4,993 research outputs found

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Organisational preparedness for hosted virtual desktops in the context of digital forensics

    Get PDF
    Virtualization in computing has progressed to an extent where desktops can be virtualized and accessed from anywhere. The server hosted model has already surpassed 1% market share of the worldwide professional PC market, with estimates indicating that this is a rapidly growing area. This paper investigates the adequacy of current digital forensic procedures on hosted virtual desktops (HVDs) as there does not appear to be specific methods of locating and extracting evidences from this infrastructure. A hosted virtual desktop deployed in private clouds was simulated to reflect two different computer crime scenarios. It was found that current digital forensic procedures may not be adequate for locating and extracting evidence, since the infrastructure introduces complications such as persistent/non-persisted disk modes and segregating data in a multi-tenant environment

    Analytical Challenges in Modern Tax Administration: A Brief History of Analytics at the IRS

    Get PDF

    "The influence of decision-maker effort and case complexity on appealed rulings subject to multi-categorical selection"

    Get PDF
    This study extends the standard econometric treatment of appellate court outcomes by 1) considering the role of decision-maker effort and case complexity, and 2) adopting a multi-categorical selection process of appealed cases. We find evidence of appellate courts being affected by both the effort made by first-stage decision makers and case complexity. This illustrates the value of widening the narrowly defined focus on heterogeneity in individual-specific preferences that characterises many applied studies on legal decision-making. Further, the majority of appealed cases represent non-random sub-samples and the multi-categorical selection process appears to offer advantages over the more commonly used dichotomous selection models.Appeal, Decision-maker effort, Case complexity, Selection bias. JEL classification:K41, C34

    Virtual reality urban modelling - an overview

    Get PDF
    This paper offers an overview of the increasing use of Virtual Reality (VR) technologies for the simulation of urban environments. It provides a summary of cities worldwide where three-dimensional computer modelling is being utilised to aid urban planning. The study considers the need for a digital representation of cities and raises issues pertaining to advantages, barriers and ownership. A case study of a pilot project on the visualisation of Newcastle upon Tyne is examined to show an approach adopted for the representation of this city in North East England. The process of this visualisation is summarised and future research is outlined in relation to this city model

    Temperature dependence of viscosity, relaxation times (T1, T2) and simulated contrast for potential perfusates in post-mortem MR angiography (PMMRA).

    Get PDF
    Developments in post-mortem imaging increasingly focus on addressing recognised diagnostic weaknesses, especially with regard to suspected natural deaths. Post-mortem MR angiography (PMMRA) may offer additional diagnostic information to help address such weaknesses, specifically in the context of sudden cardiac death. Complete filling of the coronary arteries and acceptable contrast with surrounding tissue are essential for a successful approach to PMMRA. In this work, the suitability of different liquids for inclusion in a targeted PMMRA protocol was evaluated. Factors influencing cooling of paraffinum liquidum + AngiofilÂź (6 %) in cadavers during routine multiphase post-mortem CT angiography were investigated. The temperature dependence of dynamic viscosity (8-20 °C), longitudinal (T1) and transverse (T2) relaxation (1-23 °C) of the proposed liquids was quadratically modelled. The relaxation behaviour of these liquids and MR scan parameters were further investigated by simulation of a radiofrequency (RF)-spoiled gradient echo (GRE) sequence to estimate potentially achievable contrast between liquids and post-mortem tissue at different temperatures across a forensically relevant temperature range. Analysis of the established models and simulations indicated that based on dynamic viscosity (27-33 mPa · s), short T1 relaxation times (155-207 ms) and a minimal temperature dependence over the investigated range of these parameters, paraffin oil and a solution of paraffin oil + AngiofilÂź (6 %) would be most suitable for post-mortem reperfusion and examination in MRI

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    • 

    corecore