70 research outputs found

    Detecting Robotic Anomalies using RobotChain

    Get PDF
    Robotic events can provide notable amounts of information regarding a robot’s status, which can be extrapolated to detect productivity, anomalies, malfunctions and used for monitorization. However, when problems occur in sensitive environments like a factory, the logs of a machine may be discarded because they are susceptible to chances and malicious intents. In this paper we propose to use RobotChain for anomaly detection. RobotChain is a method to securely register robotic events, using a blockchain, which ensures that once an event gets registered on it, it’s secured and cannot be tampered with. We show how this system can be leveraged with the module for anomaly detection, that uses the information contained on the blockchain to detect anomalies on a UR3 robot.This work was partially supported by the Tezos Fundation through a grant for project Robotchaininfo:eu-repo/semantics/publishedVersio

    The efficacy potential of cyber security advice as presented in news articles

    Full text link
    Cyber security advice is a broad church: it is thematically expansive, comprising expert texts, user-generated data consumed by individual users via informal learning, and much in-between. While there is evidence that cyber security news articles play a role in disseminating cyber security advice, the nature and extent of that role are not clear. We present a corpus of cyber security advice generated from mainstream news articles. The work was driven by two research objectives. The first objective was to ascertain what kind of actionable advice is being disseminated; the second was to explore ways of determining the efficacy potential of news-mediated security advice. The results show an increase in the generation of cyber security news articles, together with increases in vocabulary complexity and reading difficulty. We argue that these could present challenges for vulnerable users. We believe that this corpus and the accompanying analysis have the potential to inform future efforts to quantify and improve the efficacy potential of security advice dissemination

    Exploring a Modelling Method with Semantic Link Network and Resource Space Model

    Get PDF
    To model the complex reality, it is necessary to develop a powerful semantic model. A rational approach is to integrate a relational view and a multi-dimensional view of reality. The Semantic Link Network (SLN) is a semantic model based on a relational view and the Resource Space Model (RSM) is a multi-dimensional view for managing, sharing and specifying versatile resources with a universal resource observation. The motivation of this research consists of four aspects: (1) verify the roles of Semantic Link Network and the Resource Space Model in effectively managing various types of resources, (2) demonstrate the advantages of the Resource Space Model and Semantic Link Network, (3) uncover the rules through applications, and (4) generalize a methodology for modelling complex reality and managing various resources. The main contribution of this work consists of the following aspects: 1. A new text summarization method is proposed by segmenting a document into clauses based on semantic discourse relations and ranking and extracting the informative clauses according to their relations and roles. The Resource Space Model benefits from using semantic link network, ranking techniques and language characteristics. Compared with other summarization approaches, the proposed approach based on semantic relations achieves a higher recall score. Three implications are obtained from this research. 2. An SLN-based model for recommending research collaboration is proposed by extracting a semantic link network of different types of semantic nodes and different types of semantic links from scientific publications. Experiments on three data sets of scientific publications show that the model achieves a good performance in predicting future collaborators. This research further unveils that different semantic links play different roles in representing texts. 3. A multi-dimensional method for managing software engineering processes is developed. Software engineering processes are mapped into multiple dimensions for supporting analysis, development and maintenance of software systems. It can be used to uniformly classify and manage software methods and models through multiple dimensions so that software systems can be developed with appropriate methods. Interfaces for visualizing Resource Space Model are developed to support the proposed method by keeping the consistency among interface, the structure of model and faceted navigation

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    Critical analysis for big data studies in construction: significant gaps in knowledge

    Get PDF
    Purpose The purpose of this paper is to identify the gaps and potential future research avenues in the big data research specifically in the construction industry. Design/methodology/approach The paper adopts systematic literature review (SLR) approach to observe and understand trends and extant patterns/themes in the big data analytics (BDA) research area particularly in construction-specific literature. Findings A significant rise in construction big data research is identified with an increasing trend in number of yearly articles. The main themes discussed were big data as a concept, big data analytical methods/techniques, big data opportunities – challenges and big data application. The paper emphasises “the implication of big data in to overall sustainability” as a gap that needs to be addressed. These implications are categorised as social, economic and environmental aspects. Research limitations/implications The SLR is carried out for construction technology and management research for the time period of 2007–2017 in Scopus and emerald databases only. Practical implications The paper enables practitioners to explore the key themes discussed around big data research as well as the practical applicability of big data techniques. The advances in existing big data research inform practitioners the current social, economic and environmental implications of big data which would ultimately help them to incorporate into their strategies to pursue competitive advantage. Identification of knowledge gaps helps keep the academic research move forward for a continuously evolving body of knowledge. The suggested new research avenues will inform future researchers for potential trending and untouched areas for research. Social implications Identification of knowledge gaps helps keep the academic research move forward for continuous improvement while learning. The continuously evolving body of knowledge is an asset to the society in terms of revealing the truth about emerging technologies. Originality/value There is currently no comprehensive review that addresses social, economic and environmental implications of big data in construction literature. Through this paper, these gaps are identified and filled in an understandable way. This paper establishes these gaps as key issues to consider for the continuous future improvement of big data research in the context of the construction industry

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    Explainable Predictive Maintenance

    Full text link
    Explainable Artificial Intelligence (XAI) fills the role of a critical interface fostering interactions between sophisticated intelligent systems and diverse individuals, including data scientists, domain experts, end-users, and more. It aids in deciphering the intricate internal mechanisms of ``black box'' Machine Learning (ML), rendering the reasons behind their decisions more understandable. However, current research in XAI primarily focuses on two aspects; ways to facilitate user trust, or to debug and refine the ML model. The majority of it falls short of recognising the diverse types of explanations needed in broader contexts, as different users and varied application areas necessitate solutions tailored to their specific needs. One such domain is Predictive Maintenance (PdM), an exploding area of research under the Industry 4.0 \& 5.0 umbrella. This position paper highlights the gap between existing XAI methodologies and the specific requirements for explanations within industrial applications, particularly the Predictive Maintenance field. Despite explainability's crucial role, this subject remains a relatively under-explored area, making this paper a pioneering attempt to bring relevant challenges to the research community's attention. We provide an overview of predictive maintenance tasks and accentuate the need and varying purposes for corresponding explanations. We then list and describe XAI techniques commonly employed in the literature, discussing their suitability for PdM tasks. Finally, to make the ideas and claims more concrete, we demonstrate XAI applied in four specific industrial use cases: commercial vehicles, metro trains, steel plants, and wind farms, spotlighting areas requiring further research.Comment: 51 pages, 9 figure

    Data quality affecting big data analytics in smart factories : research themes, issues and methods

    Get PDF
    Recent years have seen a growing call for use of big data analytics techniques to support the realisation of symmetries and simulations in digital twins and smart factories, in which data quality plays an important role in determining the quality of big data analytics products. Although data quality affecting big data analytics has received attention in the smart factory research field, to date a systematic review of the topic of interest for understanding the present state of the art is not available, which could help reveal the trends and gaps in this area. This paper therefore presents a systematic literature review of research articles about data quality affecting big data analytics in smart factories that have been published up to 2020. We examined 31 empirical studies from our selection of papers to identify the research themes in this field. The analysis of these studies links data quality issues toward big data analytics with data quality dimensions and methods used to address these issues in the smart factory context. The findings of this systematic review also provide implications for practitioners in addressing data quality issues to better use big data analytics products to support digital symmetry in the context of smart factory
    corecore