Filters








2,224 Hits in 5.7 sec

A Novel Cyber-Security Framework Leveraging Programmable Capabilities in Digital Services

Matteo Repetto, Alessandro Carrega, Armend Duzha
2020 Zenodo  
In this paper, we briefly review the main characteristics of emerging digital services, point out open cyber-security challenges, and discuss the need to include cyber-security programmable capabilities  ...  We also describe a novel framework for managing such functions and implement multiple security services for complex business chains.  ...  Leveraging security capabilities in digital services A new breed of cyber-security paradigms is therefore needed to protect digital services along the different dimensions.  ... 
doi:10.5281/zenodo.4267986 fatcat:hwxoa2q475gbxadttu5tz3l3ru

Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems

Remi Badonnel, Carol Fung, Qi Li, Sandra Scott-Hayward
2020 IEEE Transactions on Network and Service Management  
In "Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning," Sivanathan et al.  ...  [item 4) in the Appendix] describe a monitoring solution using the SDN paradigm combined with machine learning methods, in order to leverage the benefits of programmable flow-based telemetry with flexible  ... 
doi:10.1109/tnsm.2020.2972769 fatcat:lftjjawjb5enhmf2ohmlsqu5ja

A distributed cyber-security framework for heterogeneous environments

Raffaele Bolla, Paolo M. Comi, Matteo Repetto
2018 Zenodo  
Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments  ...  programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms.  ...  This work was supported in part by the European Commission, under project Matilda (grant no. 761898).  ... 
doi:10.5281/zenodo.3699044 fatcat:pmuv54ydxvgvnhv22sb47ohqbu

IEEE Access Special Section: Cyber-Physical Systems

Remigiusz Wisniewski, Grzegorz Benysek, Luis Gomes, Dariusz Kania, Theodore Simos, Mengchu Zhou
2019 IEEE Access  
An enhancement resilience for a multi-agent framework for complex CPS is proposed in ''A distributed multi-agent framework for resilience enhancement in cyber-physical systems,'' by Januário et al.  ...  In particular, a novel method for CPPS log analysis is proposed.  ... 
doi:10.1109/access.2019.2949898 fatcat:mejnm7golfc2xdm5r2x5ae2pza

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
and demonstration use cases; (ii) to perform an analysis of the State of the Art and current market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework  ...  , GUARD leverages standardized APIs and interfaces to build an open cyber-security framework.  ...  Two-fold cyber-security dimension for digital business chains The two main dimensions in a business chain (i.e., services and data) are directly reflected in the same number of security aspects: service  ... 
doi:10.5281/zenodo.4268474 fatcat:vtvogbwapzdc7nn6vms2cvdjou

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
and demonstration use cases; (ii) to perform an analysis of the State of the Art and current market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework  ...  Two-fold cyber-security dimension for digital business chains The two main dimensions in a business chain (i.e., services and data) are directly reflected in the same number of security aspects: service  ...  A new breed of cyber-security paradigms is therefore needed to protect digital services along the different dimensions.  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

Towards Autonomous Security Assurance in 5G Infrastructures

Stefan Covaci, Matteo Repetto, Fulvio Risso
2018 IEICE transactions on communications  
In this paper, we outline a new paradigm towards autonomous security assurance in 5G infrastructures, leveraging service orchestration for semi-autonomous management and reaction, yet decoupling security  ...  5G infrastructures will heavily rely on novel paradigms such as Network Function Virtualization and Service Function Chaining to build complex business chains involving multiple parties.  ...  Acknowledgments This work was supported in part by the European Commission, under Grant Agreement no. 786922 (ASTRID Project).  ... 
doi:10.1587/transcom.2018nvi0001 fatcat:y35kz5po4raz3afb2uwyk3c2ky

Three Emerging Innovative Technologies Required for Cyber Operations to Execute Commander's Intent at Machine Speed

Andrew Stewart
2020 Military Cyber Affairs  
This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services."  ...  Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information.  ...  These capabilities allow for a revolution in operations for the DODIN to be realized as a DoD Cyber Platform that delivers integrated network operations with visibility, agility, and security on a zero  ... 
doi:10.5038/2378-0789.4.2.1069 fatcat:6i7xw6awpbf7xdzm3iphuqtc2i

IT Risk and Resilience—Cybersecurity Response to COVID-19

Tim Weil, San Murugesan
2020 IT Professional Magazine  
Cybersecurity professionals are urgently responding to increased cyber threats and their responses span the spectrum of information security and privacy management capabilities.  ...  IT SECURITY DURING THE PANDEMIC CRISIS Pandemic events stress test IT systems, tactical security measures, and IT governance models causing strategic (long-term) disruption in the global digital fabric  ... 
doi:10.1109/mitp.2020.2988330 fatcat:mv3g6mkkvva6rj7tfa7gkzfunu

A Systematic Literature Review on the Cyber Security

Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal
2021 International Journal of Scientific Research and Management  
The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties  ...  Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  ...  Any cyber security framework will outline how to implement a five-step cyber security approach in detail.  ... 
doi:10.18535/ijsrm/v9i12.ec04 fatcat:bxrsidjhpngdxgllk5cpomoyxa

An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains

Matteo Repetto, Domenico Striccoli, Giuseppe Piro, Alessandro Carrega, Gennaro Boggia, Raffaele Bolla
2021 Journal of Network and Systems Management  
In order to fill this gap, this work proposes a new methodological approach to design and implement heterogeneous security services for distributed systems that combine together digital resources and components  ...  The framework is designed to support both existing and new security services, and focuses on three novel aspects: (i) full automation of the processes that manage the whole system, i.e., threat detection  ...  Acknowledgements This work was framed in the context of the projects ASTRID and GUARD, which receive funding from the European Union's Horizon 2020 research and innovation programme under Grant Agreement  ... 
doi:10.1007/s10922-021-09607-7 fatcat:fyacmqb4nvaubmjaqxht3rg67y

Defense as a Service Cloud for Cyber-Physical Systems

Mohamed Azab, Mohamed Eltoweissy
2011 Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing  
In this paper, we present CyPhyCARD (Cooperative Autonomous Resilient Defense "CARD" platform for Cyber Physical Systems) as a resilient and secure defense cloud.  ...  a moving target defense.  ...  CyPhyCARD provides a distinct CPS security solution through its high situational awareness capability.  ... 
doi:10.4108/icst.collaboratecom.2011.247118 dblp:conf/colcom/AzabE11 fatcat:oaucgz457rdjroarroz7rn4aea

Leveraging Blockchain for Sustainability and Open Innovation: A Cyber-Resilient Approach toward EU Green Deal and UN Sustainable Development Goals [chapter]

Paula Fraga-Lamas, Tiago M. Fernández-Caramés
2020 Computer Security Threats [Working Title]  
, and cyber-resilience, as well as to provide a higher operational efficiency in global partnerships.  ...  SDGs are an urgent global call for action to provide a blueprint for shared prosperity in a sustainable world.  ...  Leveraging Blockchain for Sustainability and Open Innovation: A Cyber-Resilient Approach… DOI: http://dx.doi.org/10.5772/intechopen.92371 Computer Security Threats Leveraging Blockchain for Sustainability  ... 
doi:10.5772/intechopen.92371 fatcat:45vmchibonftlgo4ofxp7gdqiy

D8.1. Guidelines for Cybersecurity Training Programme across EU (Intermediate)

Gustavo González-Granadillo
2020 Zenodo  
The Cyber-MAR ecosystem analysis aims to identifying aspects related to the regulatory framework, initiatives, challenges and existing gaps in both, the cybersecurity and the maritime industries.  ...  In addition, a stakeholder analysis is presented where three main stakeholder groups are identified: cybersecurity, shipping, and port.  ...  Italy General Information Italy has a National Cybersecurity Authority, namely AgID176 -Agenzia per l'Italia Digitale (Digital Italy Agency), aiming to managing the implementation of the Italian Digital  ... 
doi:10.5281/zenodo.5036573 fatcat:g2tfoqug6zge7mdwwopozda43m

Cross-layer security framework for smart grid: Physical security layer

Mohammed M. Farag, Mohamed Azab, Bassem Mokhtar
2014 IEEE PES Innovative Smart Grid Technologies, Europe  
We advance a conceptual layering model of the smart grid and a high-level overview of a security framework, termed CyNetPhy, towards enabling cross-layer security of the smart grid.  ...  We describe an attack scenario raising the emerging hardware Trojan threat in process control systems (PCSes) and its novel PSL resolution leveraging the model predictive control principles.  ...  More specifically, we advance a novel approach leveraging the model predictive control principles to secure PCSes vulnerable to the hardware Trojan threat.  ... 
doi:10.1109/isgteurope.2014.7028963 fatcat:yb2v7gm5e5cfrlvxpek7jb6tye
« Previous Showing results 1 — 15 out of 2,224 results