Narrow your search

Library

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

VIVES (2)

FARO (1)

ULiège (1)

Vlaams Parlement (1)


Resource type

book (3)


Language

English (3)


Year
From To Submit

2022 (2)

1996 (1)

Listing 1 - 3 of 3
Sort by

Book
Security of Cyber-Physical Systems
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.

Keywords

Technology: general issues --- History of engineering & technology --- smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection --- smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection


Book
Security of Cyber-Physical Systems
Author:
Year: 2022 Publisher: Basel MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.

Stealing into Print : Fraud, Plagiarism, and Misconduct in Scientific Publishing
Author:
ISBN: 0520917804 0585301662 9780520917804 9780585301662 0520205138 0520078314 9780520205130 9780520078314 Year: 1996 Publisher: Berkeley, California : University of California Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

False data published by a psychologist influence policies for treating the mentally retarded. A Nobel Prize-winning molecular biologist resigns the presidency of Rockefeller University in the wake of a scandal involving a co-author accused of fabricating data. A university investigating committee declares that almost half the published articles of a promising young radiologist are fraudulent. Incidents like these strike at the heart of the scientific enterprise and shake the confidence of a society accustomed to thinking of scientists as selfless seekers of truth. Marcel LaFollette's long-awaited book gives a penetrating examination of the world of scientific publishing in which such incidents of misconduct take place. Because influential scientific journals have been involved in the controversies, LaFollette focuses on the fragile "peer review" process--the editorial system of seeking pre-publication opinions from experts. She addresses the cultural glorification of science, which, combined with a scientist's thirst for achievement, can seem to make cheating worth the danger. She describes the great risks taken by the accusers--often scholars of less prestige and power than the accused--whom she calls "nemesis figures" for their relentless dedication to uncovering dishonesty. In sober warning, LaFollette notes that impatient calls from Congress, journalists, and taxpayers for greater accountability from scientists have important implications for the entire system of scientific research and communication. Provocative and learned, Stealing Into Print is certain to become the authoritative work on scientific fraud, invaluable to the scientific community, policy makers, and the general public." -- Publisher's description

Keywords

Science publishing --- Publishers and publishing --- Technical writing --- Authorship --- Scientists --- Plagiarism. --- Fraud. --- Authorship. --- Research. --- Scientific Misconduct --- Scientific Misconduct. --- Publishing. --- Ethics, Professional. --- Writing. --- Literacy --- Professional Ethics --- Ethic, Professional --- Professional Ethic --- Professional Misconduct --- Electronic Publishing --- Publishing, Electronic --- Electronic Publishings --- Publishings, Electronic --- Book Industry --- Scientific Dishonesty --- Ethics in Publishing --- Fraud, Scientific --- Fraudulent Data --- Research Misconduct --- Data, Fraudulent --- Dishonesties, Scientific --- Dishonesty, Scientific --- Frauds, Scientific --- Misconduct, Research --- Misconduct, Scientific --- Publishing, Ethics in --- Scientific Dishonesties --- Scientific Fraud --- Scientific Frauds --- Scientific Experimental Error --- Laboratory Research --- Research Activities --- Research and Development --- Research Priorities --- Activities, Research --- Activity, Research --- Development and Research --- Priorities, Research --- Priority, Research --- Research Activity --- Research Priority --- Research, Laboratory --- Ethics, Research --- Authorships --- Commercial fraud --- Deceit --- Misrepresentation (Crime) --- Commercial crimes --- Deception --- Torts --- Hoaxes --- Impostors and imposture --- Copyright infringement --- Literary ethics --- Literature --- Quotation --- Imitation in literature --- Originality in literature --- Authoring (Authorship) --- Writing (Authorship) --- Engineering --- Science --- Scientific writing --- Technology --- Communication of technical information --- Book publishing --- Books --- Book industries and trade --- Booksellers and bookselling --- Scientific literature --- Moral and ethical aspects. --- Professional ethics. --- trends. --- Publishing --- Science publishing. --- Editing. --- Fraud in science. --- Scientific fraud --- accountability. --- authorship. --- cheating. --- congress. --- cultural glorification of science. --- dishonesty. --- ethics. --- exposure. --- fabricating data. --- false data. --- fraud. --- fraudulent. --- government. --- media studies. --- misconduct. --- morality. --- nemesis figures. --- peer review process. --- plagiarism. --- pre publication opinions. --- psychology. --- publication. --- retraction. --- scandal. --- science. --- scientific communication. --- scientific community. --- scientific journals. --- scientific misconduct. --- scientific publishing. --- scientific research. --- taxpayers. --- unethical practices. --- whistleblowers.

Listing 1 - 3 of 3
Sort by