11,269 research outputs found
Assessing and augmenting SCADA cyber security: a survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
J-PET Framework: Software platform for PET tomography data reconstruction and analysis
J-PET Framework is an open-source software platform for data analysis,
written in C++ and based on the ROOT package. It provides a common environment
for implementation of reconstruction, calibration and filtering procedures, as
well as for user-level analyses of Positron Emission Tomography data. The
library contains a set of building blocks that can be combined by users with
even little programming experience, into chains of processing tasks through a
convenient, simple and well-documented API. The generic input-output interface
allows processing the data from various sources: low-level data from the
tomography acquisition system or from diagnostic setups such as digital
oscilloscopes, as well as high-level tomography structures e.g. sinograms or a
list of lines-of-response. Moreover, the environment can be interfaced with
Monte Carlo simulation packages such as GEANT and GATE, which are commonly used
in the medical scientific community.Comment: 14 pages, 5 figure
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Assess program: Interactive data management systems for airborne research
Two data systems were developed for use in airborne research. Both have distributed intelligence and are programmed for interactive support among computers and with human operators. The C-141 system (ADAMS) performs flight planning and telescope control functions in addition to its primary role of data acquisition; the CV-990 system (ADDAS) performs data management functions in support of many research experiments operating concurrently. Each system is arranged for maximum reliability in the first priority function, precision data acquisition
Logging software upgrade
Vaisala weather instruments testing requires data logging to produce information for decisions making. Data logging is increasingly becoming database focused. Database logging was not usable and available to all users easily, for which reason this thesis aimed to bring database logging into internally used logging software. VB.NET based software was to be updated bringing database logging available to all users.
The thesis and development of the software update used empirical research. Software principles were applied from theoretical literacy sources. Not all theoretical principles were applied to the internal software.
Most software acceptance requirements were met, and software was evaluated acceptable to use. Especially its productivity was remarkable. However, its development should continue to bring all evaluation subjects to fully satisfying level. Some erroneous issues can escalate in wider use.
The software was successfully updated, and it began a new era in its development lifecycle. Software was uploaded into GIT and should continue to be improved to better serve the company and its needs
Emulation of modular manufacturing machines using CAD modelling
Designing, testing and debugging a machine control system which controls mechatronic hardware elements can be a complex, time consuming and costly procedure. It is often extremely difficult for the system builder to envisage in advance the effects of small changes to the control system logic, with potentially dangerous results if the hardware consists of heavy machinery. It is also rare that a system builder will arrive at a working prototype on the first attempt and discovering the reasons for incorrect operation without a suitable means of comprehending the problems can be an arduous task. This paper describes an approach which supports the designing, testing and debugging of modular manufacturing machines using 3D graphical models of the machine hardware. The paper emphasises the underlying methodology of the approach, which involves collecting timing data from the executing control system under development, then emulating the operation of the machine by using this data to drive a graphical model of the hardware. The term “emulation” is used to mean modelling using data captured from the real machine as opposed to “simulation” which synthesises data.
The work builds on previous research at the MSI Research Institute concerned with the control of modular machines. Two new extensions to this work are described here, which form the basis of the emulation capability. The first is the addition of the ability to execute the control system without the mechatronic hardware elements present whilst still retaining the operational behaviour of the application. The second is the mechanism for collecting the run-time data which defines these operational characteristics, to drive the machine emulation. The features of the custom 3D modeller are presented and its use for machine emulation is described. An example of a real control system under development is given to illustrate the complete process.
The research objectives of the work described here are concerned with the fundamental problems designers encounter when trying to prototype the control systems of modular machines. The research has shown that the ability to execute the control system with or without the mechatronic hardware elements present can be a considerable advantage if supported by a CAD-based emulation system
Applying Spatial Computing to Everyday Interactive Designs
In this position paper, we address the applicability
of spatial computing in the field of interactive architecture. The
process of designing large-scale interactive systems is cumbersome,
due in fact to single design cycles (transforming ideas into
prototypes) taking a period of time usually measured in months,
most of it dedicated to writing the software controlling the system.
As most interactive architecture projects pass through several
design cycles interleaved with user studies, speeding up the
generation of the needed software becomes of crucial importance.
The global-to-local programming approach is in fact a perfect tool
for this task. Describing complex behaviors with simple rules
is rarely seen in the existing installations, the large majority
employing a central computer for the control of the system.
Building up on our previous experience in this area, we created
HiveKit, a proof of concept allowing bridging between the two
fields, giving non-specialists easy access to distributed algorithms.
HiveKit is a software package which allows designers to specify
the desired behavior and automatically generate and deploy the
needed code on networks of embedded devices. We introduce several
projects where HiveKit is employed and create an argument,
based on user studies, favoring the need for large-scale adoption
of such tools
Random Generation of Arbitrary Waveforms for Emulating Three-Phase Systems
This paper describes an apparatus for generating a
signal representative of steady-state and transient disturbances
in three-phase waveforms of an ac electrical system as described
in IEEE Std 1159-09. It can be configured as a synthesizer of
randomly distorted signals for different applications: for testing
the effects of disturbed grid on equipment and to generate patterns
of electrical disturbances for the training of artificial neural
networks, which are used for measuring power quality tasks. For
the first purpose, voltage and current amplifiers are added in the
output stage, which allows the generation of disturbed signals at
grid level.Comisión Interministerial de Ciencia y Tecnología DPI2006-15467-C02-01Comisión Interministerial de Ciencia y Tecnología DPI2006-15467-C02-0
CERN openlab Whitepaper on Future IT Challenges in Scientific Research
This whitepaper describes the major IT challenges in scientific research at CERN and several other European and international research laboratories and projects. Each challenge is exemplified through a set of concrete use cases drawn from the requirements of large-scale scientific programs. The paper is based on contributions from many researchers and IT experts of the participating laboratories and also input from the existing CERN openlab industrial sponsors. The views expressed in this document are those of the individual contributors and do not necessarily reflect the view of their organisations and/or affiliates
- …