34,513 research outputs found

    Autonomic computing architecture for SCADA cyber security

    Get PDF
    Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator

    Data mining based cyber-attack detection

    Get PDF

    Group-privacy threats for geodata in the humanitarian context

    Get PDF
    The role of geodata technologies in humanitarian action is arguably indispensable in determining when, where, and who needs aid before, during, and after a disaster. However, despite the advantages of using geodata technologies in humanitarianism (i.e., fast and efficient aid distribution), several ethical challenges arise, including privacy. The focus has been on individual privacy; however, in this article, we focus on group privacy, a debate that has recently gained attention. We approach privacy through the lens of informational harms that undermine the autonomy of groups and control of knowledge over them. Using demographically identifiable information (DII) as a definition for groups, we first assess how these are derived from geodata types used in humanitarian DRRM. Second, we discuss four informational-harm threat models: (i) biases from missing/underrepresented categories, (ii) the mosaic effect—unintentional sensitive knowledge discovery from combining disparate datasets, (iii) misuse of data (whether it is shared or not); and (iv) cost–benefit analysis (cost of protection vs. risk of misuse). Lastly, borrowing from triage in emergency medicine, we propose a geodata triage process as a possible method for practitioners to identify, prioritize, and mitigate these four group-privacy harms

    Contributions to energy informatics, data protection, AI-driven cybersecurity, and explainable AI

    Get PDF
    This cumulative dissertation includes eleven papers dealing with energy informatics, privacy, artificial intelligence-enabled cybersecurity, explainable artificial intelligence, ethical artificial intelligence, and decision support. In addressing real-world challenges, the dissertation provides practical guidance, reduces complexity, shows insights from empirical data, and supports decision-making. Interdisciplinary research methods include morphological analysis, taxonomies, decision trees, and literature reviews. From the resulting design artifacts, such as design principles, critical success factors, taxonomies, archetypes, and decision trees ÂŹ practitioners, including energy utilities, data-intensive artificial intelligence service providers, cybersecurity consultants, managers, policymakers, regulators, decision-makers, and end users can benefit. These resources enable them to make informed and efficient decisions

    ECHO Information sharing models

    Get PDF
    As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents involved in the E-EWS. The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains

    Artificial Intelligence for the Financial Services Industry: What Challenges Organizations to Succeed?

    Get PDF
    As a research field, artificial intelligence (AI) exists for several years. More recently, technological breakthroughs, coupled with the fast availability of data, have brought AI closer to commercial use. Internet giants such as Google, Amazon, Apple or Facebook invest significantly into AI, thereby underlining its relevance for business models worldwide. For the highly data driven finance industry, AI is of intensive interest within pilot projects, still, few AI applications have been implemented so far. This study analyzes drivers and inhibitors of a successful AI application in the finance industry based on panel data comprising 22 semi-structured interviews with experts in AI in finance. As theoretical lens, we structured our results using the TOE framework. Guidelines for applying AI successfully reveal AI-specific role models and process competencies as crucial, before trained algorithms will have reached a quality level on which AI applications will operate without human intervention and moral concerns

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    • 

    corecore