304 results on '"Infrastructure security"'
Search Results
2. Security vulnerability assessments for sustainable infrastructure: a scientometric review
- Author
-
Ewa, Wofai O. and Ugwu, Onuegbu O.
- Published
- 2025
- Full Text
- View/download PDF
3. Cyber Security Challenges in the Transportation Industry - A Comprehensive Analysis and Recommendations.
- Author
-
AL-BADAWI, HABIB
- Subjects
INTERNET security ,TRANSPORTATION security measures ,TRANSPORTATION industry ,INFRASTRUCTURE (Economics) - Abstract
This academic study examines the cyber security challenges faced by the transportation industry, with a focus on Asia. Drawing insights from various scholarly articles and recent incidents, this research investigates the evolving threat landscape, potential vulnerabilities, and the impact of cyber-attacks on transportation systems. The study also explores the legal and ethical considerations surrounding cyber-operations in the transportation sector. Based on the analysis, practical recommendations are provided to enhance cybersecurity measures and mitigate risks within the transportation industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Enhancing Security for Private Cloud When Deployed at Small Department
- Author
-
Duy, Hung Vu, Thi, Huyen Do, Sy, Nguyen Pham, Van, Thang Tran, Vuong, Quang Huy, Thu, Khanh Dinh, Dinh, Thai Nguyen, Phuong, Hanh Nguyen Thi, Tran, Trung, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Nguyen, Thi Dieu Linh, editor, Dawson, Maurice, editor, Ngoc, Le Anh, editor, and Lam, Kwok Yan, editor
- Published
- 2024
- Full Text
- View/download PDF
5. Development of OTP Based Switch System for Power System Infrastructure Security and Personnel Safety
- Author
-
Prasad, D., Gopila, M., Suresh, G., Porkodi, M., Kacprzyk, Janusz, Series Editor, Kyamakya, Kyandoghere, editor, and Bokoro, Pitshou Ntambu, editor
- Published
- 2024
- Full Text
- View/download PDF
6. Security Infrastructure for Cyber Attack Targeted Networks and Services
- Author
-
Mellal, Idir, Fouzar, Youcef, Mourad, Laghrouche, Boussey, Jumana, Deb, Dipankar, Series Editor, Swain, Akshya, Series Editor, Grancharova, Alexandra, Series Editor, Chaturvedi, Manish, editor, Patel, Pankesh, editor, and Yadav, Ramnarayan, editor
- Published
- 2022
- Full Text
- View/download PDF
7. Geographic Information System (GIS) for National Security
- Author
-
Mukherjee, Amit, Behera, Anshuman, editor, and Mishra, Sitakanta, editor
- Published
- 2022
- Full Text
- View/download PDF
8. Homeland security research opportunities.
- Author
-
Albert, Laura A., Nikolaev, Alexander, and Jacobson, Sheldon H.
- Subjects
- *
OPERATIONS research , *NATIONAL security , *SCIENTIFIC community , *INDUSTRIAL engineers , *INDUSTRIAL engineering , *TECHNOLOGICAL innovations - Abstract
Homeland security research has gone through a significant transformation since the events of September 11, 2001, and continues to evolve. This article identifies opportunities that the industrial engineering and operations research communities can seize. By drawing together insights from thought leaders in these communities, a path outlining research problems and discovery is provided that will serve to guide industrial engineering and operations research innovations and help move homeland security research forward over the next decade. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. CRITICAL INFRASTRUCTURE SECURITY MANAGEMENT.
- Author
-
Jagusiak, Bogusław and Kaczmarek, Waldemar
- Subjects
CRISIS management ,SECURITY management ,HYPOTHESIS ,RESEARCH ,INFRASTRUCTURE (Economics) - Abstract
Copyright of International Journal of Legal Studies ( IJOLS ) is the property of International Institute of Innovation Science-Education-Development in Warsaw and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
10. Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture.
- Author
-
Ruchkin, V. N., Kostrov, B. V., and Fulin, V. A.
- Abstract
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing—and in some cases improving—the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. ThreatDetect: An Autonomous Platform to secure Marine Infrastructures
- Author
-
Casari, Paolo, Lampe, Lutz, Martinez, Stephane, Diamant, Roee, and Palestini, Claudio, editor
- Published
- 2020
- Full Text
- View/download PDF
12. АНАЛІЗ МЕТОДОЛОГІЇ DEVSECOPS В ПРОЦЕСАХ РОЗРОБКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ
- Author
-
Andrii Oleksandrovich Hapon, Volodymyr Mykolayovych Fedorchenko, Andrii Oleksandrovich Polyakov, Valeriy Yuriyovich Volovshchykov, and Viktor Alexeevich Guzhva
- Subjects
devsecops ,application security ,infrastructure security ,sdlc ,bsimm ,opensamm ,Technology - Abstract
Предметом дослідження в статті є методологія розробки і захисту програмного забезпечення в рамках DevSecOps. Дана методологія змінила підхід до забезпечення безпеки з реактивного на проактивний, а також підкреслює важливість забезпечення безпеки на всіх рівнях організації. DevSecOps означає забезпечення безпеки в розробці додатків від самих ранніх етапів до самого кінця, а також включає в себе ав томатизацію деяких шлюзів безпеки, щоб запобігти уповільнення робочого процесу DevOps. Необхідно підтримувати короткі і часто повторювані цикли розробки програмного продукту, а також інтегрувати заходи безпеки. Вибір правильних інструментів для безперервної інтеграції безпеки може допомогти в досягненні цих цілей. Сучасні інструменти автоматизації допомогли організаціям впровадити більш гнучкі методи розробки, а також зіграли свою роль в розробці нових заходів безпеки. Для ефективного захисту DevOps потрібні не тільки нові інструменти, а й зміни в самій організації процесів DevOps, щоб швидше інтегрувати роботу груп фахівців з безпеки з іншими спеціалістами, що призведе до покращення якості продукту. Стаття присвячена детальному аналізу сучасних підходів і методологій систематизації розробки та захисту програмного забезпечення, серед яких SDLC, BSIMM і OpenSAMM. Мета роботи – класифікація підходів до побудови процесів DevSecOps, а також розгляд методологій систематизації існуючих засобів захисту програмного забезпечення, що забезпечують взаємодію команди розробників і фахівців із захисту інформації в рамках одного життєвого циклу розробки. У статті вирішуються наступні завдання: розгляд і аналіз підходів побудови процесів DevSecOps і розгляд методологій систематизації засобів захисту програмного забезпечення. Отримані наступні результати: проаналізовано необхідні складові для побудови DevSecOps процесів. Висновки: проведений аналіз дозволяє класифікувати процес розробки і захисту програмного забезпечення за допомогою методології DevSecOps.
- Published
- 2020
- Full Text
- View/download PDF
13. A Survey on SCADA Security and Honeypot in Industrial Control System
- Author
-
Lu, Kuan-Chu, Liu, I-Hsien, Sun, Meng-Wei, Li, Jung-Shian, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Saeed, Faisal, editor, Gazem, Nadhmi, editor, Mohammed, Fathey, editor, and Busalim, Abdelsalam, editor
- Published
- 2019
- Full Text
- View/download PDF
14. Switched-Based Resilient Control of Cyber-Physical Systems
- Author
-
Mariana Segovia-Ferreira, Jose Rubio-Hernan, Rosa Cavalli, and Joaquin Garcia-Alfaro
- Subjects
Cyber-physical security ,infrastructure security ,cyber resilience ,moving target defense ,switched linear systems ,networked control systems ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
We present a control-theoretic approach to achieve Cyber-Physical Systems (CPS) resilient designs. We assume situations in which the CPS must maintain the correct operation of a set of crucial functionalities despite ongoing adversarial misbehavior. The approach is based on a moving target defense paradigm, driven by a linear switching of state-space matrices, and applied at both the physical and network layers of a networked-control system. We show that the final system maintains stability. We also evaluate, via simulation, a step-by-step procedure that takes a transfer function, representing the dynamics of the physical process. As a result, we obtain a resilient CPS design structured around a topology of decentralized controllers. Results show that the obtained approach is both innovative and promising.
- Published
- 2020
- Full Text
- View/download PDF
15. Trends and Applications in Stackelberg Security Games
- Author
-
Kar, Debarun, Nguyen, Thanh H., Fang, Fei, Brown, Matthew, Sinha, Arunesh, Tambe, Milind, Jiang, Albert Xin, Başar, Tamer, editor, and Zaccour, Georges, editor
- Published
- 2018
- Full Text
- View/download PDF
16. Comparing IO Visor and Pcap for Security Inspection of Traced Packets from SmartX Box
- Author
-
Rathore, Muhammad Ahmad, Risdianto, Aris Cahyadi, Nam, Taekho, Kim, JongWon, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Ruediger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Park, James J., editor, Loia, Vincenzo, editor, Yi, Gangman, editor, and Sung, Yunsick, editor
- Published
- 2018
- Full Text
- View/download PDF
17. Domain Name System Without Root Servers
- Author
-
Wander, Matthäus, Boelmann, Christopher, Weis, Torben, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Cuppens, Nora, editor, Cuppens, Frédéric, editor, Lanet, Jean-Louis, editor, Legay, Axel, editor, and Garcia-Alfaro, Joaquin, editor
- Published
- 2018
- Full Text
- View/download PDF
18. Autonomous long-range drone detection system for critical infrastructure safety.
- Author
-
Zhang, Xindi and Kusrini, Kusrini
- Subjects
INTRUSION detection systems (Computer security) ,SITUATIONAL awareness ,DRONE aircraft ,FOCAL length ,DESIGN software ,STREAMING media - Abstract
The development of unmanned aerial vehicles has been identified as a potential source of a weapon for causing operational disruptions against critical infrastructures. To mitigate and neutralise the threat posed by the misuse of drones against malicious and terrorist activity, this paper presents a holistic design of a long-range autonomous drone detection platform. The novelty of the proposed system lies in the confluence between the design of hardware and software components to effective and efficient localisation of the intruder objects. The research presented in the paper proposes the design and validation of a situation awareness component which is interfaced with the hardware component for controlling the focal length of the camera. The continuous stream of media data obtained from the region of vulnerability is processed using the object detection that is built on region based fully connected neural network. The novelty of the proposed system relies on the processing of multi-threaded dual-media input streams that are evaluated to mitigate the latency of the system. Upon the successful detection of malicious drones, the system logs the occurrence of intruders that consists of both event description and the associated media evidence for the deployment of the mitigation strategy. The analytics platform that controls the signalling of the low-cost sensing equipment contains the NVIDIA GeForce GTX 1080 for detecting drones. The experimental testbeds developed for the validation of the proposed system has been constructed to include environments and situations that are commonly faced by critical infrastructure operators such as the area of protection, drone flight path, tradeoff between the angle of coverage against the distance of coverage. The validation of the proposed system has resulted in yielding a range of intruder drone detection by 250m with an accuracy of 95.5%. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
19. Discovering the Hidden Community Structure of Public Transportation Networks.
- Author
-
Hajdu, László, Bóta, András, Krész, Miklós, Khani, Alireza, and Gardner, Lauren M.
- Subjects
PUBLIC transit ,COMMUNITY organization ,LOCAL transit access ,METROPOLIS ,PUBLIC transit ridership ,SMART cards - Abstract
Advances in public transit modeling and smart card technologies can reveal detailed contact patterns of passengers. A natural way to represent such contact patterns is in the form of networks. In this paper we utilize known contact patterns from a public transit assignment model in a major metropolitan city, and propose the development of two novel network structures, each of which elucidate certain aspects of passenger travel behavior. We first propose the development of a transfer network, which can reveal passenger groups that travel together on a given day. Second, we propose the development of a community network, which is derived from the transfer network, and captures the similarity of travel patterns among passengers. We then explore the application of each of these network structures to identify the most frequently used travel paths, i.e., routes and transfers, in the public transit system, and model epidemic spreading risk among passengers of a public transit network, respectively. In the latter our conclusions reinforce previous observations, that routes crossing or connecting to the city center in the morning and afternoon peak hours are the most "dangerous" during an outbreak. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
20. Optimization Problems in Infrastructure Security
- Author
-
Kranakis, Evangelos, Krizanc, Danny, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Garcia-Alfaro, Joaquin, editor, Kranakis, Evangelos, editor, and Bonfante, Guillaume, editor
- Published
- 2016
- Full Text
- View/download PDF
21. A Review of Intelligent Infrastructure Surveillance to Support Safe Autonomy in Smart-Railways
- Author
-
Pappaterra, M. J., Flammini, Francesco, Pappaterra, M. J., and Flammini, Francesco
- Abstract
Since railways are considered among the most critical transportation infrastructures, significant research exists on the use of modern technology for their safety and security. In order to enable full autonomy of railway operations, it is not only important to guarantee safety from the control system perspective, but also to ensure that external threats of both intentional and natural origin are detected automatically. This literature review highlights the potential of Artificial Intelligence (AI) in physical infrastructure security and surveillance of autonomous railway operations. We survey AI applications to identify unauthorized access to restricted areas, as well as intelligent monitoring against natural disasters. We also discuss the use of AI to improve situational awareness, in order to analyze data from various sources to prevent incidents, provide real-time information to decision-makers, and support emergency response. Finally, we highlight the challenges to overcome, including data quality, privacy concerns, regulations, and other technical limitations.
- Published
- 2023
- Full Text
- View/download PDF
22. Securing Infrastructure Facilities: When Does Proactive Defense Help?
- Author
-
Wu, Manxi and Amin, Saurabh
- Abstract
Infrastructure systems are increasingly facing new security threats due to the vulnerabilities of cyber-physical components that support their operation. In this article, we investigate how the infrastructure operator (defender) should prioritize the investment in securing a set of facilities in order to reduce the impact of a strategic adversary (attacker) who can target a facility to increase the overall usage cost of the system. We adopt a game-theoretic approach to model the defender-attacker interaction and study two models: normal form game—where both players move simultaneously—and sequential game—where attacker moves after observing the defender's strategy. For each model, we provide a complete characterization of how the set of facilities that are secured by the defender in equilibrium vary with the costs of attack and defense. Importantly, our analysis provides a sharp condition relating the cost parameters for which the defender has the first-mover advantage. Specifically, we show that to fully deter the attacker from targeting any facility, the defender needs to proactively secure all "vulnerable facilities" at an appropriate level of effort. We illustrate the outcome of the attacker–defender interaction on a simple transportation network. We also suggest a dynamic learning setup to understand how this outcome can affect the ability of imperfectly informed users to make their decisions about using the system in the post-attack stage. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
23. Monitoring Oil Pipeline Infrastructures with Multiple Unmanned Aerial Vehicles
- Author
-
Ondráček, Jakub, Vaněk, Ondřej, Pěchouček, Michal, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Goebel, Randy, editor, Tanaka, Yuzuru, editor, Wahlster, Wolfgang, editor, Siekmann, Jörg, editor, Demazeau, Yves, editor, Zambonelli, Franco, editor, Corchado, Juan M., editor, and Bajo, Javier, editor
- Published
- 2014
- Full Text
- View/download PDF
24. Infrastructure Security of the Ural Regions: Assessment Technique and Diagnostic Results
- Author
-
Pavel Arkadyevich Pykhov and Tatyana Olegovna Kashina
- Subjects
infrastructure ,infrastructure security ,indicative analysis ,regions of Ural ,economic security ,economic growth ,sustainable development ,balanced development ,regional economy ,regional policy ,Regional economics. Space in economics ,HT388 - Abstract
This article examines the infrastructure as one of the important elements of the economic system. Authors have considered the stages of formation of this concept in the scientific world, the ideas of a number of scientists on a role and place of infrastructure in the economic system are given. Short genesis of approaches to the description of infrastructure and to assignment of its functions to certain branches is created. The paper emphasized the importance of strengthening the infrastructural support to the transition of the economy to the machine mode of production. Two main methodological approaches describing the nature and content of infrastructure are allocated: branch-wise and functional. The author's technique of the assessment of infrastructure security of territories at the regional level is offered. A basis of this technique is the allocation of the set of special indicators which values allow to see the level of development of separate elements of infrastructure. Indicative analysis, which is the basis of the methods, allows to judge any phenomenon by comparing the current observed values with the previously accepted threshold levels. This comparison allows one to classify the observations on the scale of "norm-pre-crisis-crisis". The essential advantage of this method is the normalization of indicators, i.e. their reduction to one comparable conditional size. It allows to receive the assessment on certain blocks of indicators and a complex assessment on all set in general. Authors have allocated four basic elements of infrastructure, such as transport, communications and telecommunications, utilities and health care availability. In total, the technique includes 21 indicators. The results of approbatory calculations with the author's method have revealed shortcomings in the infrastructure development of the Ural region. The article is a brief analysis of the data with the accents on the individual indicators and areas.
- Published
- 2015
- Full Text
- View/download PDF
25. Trial Implementation of a Multihazard Risk Assessment Framework for High-Impact Low-Frequency Power Grid Events.
- Author
-
Veeramany, Arun, Coles, Garill A., Unwin, Stephen D., Nguyen, Tony B., and Dagle, Jeffery E.
- Abstract
The Pacific Northwest National Laboratory developed a risk framework for modeling high-impact, low-frequency power grid events to support risk-informed decisions. In this paper, we briefly recap the framework and demonstrate its implementation for seismic and geomagnetic hazards using a benchmark reliability test system. We describe integration of a collection of models implemented to perform hazard analysis, fragility evaluation, consequence estimation, and postevent restoration. We demonstrate the value of the framework as a multihazard power grid risk assessment and management tool. The research will benefit transmission planners and emergency planners by improving their ability to maintain a resilient grid infrastructure against impacts from major events. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
26. A Decision Framework for Managing the Risk of Terrorist Threats at Rail Stations Interconnected with Airports.
- Author
-
Kaewunruen, Sakdirat, Alawad, Hamad, and Cotruta, Silviu
- Subjects
INTERNATIONAL airports ,TERRORISM ,TERRORISTS ,RAILROAD stations ,DECISION making - Abstract
This paper highlights a risk-based decision-making framework on a basis of probabilistic risk assessment (PRA). Its aim is to enable stakeholders of transport infrastructures to systematically and effectively allocate their limited resources and consequently improve resilience when facing the potential risk of a terrorist attack. The potential risk of a terrorist attack affects the inter-operation of transportation infrastructures including airports and rail stations, the regional economy, and imposes additional costs of security or any countermeasures. This novel framework is thus established in order to model the security system, to consider a multitude of threat scenarios, and to assess the decisions and choices taken by the aggressors during various stages of their attack. The framework has capability to identify the state of partial neutralization, which reveals the losses incurred when the terrorist could not reach the primary target. In this study, an underground railway station interconnected to an international airport has been used as a case study to demonstrate the effectiveness of this novel framework. By the rigorous assessment of potential losses during a variety of threat scenarios, four countermeasures that could minimise losses are proposed: screening of passengers by observation techniques (SPOT), a surveillance system, increase of the cargo screening rate, and blast-resistant cargo containers. The cost and efficiency assessment is employed to determine the most suitable countermeasures when the value of the security measures equal their cost. Note that ongoing research is still needed to establish better countermeasures since there is no end to the creativity of terrorists. The new technology, such as wireless sensors, will play an important role in the security system in the future. In particular, this study will help insurance and rail industries to model and manage risk profiles at critical infrastructure. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
27. Using 3D Models And Discrete Simulations In Infrastructure Security Applications
- Author
-
Assogna, Pierluigi, Bertocchi, Glauco, Paoluzzi, Alberto, Vicentino, Michele, Scorzelli, Giorgio, Zollo, Roberto, Papa, Mauricio, editor, and Shenoi, Sujeet, editor
- Published
- 2008
- Full Text
- View/download PDF
28. Collaborative Robots for Infrastructure Security Applications
- Author
-
Guo, Yi, Parker, Lynne E., Madhavan, Raj, Kacprzyk, Janusz, editor, Nedjah, Nadia, editor, Coelho, Leandro dos Santos, editor, and Mourelle, Luiza de Macedo, editor
- Published
- 2007
- Full Text
- View/download PDF
29. Software Environment for Simulation and Evaluation of a Security Operation Center
- Author
-
Bourgeois, Julien, Ganame, Abdoul Karim, Kotenko, Igor, Ulanov, Alexander, Cartwright, William, editor, Gartner, Georg, editor, Meng, Liqiu, editor, Peterson, Michael P., editor, Popovich, Vasily V., editor, Schrenk, Manfred, editor, and Korolenko, Kyrill V., editor
- Published
- 2007
- Full Text
- View/download PDF
30. Simulation of Internet DDoS Attacks and Defense
- Author
-
Kotenko, Igor, Ulanov, Alexander, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Katsikas, Sokratis K., editor, López, Javier, editor, Backes, Michael, editor, Gritzalis, Stefanos, editor, and Preneel, Bart, editor
- Published
- 2006
- Full Text
- View/download PDF
31. Cybersecurity Standards in the Context of Operating System
- Author
-
Jahanzaib Malik, Syed Wasif Abbas Hamdani, Waleed Bin Shahid, Malik Hamza Murtaza, Haider Abbas, Abdul Waheed Khan, Abdul Rehman Janjua, Mohammed Atiquzzaman, and Muhammad Faisal Amjad
- Subjects
020205 medical informatics ,General Computer Science ,business.industry ,Computer science ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Infrastructure security ,Computer security ,computer.software_genre ,Theoretical Computer Science ,Software ,Open research ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Operating system ,NIST ,Baseline (configuration management) ,Conformance testing ,business ,computer - Abstract
Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by fine-tuning system parameters to the best and optimized security levels. For the protection of infrastructure and information systems, several guidelines have been provided by well-known organizations in the form of cybersecurity standards. Since security vulnerabilities incur a very high degree of financial, reputational, informational, and organizational security compromise, it is imperative that a baseline for standard compliance be established. The selection of security standards and extracting requirements from those standards in an organizational context is a tedious task. This article presents a detailed literature review, a comprehensive analysis of various cybersecurity standards, and statistics of cyber-attacks related to operating systems (OS). In addition to that, an explicit comparison between the frameworks, tools, and software available for OS compliance testing is provided. An in-depth analysis of the most common software solutions ensuring compliance with certain cybersecurity standards is also presented. Finally, based on the cybersecurity standards under consideration, a comprehensive set of minimum requirements is proposed for OS hardening and a few open research challenges are discussed.
- Published
- 2021
- Full Text
- View/download PDF
32. Detection of Floating Objects Based on Hydroacoustic and Hydrodynamic Pressure Measurements in the Coastal Zone
- Author
-
K. Buszman and Małgorzata Gloza
- Subjects
010504 meteorology & atmospheric sciences ,Mechanical Engineering ,System of measurement ,Naval architecture. Shipbuilding. Marine engineering ,Hydrodynamic pressure ,VM1-989 ,020101 civil engineering ,Ocean Engineering ,02 engineering and technology ,Infrastructure security ,01 natural sciences ,marine traffic ,0201 civil engineering ,Constant supervision ,Coastal zone ,underwater pressure research ,Environmental science ,coastal zone ,Submarine pipeline ,Underwater ,0105 earth and related environmental sciences ,Radio wave ,Marine engineering ,marine safety - Abstract
The development of coastal infrastructure and related maritime transport necessitatesthe intensification of vessel traffic monitoring. Navigation systems used in this research are traditionally based on the information transmitted by radio waves. Marine traffic safety requires constant supervision carried out by dedicated systems, the operation of which may be limitedby difficult environmental conditions. The possibilities of supporting navigation systems with underwater observation systems are explored here. The research was carried out using an underwater measurement system. Local disturbances of the hydroacoustic and hydrodynamic field from the moving vessels were analysed. The potential for identifying a moving vessel, for example for offshore infrastructure security purposes, is demonstrated.
- Published
- 2020
33. A Decision Framework for Managing the Risk of Terrorist Threats at Rail Stations Interconnected with Airports
- Author
-
Sakdirat Kaewunruen, Hamad Alawad, and Silviu Cotruta
- Subjects
decision analysis ,infrastructure security ,probabilistic risk assessment ,critical infrastructures ,terrorism ,Industrial safety. Industrial accident prevention ,T55-55.3 ,Medicine (General) ,R5-920 - Abstract
This paper highlights a risk-based decision-making framework on a basis of probabilistic risk assessment (PRA). Its aim is to enable stakeholders of transport infrastructures to systematically and effectively allocate their limited resources and consequently improve resilience when facing the potential risk of a terrorist attack. The potential risk of a terrorist attack affects the inter-operation of transportation infrastructures including airports and rail stations, the regional economy, and imposes additional costs of security or any countermeasures. This novel framework is thus established in order to model the security system, to consider a multitude of threat scenarios, and to assess the decisions and choices taken by the aggressors during various stages of their attack. The framework has capability to identify the state of partial neutralization, which reveals the losses incurred when the terrorist could not reach the primary target. In this study, an underground railway station interconnected to an international airport has been used as a case study to demonstrate the effectiveness of this novel framework. By the rigorous assessment of potential losses during a variety of threat scenarios, four countermeasures that could minimise losses are proposed: screening of passengers by observation techniques (SPOT), a surveillance system, increase of the cargo screening rate, and blast-resistant cargo containers. The cost and efficiency assessment is employed to determine the most suitable countermeasures when the value of the security measures equal their cost. Note that ongoing research is still needed to establish better countermeasures since there is no end to the creativity of terrorists. The new technology, such as wireless sensors, will play an important role in the security system in the future. In particular, this study will help insurance and rail industries to model and manage risk profiles at critical infrastructure.
- Published
- 2018
- Full Text
- View/download PDF
34. Development of Security Performance and Comparative Analyses Process for Big Data in Cloud
- Author
-
M. R. Shrihari, T. N. Manjunath, R. A. Archana, and Ravindra S. Hegadi
- Subjects
business.industry ,Computer science ,Big data ,Advanced Encryption Standard ,Cloud computing ,Cryptography ,Infrastructure security ,Computer security ,computer.software_genre ,Encryption ,Session key ,business ,computer ,Key size - Abstract
Big data is accumulate and development with the facilitate of disseminated encoding structures like Hadoop which handles the new encoding prototype. Big data can handle huge quantity of information with thousands of computers in clusters. Through the condition of compute of different possessions in public cloud, people and institute are clever to outsource their statistics storage and services. Conversely, the information owners are disturbed with security of their outsourced statistics. The Cloud Security Alliance has recognized and announced different security confronts with reverence to big data security and safe estimation in disseminated encoding structure veracity and immediate security. There are important investigate assistance establish in the survey. Conversely, a complete approach that provides to the security wants of the cloud-big data environment to stimulate of the different afore reveals dispute is lost. Consequently the plan of this proposal is to examine, design, and execute method for safe computation, big data privacy, big data security, and efficient statistics administration. Individual challenges are big data privacy, infrastructure security, big data security, and data management. Authentication using username and password which contains the user data such as identity number, data provider name, date and time of uploading the data is also used to recognize the person who uploaded the data into the big data cloud. It identifies the origin of data and someone who downloads the data could know the person who created it. A variety of cryptographic methods used for encryption are Attribute-Based Encryption as Scheme 1, Advanced Encryption Standard as Scheme 2, hybridized Attribute-Based Encryption and Advanced Encryption Standard as Scheme 3, and the proposed algorithm named Secure Dynamic Bit Standard as Scheme 4 which offer high security for the data stored and access by the end user. The Secure Dynamic Bit Standard algorithm provides the security during two dissimilar keys such as master key and session key produced by cloud service provider. The Secure Dynamic Bit Standard algorithms enclose the three disparate key lengths such as 128 bits, 256 bits, and 512 bits. The key length of the master key and session key randomly creates through the encryption process. This method will minimize the maximum number of unauthorized and unauthenticated users in the big data cloud. It also minimizes the maximum number of assault in the big data cloud environment such as collusion, brute force attack, and Structured Query Language.
- Published
- 2021
- Full Text
- View/download PDF
35. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
- Author
-
Jeong-Nyeo Kim and Song-Yi Hwang
- Subjects
Computer science ,Botnet ,Denial-of-service attack ,TP1-1185 ,computer.software_genre ,Computer security ,IoT malware ,Biochemistry ,Article ,Analytical Chemistry ,propagation ,Electrical and Electronic Engineering ,Instrumentation ,Access network ,business.industry ,Chemical technology ,diffusion ,tool ,Infrastructure security ,Atomic and Molecular Physics, and Optics ,Networking hardware ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Malware ,The Internet ,business ,verification ,computer ,Private network - Abstract
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions.
- Published
- 2021
- Full Text
- View/download PDF
36. Digital data provenance for the power grid based on a Keyless Infrastructure Security Solution
- Author
-
J. Plummer, R. Bishop, K. Kaur, M. Mylrea, A. Chawla, G. Raymond, V. Tatireddy, R. Singh, G. Day, D. Sebastian-Cardenas, C. Allwardt, B. Johnson, A. Moralez, and S. Gourisetti
- Subjects
Provenance ,Computer science ,Digital data ,Power grid ,Infrastructure security ,Computer security ,computer.software_genre ,computer - Published
- 2021
- Full Text
- View/download PDF
37. Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure
- Author
-
Ali T. Atieh
- Subjects
Authentication ,Cloud computing security ,Computer science ,Network security ,business.industry ,Cloud computing ,Infrastructure security ,Asset (computer security) ,Computer security ,computer.software_genre ,Information technology management ,Physical access ,business ,computer - Abstract
A robust and secure IT infrastructure ensures reliable security, high speeds and connectivity, employee support and accessibility, and a positive user experience for clients. It is hard to manage a modern firm without a secure and adaptable IT infrastructure. Technology, when properly set up and networked, can improve back-office processes, increase efficiency, and simplify communication. This research explores how an organization assure the optimum level of infrastructure security in in three domains: network infrastructure security, physical infrastructure security, and cloud infrastructure security. Running a network infrastructure model comes with a variety of difficulties. The findings suggest that there are few recommendations for assuring right security level for the network infrastructure, including: conducting a network security assessment, keeping user access privileges to a bare minimum for work, updating programs, investigating cybersecurity tools and Increasing cyber-awareness. Physical infrastructure security is also crucial. We divided he dangers are divided into the following categories and suggested for appropriated measure: threats by environment, threats by technical infrastructure, threats by humans, inappropriate humidity and temperature, Electrification, Electromagnetic Interference (EMI), Unauthorized physical access. Cloud security is necessitated by the widespread adoption of cloud technology, as well as an ever-increasing volume and sophistication of cyber attacks. To ensure the right level of cloud security, this research recommend to take some measures, including: Transit and Rest Protection, Asset Security. Securing User Management, Integration of compliance and security, Authentication and Identity, and Operational Safety and Security While no amount of security will ever stop all attacks, organizations can significantly minimize risk of suffering a breach and the fallout from such attacks by taking a few critical steps to secure business’ network, physical and cloud infrastructure.
- Published
- 2021
- Full Text
- View/download PDF
38. Switched-Based Resilient Control of Cyber-Physical Systems
- Author
-
Jose Rubio-Hernan, Joaquin Garcia-Alfaro, Rosa Cavalli, Mariana Segovia-Ferreira, Institut Polytechnique de Paris (IP Paris), Département Réseaux et Services de Télécommunications (RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Réseaux, Systèmes, Services, Sécurité (R3S-SAMOVAR), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP)-Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Département Electronique et Physique (EPH), Département Réseaux et Services Multimédia Mobiles (RS2M), and Méthodes et modèles pour les réseaux (METHODES-SAMOVAR)
- Subjects
Networked control systems ,Switched linear systems ,0209 industrial biotechnology ,Infrastructure security ,General Computer Science ,Computer science ,Distributed computing ,Stability (learning theory) ,Topology (electrical circuits) ,02 engineering and technology ,Transfer function ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,General Materials Science ,networked control systems ,Resilience (network) ,Linear system ,General Engineering ,Process (computing) ,Cyber-physical system ,020206 networking & telecommunications ,ACM: D.: Software ,Cyber resilience ,Moving target defense ,Cyber-physical security ,Control system ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,lcsh:TK1-9971 - Abstract
International audience; We present a control-theoretic approach to achieve Cyber-Physical Systems (CPS) resilient designs. We assume situations in which the CPS must maintain the correct operation of a set of crucial functionalities despite ongoing adversarial misbehavior. The approach is based on a moving target defense paradigm, driven by a linear switching of state-space matrices, and applied at both the physical and network layers of a networked-control system. We show that the final system maintains stability. We also evaluate, via simulation, a step-by-step procedure that takes a transfer function, representing the dynamics of the physical process. As a result, we obtain a resilient CPS design structured around a topology of decentralized controllers. Results show that the obtained approach is both innovative and promising.
- Published
- 2020
- Full Text
- View/download PDF
39. Decentralized gene regulatory networks: An approach to energy efficient node coordination with delay constraints for wireless sensor systems
- Author
-
Heejung Byun
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,media_common.quotation_subject ,Distributed computing ,020206 networking & telecommunications ,02 engineering and technology ,Infrastructure security ,Adaptability ,Robustness (computer science) ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,business ,Communications protocol ,Wireless sensor network ,Information Systems ,media_common ,Efficient energy use - Abstract
Wireless sensor networks (WSNs) systems have been used for several applications from target tracking to environment monitoring. Recently, there has been increased interest in the design of WSN protocols for delay-sensitive applications, such as military surveillance, health monitoring, and infrastructure security. However, due to the strict resource constraints of the sensor nodes, WSNs pose critical challenges for network protocol design for reliable communications with delay constraints. Biologically inspired modeling techniques have received considerable attention for their robustness, scalability, and adaptability with simple local interactions and limited information. In this paper, we apply gene regulatory networks (GRNs) principles to the WSN system and propose a new GRN model for decentralized node coordination to achieve energy saving while meeting delay requirements. Using control theory, we provide conditions of system parameters to ensure system convergence and stability. Simulation results indicate that the proposed scheme achieves superior performance with energy savings as well as desirable delay guarantees compared with other well-known schemes.
- Published
- 2019
- Full Text
- View/download PDF
40. INFRASTRUCTURE SECURITY OF FORMATION AND DEVELOPMENT OF SECTORAL CORPORATE CLUSTERS
- Author
-
Natalya G. Metelenko, Olena V. Kovalenko, Yevhenii К. Merzhynskyi, Alla I. Rudych, and Vyacheslav Makedon
- Subjects
National economy ,Development (topology) ,Renewable Energy, Sustainability and the Environment ,Geography, Planning and Development ,Business ,Infrastructure security ,Safety Research ,Industrial organization - Published
- 2019
- Full Text
- View/download PDF
41. Analisis Tata Kelola Teknologi Informasi pada Layanan Infrastruktur Jaringan RSUD Provinsi NTB menggunakan COBIT 4.1
- Author
-
Indri Rahmawati Yunus, Sri Endang Anjarwani, and Nadiyasari Agitha
- Subjects
Service (business) ,COBIT ,Process management ,Computer science ,Information system ,Infrastructure security ,Metric (unit) ,Maturity (finance) - Abstract
By utilizing IT network infrastructure services optimally, the use of information systems and other IT activities in RSUD Provinsi NTB will run smoothly. However, there are some problems such as devices acquisition, maintenance and network infrastructure security that must be overcome to achieve the best services in accordance with the vision and mission. This research uses COBIT 4.1 framework and maturity level as a metric of current conditions and expected conditions in RSUD Provinsi NTB. This observation results that the current maturity level is 3 and is expected to be 5. We also propose some recommendations for improvements that are expected to overcome the faced problem and make improvements to the existing IT network infrastructure service.
- Published
- 2019
- Full Text
- View/download PDF
42. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
- Author
-
Iman Almomani, Mohanned Ahmed, and Leandros A. Maglaras
- Subjects
Information privacy ,Service (systems architecture) ,Cybersecurity ,General Computer Science ,Higher education ,Saudi Arabia ,Gap analysis ,Computer security ,computer.software_genre ,Maturity Assessment ,Audit tool ,ECC ,GDPR ,Maturity assessment ,Government ,business.industry ,ISO27001 ,NCA ,Security and Privacy ,COVID-19 ,Infrastructure security ,CRF ,QA75.5-76.95 ,Maturity (finance) ,CITC ,Computer Education ,Electronic computers. Computer science ,International security ,business ,computer - Abstract
open access article The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regulatory Framework (CRF) and the NCA’s Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However, these frameworks lack a practical, published mechanism that continuously assesses the organizations’ security level, especially in HEI (Higher Education Institutions) systems. This paper proposes a Cybersecurity Maturity Assessment Framework (SCMAF) for HEIs in Saudi Arabia. SCMAF is a comprehensive, customized security maturity assessment framework for Saudi organizations aligned with local and international security standards. The framework can be used as a self-assessment method to establish the security level and highlight the weaknesses and mitigation plans that need to be implemented. SCMAF is a mapping and codification model for all regulations that the Saudi organizations must comply with. The framework uses different levels of maturity against which the security performance of each organization can be measured. SCMAF is implemented as a lightweight assessment tool that could be provided online through a web-based service or offline by downloading the tool to ensure the organizations’ data privacy. Organizations that apply this framework can assess the security level of their systems, conduct a gap analysis and create a mitigation plan. The assessment results are communicated to the organization using visual score charts per security requirement per level attached with an evaluation report.
- Published
- 2021
43. Applications of underground structures for the physical protection of critical infrastructure
- Author
-
George H Baker, Don A Linger, and Richard G Little
- Subjects
Government ,Information sharing ,Economic security ,Critical infrastructure protection ,Context (language use) ,Business ,Infrastructure security ,Computer security ,computer.software_genre ,computer ,Critical infrastructure ,Physical security - Abstract
The U.S. President’s Commission on Critical Infrastructure Protection (PCCIP), convened in the wake of the bombing of the Murrah Federal Building in Oklahoma City, concluded that the nation’s physical security and economic security depend on our critical energy, communications, and computer infrastructures. While a primary motivating event for the establishment of the commission was the catastrophic physical attack of the Murrah Building, it is ironic that the commission focused its attention primarily on cyber threats. Their rationale was that cyber vulnerabilities posed a new, unaddressed challenge to infrastructure security. This approach was further questioned by the events of September 11, 2001 and the subsequent bio-threat events in America. During and shortly after the convention of the President’s Commission on Critical Infrastructure Protection in 1997-99, a working group met to look into the physical protection of critical U.S. infrastructure using underground structures. This “Underground Structures Infrastructure Applications” (USIA) group provided a timely balancing discussion of issues surrounding the physical vulnerability aspect of the infrastructure protection problem. The group convened a workshop on the subject under the auspices of the National Research Council’s Board on Infrastructure and the Constructed Environment. The present paper draws on the working group deliberations and NRC Workshop proceedings to address infrastructure assurance in the context of maximizing the physical protection of high value infrastructure by the use of underground construction. Although the PCCIP did not directly address a role for underground facilities (UGFs), its final report recommended a program of government and industry cooperation and information sharing to improve the physical security of critical United States infrastructure. We develop specific recommendations for the use of underground facilities to support implementation of the general PCCIP challenge. It is our contention that underground facilities reduce the risk of infrastructure disruption from both physical and cyber attacks. In the latter case, undergrounds provide secure reserve operations and back-up data storage locations to ensure the reconstitution of critical electronic information systems. In addition, noting that the Norwegians have placed much of their critical infrastructure underground, we provide information on the Norway’s experience gathered on a fact-finding trip to that country organized by one of the authors. The events of September 11, 2001 and the use of underground locations for terrorist security by the Taliban, provide a strong impetus for the use of underground construction to protect vital infrastructure. 1 Critical Foundations: Protecting America’s Infrastructures, Report of the President’s Commission on Critical Infrastructure Protection, October 1997 2 Use of Underground Facilities to Protect Critical Infrastructures, National Academy Press, Washington, D.C., 1998
- Published
- 2021
- Full Text
- View/download PDF
44. Smart Grid Anomaly Detection using a Deep Learning Digital Twin
- Author
-
Yan Lindsay Sun, Haibo He, and William Danilczyk
- Subjects
Electric power system ,Units of measurement ,Smart grid ,SCADA ,Computer science ,Real-time computing ,Cyber-physical system ,Infrastructure security ,Fault (power engineering) ,Fault detection and isolation - Abstract
The power grid is considered to be the most critical piece of infrastructure in the United States because each of the other fifteen critical infrastructures, as defined by the Cyberse-curity and Infrastructure Security Agency (CISA), require the energy sector to properly function. Due the critical nature of the power grid, the ability to detect anomalies in the power grid is of critical importance to prevent power outages, avoid damage to sensitive equipment and to maintain a working power grid. Over the past few decades, the modern power grid has evolved into a large Cyber Physical System (CPS) equipped with wide area monitoring systems (WAMS) and distributed control. As smart technology advances, the power grid continues to be upgraded with high fidelity sensors and measurement devices, such as phasor measurement units (PMUs), that can report the state of the system with a high temporal resolution. However, this influx of data can often become overwhelming to the legacy Supervisory Control and Data Acquisition (SCADA) system, as well as, the power system operator. In this paper, we propose using a deep learning (DL) convolutional neural network (CNN) as a module within the Automatic Network Guardian for ELectrical systems (ANGEL) Digital Twin environment to detect physical faults in a power system. The presented approach uses high fidelity measurement data from the IEEE 9-bus and IEEE 39-bus benchmark power systems to not only detect if there is a fault in the power system but also applies the algorithm to classify which bus contains the fault.
- Published
- 2021
- Full Text
- View/download PDF
45. Trains Detection Using State of Polarization Changes Measurement and Convolutional Neural Networks
- Author
-
Radim Burget, Vojtech Myska, Petr Munster, and Petr Dejdar
- Subjects
Optical fiber ,Artificial neural network ,Computer science ,optical fiber sensor ,Infrastructure security ,artificial intelligence ,Polarization (waves) ,state of polarization changes ,Signal ,Convolutional neural network ,law.invention ,Vibration ,machine learning ,law ,Distortion ,Electronic engineering ,vibration - Abstract
Fiber optic infrastructure security is of growing interest. The current distributed sensor systems are robust and expensive solutions, and their practical applications are uncommon. Research into simple and cost-effective solutions based on changes in the state of polarization is crucial. This paper expands the use of a vibration sensor based on the sensing of rapid changes in the state of polarization (SOP) of light in a standard single-mode optical fiber by using a convolutional neural network to detect trains running along the optical fiber infrastructure. It is a simple system that determines ongoing events near the optical fiber route by simply determining the signal boundaries that define the idle state. By using a neural network, it is possible to eliminate the distortion caused by the temperature changes and, for example, to improve detection in the the zones where the vibrations are not strong enough for a simple threshold resolution.
- Published
- 2021
- Full Text
- View/download PDF
46. Using 3D Models And Discrete Simulations In Infrastructure Security Applications.
- Author
-
Assogna, Pierluigi, Bertocchi, Glauco, Paoluzzi, Alberto, Vicentino, Michele, Scorzelli, Giorgio, and Zollo, Roberto
- Abstract
Next generation systems for critical infrastructure protection must support capabilities such as behavior analysis, situation modeling and data mining integrated within sophisticated virtual or augmented reality interfaces. This paper describes the design goals and implementation of a platform for critical infrastructure security applications. The platform is designed to support semi-automated 3D modeling of infrastructures, 3D integration of sensor networks, situation modeling and visual simulation via 3D animation, and advanced situation analysis. Such a system would enable operators to recognize preliminary indications of crisis situations and promptly activate the appropriate countermeasures. It would also assist them in optimizing normal operations and conducting simulations for emergency planning and crisis management. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
47. Our historians: the court and the FCC. Foreign ownership regulations and legislative history as a framing device.
- Author
-
Zajacz, Rita
- Abstract
While policy analysts are generally concerned with contemporary problems that they investigate via contemporary sources of information, most of them rely on legislative history to establish the purpose of legislation. Through the analysis of foreign ownership policy in the twentieth century, I demonstrate that conventional legislative history is best understood as a framing device, a purposeful representation of the past in the service of current policy objectives. Therefore, to fully understand the development of communications policy, researchers would benefit both from historical research about the origins of legislation and from investigating the development of its conventional legislative history. In our case, archival research directs attention to the security of the communications infrastructure as the primary rationale for the rules, whose lasting importance for the military departments illuminates continuity with the past. By contrast, the FCC's focus on propaganda as the main security rationale has contributed to a significant change: the deregulation of conduit media. ..PAT.-Unpublished Manuscript [ABSTRACT FROM AUTHOR]
- Published
- 2004
48. Solutions for IoT System Security
- Author
-
Fan Du and Qinghao Tang
- Subjects
Security framework ,Authentication ,business.industry ,Computer science ,Firmware ,Cloud computing ,Infrastructure security ,Computer security ,computer.software_genre ,Identification (information) ,Terminal (electronics) ,Internet of Things ,business ,computer - Abstract
This chapter will introduce security solutions based on the security framework to enable the terminal, network, and cloud platform of the IoT system to have three functions: identification and authentication; OTA firmware update; and terminal device security protection. If these IoT infrastructure security construction strategies are used appropriately, they will become powerful tools for IoT manufactures to ensure device security.
- Published
- 2021
- Full Text
- View/download PDF
49. Study on the Security Protection System of Foreign Satellite Navigation System Infrastructure
- Author
-
Chen Yu and Wenqing Zhang
- Subjects
Service (business) ,Internationalization ,Order (exchange) ,business.industry ,SAFER ,Scale (social sciences) ,media_common.cataloged_instance ,Satellite navigation ,Business ,Infrastructure security ,European union ,Telecommunications ,media_common - Abstract
In 2020, the Beidou-3 global satellite navigation system announced the official opening, officially providing services to the world, and the Beidou system has also entered a new era of scale, industrialization, internationalization and popularization. New era gave birth to the new requirements, how to provide safer, more stable, more reliable, higher-quality fixed navigation users worldwide location service has become a new target. In order to provide better navigation and positioning services, we must not only pay attention to technological innovation, but also maintain the safety of the satellite navigation system. Security issues have long been the focus of attention of all countries, and are also the main points of centralized regulation of laws and regulations. Infrastructure security is the most basic and most important point in system security. This article starts with the security protection system of satellite navigation systems and infrastructure, focusing on combing and analyzing the security protection systems of the three global satellite navigation systems in the United States, Russia, and the European Union. From the aspect, we will elaborate on the specific measures taken by foreign satellite navigation systems to protect their infrastructure.
- Published
- 2021
- Full Text
- View/download PDF
50. Critical Infrastructures and Safeguarding the City’s Sustainability and Peace
- Author
-
Ali Cheshmehzangi
- Subjects
Coronavirus disease 2019 (COVID-19) ,Agency (sociology) ,Sustainability ,Business ,Infrastructure security ,Public administration ,Safeguarding ,Critical infrastructure - Abstract
The Cybersecurity and Infrastructure Security Agency (CISA), based in the USA, was probably the first agency that identified critical infrastructures (CIs) during the COVID-19 pandemic (CISAin Identifying critical infrastructure during COVID-19, 2020).
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.