A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Novel Cyber-Security Framework Leveraging Programmable Capabilities in Digital Services
2020
Zenodo
In this paper, we briefly review the main characteristics of emerging digital services, point out open cyber-security challenges, and discuss the need to include cyber-security programmable capabilities ...
We also describe a novel framework for managing such functions and implement multiple security services for complex business chains. ...
Leveraging security capabilities in digital services A new breed of cyber-security paradigms is therefore needed to protect digital services along the different dimensions. ...
doi:10.5281/zenodo.4267986
fatcat:hwxoa2q475gbxadttu5tz3l3ru
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems
2020
IEEE Transactions on Network and Service Management
In "Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning," Sivanathan et al. ...
[item 4) in the Appendix] describe a monitoring solution using the SDN paradigm combined with machine learning methods, in order to leverage the benefits of programmable flow-based telemetry with flexible ...
doi:10.1109/tnsm.2020.2972769
fatcat:lftjjawjb5enhmf2ohmlsqu5ja
A distributed cyber-security framework for heterogeneous environments
2018
Zenodo
Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments ...
programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. ...
This work was supported in part by the European Commission, under project Matilda (grant no. 761898). ...
doi:10.5281/zenodo.3699044
fatcat:pmuv54ydxvgvnhv22sb47ohqbu
IEEE Access Special Section: Cyber-Physical Systems
2019
IEEE Access
An enhancement resilience for a multi-agent framework for complex CPS is proposed in ''A distributed multi-agent framework for resilience enhancement in cyber-physical systems,'' by Januário et al. ...
In particular, a novel method for CPPS log analysis is proposed. ...
doi:10.1109/access.2019.2949898
fatcat:mejnm7golfc2xdm5r2x5ae2pza
D2.1 Vision, State of the Art and Requirements Analysis
2019
Zenodo
and demonstration use cases; (ii) to perform an analysis of the State of the Art and current market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework ...
, GUARD leverages standardized APIs and interfaces to build an open cyber-security framework. ...
Two-fold cyber-security dimension for digital business chains The two main dimensions in a business chain (i.e., services and data) are directly reflected in the same number of security aspects: service ...
doi:10.5281/zenodo.4268474
fatcat:vtvogbwapzdc7nn6vms2cvdjou
D2.1 Vision, State of the Art and Requirements Analysis
2019
Zenodo
and demonstration use cases; (ii) to perform an analysis of the State of the Art and current market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework ...
Two-fold cyber-security dimension for digital business chains The two main dimensions in a business chain (i.e., services and data) are directly reflected in the same number of security aspects: service ...
A new breed of cyber-security paradigms is therefore needed to protect digital services along the different dimensions. ...
doi:10.5281/zenodo.3564301
fatcat:lrb6r6zat5bk5oqwpwwlui3ztm
Towards Autonomous Security Assurance in 5G Infrastructures
2018
IEICE transactions on communications
In this paper, we outline a new paradigm towards autonomous security assurance in 5G infrastructures, leveraging service orchestration for semi-autonomous management and reaction, yet decoupling security ...
5G infrastructures will heavily rely on novel paradigms such as Network Function Virtualization and Service Function Chaining to build complex business chains involving multiple parties. ...
Acknowledgments This work was supported in part by the European Commission, under Grant Agreement no. 786922 (ASTRID Project). ...
doi:10.1587/transcom.2018nvi0001
fatcat:y35kz5po4raz3afb2uwyk3c2ky
Three Emerging Innovative Technologies Required for Cyber Operations to Execute Commander's Intent at Machine Speed
2020
Military Cyber Affairs
This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services." ...
Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. ...
These capabilities allow for a revolution in operations for the DODIN to be realized as a DoD Cyber Platform that delivers integrated network operations with visibility, agility, and security on a zero ...
doi:10.5038/2378-0789.4.2.1069
fatcat:6i7xw6awpbf7xdzm3iphuqtc2i
IT Risk and Resilience—Cybersecurity Response to COVID-19
2020
IT Professional Magazine
Cybersecurity professionals are urgently responding to increased cyber threats and their responses span the spectrum of information security and privacy management capabilities. ...
IT SECURITY DURING THE PANDEMIC CRISIS Pandemic events stress test IT systems, tactical security measures, and IT governance models causing strategic (long-term) disruption in the global digital fabric ...
doi:10.1109/mitp.2020.2988330
fatcat:mv3g6mkkvva6rj7tfa7gkzfunu
A Systematic Literature Review on the Cyber Security
2021
International Journal of Scientific Research and Management
The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties ...
Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. ...
Any cyber security framework will outline how to implement a five-step cyber security approach in detail. ...
doi:10.18535/ijsrm/v9i12.ec04
fatcat:bxrsidjhpngdxgllk5cpomoyxa
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains
2021
Journal of Network and Systems Management
In order to fill this gap, this work proposes a new methodological approach to design and implement heterogeneous security services for distributed systems that combine together digital resources and components ...
The framework is designed to support both existing and new security services, and focuses on three novel aspects: (i) full automation of the processes that manage the whole system, i.e., threat detection ...
Acknowledgements This work was framed in the context of the projects ASTRID and GUARD, which receive funding from the European Union's Horizon 2020 research and innovation programme under Grant Agreement ...
doi:10.1007/s10922-021-09607-7
fatcat:fyacmqb4nvaubmjaqxht3rg67y
Defense as a Service Cloud for Cyber-Physical Systems
2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing
In this paper, we present CyPhyCARD (Cooperative Autonomous Resilient Defense "CARD" platform for Cyber Physical Systems) as a resilient and secure defense cloud. ...
a moving target defense. ...
CyPhyCARD provides a distinct CPS security solution through its high situational awareness capability. ...
doi:10.4108/icst.collaboratecom.2011.247118
dblp:conf/colcom/AzabE11
fatcat:oaucgz457rdjroarroz7rn4aea
Leveraging Blockchain for Sustainability and Open Innovation: A Cyber-Resilient Approach toward EU Green Deal and UN Sustainable Development Goals
[chapter]
2020
Computer Security Threats [Working Title]
, and cyber-resilience, as well as to provide a higher operational efficiency in global partnerships. ...
SDGs are an urgent global call for action to provide a blueprint for shared prosperity in a sustainable world. ...
Leveraging Blockchain for Sustainability and Open Innovation: A Cyber-Resilient Approach… DOI: http://dx.doi.org/10.5772/intechopen.92371
Computer Security Threats
Leveraging Blockchain for Sustainability ...
doi:10.5772/intechopen.92371
fatcat:45vmchibonftlgo4ofxp7gdqiy
D8.1. Guidelines for Cybersecurity Training Programme across EU (Intermediate)
2020
Zenodo
The Cyber-MAR ecosystem analysis aims to identifying aspects related to the regulatory framework, initiatives, challenges and existing gaps in both, the cybersecurity and the maritime industries. ...
In addition, a stakeholder analysis is presented where three main stakeholder groups are identified: cybersecurity, shipping, and port. ...
Italy General Information Italy has a National Cybersecurity Authority, namely AgID176 -Agenzia per l'Italia Digitale (Digital Italy Agency), aiming to managing the implementation of the Italian Digital ...
doi:10.5281/zenodo.5036573
fatcat:g2tfoqug6zge7mdwwopozda43m
Cross-layer security framework for smart grid: Physical security layer
2014
IEEE PES Innovative Smart Grid Technologies, Europe
We advance a conceptual layering model of the smart grid and a high-level overview of a security framework, termed CyNetPhy, towards enabling cross-layer security of the smart grid. ...
We describe an attack scenario raising the emerging hardware Trojan threat in process control systems (PCSes) and its novel PSL resolution leveraging the model predictive control principles. ...
More specifically, we advance a novel approach leveraging the model predictive control principles to secure PCSes vulnerable to the hardware Trojan threat. ...
doi:10.1109/isgteurope.2014.7028963
fatcat:yb2v7gm5e5cfrlvxpek7jb6tye
« Previous
Showing results 1 — 15 out of 2,224 results