Permalink
Find file
cb4bae8 Jun 6, 2016
53 lines (51 sloc) 2.36 KB
@article{satyanarayanan2015edge,
title={Edge Analytics in the Internet of Things},
author={
Mahadev Satyanarayanan and Pieter Simoens and Yu Xiao and
Padmanabhan Pillai and Zhuo Chen and Kiryong Ha and
Wenlu Hu and Brandon Amos
},
journal={IEEE Pervasive Computing},
number={2},
pages={24--31},
_venue={IEEE Pervasive Computing},
year={2015},
publisher={IEEE},
url={https://www.cs.cmu.edu/~satya/docdir/satya-edge2015.pdf},
abstract={
High-data-rate sensors, such as video cameras, are becoming ubiquitous in the
Internet of Things. This article describes GigaSight, an Internet-scale
repository of crowd-sourced video content, with strong enforcement of privacy
preferences and access controls. The GigaSight architecture is a federated
system of VM-based cloudlets that perform video analytics at the edge of the
Internet, thus reducing the demand for ingress bandwidth into the cloud.
Denaturing, which is an owner-specific reduction in fidelity of video content
to preserve privacy, is one form of analytics on cloudlets. Content-based
indexing for search is another form of cloudlet-based analytics. This article
is part of a special issue on smart spaces.
}
}
@article{turner2015bad,
title={{{Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks?}}},
author={Turner, Hamilton and White, Jules and Camelio, Jaime A and Williams, Christopher and Amos, Brandon and Parker, Robert},
journal={Security \& Privacy, IEEE},
volume={13},
number={3},
pages={40--47},
_venue={IEEE Security \& Privacy},
year={2015},
publisher={IEEE},
keywords={magazine},
url={http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7118094},
abstract={
Recent cyberattacks have highlighted the risk of physical equipment operating
outside designed tolerances to produce catastrophic failures. A related
threat is cyberattacks that change the design and manufacturing of a
machine's part, such as an automobile brake component, so it no longer
functions properly. These risks stem from the lack of cyber-physical models
to identify ongoing attacks as well as the lack of rigorous application of
known cybersecurity best practices. To protect manufacturing processes in the
future, research will be needed on a number of critical cyber-physical
manufacturing security topics.
}
}