11,340 research outputs found

    Cyber security situational awareness

    Get PDF

    Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery

    Get PDF
    Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them. This complex landscape has made it extremely difficult for security administrators to keep accurate and be effective in protecting their systems against cyber threats. In this paper, we describe our vision and scientific posture on how artificial intelligence techniques and a smart use of security knowledge may assist system administrators in better defending their networks. To that end, we put forward a research roadmap involving three complimentary axes, namely, (I) the use of FCA-based mechanisms for managing configuration vulnerabilities, (II) the exploitation of knowledge representation techniques for automated security reasoning, and (III) the design of a cyber threat intelligence mechanism as a CKDD process. Then, we describe a machine-assisted process for cyber threat analysis which provides a holistic perspective of how these three research axes are integrated together

    Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD

    Get PDF
    Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by ‘open networks’, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings

    Quantum Applications In Political Science

    Get PDF
    Undergraduate Research ScholarshipThis paper will show the current state of quantum computation and its application as a political science research method. It will look at contemporary empirical literature to assess the current state of the method in both political science and computer science. Then, by assessing the state of quantum computation, this paper will make predictions concerning quantum computation as a research tool and also assess its capability as a catalyst for international diplomacy and discourse. Quantum computation is an emerging technology with increasing scientific attention. This paper will use IBM’s quantum computer, accessed through the cloud, to model and execute quantum algorithms that show the utility for political science research. Furthermore, through the base mathematics of common quantum algorithms, this paper will show how these algorithms can be expanded. This paper finds that quantum computation is a valuable tool with remarkable potential. However, quantum computing has its limitations and currently resides in an important juncture that will decide whether technology involving it will be resigned as a niche theoretical tool or be continued to be developed into a mainstream technology.No embargoAcademic Major: World Politic
    • 

    corecore