56,049 research outputs found
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure
Big data research has attracted great attention in science, technology,
industry and society. It is developing with the evolving scientific paradigm,
the fourth industrial revolution, and the transformational innovation of
technologies. However, its nature and fundamental challenge have not been
recognized, and its own methodology has not been formed. This paper explores
and answers the following questions: What is big data? What are the basic
methods for representing, managing and analyzing big data? What is the
relationship between big data and knowledge? Can we find a mapping from big
data into knowledge space? What kind of infrastructure is required to support
not only big data management and analysis but also knowledge discovery, sharing
and management? What is the relationship between big data and science paradigm?
What is the nature and fundamental challenge of big data computing? A
multi-dimensional perspective is presented toward a methodology of big data
computing.Comment: 59 page
Supporting adaptiveness of cyber-physical processes through action-based formalisms
Cyber Physical Processes (CPPs) refer to a new generation of business processes enacted in many application environments (e.g., emergency management, smart manufacturing, etc.), in which the presence of Internet-of-Things devices and embedded ICT systems (e.g., smartphones, sensors, actuators) strongly influences the coordination of the real-world entities (e.g., humans, robots, etc.) inhabitating such environments. A Process Management System (PMS) employed for executing CPPs is required to automatically adapt its running processes to anomalous situations and exogenous events by minimising any human intervention. In this paper, we tackle this issue by introducing an approach and an adaptive Cognitive PMS, called SmartPM, which combines process execution monitoring, unanticipated exception detection and automated resolution strategies leveraging on three well-established action-based formalisms developed for reasoning about actions in Artificial Intelligence (AI), including the situation calculus, IndiGolog and automated planning. Interestingly, the use of SmartPM does not require any expertise of the internal working of the AI tools involved in the system
Cyber-Virtual Systems: Simulation, Validation & Visualization
We describe our ongoing work and view on simulation, validation and
visualization of cyber-physical systems in industrial automation during
development, operation and maintenance. System models may represent an existing
physical part - for example an existing robot installation - and a software
simulated part - for example a possible future extension. We call such systems
cyber-virtual systems.
In this paper, we present the existing VITELab infrastructure for
visualization tasks in industrial automation. The new methodology for
simulation and validation motivated in this paper integrates this
infrastructure. We are targeting scenarios, where industrial sites which may be
in remote locations are modeled and visualized from different sites anywhere in
the world.
Complementing the visualization work, here, we are also concentrating on
software modeling challenges related to cyber-virtual systems and simulation,
testing, validation and verification techniques for them. Software models of
industrial sites require behavioural models of the components of the industrial
sites such as models for tools, robots, workpieces and other machinery as well
as communication and sensor facilities. Furthermore, collaboration between
sites is an important goal of our work.Comment: Preprint, 9th International Conference on Evaluation of Novel
Approaches to Software Engineering (ENASE 2014
Numerical simulation of electric signal in the cyber-physical immunosensor system on rectangular lattice in R package
Проведено чисельне моделювання електричного сигналу з перетворювача в кіберфізичній імуносенсорній системі на прямокутній решітці з використанням диференціальних рівнянь із запізненням за допомогою пакета R. Описано функціональні можливості пакета R як середовища програмування для статистичного аналізу даних, наведено корисні сайти, списки посилань і документація пакета R. У вигляді таблиці представлено назви параметрів моделі імуносенсора на прямокутній решітці з використанням диференціальних рівнянь із запізненням та їх числові значення в пакеті R. Реалізовано комп’ютерну програму «Чисельний аналіз електричного сигналу з перетворювача, який характеризує кількість флуоресціюючих пікселів в імуносенсорі на прямокутній решітці з використанням диференціальних рівнянь із запізненням». Розроблена комп’ютерна програма дає змогу провести дослідження стійкості імуносенсорних систем, які широко використовуються для отримання діагностичної інформації з метою оцінювання критичних станів при серцево-судинних захворюваннях, величини інсуліну при вимірюванні величини глюкози в крові та виявлення кількісних показників у деяких фармацевтичних сполуках. Наведено фрагмент лістингу комп’ютерної програми в пакеті R для отримання електричного сигналу з перетворювача, який характеризує кількість флуоресціюючих пікселів у кіберфізичній імуносенсорній системі на прямокутній решітці з використанням диференціальних рівнянь із запізненням. Проведено чисельне моделювання для електричного сигналу з перетворювача в імуносенсорі на прямокутній решітці з використанням диференціальних рівнянь із запізненням. Проаналізовано зміни отриманого електричного сигналу, які відповідають кількості флуоресціюючих пікселів у кіберфізичній імуносенсорній системі. Обгрунтовано використання пакета R як вільнопоширюваного програмного забезпечення з графічною візуалізацією результатів аналізу.The numerical simulation of electric signal from the converter in the cyber-physical immunosensor system on rectangular lattice using differential equations with delay by means of R package is carried out in this paper. The functional features of R package as a programming environment for statistical data analysis are described, useful sites, references lists and documentation of R package are given. The names of parameters of the immunosensor model on rectangular lattice using the differential equations with delay and their numerical values in the package R are presented in the form of the table. The computer program «Numerical analysis of the electrical signal from the converter that characterizes the number of fluorescing pixels in the immunosensor on rectangular lattice using delayed differential equations» is implemented. The developed computer program makes it possible to carry out the investigation of the stability of immunosensory systems, which are widely used to obtain diagnostic information in order to evaluate critical states of cardiovascular disease, insulin values while measuring blood glucose values and identify quantitative indicators in some рharmaceutics compounds. The fragment of computer program listing in R package for obtaining the electrical signal from converter characterizing the number of fluorescent pixels in cyber-physical immunosensor system on rectangular lattice using delayed differential equations is presented. Numerical simulation for the electric signal from the converter in the immunosensor on rectangular lattice using the delayed differential equations is carried out. The changes of the received electrical signal corresponding to the number of fluorescent pixels in the cyber-physical immunosensory system are analyzed. The use of R package as a freely distributed software with graphical visualization of the analysis results is substantiated
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Assessing and augmenting SCADA cyber security: a survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
- …