.17762/ijritcc.v11i3s.6151.

Full text
Abstract:
The difficulty of privacy protection in cyber-physical installations encompasses several sectors and calls for methods like encryption, hashing, secure routing, obfuscation, and data exchange, among others. To create a privacy preservation model for cyber physical deployments, it is advised that data privacy, location privacy, temporal privacy, node privacy, route privacy, and other types of privacy be taken into account. Consideration must also be given to other types of privacy, such as temporal privacy. The computationally challenging process of incorporating these models into any wireless
APA, Harvard, Vancouver, ISO, and other styles
12

Grigaliūnas, Šarūnas, Rasa Brūzgienė, and Algimantas Venčkauskas. "The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System." Electronics 12, no. 3 (2023): 591. http://dx.doi.org/10.3390/electronics12030591.

Full text
Abstract:
Industry X.0 is the new age of digitization, when information and communication systems are strongly linked to other systems and processes and are accessed remotely from anywhere at any time. The existing information systems’ security methods are ineffective because they should focus on and assess a broader range of factors in physical and digital spaces, especially because tactics of cybercrimes are always evolving and attackers are getting more inventive in searching for holes that might be exploited. To fight it, it is a need to be one step ahead of the attacker, including understanding the
APA, Harvard, Vancouver, ISO, and other styles
13

Kravets, Ja, O. A. R. Almusawi, Ju N. Doroshenko, S. N. Mamedov, and Yu V. Redkin. "Security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model." Journal of Physics: Conference Series 2094, no. 4 (2021): 042040. http://dx.doi.org/10.1088/1742-6596/2094/4/042040.

Full text
Abstract:
Abstract The problems and features of security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model are considered. The algorithm of the functioning of the system node allows for the possibility of increasing or decreasing its resources using various approaches. Models of stochastic automata with a variable structure are used to model such systems. The process of functioning of a node of a system with a distributed registry based on a chain of blocks in the form of a finite automaton with a variable structure and lin
APA, Harvard, Vancouver, ISO, and other styles
14

Khalid, Mohd Nor Akmal, Amjed Ahmed Al-Kadhimi, and Manmeet Mahinderjit Singh. "Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review." Mathematics 11, no. 6 (2023): 1353. http://dx.doi.org/10.3390/math11061353.

Full text
Abstract:
Cybersecurity has become a prominent issue in regard to ensuring information privacy and integrity in the internet age particularly with the rise of interconnected devices. However, advanced persistent threats (APTs) pose a significant danger to the current contemporary way of life, and effective APT detection and defense are vital. Game theory is one of the most sought-after approaches adopted against APTs, providing a framework for understanding and analyzing the strategic interactions between attackers and defenders. However, what are the most recent developments in game theory frameworks a
APA, Harvard, Vancouver, ISO, and other styles
15

Polachan, Kurian, Joydeep Pal, Chandramani Singh, and Prabhakar T. V. "Assessing Quality of Control in Tactile Cyber-Physical Systems." IEEE Transactions on Network and Service Management, 2022, 1. http://dx.doi.org/10.1109/tnsm.2022.3164100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Polachan, Kurian, Chandramani Singh, and T. V. Prabhakar. "Decentralized Dynamic Scheduling of TCPS flows and a Simulator for Time-Sensitive Networking." ACM Transactions on Internet Technology, February 3, 2022. http://dx.doi.org/10.1145/3498729.

Full text
Abstract:
Cybersickness and control-loop instabilities are two main concerns in Tactile Cyber-Physical Systems (TCPS). TCPS applications demand stringent bounds on end-to-end latencies to avoid their occurrences. Traditional best-effort networks cannot guarantee packet latencies in the presence of external traffic. On the other hand, emerging deterministic networks such as IEEE 802.1 Time-Sensitive Networking (TSN) can isolate time-critical flows from external traffic using IEEE 802.1Qbv Time-Aware Shaper (TAS) to guarantee bounded end-to-end packet latencies. In this work, we develop eDDSCH-TSN, a dece
APA, Harvard, Vancouver, ISO, and other styles
17

Agarwal, Sucheta, Kuldeep Kumar Saxena, Vivek Agrawal, et al. "Prioritizing the barriers of green smart manufacturing using AHP in implementing Industry 4.0: a case from Indian automotive industry." TQM Journal, October 3, 2022. http://dx.doi.org/10.1108/tqm-07-2022-0229.

Full text
Abstract:
PurposeManufacturing companies are increasingly using green smart production (GSM) as a tactic to boost productivity since it has a number of advantages over conventional manufacturing methods. It costs a lot of money and takes a lot of work to create an SMS since it combines a lot of different technologies, including automation, data exchanges, cyber-physical systems (CPS), artificial intelligence, the Internet of things (IoT) and semi-autonomous industrial systems. Green smart manufacturing (GSM) activities provide the foundation for creating ecologically friendly and green products. However
APA, Harvard, Vancouver, ISO, and other styles
18

Bayes, Chantelle. "The Cyborg Flâneur: Reimagining Urban Nature through the Act of Walking." M/C Journal 21, no. 4 (2018). http://dx.doi.org/10.5204/mcj.1444.

Full text
Abstract:
The concept of the “writer flâneur”, as developed by Walter Benjamin, sought to make sense of the seemingly chaotic nineteenth century city. While the flâneur provided a way for new urban structures to be ordered, it was also a transgressive act that involved engaging with urban spaces in new ways. In the contemporary city, where spaces are now heavily controlled and ordered, some members of the city’s socio-ecological community suffer as a result of idealistic notions of who and what belongs in the city, and how we must behave as urban citizens. Many of these ideals emerge from nineteenth cen
APA, Harvard, Vancouver, ISO, and other styles
19

Jethani, Suneel. "Lists, Spatial Practice and Assistive Technologies for the Blind." M/C Journal 15, no. 5 (2012). http://dx.doi.org/10.5204/mcj.558.

Full text
Abstract:
IntroductionSupermarkets are functionally challenging environments for people with vision impairments. A supermarket is likely to house an average of 45,000 products in a median floor-space of 4,529 square meters and many visually impaired people are unable to shop without assistance, which greatly impedes personal independence (Nicholson et al.). The task of selecting goods in a supermarket is an “activity that is expressive of agency, identity and creativity” (Sutherland) from which many vision-impaired persons are excluded. In response to this, a number of proof of concept (demonstrating fe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!