6 research outputs found

    Socially and biologically inspired computing for self-organizing communications networks

    Get PDF
    The design and development of future communications networks call for a careful examination of biological and social systems. New technological developments like self-driving cars, wireless sensor networks, drones swarm, Internet of Things, Big Data, and Blockchain are promoting an integration process that will bring together all those technologies in a large-scale heterogeneous network. Most of the challenges related to these new developments cannot be faced using traditional approaches, and require to explore novel paradigms for building computational mechanisms that allow us to deal with the emergent complexity of these new applications. In this article, we show that it is possible to use biologically and socially inspired computing for designing and implementing self-organizing communication systems. We argue that an abstract analysis of biological and social phenomena can be made to develop computational models that provide a suitable conceptual framework for building new networking technologies: biologically inspired computing for achieving efficient and scalable networking under uncertain environments; socially inspired computing for increasing the capacity of a system for solving problems through collective actions. We aim to enhance the state-of-the-art of these approaches and encourage other researchers to use these models in their future work

    Novelty detection system based on multi-criteria evaluation in respect of industrial control system

    Get PDF
    The industrial processes and systems have become more sophisticated and also adopted in diverse areas of human activities. The Industrial Control System (ICS) or Internet of Things (IoT) have become essential for our daily life, and therefore vital for contemporary society. These systems are often included in Critical Information Infrastructure (CII) which is crucial for each state. Consequently, the cyber defense is and will be one of the most important security field for our society. Therefore, we use the novelty detection approach in order to identify anomalies which can be a symptom of the cyber-attack in ICS environment. To achieve the main goal of the article One-Class Support Vector Machine (OCSVM) algorithm was used. Moreover, the anomaly detection algorithm is adjusted via multi-criteria evaluation and classifier fusion. © 2019, Springer International Publishing AG, part of Springer Nature.IGA/FAI/2018/003; VI20152019049; MSU, Mississippi State University; ORNL, Oak Ridge National Laboratory; MSMT-7778/2014, MŠMT, Ministerstvo Školství, Mládeže a Tělovýchovy; LO1303, MŠMT, Ministerstvo Školství, Mládeže a Tělovýchovy; VI20172019054, Ministerstvo Vnitra České Republiky; CZ.1.05/2.1.00/03.0089, FEDER, European Regional Development Fun
    corecore