2,315 research outputs found

    Academic Year 2019-2020 Faculty Excellence Showcase, AFIT Graduate School of Engineering & Management

    Get PDF
    An excerpt from the Dean\u27s Message: There is no place like the Air Force Institute of Technology (AFIT). There is no academic group like AFIT’s Graduate School of Engineering and Management. Although we run an educational institution similar to many other institutions of higher learning, we are different and unique because of our defense-focused graduate-research-based academic programs. Our programs are designed to be relevant and responsive to national defense needs. Our programs are aligned with the prevailing priorities of the US Air Force and the US Department of Defense. Our faculty team has the requisite critical mass of service-tested faculty members. The unique composition of pure civilian faculty, military faculty, and service-retired civilian faculty makes AFIT truly unique, unlike any other academic institution anywhere

    Engage D1.2 Final Project Results Report

    Get PDF
    This deliverable summarises the activities and results of Engage, the SESAR 2020 Knowledge Transfer Network (KTN). The KTN initiated and supported multiple activities for SESAR and the European air traffic management (ATM) community, including PhDs, focused catalyst fund projects, thematic workshops, summer schools and the launch of a wiki as the one-stop, go-to source for ATM research and knowledge in Europe. Key throughout was the integration of exploratory and industrial research, thus expediting the innovation pipeline and bringing researchers together. These activities laid valuable foundations for the SESAR Digital Academy

    Design Principles for Creating a Pay-per-Part Value Proposition in Data Ecosystems

    Get PDF
    In practice and research, pay-per-part business models are becoming increasingly popular. Amongst others mechanical engineering companies, banks, insurances, and IT companies are working on these new business models. There is increasing evidence that the enabler for pay-per-part approaches is the cooperative use of data across company boundaries, being discussed in literature under the term data ecosystem. Along two case studies, a total of eleven companies were accompanied from the definition of the cooperative pay-per-part value proposition to the implementation of a proof of concept. Based on these case studies, eleven design principles could be derived. These design principles provide companies a guidance when designing a cooperative value proposition within an ecosystem. The identified design principles were mapped to different stakeholder groups that are involved in the design of a cooperative value proposition. The generated design principles were evaluated and implications for practitioners and research given

    Cyber Threat Intelligence based Holistic Risk Quantification and Management

    Get PDF

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Systemic Risk and Vulnerability Analysis of Multi-cloud Environments

    Full text link
    With the increasing use of multi-cloud environments, security professionals face challenges in configuration, management, and integration due to uneven security capabilities and features among providers. As a result, a fragmented approach toward security has been observed, leading to new attack vectors and potential vulnerabilities. Other research has focused on single-cloud platforms or specific applications of multi-cloud environments. Therefore, there is a need for a holistic security and vulnerability assessment and defense strategy that applies to multi-cloud platforms. We perform a risk and vulnerability analysis to identify attack vectors from software, hardware, and the network, as well as interoperability security issues in multi-cloud environments. Applying the STRIDE and DREAD threat modeling methods, we present an analysis of the ecosystem across six attack vectors: cloud architecture, APIs, authentication, automation, management differences, and cybersecurity legislation. We quantitatively determine and rank the threats in multi-cloud environments and suggest mitigation strategies.Comment: 27 pages, 9 figure
    corecore