7 research outputs found

    Intrusion Detection in Critical Infrastructures: A literature review

    Get PDF
    open access articlever the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review of the methods of network detection and cyber attacks that can take place in critical infrastructure. As it is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels and spots any diversity, is one of the most effective solutions

    Implementing Virtualization on Single-Board Computers: A Case Study on Edge Computing

    Get PDF
    The widespread adoption of cloud computing has resulted in centralized datacenter structures; however, there is a requirement for smaller-scale distributed infrastructures to meet the demands for speed, responsiveness, and security for critical applications. Single-Board Computers (SBCs) present numerous advantages such as low power consumption, low cost, minimal heat emission, and high processing power, making them suitable for applications such as the Internet of Things (IoT), experimentation, and other advanced projects. This paper investigates the possibility of adopting virtualization technology on Single-Board Computers (SBCs) for the implementation of reliable and cost-efficient edge-computing environments.The results of this study are based on experimental implementations and testing conducted in the course of a case study performed on the edge infrastructure of a financial organization, where workload migration was achieved from a traditional to an SBC-based edge infrastructure. The performance of the two infrastructures was studied and compared during this process, providing important insights into the power efficiency gains, resource utilization, and overall suitability for the organization’s operational needs

    Intrusion Detection in Critical Infrastructures: A Literature Review

    Get PDF
    Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place in a critical infrastructure. As is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels and spots any diversity, is one of the most effective solutions

    Sport fans' roles in value co-creation

    Get PDF
    Research question The sports industry has witnessed sustained growth. The cultural, symbolic and stakeholder-embedded nature of sport provides a dynamic setting for developing service research. In this context, an evolution in the logic of value creation can be observed; fans are no longer passive receivers of value but, instead, can be active value co-creators. The sport fan exhibits distinctive characteristics and an ability and willingness to integrate resources and co-produce value propositions, which necessitates an understanding of fan value co-creation. We answer one key research question: what is the role of fans in value co-creation in sports? We do so by conceptually exploring the processes through which sport fans co-create and provide value propositions. Research methods We use case exemplars to provide a base for the theoretical consideration of the role of sport fans in value co-creation. We verify and consolidate the service-dominant logic (SDL) in the sport context. However, due to the high level of abstraction of the SDL as a general theory, we utilize consumer culture theory (CCT) as a middle range theory (MRT) to bridge the gap between contextual descriptions of the role of fans and the SDL. Results and findings Fans evaluate, redefine and reposition value propositions in different sport settings. The three roles of assimilators, adaptors and authenticators in value co-creation are identified through five case exemplars. We extend the theoretical understanding of the processes through which sport fans co-create value. Implications Knowledge of the distinctive characteristics of sport fans and their roles in value co-creation will assist managers in developing effective marketing propositions. Our theoretical contribution will generate new lines of research in the field

    From Cyber Terrorism to Cyber Peacekeeping: Are we there yet?

    No full text
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.In Cyberspace nowadays, there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. In this article, we discuss what Cyberterrorism is and how it can lead to Cyberwarfare

    Intrusion detection in critical infrastructures: A literature review

    No full text
    Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place in a critical infrastructure. As is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels and spots any diversity, is one of the most effective solutions. © 2021 by the authors. Licensee MDPI, Basel, Switzerland
    corecore