Abstract—Cyber-physical systems uses sensors, actuators, and computation to solve problems that cross the physical world and computational world. Traditionally, the systems have been designed to be specific to one application domain and to be managed by a single entity. However, to achieve scalability, it is necessary to reuse sensors and actuators across multiple application domains. This broad use of sensors and actuators, as envisioned for the Internet of Things, raises many new problems related to interoperability, resource sharing, security and trust, and economics. In this paper, we address the problem of trust – specifically how to verify sensor information that is gathered from multiple sensors that are managed by different entities...
Cyber physical systems are becoming ubiquitous devices in many fields thus creating the need for eff...
Most current scientific and industrial efforts in IoT are geared towards building integrated platfor...
In this paper, we propose a model-based approach to detect outliers in sensor networks by exploring ...
Devices that sense some aspect of the environment, or collect data about it, process the sensed data...
Abstract. Various applications rely on a continuous processing of data streams originating from a ne...
We are entering a new era of computing technology, the era of Internet of Things (IoT). An important...
Internet of Thing (IoT) becoming increasingly popular over the past few years because it can be impl...
Pushed by the Internet of Things (IoT) paradigm modern sensor networks monitor a wide range of pheno...
The Internet of Things (IoT) has been gaining attention in the past few years as this technology has...
Especially in context of critical urban infrastructures, trust in IoT data is of utmost importance. ...
The failure on the IoT devices is also caused due to limited battery life, hardware failure or human...
Remote sensing is often a crucial part of cyber-physical and networked systems. Measurements taken a...
Abstract: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to...
Validation of input data is essential in any computer system, but perhaps particularly important in ...
Internet of Things (IoT) applications are increasingly being adopted for innovative and cost-effecti...
Cyber physical systems are becoming ubiquitous devices in many fields thus creating the need for eff...
Most current scientific and industrial efforts in IoT are geared towards building integrated platfor...
In this paper, we propose a model-based approach to detect outliers in sensor networks by exploring ...
Devices that sense some aspect of the environment, or collect data about it, process the sensed data...
Abstract. Various applications rely on a continuous processing of data streams originating from a ne...
We are entering a new era of computing technology, the era of Internet of Things (IoT). An important...
Internet of Thing (IoT) becoming increasingly popular over the past few years because it can be impl...
Pushed by the Internet of Things (IoT) paradigm modern sensor networks monitor a wide range of pheno...
The Internet of Things (IoT) has been gaining attention in the past few years as this technology has...
Especially in context of critical urban infrastructures, trust in IoT data is of utmost importance. ...
The failure on the IoT devices is also caused due to limited battery life, hardware failure or human...
Remote sensing is often a crucial part of cyber-physical and networked systems. Measurements taken a...
Abstract: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to...
Validation of input data is essential in any computer system, but perhaps particularly important in ...
Internet of Things (IoT) applications are increasingly being adopted for innovative and cost-effecti...
Cyber physical systems are becoming ubiquitous devices in many fields thus creating the need for eff...
Most current scientific and industrial efforts in IoT are geared towards building integrated platfor...
In this paper, we propose a model-based approach to detect outliers in sensor networks by exploring ...