We present a single-server and two-level mixed service polling systems with two queue types, one center queue and N normal queue. Customers arrive at the system according to a batch process. The center queue will be s...
详细信息
The increasing threat of Denial of service (DoS) attacks targeting Smart City systems impose unprecedented challenges in terms of service availability, especially against centralized control platforms due to their sin...
详细信息
ISBN:
(数字)9783319188027
ISBN:
(纸本)9783319188027;9783319188010
The increasing threat of Denial of service (DoS) attacks targeting Smart City systems impose unprecedented challenges in terms of service availability, especially against centralized control platforms due to their single point of failure issue. The European ARTEMIS co-funded project ACCUS (Adaptive Cooperative Control in Urban (sub) systems) is focused on a centralized Integration and Coordination Platform (ICP) for urban subsystems to enable real-time collaborative applications across them and optimize their combined performance in Smart Cities. Hence, any outage of the ACCUS ICP, due to DoS attacks, can severely affect not only the interconnected subsystems but also the citizens. Consequently, it is of utmost importance for ACCUS ICP to be protected with the appropriate defense mechanisms against these attacks. Towards this direction, the measurement of the performance degradation of the attacked ICP server can be used for the selection of the most appropriate defense mechanisms. However, the suitable metrics are required to be defined. Therefore, this paper models and analyzes the impact of DoS attacks on the queue management temporal performance of the ACCUS ICP server in terms of system delay by using queueing theory.
Cloud manufacturing (CMfg) is a novel business paradigm with resource service (RS) sharing being one of the most important purposes. From the perspective of enterprise business interactions, how to achieve full RS sha...
详细信息
ISBN:
(纸本)9783319227597
Cloud manufacturing (CMfg) is a novel business paradigm with resource service (RS) sharing being one of the most important purposes. From the perspective of enterprise business interactions, how to achieve full RS sharing is an important research issue in CMfg as it plays a critical role in enhancing the performance and efficiency of a CMfg system. However, the research on CMfg RS sharing is challenged by the complexity of a CMfg system, mainly coming from the vast number of involved enterprises and their complex business interactions. In this paper, we propose a modeling framework for CMfg RS sharing by regarding a CMfg system as a complex system and elaborating the problem from the perspective of complex systems modeling and simulation. We summarize systematically the factors that need to be considered for building a system of CMfg RS sharing, which is followed by the modeling procedure.
Smart city is rapidly gaining attention, and more than 400 sites are recognized all over the world, as of the year 2012. Smart city is regarded as an urban area where its social/public infrastructure is efficiently ma...
详细信息
ISBN:
(纸本)9781467365635
Smart city is rapidly gaining attention, and more than 400 sites are recognized all over the world, as of the year 2012. Smart city is regarded as an urban area where its social/public infrastructure is efficiently managed using the advanced technology such as ICT, environmental science. The original goal was to form a technology basis for low carbon society or efficient community in energy usage, however, the recent concept grows to include resiliency of society and its infrastructure in disastrous situation. This trend is apparent in Japan, especially after the East Japan Great Earthquake in 2011. Smart city is designed as a social infrastructure to share community resources in emergent situations, and to bring efficiency in energy use in a normal situation. This paper introduces typical smart city projects in the world and community services developed under smart city context.
Impact craters are typical lunar areas which can reflect the characteristics of lunar surface, so the studies of them are one of the key tasks of lunar exploration. A class of complete orthogonal piecewise polynomials...
详细信息
In healthcare sector huge quantities of data about patients and their medical conditions have been gathered through clinical databases and various other healthcare processes. Currently, it records nearly all aspects o...
详细信息
ISBN:
(纸本)9781450347792
In healthcare sector huge quantities of data about patients and their medical conditions have been gathered through clinical databases and various other healthcare processes. Currently, it records nearly all aspects of care, including patient personal information, clinical trials, hospital records, diagnosis, medication, test results, imaging data, costs, administrative reports, etc. Like in other application domains, the big data revolution holds also great promise in the area of healthcare, as the available data about individual patients is very rich, and hides crucial knowledge that can be exploited to improve patients' care while reducing its cost. For instance, in 2012 worldwide collected healthcare data was estimated to be in the region of 500 petabytes and it is expected to grow 50 times more in 2020 (25 Exabytes). Turning this massive amount of data into knowledge that can be used to identify needs, predict and prevent critical patients' conditions, and help practitioners to make rapid and accurate decisions is not only a desire but is of urgent and crucial necessity. Therefore, healthcare organisations must have the ability to manage and analyse their data in a rapid and efficient manner to answer several critical questions related to diseases, treatments, patients' behaviours, and care management. However, building such system faces huge challenges: 1) data complexity, 2) Privacy, security, ethical, legal, and social issues, and 3) Interoperability, portability, and compatibility. We will discuss all these challenges and the requirements of healthcare ecosystem. This will lead us to describe some innovative methodologies of how to build such ecosystem to face the healthcare challenges of the next decade or so.
In these years, computerization has been more and more important in the financial area. The computational intensity and real- time constraints of those financial models require high-throughput parallel architectures. ...
详细信息
Multi-carrier code division multiple access (MC-CDMA) has been considered as a strong candidate for next generation wireless communication system due to its excellent performance in multi-path fading channel and simpl...
详细信息
Recently, the industrial wireless protocols have been widely used around the world. However, the unreliable communication media between the sensors and the central controller renders the wireless signal channel vulner...
详细信息
ISBN:
(纸本)9781467379298
Recently, the industrial wireless protocols have been widely used around the world. However, the unreliable communication media between the sensors and the central controller renders the wireless signal channel vulnerable to many attacks. Various efforts have been devoted to study the influence of specific malicious attacks from the aspect of theoretical investigation based on different assumptions. This paper focuses on verifying the optimal Denial-of-service (DoS) jamming attack strategy on a class of wireless industrial control system from the view of experiments. We first introduce typical control system model and DoS attack model, and an optimal DoS attack schedule against LQG control based on these models. Then, we establish a semi physical security testbed which consists of virtual plant, physical controller and communication process. We also realize wireless DoS attacks by exploiting the USRP device. Through extensive experiments and analysis, we investigate the performance of different DoS attack strategies on the LQG control system over an inverted pendulum.
All operating systems are employing some sort of logging mechanism to track and note users activities and Microsoft Windows is not an exception. Log Analysis is one of the important parts of Windows forensics process....
详细信息
暂无评论