LEADER 04006nam 2200961z- 450 001 9910557531703321 005 20231214133657.0 035 $a(CKB)5400000000044261 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/76545 035 $a(EXLCZ)995400000000044261 100 $a20202201d2021 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrustworthiness in Mobile Cyber Physical Systems 210 $aBasel, Switzerland$cMDPI - Multidisciplinary Digital Publishing Institute$d2021 215 $a1 electronic resource (190 p.) 311 $a3-0365-1086-9 311 $a3-0365-1087-7 330 $aComputing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ?cyberworld? of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS. 606 $aTechnology: general issues$2bicssc 610 $aAUTOSAR 610 $aDAG 610 $arunnable scheduling 610 $acontrol-scheduling codesign 610 $alagrange multiplier 610 $aMobile Cyber-Physical Systems (MCPS) 610 $aindustry 610 $aMobile Sink Groups (MSG) 610 $agroup mobility 610 $areal-time data delivery 610 $aIntelligent Transportation System (ITS) 610 $adeep neural network 610 $aRed Light Runner (RLR) 610 $adynamic signal control 610 $aintersection safety 610 $amixed-criticality 610 $apower-aware 610 $areal-time scheduling 610 $aDVFS 610 $asecurity taxonomies 610 $aevent-based systems 610 $amobile cyber physical systems 610 $asecurity flaws 610 $asearchable encryption 610 $aPEKS 610 $aforward privacy 610 $atrusted execution environment 610 $aSGX 610 $adata quality 610 $alarge-scale 610 $ahigh-dimensionality 610 $alinear discriminant analysis 610 $arandom projection 610 $abootstrapping 610 $acontroller area network bus 610 $aauthentication 610 $aauthenticity 610 $aresiliency 610 $asustainability 610 $aformal verification 610 $amodel checking 610 $ain-vehicle network 610 $amodel compression 610 $aadversarial robustness 610 $aweight pruning 610 $aadversarial training 610 $adistillation 610 $aembedded system 610 $asecure AI 615 7$aTechnology: general issues 700 $aKang$b Kyungtae$4edt$01293426 702 $aSon$b Junggab$4edt 702 $aSuh$b Hyo-Joong$4edt 702 $aKang$b Kyungtae$4oth 702 $aSon$b Junggab$4oth 702 $aSuh$b Hyo-Joong$4oth 906 $aBOOK 912 $a9910557531703321 996 $aTrustworthiness in Mobile Cyber Physical Systems$93022613 997 $aUNINA