Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    A Triple Human-Digital Twin Architecture for Cyber-Physical Systems

    Duansen Shangguan*, Liping Chen, Chang Su, Jianwan Ding, Chan Liu

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1557-1578, 2022, DOI:10.32604/cmes.2022.018979

    Abstract With the development of information and communication technology and the advent of the Internet of Things (IoT) era, cyber-physical system (CPS) is becoming the trend of products or systems. The deep integration and real-time interaction between the physical world and the virtual world expand system functions. Although there are some CPS implementation guidelines, the virtual world is still relatively abstract compared to the concrete physical world that can be touched through the IoT. Besides that, human is a non-negligible CPS endogenous interactive intelligent component. In this paper, we propose a triple human-digital twin architecture, where the physical objects and the… More >

  • Open Access

    ARTICLE

    Fault Management Cyber-Physical Systems in Virtual Storage Model

    Kailash Kumar*, Ahmad Abdullah Aljabr

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3781-3801, 2022, DOI:10.32604/cmc.2022.020510

    Abstract On average, every two years, the amount of data existing globally doubles. Software development will be affected and improved by Cyber-Physical Systems (CPS). The number of problems remained even though developments helped Information Technology experts extract better value from their storage investments. Because of poor interoperability between different vendors and devices, countless numbers of Storage Area Networks were created. Network setup used for data storage includes a complex and rigid arrangement of routers, switch, hosts/servers, storage arrays. We have evaluated the performance of routing protocol Transmission Control Protocol (TCP) and Fibre Channel Protocol (FCP) under different network scenario by Network… More >

  • Open Access

    ARTICLE

    Towards Aspect Based Components Integration Framework for Cyber-Physical System

    Sadia Ali1, Yaser Hafeez1, Muhammad Bilal2, Saqib Saeed3, Kyung Sup Kwak4,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 653-668, 2022, DOI:10.32604/cmc.2022.018779

    Abstract Cyber-Physical Systems (CPS) comprise interactive computation, networking, and physical processes. The integrative environment of CPS enables the smart systems to be aware of the surrounding physical world. Smart systems, such as smart health care systems, smart homes, smart transportation, and smart cities, are made up of complex and dynamic CPS. The components integration development approach should be based on the divide and conquer theory. This way multiple interactive components can reduce the development complexity in CPS. As reusability enhances efficiency and consistency in CPS, encapsulation of component functionalities and a well-designed user interface is vital for the better end-user's Quality… More >

  • Open Access

    ARTICLE

    Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

    Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 193-211, 2019, DOI:10.32604/cmc.2019.05290

    Abstract Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process… More >

Displaying 11-20 on page 2 of 14. Per Page