Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Sophisticated cyber attacks by state-sponsored and criminal actors continue to plague government and industrial infrastructure. Intuitively, partitioning cyber systems into survivable, intrusion tolerant compartments is a good idea. This prevents witting and unwitting insiders from moving laterally and reaching back to their command and control (C2) servers. However, there is a lack of artifacts that...
Cyber attacks are a critical threat to government infrastructure, commercial enterprises and personal devices. When belligerents attack cyber systems, they need to spread laterally to reach high value targets and communicate with their command and control sites. Intuitively, a layered defense including intrusion detection systems will limit the adversary's exploitation of the target. We apply lessons...
Security challenges in cloud environments remain largely catastrophic due to the nature of the cloud; complex, heterogeneous, widely accessible over the internet, and virtualised resource sharing. Static and boundary-based conventional security approaches are clearly not effective as the sole countermeasures. Instead, countermeasures need to be intelligent with a high degree of autonomous, self-managing...
Fake identities and identity theft are issues whose relevance is increasing in the social network domain. This paper deals with this problem by proposing an innovative approach which combines a collaborative mechanism implementing a trust graph with keystroke-dynamic-recognition techniques to trust identities. The trust of each node is computed on the basis of neighborhood recognition and behavioral...
Recently, flexible networks contain various services designed and implemented by different vendors to accomplish specific tasks. Trust to security systems of such services is a significant challenge. In this paper, we propose a framework to assess trust to security systems of web services based on security policy specifications and security mechanisms running on flexible networks. The framework may...
The concept of Internet of Things (IoT) which lately was perceived as emerging paradigm is now becoming an important field for innovation-based companies who are developing and deploying solutions tailored to their clients' needs. Despite the fact that there were numerous IoT models which were proposed in research papers, many of them were lacking practical architecture examples and empirical studies...
Based on the financial security index calculated in the method of principal component analysis, this paper applies the model of BP neural network to test the result and then puts forward the early warning of Chinese financial security position in the future. In addition, the article gives some following suggestions for the early warning of financial risks: we shall reform the current financial regulation...
Biofuel is one of the best alternative solutions to fulfill the fuel demand, due to the increasing of energy needs and the limited reserve of fossil fuel. Biodiesel, a liquid biofuel and derived from biomass, is produced from vegetable oil, animal fat and other sources to replace diesel oil. Indonesia has been producing biodiesel from vegetable oil, such as Crude Palm Oil (CPO). Because most of Biodiesel...
Large-scale infrastructures are critical to economic and social development, and hence their continued performance and security are of high national importance. Such an infrastructure often is a system of systems, and its functionality critically depends on the inherent robustness of its constituent systems and its defense strategy for countering attacks. Additionally, interdependencies between the...
Improved understanding of the interfaces between travel choices and the consequential energy, health and security impacts would support the development of policies that deliver positive benefits across the sectors. This would represent a step change from the common sectoral based approach, whereby positive impacts for one sector may be negated by dis-benefits in another. This concept paper presents...
Scholars and industrial professionals are committed to integrating traditional financial economics models and machine learning models to improve the prediction model for stock prices, which is still a challenging topic. However, there is few acceptable results reported. This study proposes a two-stage multi-view prediction method that provides a new integration perspective for the integration of finance...
The exploitation of multi-terminal (MT) HVDC (High Voltage Direct Current) grids for offshore wind farm integration into continental bulk AC system raises several technical issues, in particular the verification of the compliance of MTDC grids and offshore wind parks to the performance requirements (in terms of frequency, voltage support and fault ride through) which are being established by the grid...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
The OPTIMATE prototype is a tool developed to perform simulations involving multiple market areas and market rules. The platform models the sequence of actions taken by Transmission System Operators, Market Players and Power Exchanges from day-ahead to real-time. The purpose of the present paper is first, to present the most recent developments of the platform regarding reserve management strategies;...
The idea of employees leveraging their personal mobile devices for their work (Bring Your Own Device, or BYOD) is becoming increasingly popular in recent years. As BYOD users will use various digital goods (such as cloud services and mobile software) for their work and personal purposes via the same mobile devices, it brings serious security risks into both the cloud and mobile devices. Generally,...
The ability for IBM researchers and development teams to take an idea or business opportunity and quickly solution it by requesting resources from a self-service cloud portal or an application-programming interface, API, has drastically changed how IBM Research procures information technology resources. In this poster, we'll present a brief history, the current IBM Research Hybrid cloud and our analysis...
This brief paper reports on an early stage ongoing PhD project in the field of cyber-physical security in health care critical infrastructures. The research overall aims to develop a methodology that will increase the ability of secure recovery of health critical infrastructures. This ambitious or reckless attempt, as it is currently at an early stage, in this paper, tries to answer why cyber-physical...
The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business...
Security is one of the biggest challenges facing organisations in the modern hyper-connected world. A number of theoretical security models are available that provide best practice security guidelines and are widely utilised as a basis to identify and operationalise security requirements. Such models often capture high-level security concepts (e.g., whitelisting, secure configurations, wireless access...
In this short position paper I consider the contributions that software engineering as a discipline can make to the development and implementation of government policy. It is intended to support the growing body of knowledge on scientific advice in government and to encourage software engineers to engage with policy and the policy community.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.