22,942 research outputs found

    Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis

    Get PDF
    Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to increase the operators' visibility of ATM communication networks. We raise the question of how to determine the optimal level of automation in this safety-critical context, and we present a novel passive network monitoring system that can reveal network utilisation trends and traffic patterns in diverse timescales. Using network measurements, we derive resilience metrics and visualisations to enhance the operators' knowledge of the network and traffic behaviour, and allow for network planning and provisioning based on informed what-if analysis

    Securing the Participation of Safety-Critical SCADA Systems in the Industrial Internet of Things

    Get PDF
    In the past, industrial control systems were ‘air gapped’ and isolated from more conventional networks. They used specialist protocols, such as Modbus, that are very different from TCP/IP. Individual devices used proprietary operating systems rather than the more familiar Linux or Windows. However, things are changing. There is a move for greater connectivity – for instance so that higher-level enterprise management systems can exchange information that helps optimise production processes. At the same time, industrial systems have been influenced by concepts from the Internet of Things; where the information derived from sensors and actuators in domestic and industrial components can be addressed through network interfaces. This paper identifies a range of cyber security and safety concerns that arise from these developments. The closing sections introduce potential solutions and identify areas for future research

    Documenting the application of the Myanmar Climate-Smart Agriculture Strategy

    Get PDF
    This paper documents the testimonials of those who implemented the Myanmar Climate-Smart Agriculture Strategy (MCSAS) and accounts of those who experienced its application on the ground. Success stories and challenges in implementing MCSAS were documented. Based on the stakeholder interviews conducted, MCSAS is proven to be a valuable document in guiding the implementation of context-specific climate actions in Myanmar. Nineteen government and NGO programs, four policy documents, and an estimate of one billion USD investments were influenced by MCSAS. Following the MCSAS, the National Climate-Smart Agriculture Center of Yezin Agricultural University was established in 2018. Several projects focusing on farmers, particularly the Climate-Smart Village in the Dry Zone and the Farmer Field School in the Delta Zone, were also studied to understand the depth of the influence of MCSAS. In these cases, climate-smart practices adopted have helped farmers coped with climate change and increased their household incomes. Nevertheless, suggestions were made to further improve the Strategy with more specific actions that could be implemented and the funding options that implementers could pursue. The Strategy also needs to be integrated into the current programs of the government and its contents translated in the local language in a format that local people can understand

    No. 08: Climate Change and Food Security in Southern African Cities

    Get PDF
    The current urban transition in the Global South is at the heart of discussions about the relationship between climate change and food security. This paper explores the links between climate change and food security within the context of the urban transition taking place in Southern Africa. Climate change is expected to negatively accentuate existing levels of urban food insecurity and these adverse impacts are likely to fall disproportionately on the poor. Researchers, planners and policymakers in Southern African cities are starting to explore how changes in weather associated with climate change are likely to affect urban lifestyles and systems. In order to do this, it is important to understand how climate science knowledge is used at the level of the city and how the impacts of climate change might affect city functioning at the metropolitan and household scales. One of the critical areas that has not been addressed in any detail is the extent to which climate change will affect the food security of the city and its inhabitants, especially within the context of high levels of poverty and widespread food and nutrition insecurity. This paper argues that it is important to understand the linkages between climate change and food security in Southern African cities to begin to design and implement pro-poor planning and programming

    On participatory service provision at the network edge with community home gateways

    Get PDF
    Edge computing is considered as a technology to enable new types of services which operate at the network edge. There are important use cases in ambient intelligence and the Internet of Things (IoT) for edge computing driven by huge business potentials. Most of today's edge computing platforms, however, consist of proprietary gateways, which are either closed or fairly restricted to deploy any third-party services. In this paper we discuss a participatory edge computing system running on home gateways to serve as an open environment to deploy local services. We present first motivating use cases and review existing approaches and design considerations for the proposed system. Then we show our platform which materializes the principles of an open and participatory edge environment, to lower the entry barriers for service deployment at the network edge. By using containers, our platform can flexibly enable third-party services, and may serve as an infrastructure to support several application domains of ambient intelligence.Peer ReviewedPostprint (author's final draft

    Olympic rings of steel: Constructing security for 2012 and beyond

    Get PDF
    Academic and political commentators have commonly sought to understand the Olympics as a cultural dynamic, a "spectacle" that motivates certain actors to project their relative interests in localized spaces and as well on a global scale (Hiller 2006; Boyle and Haggerty 2009b ). Mega-events, as this argument goes, are monumental cultural events (Roche 2000) that rely on the audacity of spectacle to dramatize and condition the cultural, political, legal and economic landscape. Extending these insights into surveillance studies, Boyle and Haggerty (2009b: 259-260) position spectacle and the disciplinary mechanisms of anxieties associated with mega-events to explain the risk management practices of security planners. The dynamic social implications of the spectacle condition dramatic regimes of securitization and surveillance such that sovereign power emanates from the production and consumption of spectacle. In similar fashion Vida Bajc (2007: 1648) writes that security meta-rituals "demonstrate[s] that the process of transformation of [the] public space [of mega-events] from one of routine of daily life into a sterile area [that] has a ritual form [that] .... separates insiders from outsiders and brings about a new socio-political reality." Put another way, the "security-meta ritual" legitimates security and surveillance practices by normalizing the social hierarchies it imposes. Bajc focuses on the over-determination of dividing practices in mega-event security, but the signifying practices associated with capital are absent (perhaps due to her empirical focus on presidential addresses). Klauser (2008: 181) links commercialization and mechanisms of surveillance, but only by foregrounding the significance of "neutralized space" created by granting absolute commercial rights to event sponsors. Neoliberalprivatization and its articulation with security and surveillance, however, cannot be reduced to control over sponsorship rights and consumptive practices in particular urban "zones," nor can it be limited by the methodological temporality of the event itself

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    • 

    corecore