Search results for "Physical Systems"
showing 5 items of 15 documents
Industry 4.0 Intelligence under Attack : From Cognitive Hack to Data Poisoning
2018
Artificial intelligence is an unavoidable asset of Industry 4.0. Artificial actors participate in real-time decision-making and problem solving in various industrial processes, including planning, production, and management. Their efficiency, as well as intelligent and autonomous behavior is highly dependent on the ability to learn from examples, which creates new vulnerabilities exploited by security threats. Today's disruptive attacks of hackers go beyond system's infrastructures targeting not only hard-coded software or hardware, but foremost data and trained decision models, in order to approach system's intelligence and compromise its work. This paper intends to reveal security threats…
Multi-agent control architecture for RFID cyberphysical robotic systems initial validation of tagged objects detection and identification using Playe…
2016
International audience; The objective of this paper is to describe and validate a multi-agent architecture proposed to control RFID Cyber-Physical Robotic Systems. This environment may contain human operators, robots (mobiles, manipulators, mobile manipulators, etc.), places (workrooms, walls, etc.) and other objects (tables, chairs, etc.). The proposed control architecture is composed of two types of agents dispatched on two levels. We find at the Organization level a Supervisory agent to allow operators to configure, manage and interact with the overall control system. At the Control level, we distinguish the Robots agents, to each robot (mobiles, manipulators or mobile manipulators) is a…
Game Theory with Engineering Applications
2016
Engineering systems are highly distributed collective systems—decisions, information, and objectives are distributed throughout—that have humans in the loop, and thus decisions may be influenced by socioeconomic factors. Engineering systems emphasize the potential of control and games beyond traditional applications. Game theory can be used to design incentives to obtain socially desirable behaviors on the part of the players, for example, a change in the consumption patterns on the part of the “prosumers” (producers-consumers) or better redistribution of traffic. This unique book addresses the foundations of game theory, with an emphasis on the physical intuition behind the concepts, an an…
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
Search for the Decay of the Higgs Boson to Charm Quarks with the ATLAS Experiment
2018
A direct search for the standard model Higgs boson decaying to a pair of charm quarks is presented. Associated production of the Higgs and Z bosons, in the decay mode ZH→ℓ+ℓ−c¯c is studied. A data set with an integrated luminosity of 36.1 fb−1 of pp collisions at √s=13TeV recorded by the ATLAS experiment at the LHC is used. The H→c¯c signature is identified using charm-tagging algorithms. The observed (expected) upper limit on σ(pp→ZH)×B(H→c¯c) is 2.7 (3.9+2.1−1.1) pb at the 95% confidence level for a Higgs boson mass of 125 GeV, while the standard model value is 26 fb.