The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid proliferation of Internet of things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures and control systems has put stringent performance and scalability requirements on modern Supervisory Control and Data Acquisition (SCADA) systems. While cloud computing has enabled modern SCADA systems to cope with the increasing amount of data generated by sensors,...
Anomaly-based Network Intrusion Detection Systems (NIDSs) are a common security defense for modern networks. The success of their operation depends upon vast quantities of training data. However, one major limitation is the inability of NIDS to be reliably trained using imbalanced datasets. Network observations are naturally imbalanced, yet without substantial data pre-processing, NIDS accuracy can...
Securing applications and services provided in the Cloud against cyber attacks is hard to achieve, due to the complexity, heterogeneity, and dynamic nature of such systems. Federated Cloud environments, and Cloud Service Providers will benefit significantly if there is a comprehensive intrusion detection methodology that evolves based on their requirements, i.e. nonintrusive and resilient. The cooperation...
With the proliferation of technology it is important the healthcare industry advance to adapt to market competition. With recent electronic prescription service becoming up and running it demonstrates how the use of technology can improve efficiency of work. Utilising this technology we can see first-hand how it helps facilitate the doctor-patient relationship. The use of a computer system also has...
It is widely accepted that modern computer networks (often presented as a heterogeneous collection of functioning organisations, applications, software, and hardware) contain vulnerabilities. This paper proposes a new methodology to compute a dynamic severity cost for each state. Here a state refers to the behaviour of a system during an attack, an example of a state is where an attacker could influence...
Web Services are fast becoming a popular facet of Service Oriented Architecture, promising to address one of computing's biggest challenges, the issue of application integration. As a concept, Web Services have been developed in order to create and build distributed software systems both large and small scale. It comes therefore, as no surprise that there are many challenges associated with the Service...
Attack graphs facilitate modelling, detection and analysis of networks, along with providing the functionality to identify potential vulnerabilities and risks within networked systems. When attack graphs are applied to large heterogeneous collaborative infrastructures i.e. Systems-of-Systems (such as critical infrastructures), existing schemas struggle to detect and evaluate interdependencies and...
The size of fraudulent activity is increasing rapidly, with individuals and organisations being at great risk. This paper inspects and determines the various components required to deliver a successful fraud detection system. It is hoped that in reading this report, the reader will comprehend what is required and see the true benefit of implementing such a solution. Following the structure of a robust...
The use of technology is extremely beneficial in terms of efficiency and in the means of supporting patients. The barriers of current communication will be discussed and ideas will be proposed to help improve. There are many challenges in this industry due to the extensive range of audience from the elderly to the young and the fit and healthy to extremely ill patients. Promoting a means of enhanced...
The volume of fraudulent activity is increasing rapidly, with individuals and organisations being at great risk. This paper inspects the various types of fraud and the use of current systems involved in the detection of fraudulent activities across various business sectors. Through research and comparison of existing systems, this paper aims to develop a new fraud detection system which can be used...
The reliance on critical infrastructures, which are heavily interconnected, is one of society's greatest weaknesses. An individual failure has the potential to have a huge impact on society and affect other infrastructures. Predicting the effects of a cascading failure is a challenge. In this paper, a simulation of a virtual city is presented in order to visualise the effects of a cascading failure...
Cloud computing usage is growing, and soon the vast majority of organisations will rely on some form of cloud computing services. Cloud computing is being adopted in critical sectors such as energy, transport and finance. This makes cloud computing services critical in themselves. When cyber-attacks and cyber disruptions happen, millions of users are affected. Infrastructure vendors will inevitably...
Cloud computing usage is growing, and soon the vast majority of organisations will rely on some form of cloud computing services. Cloud computing is being adopted in critical sectors such as energy, transport and finance. This makes cloud computing services critical in themselves. When cyber-attacks and cyber disruptions happen, millions of users are affected. Infrastructure vendors will inevitably...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.