Learn More
Carbon nanotubes (CNTs) [1, 2] have dimensions similar to those of typical polymeric chains, with 1-50nm in diameter and 1-10µm in length. Experimental results on individual carbon nanotubes and nanotube bundles show that they have exceptional electrical and mechanical properties with an elastic modulus of ~1TPa and fracture strain of 5-10%. [3] The thermal(More)
In this article, we address both security and safety requirements and solve security-aware design problems for the controller area network (CAN) protocol and time division multiple access (TDMA)-based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general(More)
Cyber-security has emerged as a pressing issue for transportation systems. Studies have shown that attackers can attack modern vehicles from a variety of interfaces and gain access to the most safety-critical components. Such threats become even broader and more challenging with the emergence of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)(More)
The safety of real-time embedded systems relies on both functional and timing correctness. On the timing side, real-time constraints are set on task executions, and missing them may lead to system failure. On the functional side, soft errors have become a major concern. Various soft error tolerance strategies are proposed for soft error detection and(More)
In this article, we propose a new lifetime task optimization technique for real-time embedded processors considering the electromigration-induced reliability. The new approach is based on a recently proposed physics-based electromigration (EM) model for more accurate EM assessment of a power grid network at the chip level. We apply the dynamic voltage and(More)
We have studied the stress wave propagation in one-dimensional (1-D) nanoscopic buckyball (C60) system by molecular dynamics (MD) simulation and quantitative modeling. Simulation results have shown that solitary waves are generated and propagating in the buckyball system through impacting one buckyball at one end of the buckyball chain. We have found the(More)
Demand response (DR) is an effective mechanism in improving power system efficiency and reducing energy cost for customers. However, DR processes might be vulnerable to cyber attacks from the usage of advanced metering infrastructure and wide-area network to exchange information. In this paper, we study potential attacks for a proactive demand participation(More)
Although entities are named under some specific rules, the amount of various names makes it impossible for computers to detect these entities in a context because of the complex variety of the rules. If we can create a rule that can be easily identified by computers to detect these names automatically, it will substantially reduce our cost, save our time as(More)
Security attacks may have disruptive consequences on cyber-physical systems, and lead to significant social and economic losses. Building secure cyber-physical systems is particularly challenging due to the variety of attack surfaces from the cyber and physical components, and often to limited computation and communication resources. In this paper, we(More)