In this position paper we investigate the security of cyberphysical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that informati...
ct This paper presents the author’s view on the main challenges for autonomous operation in surface mining environment. A brief overview of the mine operation is presented showin...
Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authen...
The goal of this paper is to examine the Japanese experience with the software development process, the challenges they face and how formal engineering methods, in particular SOFL...
Spatiotemporal database management systems can become an enabling technology for important applications such as Geographic Information Systems (GIS), environmental information sys...