Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (6): 1770-1773.DOI: 10.11772/j.issn.1001-9081.2014.06.1770
Previous Articles Next Articles
LIU Mingxing,MA Wubin,DENG Su,HUANG Hongbin
Received:
2013-11-18
Revised:
2013-12-25
Online:
2014-07-02
Published:
2014-06-01
Contact:
LIU Mingxing
刘明星,马武彬,邓苏,黄宏斌
通讯作者:
刘明星
作者简介:
CLC Number:
LIU Mingxing MA Wubin DENG Su HUANG Hongbin. Modeling and verification of services oriented cyber physical systems[J]. Journal of Computer Applications, 2014, 34(6): 1770-1773.
刘明星 马武彬 邓苏 黄宏斌. 面向服务的信息物理融合系统建模与验证[J]. 计算机应用, 2014, 34(6): 1770-1773.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.06.1770
[1]LEE E A. Cyber-physical systems — are computing foundations adequate? [EB/OL]. [2013-02-15]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.84.8011&rep=rep1&type=pdf.
[2]HE J. Cyber physical systems [J]. Communications of the China Computer Federation, 2010,6(1):25-29.(何积丰.Cyber physical systems[J]. 中国计算机学会通讯, 2010,6(1):25-29.) [3]WANG X, CHEN L, HUANG H, et al. A service-oriented architecture framework of cyber-physical systems [J]. Journal of Computer Research and Development, 2010,47(S2):299-303.(王小乐,陈丽娜,黄宏斌,等.一种面向服务的CPS体系框架[J].计算机研究与发展, 2010,47(S2):299-303.) [4]TAN P, SHU J, WU Z. An architecture for cyber-physical systems [J]. Journal of Computer Research and Development, 2010, 47(S2):312-316.(谭朋柳,舒坚,吴振华.一种信息—物理融合系统的体系结构[J].计算机研究与发展, 2010, 47(S2):312-316.) [5]CHEN L, WANG X, DENG S. Cyber physical system architecture design [J]. Computer Science, 2011,38(5):295-300.(陈丽娜,王小乐,邓苏.CPS体系结构设计[J].计算机科学, 2011,38(5):295-300.) [6]TAN Y, GODDARD S, PREZ L C. A prototype architecture for cyber-physical systems [J]. ACM SIGBED Review, 2008,5(1):51-52. [7]DERLER P, LEE E A. Modeling cyber-physical systems [J]. Proceedings of the IEEE, 2012,100(1):13-28.
[8]LIN J, SEDDIGH S, MILLER A. Modeling cyber-physical systems with semantic Agents [C]// Proceedings of the 2010 34th Annual Computer Software and Applications Conference Workshops. Piscataway: IEEE Press, 2010:13-18.
[9]TAN Y, VURAN M C, GODDARD S. Spatio-temporal event model for cyber-physical systems [C]// Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems Workshops. Washington, DC: IEEE Computer Society, 2009:44-50.
[10]LI L, JIN Z, LI G. Modeling and verifying services of Internet of things based on timed automata [J]. Chinese Journal of Computers, 2011,34(8):1355-1377.(李力行,金芝,李戈.基于时间自动机的物联网服务建模和验证[J].计算机学报,2011,34(8):1355-1377.)
[11]CHEN Z. Modeling and verification of cyber-physical systems based on timed automata [J]. Computer and Modernization, 2012(10):125-130.(陈志辉.基于时间自动机的信息物理融合系统建模与验证[J].计算机与现代化,2012(10):125-130.)
[12]ALUR R, DILL D L. A theory of timed automata [J]. Theoretical Computer Science, 1994,126(2):183-235. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||