8,431 research outputs found

    On the Convergence of Blockchain and Internet of Things (IoT) Technologies

    Full text link
    The Internet of Things (IoT) technology will soon become an integral part of our daily lives to facilitate the control and monitoring of processes and objects and revolutionize the ways that human interacts with the physical world. For all features of IoT to become fully functional in practice, there are several obstacles on the way to be surmounted and critical challenges to be addressed. These include, but are not limited to cybersecurity, data privacy, energy consumption, and scalability. The Blockchain decentralized nature and its multi-faceted procedures offer a useful mechanism to tackle several of these IoT challenges. However, applying the Blockchain protocols to IoT without considering their tremendous computational loads, delays, and bandwidth overhead can let to a new set of problems. This review evaluates some of the main challenges we face in the integration of Blockchain and IoT technologies and provides insights and high-level solutions that can potentially handle the shortcomings and constraints of both IoT and Blockchain technologies.Comment: Includes 11 Pages, 3 Figures, To publish in Journal of Strategic Innovation and Sustainability for issue JSIS 14(1

    SciTech News Volume 71, No. 1 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11 Reviews Sci-Tech Book News Reviews 12 Advertisements IEEE

    The conditions for implementing a circular economy in the Czech Republic

    Get PDF
    In July 2018, measures of the European Commission regarding the Circular Economy Package (CEP) came into force. All EU Member States have two years since to implement these measures into their national legislations. The aim of the authors is, using available resources, to evaluate current conditions in the Czech Republic in the areas affected by this legislation. It is primarily the area of waste management, which has set values within the CEP that must be achieved within those two years. The article offers an analysis of the circular economy penetration into the Czech legislation. The procedure for introducing changes in legislation is presented through the Waste Management Plan (WMP) for the period 2015-2024. The aim of the article is to verify whether whether the Czech Republic is able to meet the EU and WMP's requirements in the current development of waste management. The authors are first to use the analysis of secondary data from national and transnational sources, from which they created unique and original outcomes for the given issue. After the analysis, they introduced the measures that could be used for the greater motivation of the target groups in order to meet the goals of the Czech Republic. The authors address the concrete impacts of CEP implementation within the Czech Republic and also present Czech examples of good practice.Web of Science24437536

    Cyber-Vulnerabilities & Public Health Emergency Response

    Get PDF

    Recent Advances in Internet of Things and Emerging Social Internet of Things: Vision, Challenges and Trends

    Get PDF
    In recent years, the Internet of Things (IoT), together with its related emerging technologies, has been driving a revolution in the way people perceive and interact with the surrounding environment [...

    Malware in the Future? Forecasting of Analyst Detection of Cyber Events

    Full text link
    There have been extensive efforts in government, academia, and industry to anticipate, forecast, and mitigate cyber attacks. A common approach is time-series forecasting of cyber attacks based on data from network telescopes, honeypots, and automated intrusion detection/prevention systems. This research has uncovered key insights such as systematicity in cyber attacks. Here, we propose an alternate perspective of this problem by performing forecasting of attacks that are analyst-detected and -verified occurrences of malware. We call these instances of malware cyber event data. Specifically, our dataset was analyst-detected incidents from a large operational Computer Security Service Provider (CSSP) for the U.S. Department of Defense, which rarely relies only on automated systems. Our data set consists of weekly counts of cyber events over approximately seven years. Since all cyber events were validated by analysts, our dataset is unlikely to have false positives which are often endemic in other sources of data. Further, the higher-quality data could be used for a number for resource allocation, estimation of security resources, and the development of effective risk-management strategies. We used a Bayesian State Space Model for forecasting and found that events one week ahead could be predicted. To quantify bursts, we used a Markov model. Our findings of systematicity in analyst-detected cyber attacks are consistent with previous work using other sources. The advanced information provided by a forecast may help with threat awareness by providing a probable value and range for future cyber events one week ahead. Other potential applications for cyber event forecasting include proactive allocation of resources and capabilities for cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs. Enhanced threat awareness may improve cybersecurity.Comment: Revised version resubmitted to journa
    corecore