A. Pimentel, C. Grelck, L. Miedema, D. Sapra, M. Völp, F. Lucchetti, A. Matovic, M. Maggio, N. Vreman, S. Altmeyer, F. Haas, A. Casimiro, J. Cecílio, G. Jäger, A. Espindola, S. Skalistis, J. Kouwer, G. D. Lange, J. Almeida, H. Blasum, M. Brotz, S. Wagner, P. Novobílský
{"title":"The ADMORPH Approach for Adaptively Morphing Embedded Systems","authors":"A. Pimentel, C. Grelck, L. Miedema, D. Sapra, M. Völp, F. Lucchetti, A. Matovic, M. Maggio, N. Vreman, S. Altmeyer, F. Haas, A. Casimiro, J. Cecílio, G. Jäger, A. Espindola, S. Skalistis, J. Kouwer, G. D. Lange, J. Almeida, H. Blasum, M. Brotz, S. Wagner, P. Novobílský","doi":"10.1145/3672359.3672372","DOIUrl":null,"url":null,"abstract":"Due to the increasing performance demands of missionand safety-critical Cyber-Physical Systems (of Systems), these systems exhibit a rapidly growing complexity, manifested by an increasing number of (distributed) computational cores and application components connected via complex networks. However, with these systems' growing complexity and interconnectivity, the chances of hardware failures and disruptions due to cyber-attacks will also quickly increase.","PeriodicalId":330677,"journal":{"name":"ACM Sigada Ada Letters","volume":"5 1","pages":"78 - 83"},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Sigada Ada Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3672359.3672372","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Due to the increasing performance demands of missionand safety-critical Cyber-Physical Systems (of Systems), these systems exhibit a rapidly growing complexity, manifested by an increasing number of (distributed) computational cores and application components connected via complex networks. However, with these systems' growing complexity and interconnectivity, the chances of hardware failures and disruptions due to cyber-attacks will also quickly increase.