LEADER 04039nam 2200985z- 450 001 9910557531703321 005 20220111 035 $a(CKB)5400000000044261 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/76545 035 $a(oapen)doab76545 035 $a(EXLCZ)995400000000044261 100 $a20202201d2021 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aTrustworthiness in Mobile Cyber Physical Systems 210 $aBasel, Switzerland$cMDPI - Multidisciplinary Digital Publishing Institute$d2021 215 $a1 online resource (190 p.) 311 08$a3-0365-1086-9 311 08$a3-0365-1087-7 330 $aComputing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the 'cyberworld' of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS. 606 $aTechnology: general issues$2bicssc 610 $aadversarial robustness 610 $aadversarial training 610 $aauthentication 610 $aauthenticity 610 $aAUTOSAR 610 $abootstrapping 610 $acontrol-scheduling codesign 610 $acontroller area network bus 610 $aDAG 610 $adata quality 610 $adeep neural network 610 $adistillation 610 $aDVFS 610 $adynamic signal control 610 $aembedded system 610 $aevent-based systems 610 $aformal verification 610 $aforward privacy 610 $agroup mobility 610 $ahigh-dimensionality 610 $ain-vehicle network 610 $aindustry 610 $aIntelligent Transportation System (ITS) 610 $aintersection safety 610 $alagrange multiplier 610 $alarge-scale 610 $alinear discriminant analysis 610 $amixed-criticality 610 $amobile cyber physical systems 610 $aMobile Cyber-Physical Systems (MCPS) 610 $aMobile Sink Groups (MSG) 610 $amodel checking 610 $amodel compression 610 $an/a 610 $aPEKS 610 $apower-aware 610 $arandom projection 610 $areal-time data delivery 610 $areal-time scheduling 610 $aRed Light Runner (RLR) 610 $aresiliency 610 $arunnable scheduling 610 $asearchable encryption 610 $asecure AI 610 $asecurity flaws 610 $asecurity taxonomies 610 $aSGX 610 $asustainability 610 $atrusted execution environment 610 $aweight pruning 615 7$aTechnology: general issues 700 $aKang$b Kyungtae$4edt$01293426 702 $aSon$b Junggab$4edt 702 $aSuh$b Hyo-Joong$4edt 702 $aKang$b Kyungtae$4oth 702 $aSon$b Junggab$4oth 702 $aSuh$b Hyo-Joong$4oth 906 $aBOOK 912 $a9910557531703321 996 $aTrustworthiness in Mobile Cyber Physical Systems$93022613 997 $aUNINA