A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques
暂无分享,去创建一个
Jörg Hähner | Arno Wacker | Sven Tomforde | Bernhard Sick | Dominik Fisch | Stefan Rudolph | Nils Kopal | Sven Tomforde | B. Sick | J. Hähner | Arno Wacker | Nils Kopal | Stefan Rudolph | D. Fisch
[1] Alexander Hofmann,et al. Online Intrusion Alert Aggregation with Generative Data Stream Modeling , 2011, IEEE Transactions on Dependable and Secure Computing.
[2] Takao Terano,et al. Learning Classifier Systems Meet Multiagent Environments , 2000, IWLCS.
[3] Jörg Hähner,et al. Organic traffic light control for urban road networks , 2009, Int. J. Auton. Adapt. Commun. Syst..
[4] Edward A. Lee. Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .
[5] Graham J. Williams,et al. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.
[6] Hartmut Schmeck,et al. Collaborating and Learning Predators on a Pursuit Scenario , 2010, DIPES/BICC.
[7] Seppo J. Ovaska,et al. In Your Interest - Objective Interestingness Measures for a Generative Classifier , 2011, ICAART.
[8] Bernhard Sick,et al. Techniques for knowledge acquisition in dynamically changing environments , 2012, TAAS.
[9] Melanie Volkamer,et al. Determine the Resilience of Evaluated Internet Voting Systems , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.
[10] R. Solé,et al. Information Theory of Complex Networks: On Evolution and Architectural Constraints , 2004 .
[11] Hartmut Schmeck,et al. Improving XCS Performance by Distribution , 2008, SEAL.
[12] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[13] A. Zell,et al. Novelty Detection and Online Learning for Vibration-based Terrain Classification , 2022 .
[14] Jörg Hähner,et al. Observation and Control of Organic Systems , 2011, Organic Computing.
[15] Jörg Hähner,et al. Distributed Network Protocol Parameter Adaptation in Mobile Ad-Hoc Networks , 2010, ICINCO.
[16] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[17] Hartmut Schmeck,et al. Adaption of XCS to multi-learner predator/prey scenarios , 2010, GECCO '10.
[18] Christian Müller-Schloer,et al. Organic computing: on the feasibility of controlled emergence , 2004, CODES+ISSS '04.
[19] Sven Tomforde. An architectural framework for self-configuration and self-improvement at runtime , 2011 .
[20] Martin Lauer,et al. A Mixture Approach to Novelty Detection Using Training Data with Outliers , 2001, ECML.
[21] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[22] Bernhard Sick,et al. Learning from others: Exchange of classification rules in intelligent distributed systems , 2012, Artif. Intell..
[23] Atta Badii,et al. Security, trust and privacy supported by context-aware middleware , 2007 .
[24] Magnus Jändel. Cooperating Classifiers , 2008, NICSO.
[25] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[26] Daniel P. Thunnissen,et al. Uncertainty Classification for the Design and Development of Complex Systems , 2003 .
[27] O. Weck,et al. Series ESD-WP-2007-10 A CLASSIFICATION OF UNCERTAINTY FOR EARLY PRODUCT AND SYSTEM DESIGN , 2007 .
[28] Charu C. Aggarwal,et al. Data Streams - Models and Algorithms , 2014, Advances in Database Systems.
[29] Aoying Zhou,et al. Distributed Data Stream Clustering: A Fast EM-based Approach , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[30] Christopher L. Magee,et al. Complex System Classification , 2004 .
[31] Nina Oertel. Taxonomy development in information systems: Developing a taxonomy of mobile applications , 2009 .
[32] Arno Wacker,et al. A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.
[33] Hartmut Schmeck,et al. Organic Computing - A Paradigm Shift for Complex Systems , 2011, Organic Computing.
[34] Christine M. Anderson-Cook,et al. Book review: quantitative risk management: concepts, techniques and tools, revised edition, by A.F. McNeil, R. Frey and P. Embrechts. Princeton University Press, 2015, ISBN 978-0-691-16627-8, xix + 700 pp. , 2017, Extremes.
[35] Michal Pechoucek,et al. Collaborative Learning with Logic-Based Models , 2007, Adaptive Agents and Multi-Agents Systems.
[36] Justus H. Piater,et al. Online Learning of Gaussian Mixture Models - a Two-Level Approach , 2008, VISAPP.
[37] Christian Müller-Schloer,et al. Quantitative Emergence -- A Refined Approach Based on Divergence Measures , 2010, 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems.
[38] R. Nelsen. An Introduction to Copulas , 1998 .
[39] Siu-Ming Yiu,et al. Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[40] Gregor Schiele,et al. Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments , 2008, Int. J. Adv. Media Commun..