Filters








56,104 Hits in 6.5 sec

Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture [chapter]

Pierluigi Assogna, Glauco Bertocchi, Antonio DiCarlo, Franco Milicchio, Alberto Paoluzzi, Giorgio Scorzelli, Michele Vicentino, Roberto Zollo
2009 Lecture Notes in Computer Science  
This paper describes a security platform as a complex system of holonic communities, that are hierarchically organized, but selfreconfigurable when some of them are detached or cannot otherwise operate  ...  The higher the organizational level of the holonic unit, the more complex and sophisticated each of its characteristic features.  ...  Accordingly, we introduce here an advanced architecture for protection of complex critical infrastructures.  ... 
doi:10.1007/978-3-642-03552-4_36 fatcat:wpfmgr4gifeh5csmmjkw2n2e4u

Enabling System of Systems Analysis of Critical Infrastructure Behaviors [chapter]

William J. Tolone, E. Wray Johnson, Seok-Won Lee, Wei-Ning Xiang, Lydia Marsh, Cody Yeager, Josh Blackwell
2009 Lecture Notes in Computer Science  
We contend that proper critical infrastructure analysis necessitates a system of systems approach.  ...  We also present our integrated modeling and simulation framework based on a serviceoriented architecture that enables system of systems analysis of such infrastructures.  ...  Critical infrastructure systems possess these characteristics as each infrastructure system is a highly complex collection of people, processes, technologies, and information.  ... 
doi:10.1007/978-3-642-03552-4_3 fatcat:eryjj2yk6vgota2hwhkvg64n6u

Editorial: security and reliability of critical systems

Massimo Ficco
2016 Journal of Ambient Intelligence and Humanized Computing  
In particular, critical infrastructures protection is a complex and delicate activity, which can impact human lives and material goods, threatened by both natural phenomena, as well as the consequences  ...  Authors show an extended analysis of services composing the decision support system for critical infrastructures protection.  ...  Hopefully, this special issue will bring forth advancements in science and technology and improve practices and applications as well, in the field of security and reliability of critical systems.  ... 
doi:10.1007/s12652-016-0348-5 fatcat:7sfzcubqnjdpfluey27iu76taa

An interoperable simulation framework for protecting port as critical infrastructures

Agostino Bruzzone, Francesco Longo, Alberto Tremori
2013 International Journal of System of Systems Engineering  
Due to the complexity of the Port system including several actors and infrastructures, the operations coordination is critical in order to face new asymmetric threats; so interoperable simulation combined  ...  Therefore the proposed framework is useful for the review, testing and certification of Ports Security Plans, Risk Assessments and Gaps Identification as well as for operators training.  ...  In effect a Port is a complex system involving a large number of entities dynamically interacting in an open environment 24 hours/day 365 days/year (i.e.  ... 
doi:10.1504/ijsse.2013.057661 fatcat:zqpado2syjgw3f5io4awrreb5e

D1.2 System Architecture Definition

Srdjan Skrbic
2021 Zenodo  
The specification of the architecture is based on a detailed analysis of reference architectures, state-of the- art literature review, end-user requirement analysis, as well as general non-functional requirements  ...  This deliverable provides a specification of the conceptual architecture of the COLLABS platform.  ...  These high-level objectives are detailed with KPIs that can be found in section 1.1.2 of the proposal and will be formalized for real success measurement in WP6.  ... 
doi:10.5281/zenodo.5347678 fatcat:4jr4tibrurasfnbl23huny3xkq

A Security Assessment Model for Electrical Power Grid SCADA System

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
However, it is quite difficult to plan, execute and review vulnerability analysis in critical infrastructure systems as well as in industrial control systems (such as SCADA system) due to its complexity  ...  Due to the wide application of SCADA systems in national critical infrastructure, their cyber security issues and vulnerabilities have been a primary concern; whereas, the impact and consequences of cyber-attacks  ...  This becomes great challenges in protecting national critical infrastructure.  ... 
doi:10.35940/ijitee.l1132.10812s219 fatcat:ycm7zatftzflrhe75qbbutw6ie

A hierarchical security architecture for cyber-physical systems

Quanyan Zhu, Craig Rieger, Tamer Basar
2011 2011 4th International Symposium on Resilient Control Systems  
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants.  ...  We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels.  ...  Multi-agent Layered Architecture Multi-agent systems provide richness in the architecture of ICSs.  ... 
doi:10.1109/isrcs.2011.6016081 fatcat:na7jjwj6wfd2dj7z3sklyimxki

Specialized system development

O. Eljabiri
2003 International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.  
The issue of security in contemporary software applications is a critical component for business survival. There is a need for protecting organizational strategic assets such as information.  ...  Infrastructure vulnerabilities: Weakness points and security gaps in the physical or logical architecture of information systems that may enhance opportunities to carry out attacks or steal critical information  ... 
doi:10.1109/itre.2003.1270587 fatcat:puqck3rnbzef5bpwfiwvj3sbh4

Specialized System Development [chapter]

2005 Strategic Software Engineering  
The issue of security in contemporary software applications is a critical component for business survival. There is a need for protecting organizational strategic assets such as information.  ...  Infrastructure vulnerabilities: Weakness points and security gaps in the physical or logical architecture of information systems that may enhance opportunities to carry out attacks or steal critical information  ... 
doi:10.1201/9781420031119.ch13 fatcat:6r6yzwqxbnb4pn7t4hblptac54

Cyber-physical system security for networked industrial processes

Shuang Huang, Chun-Jie Zhou, Shuang-Hua Yang, Yuan-Qing Qin
2015 International Journal of Automation and Computing  
To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment  ...  In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed.  ...  To evaluate the efficiency of the cyber-security protection architecture, a networked water level control system is investigated as a case study.  ... 
doi:10.1007/s11633-015-0923-9 fatcat:dzudgletdzhkhehunq6fm32bju

Multi-Agent Systems and Complex Networks: Review and Applications in Systems Engineering

Manuel Herrera, Marco Pérez-Hernández, Ajith Kumar Parlikad, Joaquín Izquierdo
2020 Processes  
This paper presents a review of how multi-agent systems and complex networks theory are brought together to address systems engineering and management problems.  ...  Critical and smart infrastructure, manufacturing processes, and supply chain networks are instances of research topics for which this literature review is highly relevant.  ...  From complexity science to reliability efficiency: A new way of looking at complex network systems and critical infrastructures. Int. J. Crit. Infrastruct. 2007, 3, 488-508. [CrossRef] 32.  ... 
doi:10.3390/pr8030312 fatcat:wexnsucz5jg3zjyln7vdekzffm

Implementing Intrusion Detection System for Multicore Processor

Rajeswari G., Nithya B.
2009 2009 International Conference on Advances in Recent Technologies in Communication and Computing  
The Intrusion Detection System that we Presented in this paper also protect the multi core systems from Real Time attacks and Packet Filtrations with high performance without any penalty.  ...  In this paper, we present new architecture for multi-core supported Intrusion Detection System, which aims at providing network security processing without causing performance penalty to normal network  ...  To fully utilize the potential of multi-core, this system architecture will use different level of parallelization such as instruction-level parallelization, memory parallelization, loop-level parallelization  ... 
doi:10.1109/artcom.2009.44 dblp:conf/artcom/RajeswariN09 fatcat:nbc6yirovvhizidphczu22e7ay

Architecting the next generation of service-based SCADA/DCS system of systems

Stamatis Karnouskos, Armando Walter Colombo
2011 IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society  
The rapid changes in the networked embedded systems and the way industrial applications are designed and implemented, call for a shift in the architectural paradigm.  ...  SCADA and DCS systems are in the heart of the modern industrial infrastructure.  ...  For this to work out, critical information need to be available at the right point in a timely manner at several levels.  ... 
doi:10.1109/iecon.2011.6119279 fatcat:rzuikjs4lrfe7grwguuyywzpka

An integrated modeling framework for infrastructure system-of-systems simulation

Paul T. Grogan, O. L. de Weck
2013 2013 IEEE International Systems Conference (SysCon)  
This paper presents a formal modeling framework as a first step to integrating infrastructure system models in a system-of-systems simulation addressing these concerns.  ...  Understanding these interdependencies is challenging due to high levels of integration in high-performance systems and their operation as a collaborative system-of-systems managed by multiple organizations  ...  ACKNOWLEDGMENT This work was supported by the Department of Defense (DoD) through a National Defense Science and Engineering Graduate (NDSEG) fellowship with additional support from the Center for Complex  ... 
doi:10.1109/syscon.2013.6549926 dblp:conf/syscon/GroganW13 fatcat:7hkvxtayhzdllawphgknzgp6am

Distributed security for multi-agent systems – review and applications

H.F. Rashvand, K. Salah, J.M.A. Calero, L. Harn
2010 IET Information Security  
systems.  ...  Service agents and distributed multi-agent systems (MAS) shown the potential to help with this move but lack of trust caused by heavily compromised security issues and concerns with the outof-date solutions  ...  A secure infrastructure then enables a protected system as well as protecting agents against malicious processes injected by factious agents.  ... 
doi:10.1049/iet-ifs.2010.0041 fatcat:44siypwv5vbornjc4j7nzawyqi
« Previous Showing results 1 — 15 out of 56,104 results