scholarly journals Corrigendum to “Scheduling software updates for connected cars with limited availability” [Appl. Soft Comput. (2019) 105575]

2022 ◽  
Vol 114 ◽  
pp. 106523
Author(s):  
Carlos E. Andrade ◽  
Simon D. Byers ◽  
Vijay Gopalakrishnan ◽  
Emir Halepovic ◽  
David J. Poole ◽  
...  
2019 ◽  
Vol 82 ◽  
pp. 105575 ◽  
Author(s):  
Carlos E. Andrade ◽  
Simon D. Byers ◽  
Vijay Gopalakrishnan ◽  
Emir Halepovic ◽  
David J. Poole ◽  
...  

2016 ◽  
Vol 5 (1) ◽  
pp. 20-23
Author(s):  
Rudolf Von Stokar

2014 ◽  
Vol 3 (4) ◽  
pp. 36-39
Author(s):  
Rudolf Von Stokar

ATZelektronik ◽  
2014 ◽  
Vol 9 (1) ◽  
pp. 46-51 ◽  
Author(s):  
Rudolf Von Stokar

2015 ◽  
Vol 22 (3) ◽  
pp. 93-102 ◽  
Author(s):  
Allison Breit-Smith ◽  
Jamie Busch ◽  
Ying Guo

Although a general limited availability of expository texts currently exists in preschool special education classrooms, expository texts offer speech-language pathologists (SLPs) a rich context for addressing the language goals of preschool children with language impairment on their caseloads. Thus, this article highlights the differences between expository and narrative texts and describes how SLPs might use expository texts for targeting preschool children's goals related to listening comprehension, vocabulary, and syntactic relationships.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4393
Author(s):  
JongHyup Lee ◽  
Taekyoung Kwon

The Industrial Internet of Things (IIoT) could enhance automation and analytics in industrial environments. Despite the promising benefits of IIoT, securely managing software updates is a challenging problem for those critical applications. This is due to at least the intrinsic lack of software protection mechanisms in legacy industrial systems. In this paper, to address the challenges in building a secure software supply chain for industrial environments, we propose a new approach that leverages distributed watchdogs with blockchain systems in protecting software supply chains. For this purpose, we bind every entity with a unique identity in the blockchain and employ the blockchain as a delegated authenticator by mapping every reporting action to a non-fungible token transfer. Moreover, we present a detailed specification to clearly define the behavior of systems and to apply model checking.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1220
Author(s):  
Chee Wei Lee ◽  
Stuart Madnick

Urban mobility is in the midst of a revolution, driven by the convergence of technologies such as artificial intelligence, on-demand ride services, and Internet-connected and self-driving vehicles. Technological advancements often lead to new hazards. Coupled with the increased levels of automation and connectivity in the new generation of autonomous vehicles, cybersecurity is emerging as a key threat affecting these vehicles. Traditional hazard analysis methods treat safety and security in isolation and are limited in their ability to account for interactions among organizational, sociotechnical, human, and technical components. In response to these challenges, the cybersafety method, based on System Theoretic Process Analysis (STPA and STPA-Sec), was developed to meet the growing need to holistically analyze complex sociotechnical systems. We applied cybersafety to coanalyze safety and security hazards, as well as identify mitigation requirements. The results were compared with another promising method known as Combined Harm Analysis of Safety and Security for Information Systems (CHASSIS). Both methods were applied to the Mobility-as-a-Service (MaaS) and Internet of Vehicles (IoV) use cases, focusing on over-the-air software updates feature. Overall, cybersafety identified additional hazards and more effective requirements compared to CHASSIS. In particular, cybersafety demonstrated the ability to identify hazards due to unsafe/unsecure interactions among sociotechnical components. This research also suggested using CHASSIS methods for information lifecycle analysis to complement and generate additional considerations for cybersafety. Finally, results from both methods were backtested against a past cyber hack on a vehicular system, and we found that recommendations from cybersafety were likely to mitigate the risks of the incident.


Sign in / Sign up

Export Citation Format

Share Document