사이버물리시스템 연구 동향

  • Published : 2013.12.30

Abstract

Keywords

References

  1. B. Warneke, K.S.J. Pister, "MEMS for Distributed Wireless Sensor Networks," in Proceedings of International Conference on Electronics, Circuits and Systems, 2002
  2. D. D. Gajski, S. Abdi, A. Gerstlauer, and G. Schirner. "Embedded System Design - Modeling, Synthesis, and Veri_cation". Springer, 2009.
  3. R. Rajkumar, I. Lee, L. Sha and J. Stankovic, "Cyber- Physical Systems: The Next Computing Revolution," in Proceedings of Design Automation Conference (DAC), 2010 47th ACM/IEEE, 2010.
  4. NIST Report, "http://www.nist.gov/el/isd/cps020613. cfm"
  5. Y. Lim, Y. Oh, T. Park, S. Son, "Cyber-Physical Systems( CPS) for the Smart New World", PM Issue Report, Vol. 1, Issue 1, 한국방송통신전파진흥원, 2013.
  6. 통계지리정보서비스, "http://sgis.kostat.go.kr/publics model/"
  7. The Shristian Science Monitor, 12/15/2011 온라인 version.
  8. S. Bellovin, "Stuxnet: The first weaponized software?" http://www.cs.columbia.edu/-smb/blog/2010-09-27. html, October 2010.
  9. R. Azimi, G. Bhatia, R. Rajkumar, P. Mudalige, "Reliable Intersection Protocols Using Vehicular Networks," in Proceedings of IEEE/ACM ICCPS, 2013.
  10. e-나라지표, "http://www.index.go.kr/egams/stts/jsp/ potal/stts/PO_STTS_IdxMain.jsp?idx_cd=1163"
  11. Office of the National Coordinator for Smart Grid Interoperability, "Framework and Roadmap for Smart Grid Interoperability Standards Release 1.0" NIST Special Publication 1108, January 2010.
  12. Y. Liu, P. Ning, and M. Reiter, "False Data Injection Attacks Against State Estimation in Electric Power Grids", in Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, pp. 21-32, 2009.