Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "cyber infrastructures" wg kryterium: Wszystkie pola


Wyświetlanie 1-7 z 7
Tytuł:
Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions
Autorzy:
Adi, Erwin
Baig, Zubair
Zeadally, Sherali
Powiązania:
https://bibliotekanauki.pl/articles/27272018.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
artificial intelligence
AI
cyber infrastructures
data analysis
supply chain
sztuczna inteligencja
cybernetyczne infrastruktury
analiza danych
łańcuch dostaw
Opis:
Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution of AI techniques, and we show how recent AI approaches are effective in helping an adversary attain his/her objectives appertaining to cyberattacks. We also discuss how the current architecture of computer communications enables the development of AI-based adversarial threats against heterogeneous computing platforms and infrastructures.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-23
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safeguarding critical infrastructures from cyber attacks : A case study for offshore natural gas Assets
Autorzy:
Hadjistassou, C.
Bratskas, R.
Koutras, N.
Kyriakides, A.
Charalambous, E.
Hadjiantonis, A. M.
Powiązania:
https://bibliotekanauki.pl/articles/2069216.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
cyber attacks
energy
natural gas
gas hydrates
Opis:
The majority of operations, as well as the physical and chemical processes, which take place on offshore Natural Gas installations are controlled by computer systems. These computer systems are vulnerable to cyber-attacks. If successful, such attacks can have disastrous and far-reaching consequences, including human casualties, large-scale pollution, and immense financial cost. In this paper we identify one possible way that an attacker can inflict material damage, by altering the parameters of the gas hydrate inhibition system. The formation of gas hydrates can completely halt operations for a prolonged period of time, could damage equipment, and directly endanger human lives. To raise the level of protection we propose the implementation of two lines of defense the second based on machine learning algorithms. Appreciating the sophistication of attacks, the inherent risks and complexity of multi-billion offshore energy assets we highlight the need for further research intended to address safety loopholes.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 1; 115--124
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Increasing Protection and Resilience of Critical Infrastructures – Current challenges and approaches
Autorzy:
Kozik, R.
Choraś, M.
Hołubowicz, W.
Renk, R.
Powiązania:
https://bibliotekanauki.pl/articles/2069257.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure protection
simulation
security
cyber security
next generation infrastructures
NGI
Opis:
In this paper we present current key challenges with respect to Critical Infrastructure Protection and to their resiliency. As our world becomes more and more interconnected via open networks with the cyberspace, many new challenges arise. Therefore, we frame the problem within three distinctive domains: real world natural events, human (organisational and legal), and cyber one. Within our analysis we present how current technologies, tools and methodologies can be used to address certain problems within those domains. Moreover, we stress the fact that there is a limited number of initiatives that aim at proposing the holistic (all hazard) approach addressing all the domains at once.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 3; 79--84
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling of the Decision-making Procedure for Financing of Cyber Security Means of Cloud Services by the Medium of a Bilinear Multistep Quality Game with Several Terminal Surfaces
Autorzy:
Lakhno, V.
Akhmetov, B.
Malyukov, V.
Kartbaev, T.
Powiązania:
https://bibliotekanauki.pl/articles/226592.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cloud infrastructures
cyber security
multistep quality game
optimum financing strategy
risks
decision-making support system
Opis:
The model is developed for the intellectualized decision-making support system on financing of cyber security means of transport cloud-based computing infrastructures, given the limited financial resources. The model is based on the use of the theory of multistep games tools. The decision, which gives specialists a chance to effectively assess risks in the financing processes of cyber security means, is found. The model differs from the existing approaches in the decision of bilinear multistep quality games with several terminal surfaces. The decision of bilinear multistep quality games with dependent movements is found. On the basis of the decision for a one-step game, founded by application of the domination method and developed for infinite antagonistic games, the conclusion about risks for players is drawn. The results of a simulation experiment within program implementation of the intellectualized decision-making support system in the field of financing of cyber security means of cloudbased computing infrastructures on transport are described. Confirmed during the simulation experiment, the decision assumes accounting a financial component of cyber defense strategy at any ratios of the parameters, describing financing process.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 4; 467-472
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo zarządzania sieciami i partycjami w transporcie kolejowym
Autorzy:
Procházka, Jan
Novobilsky, Petr
Procházkova, Dana
Powiązania:
https://bibliotekanauki.pl/articles/2091270.pdf
Data publikacji:
2020
Wydawca:
Instytut Kolejnictwa
Tematy:
system cyberfizyczny
infrastruktura krytyczna
systemowo wielopoziomowe, bezpieczne i niezależne przetwarzanie danych
MILS
cyber physical system
critical infrastructures
multiple independent levels of security
Opis:
Infrastruktura transportu kolejowego zapewnia codzienny przewóz dużej liczby osób i ładunków. Znaczenie kolei pod względem zapewnienia sprawności obsługi na danym obszarze czyni z niej infrastrukturę krytyczną. Obserwuje się istotny rozwój wykorzystania technologii informatycznych na kolei, podobnie jak we wszystkich innych branżach. Z tego względu zarządzanie koleją, jako systemem fi zycznym, należy zastąpić zarządzaniem koleją, jako systemem cyberfi zycznym. Infrastruktura kolejowa jest narażona na znaczące ataki zarówno w przestrzeni fi zycznej, jak i w cyberprzestrzeni. Artykuł jest poświęcony zarządzaniu sieciami komunikacyjnymi, służącymi do transmisji danych i partycjami, rozumianymi jako logicznie wydzielone zasoby informatyczne (służące do przetwarzania danych), wykorzystywanymi na potrzeby transportu kolejowego. Systemowo, wielopoziomowe, bezpieczne i niezależne (ang. System Multiple Independent Levels of Security – MILS) przetwarzanie danych spełnia wysokie wymagania dotyczące bezpieczeństwa systemu. MILS jest niezawodną architekturą bezpieczeństwa opartą na koncepcji separacji i kontrolowanego przepływu danych. W artykule opisano możliwości wykorzystania platformy MILS w systemie teleinformatycznym i systemie sterowania ruchem kolejowym.
Źródło:
Problemy Kolejnictwa; 2020, 189; 57--64
0552-2145
2544-9451
Pojawia się w:
Problemy Kolejnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
Autorzy:
Śliwiwński, Marcin
Piesik, Emilian
Powiązania:
https://bibliotekanauki.pl/articles/2068695.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
maritime infrastructure
functional safety
cyber security
SIL
SAL
EAL
industrial control systems
Opis:
The work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL) (ISO/IEC 15408), the security assurance levels (SAL) (IEC 62443), and the number of protection rings described in the Secure Safety (SeSa-SINTEF) methodology. The proposed approach will be composed of the following items: process and procedure based safety and cyber security management, integrated safety and security assessment of industrial control system (ICS) of the maritime critical infrastructure. Proposed methodology is illustrated on case study that based on the part of installation critical maritime infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2019, 10, 1; 137--148
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sensor based cyber attack detections in critical infrastructures using deep learning algorithms
Autorzy:
Yilmaz, Murat
Catak, Ferhat Ozgur
Gul, Ensar
Powiązania:
https://bibliotekanauki.pl/articles/952946.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
cyber security
engineering
critical infrastructures
industrial systems
information security
cyber attack detections
Opis:
The technology that has evolved with innovations in the digital world has also caused an increase in many security problems. Day by day the methods and forms of the cyberattacks began to become complicated, and therefore their detection became more difficult. In this work we have used the datasets which have been prepared in collaboration with Raymond Borges and Oak Ridge National Laboratories. These datasets include measurements of the Industrial Control Systems related to chewing attack behavior. These measurements include synchronized measurements and data records from Snort and relays with the simulated control panel. In this study, we developed two models using this datasets. The first is the model we call the DNN Model which was build using the latest Deep Learning algorithms. The second model was created by adding the AutoEncoder structure to the DNN Model. All of the variables used when developing our models were set parametrically. A number of variables such as activation method, number of hidden layers in the model, the number of nodes in the layers, number of iterations were analyzed to create the optimum model design. When we run our model with optimum settings, we obtained better results than related studies. The learning speed of the model has 100\% accuracy rate which is also entirely satisfactory. While the training period of the dataset containing about 4 thousand different operations lasts about 90 seconds, the developed model completes the learning process at the level of milliseconds to detect new attacks. This increases the applicability of the model in real world environment.
Źródło:
Computer Science; 2019, 20 (2); 213-243
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies