100,845 research outputs found
Effective Systems Engineering Training
The need for systems engineering training is steadily increasing, as both the defense and commercial markets take on more complex "systems of systems" work. A variety of universities and commercial training vendors have assembled courses of various lengths, format, and content to meet this need. This presentation looks at the requirements for systems engineering training, and discusses techniques for increasing its effectiveness. Several format and content options for meeting these requirements are compared and contrasted, and an experience-based curriculum is shown
The Android Platform Security Model
Android is the most widely deployed end-user focused operating system. With
its growing set of use cases encompassing communication, navigation, media
consumption, entertainment, finance, health, and access to sensors, actuators,
cameras, or microphones, its underlying security model needs to address a host
of practical threats in a wide variety of scenarios while being useful to
non-security experts. The model needs to strike a difficult balance between
security, privacy, and usability for end users, assurances for app developers,
and system performance under tight hardware constraints. While many of the
underlying design principles have implicitly informed the overall system
architecture, access control mechanisms, and mitigation techniques, the Android
security model has previously not been formally published. This paper aims to
both document the abstract model and discuss its implications. Based on a
definition of the threat model and Android ecosystem context in which it
operates, we analyze how the different security measures in past and current
Android implementations work together to mitigate these threats. There are some
special cases in applying the security model, and we discuss such deliberate
deviations from the abstract model
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Computational analysis of a plant receptor interaction network
Trabajo fin de máster en Bioinformática y BiologĂa ComputacionalIn all organisms, complex protein-protein interactions (PPI) networks control major
biological functions yet studying their structural features presents a major analytical
challenge. In plants, leucine-rich-repeat receptor kinases (LRR-RKs) are key in sensing
and transmitting non-self as well as self-signals from the cell surface. As such, LRR-RKs
have both developmental and immune functions that allow plants to make the most of their
environments. In the model organism in plant molecular biology, Arabidopsis thaliana,
most LRR-RKs are still represented by biochemically and genetically uncharacterized
receptors. To fix this an LRR-based Cell Surface Interaction (CSI LRR ) network was
obtained in 2018, a protein-protein interaction network of the extracellular domain of 170
LRR-RKs that contains 567 bidirectional interactions. Several network analyses have been
performed with CSI LRR . However, these analyses have so far not considered the spatial and
temporal expression of its proteins. Neither has it been characterized in detail the role of
the extracellular domain (ECD) size in the network structure. Because of that, the objective
of the present work is to continue with more in depth analyses with the CSI LRR network.
This would provide important insights that will facilitate LRR-RKs function
characterization.
The first aim of this work is to test out the fit of the CSI LRR network to a scale-free
topology. To accomplish that, the degree distribution of the CSI LRR network was compared
with the degree distribution of the known network models of scale-free and random.
Additionally, three network attack algorithms were implemented and applied to these two
network models and the CSI LRR network to compare their behavior. However, since the
CSI LRR interaction data comes from an in vitro screening, there is no direct evidence
whether its protein-protein interactions occur inside the plant cells. To gain insight on how
the network composition changes depending on the transcriptional regulation, the
interaction data of the CSI LRR was integrated with 4 different RNA-Seq datasets related
with the network biological functions. To automatize this task a Python script was written.
Furthermore, it was evaluated the role of the LRR-RKs in the network structure depending
on the size of their extracellular domain (large or small). For that, centrality parameters
were measured, and size-targeted attacks performed. Finally, gene regulatory information
was integrated into the CSI LRR to classify the different network proteins according to the
function of the transcription factors that regulate its expression.
The results were that CSI LRR fits a power law degree distribution and approximates a scale-
free topology. Moreover, CSI LRR displays high resistance to random attacks and reduced
resistance to hub/bottleneck-directed attacks, similarly to scale-free network model. Also,
the integration of CSI LRR interaction data and RNA-Seq data suggests that the
transcriptional regulation of the network is more relevant for developmental programs than
for defense responses. Another result was that the LRR-RKs with a small ECD size have a
major role in the maintenance of the CSI LRR integrity. Lastly, it was hypothesized that the
integration of CSI LRR interaction data with predicted gene regulatory networks could shed
light upon the functioning of growth-immunity signaling crosstalk
The Knowledge Application and Utilization Framework Applied to Defense COTS: A Research Synthesis for Outsourced Innovation
Purpose -- Militaries of developing nations face increasing budget pressures, high operations tempo, a blitzing pace of technology, and adversaries that often meet or beat government capabilities using commercial off-the-shelf (COTS) technologies. The adoption of COTS products into defense acquisitions has been offered to help meet these challenges by essentially outsourcing new product development and innovation. This research summarizes extant research to develop a framework for managing the innovative and knowledge flows. Design/Methodology/Approach – A literature review of 62 sources was conducted with the objectives of identifying antecedents (barriers and facilitators) and consequences of COTS adoption. Findings – The DoD COTS literature predominantly consists of industry case studies, and there’s a strong need for further academically rigorous study. Extant rigorous research implicates the importance of the role of knowledge management to government innovative thinking that relies heavily on commercial suppliers. Research Limitations/Implications – Extant academically rigorous studies tend to depend on measures derived from work in information systems research, relying on user satisfaction as the outcome. Our findings indicate that user satisfaction has no relationship to COTS success; technically complex governmental purchases may be too distant from users or may have socio-economic goals that supersede user satisfaction. The knowledge acquisition and utilization framework worked well to explain the innovative process in COTS. Practical Implications – Where past research in the commercial context found technological knowledge to outweigh market knowledge in terms of importance, our research found the opposite. Managers either in government or marketing to government should be aware of the importance of market knowledge for defense COTS innovation, especially for commercial companies that work as system integrators. Originality/Value – From the literature emerged a framework of COTS product usage and a scale to measure COTS product appropriateness that should help to guide COTS product adoption decisions and to help manage COTS product implementations ex post
Robust Decision Trees Against Adversarial Examples
Although adversarial examples and model robustness have been extensively
studied in the context of linear models and neural networks, research on this
issue in tree-based models and how to make tree-based models robust against
adversarial examples is still limited. In this paper, we show that tree based
models are also vulnerable to adversarial examples and develop a novel
algorithm to learn robust trees. At its core, our method aims to optimize the
performance under the worst-case perturbation of input features, which leads to
a max-min saddle point problem. Incorporating this saddle point objective into
the decision tree building procedure is non-trivial due to the discrete nature
of trees --- a naive approach to finding the best split according to this
saddle point objective will take exponential time. To make our approach
practical and scalable, we propose efficient tree building algorithms by
approximating the inner minimizer in this saddle point problem, and present
efficient implementations for classical information gain based trees as well as
state-of-the-art tree boosting models such as XGBoost. Experimental results on
real world datasets demonstrate that the proposed algorithms can substantially
improve the robustness of tree-based models against adversarial examples
- …