2012 European Intelligence and Security Informatics Conference 2012
DOI: 10.1109/eisic.2012.10
|View full text |Cite
|
Sign up to set email alerts
|

Resilience of Cyber-Physical System: A Case Study of Safe School Environment

Abstract: Modern critical infrastructure includes a combination of computational and physical components, known as cyberphysical system (CPS) [1]. Often, urban built infrastructures represent a critical node within the intertwined networks of an urban area. Current school environment are examples of CPSs including automatic access controls (AACs), guidance and alarm systems (GASs), digital clocks, heat and motion identification sensors, and remolding spaces such as classrooms. A safe school environment can be created us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Physical systems, on the other hand, rely not just on function but also on timing, and computer programs might be flawed in this regard. This discrepancy leads to a lot of ambiguity and unreliability, which is an issue for CPS [140]. Some AI or ML algorithms can be utilized to predict the next-time system state to make CPS behavior predictable.…”
Section: Limitations and Future Remarksmentioning
confidence: 99%
“…Physical systems, on the other hand, rely not just on function but also on timing, and computer programs might be flawed in this regard. This discrepancy leads to a lot of ambiguity and unreliability, which is an issue for CPS [140]. Some AI or ML algorithms can be utilized to predict the next-time system state to make CPS behavior predictable.…”
Section: Limitations and Future Remarksmentioning
confidence: 99%
“…Security Content Automation Protocol has two major concern/ elements and among these few important are- First, it is a protocol (It is a kind of four open specifications which is dedicated to the standardize the format as well as nomenclature and specification; and each is known as SCAP Specification.  Second, Security Content Automation Protocol is also about the software flaw as well as few security configuration standard reference data, and this is also referred as SCAP content [13], [14], [15]. The following table (table 1) shows the Security Content Automation Protocol Version and components herewith.…”
Section: Scap Componentsmentioning
confidence: 99%
“…Nevertheless, among such work, it is surprising that there is only a limited number of systems that target child safety applications, which represent one of the weakest population sets [5,11]. An essential feature that these systems require is the capability to detect the presence of children in a target environment.…”
Section: Introductionmentioning
confidence: 97%