Filters








4,544 Hits in 3.7 sec

Fuzzy logic based anomaly detection for embedded network security cyber sensor

Ondrej Linda, Milos Manic, Todd Vollmer, Jason Wright
2011 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)  
This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation.  ...  This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors.  ...  The Tofino platform consists of an Arcom Vulcan single board computer. The main processor is an Intel IXP425 XScale processor running at 533MHz with 64MB of DRAM and 32MB of flash memory.  ... 
doi:10.1109/cicybs.2011.5949392 dblp:conf/cics/LindaMVW11 fatcat:3kdkwddk45bupeilwvx26f7334

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles

Tuan Phan Vuong, George Loukas, Diane Gan, Anatolij Bezemskij
2015 2015 IEEE International Workshop on Information Forensics and Security (WIFS)  
This is a challenge because intrusion detection systems built for conventional computer systems tend to be unsuitable.  ...  As the system is resource-restricted, we have opted for a decision tree-based approach for generating simple detection rules, which we evaluate against denial of service and command injection attacks.  ...  It is a four-wheel-drive robot controlled via an on-board Intel Atom computer running the Linux operating system. An Arduino micro-controller is responsible for driving the robots motors.  ... 
doi:10.1109/wifs.2015.7368559 dblp:conf/wifs/VuongLGB15 fatcat:2aa7uh3ao5fzno3ngtic2ddypu

Cyber-physical codesign of distributed structural health monitoring with wireless sensor networks

Gregory Hackmann, Weijun Guo, Guirong Yan, Chenyang Lu, Shirley Dyke
2010 Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems - ICCPS '10  
Our deteriorating civil infrastructure faces the critical challenge of long-term structural health monitoring for damage detection and localization.  ...  In contrast to existing research that often separates the designs of wireless sensor networks and structural engineering algorithms, this paper proposes a cyber-physical co-design approach to structural  ...  Spencer and Shin Ae Jang for their help with our experiments related to the truss.  ... 
doi:10.1145/1795194.1795211 dblp:conf/iccps/HackmannGYLD10 fatcat:ycyguvtzw5ddffzodplumovn2e

Cyber-Physical Codesign of Distributed Structural Health Monitoring with Wireless Sensor Networks

Gregory Hackmann, Weijun Guo, Guirong Yan, Zhuoxiong Sun, Chenyang Lu, Shirley Dyke
2014 IEEE Transactions on Parallel and Distributed Systems  
Our deteriorating civil infrastructure faces the critical challenge of long-term structural health monitoring for damage detection and localization.  ...  In contrast to existing research that often separates the designs of wireless sensor networks and structural engineering algorithms, this paper proposes a cyber-physical co-design approach to structural  ...  Spencer and Shin Ae Jang for their help with our experiments related to the truss.  ... 
doi:10.1109/tpds.2013.30 fatcat:rynjtswykra43c2irlyvkojif4

The AXIOM project (Agile, eXtensible, fast I/O Module)

Dimitris Theodoropoulos, Dionisis Pnevmatikatos, Carlos Alvarez, Eduard Ayguade, Javier Bueno, Antonio Filgueras, Daniel Jimenez-Gonzalez, Xavier Martorell, Nacho Navarro, Carlos Segura, Carles Fernandez, David Oro (+4 others)
2015 2015 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)  
The AXIOM project (Agile, eXtensible, fast I/O Module) aims at researching new software/hardware architectures for the future Cyber-Physical Systems (CPSs).  ...  Current solutions for providing enough computational power are mainly based on multi-or many-core architectures.  ...  We also thank the Xilinx University Program for its hardware and software donations.  ... 
doi:10.1109/samos.2015.7363684 dblp:conf/samos/TheodoropoulosP15 fatcat:rhj5wzl6rzdwdn7nzbfk22sls4

Performance evaluation of secure industrial control system design: A railway control system case study

Xenofon Koutsoukos, Himanshu Neema, Goncalo Martins, Sajal Bhatia, Janos Sztipanovits, Keith Stouffer, Chee Yee Tang, Richard Candell
2016 2016 Resilience Week (RWS)  
and physical components and their interactions, as well as operational scenarios that can be used for evaluations of cybersecurity risks and mitigation measures and (2) Evaluation of performance impact  ...  Due to the integral role of the networking infrastructure, such systems are vulnerable to cyber attacks.  ...  (Linux kernel 2.6.24-24-rt); • Platform B: Single board unit (Trimslice2) with a CPU based on the NVIDIA Tegra2 SoC -a dual core 1 GHz ARM Cortex-A9 CPU with 1 GB of RAM, and an operating system based  ... 
doi:10.1109/rweek.2016.7573315 fatcat:gdhsvcqmwrcgldz4t5pr7veuri

Automated Analysis of Underground Marketplaces [chapter]

Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar Weippl
2014 IFIP Advances in Information and Communication Technology  
Cyber criminals usually attack Internet services to steal sensitive data and operate in crowded online underground marketplaces.  ...  Cyber crime, such as theft of credentials or credit card fraud has emerged as a new type of crime in recent years.  ...  In addition to IRC channels, cyber criminals often operate underground market-places on websites that contain forums and message boards.  ... 
doi:10.1007/978-3-662-44952-3_3 fatcat:fbdtqhyuebd4xh2rqxzkrperjq

The AXIOM software layers

Carlos Álvarez, Eduard Ayguadé, Jaume Bosch, Javier Bueno, Artem Cherkashin, Antonio Filgueras, Daniel Jiménez-González, Xavier Martorell, Nacho Navarro, Miquel Vidal, Dimitris Theodoropoulos, Dionisios N. Pnevmatikatos (+13 others)
2016 Microprocessors and microsystems  
People and objects will soon share the same digital network for information exchange in a world named as the age of the cyber-physical systems.  ...  To this aim, an innovative ARM and FPGA-based board will be designed, with enhanced capabilities for interfacing with the physical world.  ...  His research interests cover the areas of operating systems, runtime systems, compilers and applications for high-performance multiprocessor systems. Dr.  ... 
doi:10.1016/j.micpro.2016.07.002 fatcat:asg7sun5rvesjmkvnp5h5xad6a

Reconfiguration protocols for embedded agents in wireless control networks

Mohammed S. Taboun, Robert W. Brennan
2019 Procedia Manufacturing  
This work is motivated by the need for cyber-physical systems for advanced manufacturing that are capable of quickly responding to change while maintaining stable and efficient operation.  ...  This work is motivated by the need for cyber-physical systems for advanced manufacturing that are capable of quickly responding to change while maintaining stable and efficient operation.  ...  Acknowledgements The authors wish to thank the Natural Sciences and Engineering Research Council of Canada, Spartan Controls, and the Suncor Energy Foundation for their generous support of this research  ... 
doi:10.1016/j.promfg.2020.01.074 fatcat:mj6ritxjpfc5fpnlf4lon6tz6y

The AXIOM platform for next-generation cyber physical systems

Dimitris Theodoropoulos, Somnath Mazumdar, Eduard Ayguade, Nicola Bettin, Javier Bueno, Sara Ermini, Antonio Filgueras, Daniel Jiménez-González, Carlos Álvarez Martínez, Xavier Martorell, Francesco Montefoschi, David Oro (+7 others)
2017 Microprocessors and microsystems  
so that the performance can scale-up by adding multiple boards.  ...  Cyber-Physical Systems (CPSs) are widely used in many applications that require interactions between humans and their physical environment.  ...  In 2011, he joined the Computer Architecture and VLSI Systems group at the Foundation for Research and Technology -Hellas (FORTH) in Greece, where he is working as a post-doc researcher for national and  ... 
doi:10.1016/j.micpro.2017.05.018 fatcat:kry4k47ovzckhe26tvqvfucriq

Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning

George Loukas, Tuan Vuong, Ryan Heartfield, Georgia Sakellari, Yongpil Yoon, Diane Gan
2018 IEEE Access  
We argue that this limitation can be lifted with computational offloading commonly used for resource-constrained mobile devices.  ...  We employ denial of service, command injection and malware as examples of cyber attacks that are meaningful for a robotic vehicle.  ...  Testbed: Robotic Vehicle The testbed we have developed for the experimental evaluation is a 40 cm long remote-controlled 4x4 robotic vehicle, with an on-board computer based on a dual-core Intel Atom D525  ... 
doi:10.1109/access.2017.2782159 fatcat:njik42b4qfflta7tupl3y37xnq

CYBER SECURITY FRAMEWORK FOR NIGERIAN CIVIL AVIATION AUTHORITY, HEADQUARTERS

Roger-Nick Anaedevha, Aminat Ajibola
2020 International Journal of Advances in Scientific Research and Engineering  
Thereafter, the RNA Cyber Security Framework (RNA-CSF) is conceptually developed, analyzed and proposed for NCAA and for any other organization that has the need to use it.  ...  Cybersecurity, information security, and computer security are further attempts of man to continue the same ancient practice.  ...  However, the result is accepted because no single algorithm always performed the best for each dataset [17] especially experimental level.  ... 
doi:10.31695/ijasre.2020.33695 fatcat:hexk2m376jbk5i5u4ffeygrxlm

Lightweight bioinformatics: evaluating the utility of Single Board Computer (SBC) clusters for portable, scalable Real-Time Bioinformatics in fieldwork environments via benchmarking [article]

Joe Parker
2018 bioRxiv   pre-print
Single board computers (SBCs), such as the Raspberry Pi, offer a potential solution to this problem: while less powerful than their laptop cousins, their very individual low cost and power consumption  ...  At present, field-based analyses of genomic data, despite advances in computing technology, remain problematic; laptop computers are relatively expensive and limited in scalability, while cloud- and cluster-based  ...  Brantly (2016) Evaluating Single Board Computer Clusters for Cyber Operations. 2016 INTERNATIONAL CONFERENCE ON 250 CYBER CONFLICT (CYCONUS) 252 Michael, T.P., et al. (2017).  ... 
doi:10.1101/337212 fatcat:oxamhimbwverpk4ezldty5mphy

Considerations for Planning a Multi-Platform Energy Utility System

Yahav Biran, Joel Dubow, Sudeep Pasricha, George Collins, John M. Borky
2017 Energy and Power Engineering  
It uses a federated architecture to provide a group sourced increase in cyber security, in reducing the need for computing resource overcapacity, for sharing computing and power resources during emergencies  ...  Control Plane: This is the software that automatically controls the operations of software-based systems.  ...  For simplicity, we use a single cloud provider, Google Container Engine, as it provides a multi-zone production-grade compute orchestration system.  ... 
doi:10.4236/epe.2017.912046 fatcat:ycdkwuk7lze2vpammt7oltknte

From Open CNC Systems to Cyber-Physical Machine Tools: A Case Study

Changyi Deng, Ruifeng Guo, Pai Zheng, Chao Liu, Xun Xu, Ray Y. Zhong
2018 Procedia CIRP  
The aim is to cluster these products in new assembly oriented product families for the optimization of existing assembly lines and the creation of future reconfigurable assembly systems.  ...  Abstract The aim of next-generation Computer Numerical Control (CNC) is shifting from an open architecture, which has better flexibility, adaptability, versatility and expansibility, to a cyber-physical  ...  The authors are also grateful to the researchers at the Industry 4.0 Laboratory for Smart Manufacturing Systems, the University of Auckland.  ... 
doi:10.1016/j.procir.2018.03.110 fatcat:2l4st7lmxfb6ljipzzjor6ca4a
« Previous Showing results 1 — 15 out of 4,544 results