3,899 research outputs found

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

    Get PDF
    The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.info:eu-repo/semantics/publishedVersio

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Automation for network security configuration: state of the art and research trends

    Get PDF
    The size and complexity of modern computer networks are progressively increasing, as a consequence of novel architectural paradigms such as the Internet of Things and network virtualization. Consequently, a manual orchestration and configuration of network security functions is no more feasible, in an environment where cyber attacks can dramatically exploit breaches related to any minimum configuration error. A new frontier is then the introduction of automation in network security configuration, i.e., automatically designing the architecture of security services and the configurations of network security functions, such as firewalls, VPN gateways, etc. This opportunity has been enabled by modern computer networks technologies, such as virtualization. In view of these considerations, the motivations for the introduction of automation in network security configuration are first introduced, alongside with the key automation enablers. Then, the current state of the art in this context is surveyed, focusing on both the achieved improvements and the current limitations. Finally, possible future trends in the field are illustrated

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    DenMerD: a feature enhanced approach to radar beam blockage correction with edge-cloud computing

    Get PDF
    In the field of meteorology, the global radar network is indispensable for detecting weather phenomena and offering early warning services. Nevertheless, radar data frequently exhibit anomalies, including gaps and clutter, arising from atmospheric refraction, equipment malfunctions, and other factors, resulting in diminished data quality. Traditional radar blockage correction methods, such as employing approximate radial information interpolation and supplementing missing data, often fail to effectively exploit potential patterns in massive radar data, for the large volume of data precludes a thorough analysis and understanding of the inherent complex patterns and dependencies through simple interpolation or supplementation techniques. Fortunately, edge computing possesses certain data processing capabilities and cloud center boasts substantial computational power, which together can collaboratively offer timely computation and storage for the correction of radar beam blockage. To this end, an edge-cloud collaborative driven deep learning model named DenMerD is proposed in this paper, which includes dense connection module and merge distribution (MD) unit. Compared to existing models such as RC-FCN, DenseNet, and VGG, this model greatly improves key performance metrics, with 30.7% improvement in Critical Success Index (CSI), 30.1% improvement in Probability of Detection (POD), and 3.1% improvement in False Alarm Rate (FAR). It also performs well in the Structure Similarity Index Measure (SSIM) metrics compared to its counterparts. These findings underscore the efficacy of the design in improving feature propagation and beam blockage accuracy, and also highlights the potential and value of mobile edge computing in processing large-scale meteorological data

    Safe passage for attachment systems:Can attachment security at international schools be measured, and is it at risk?

    Get PDF
    Relocations challenge attachment networks. Regardless of whether a person moves or is moved away from, relocation produces separation and loss. When such losses are repeatedly experienced without being adequately processed, a defensive shutting down of the attachment system could result, particularly when such experiences occur during or across the developmental years. At schools with substantial turnover, this possibility could be shaping youth in ways that compromise attachment security and young people’s willingness or ability to develop and maintain deep long-term relationships. Given the well-documented associations between attachment security, social support, and long-term physical and mental health, the hypothesis that mobility could erode attachment and relational health warrants exploration. International schools are logical settings to test such a hypothesis, given their frequently high turnover without confounding factors (e.g. war trauma or refugee experiences). In addition, repeated experiences of separation and loss in international school settings would seem likely to create mental associations for the young people involved regarding how they and others tend to respond to such situations in such settings, raising the possibility that people at such schools, or even the school itself, could collectively be represented as an attachment figure. Questions like these have received scant attention in the literature. They warrant consideration because of their potential to shape young people’s most general convictions regarding attachment, which could, in turn, have implications for young people’s ability to experience meaning in their lives
    • …
    corecore