Filters








2,098 Hits in 6.8 sec

Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security

Michael Mylrea, Sri Nikhil Gupta Gourisetti
2017 2017 Resilience Week (RWS)  
This paper explores the application of blockchain and smart contracts to improve smart grid cyber resiliency and secure transactive energy applications.  ...  Blockchain may help solve several complex problems related to securing the integrity and trustworthiness of rapid, distributed, complex energy transactions and data exchanges.  ...  can't be modified retroactively; 9) Rapid detection of data anomalies may enhance the ability to detect and respond to cyber-attacks; 10) Helps align currently dispersed blockchain initiatives and facilitates  ... 
doi:10.1109/rweek.2017.8088642 fatcat:fydkzuakevfndevpvsoklzspay

Security and trust in the 6G era

Volker Ziegler, Peter Schneider, Harish Viswanathan, Michael Montag, Satish Kanugovi, Ali Rezaki
2021 IEEE Access  
They would also like to thank A. Hu for helping with the preparation of the manuscript.  ...  ACKNOWLEDGMENT The authors would like to thank a number of colleagues at Nokia Bell Labs with whom they had numerous discussions about security and trust for the 2030s.  ...  Building on cyber-resilience, it is commonly agreed that privacy-preserving technologies need to be enhanced in 6G. FIGURE 4.  ... 
doi:10.1109/access.2021.3120143 fatcat:g5iqzb224zbq3kmsjqph5ygz5a

Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering [article]

Alexander Kott, Ananthram Swami, Patrick McDaniel
2015 arXiv   pre-print
In this paper we point to an approach to answering this question.  ...  We illustrate each of the game-changers examples of related current research, and then offer recommendations for advancement of cyber science and engineering with respect to each of the six game-changers  ...  provenance; effectively copes with dynamic modification of network and data topology [7] .  ... 
arXiv:1511.00509v1 fatcat:kb22j5nicbge5adwbstfxroce4

Leveraging Blockchain for Sustainability and Open Innovation: A Cyber-Resilient Approach toward EU Green Deal and UN Sustainable Development Goals [chapter]

Paula Fraga-Lamas, Tiago M. Fernández-Caramés
2020 Computer Security Threats [Working Title]  
, and cyber-resilience, as well as to provide a higher operational efficiency in global partnerships.  ...  Finally, different open challenges and recommendations are enumerated with the aim of guiding all the stakeholders committed to the development of cyber-resilient and high-impact sustainable solutions.  ...  and Open Innovation: A Cyber-Resilient Approach… DOI: http://dx.doi.org/10.5772/intechopen.92371 Leveraging Blockchain for Sustainability and Open Innovation: A Cyber-Resilient Approach… DOI: http  ... 
doi:10.5772/intechopen.92371 fatcat:45vmchibonftlgo4ofxp7gdqiy

IEEE Access Special Section: Cyber-Physical Systems

Remigiusz Wisniewski, Grzegorz Benysek, Luis Gomes, Dariusz Kania, Theodore Simos, Mengchu Zhou
2019 IEEE Access  
An enhancement resilience for a multi-agent framework for complex CPS is proposed in ''A distributed multi-agent framework for resilience enhancement in cyber-physical systems,'' by Januário et al.  ...  It is proven that the proposed scheme satisfies the consumer-centric property to ensure the sustainable participations of the P2P trading market.  ... 
doi:10.1109/access.2019.2949898 fatcat:mejnm7golfc2xdm5r2x5ae2pza

Resilience in All: An Overview and Farewell [From the Editor]

Michael Henderson
2020 IEEE Power and Energy Magazine  
By developing a novel probabilistic risk-based framework to identify resilient network-enhancement options, they are able to differentiate resilience-focused from reliabilityfocused network enhancement  ...  Off line and Off- line and Off line Tools Proven line Tools line Tools Proven Proven line Tools line Tools for Power Grid Modeling, Analysis, Assessment, Enhancement and Optimization www.bigwood-systems.com  ... 
doi:10.1109/mpe.2020.2986661 fatcat:ju25lwn72jayjkogiwuzwdqhge

Jeremiah Thoronka Article 2.pdf

Jeremiah Thoronka
2021 figshare.com  
The trend of the fourth industrial revolution (4IR) has proven to be exponential, if compared to the three it precedes that took a linear approach.  ...  This laid the foundation for the fourth industrial revolution that leveraged the differences between the digital, physical, and biological ecosystem (Johnson, 2019).  ...  These systems will enhance more efficient energy grid and systems and with the implementation of an energy management intelligence system (EMIS), will help the sector to be a data-driven support sector  ... 
doi:10.6084/m9.figshare.14238035.v1 fatcat:ya7hpm6bvbakragzxcn42od6ni

AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enabler? [article]

C. Benzaid, T. Taleb
2022 arXiv   pre-print
patterns from a large set of time-varying multi-dimensional data, and deliver faster and accurate decisions.  ...  Artificial Intelligence (AI) is envisioned to play a pivotal role in empowering intelligent, adaptive and autonomous security management in 5G and beyond networks, thanks to its potential to uncover hidden  ...  The AI has proven its ability in uncovering hidden patterns from a large set of time-varying multi-dimensional data.  ... 
arXiv:2201.02730v1 fatcat:upuk2pjcfzag5bjs5woeiwkxe4

Assessing Cyberbiosecurity Vulnerabilities and Infrastructure Resilience

Daniel S. Schabacker, Leslie-Anne Levy, Nate J. Evans, Jennifer M. Fowler, Ellen A. Dickey
2019 Frontiers in Bioengineering and Biotechnology  
This approach proposes to integrate existing capabilities and proven methodologies from the infrastructure assessment realm (e.g., decision science, physical security, infrastructure resilience, cybersecurity  ...  In this paper, we outline the foundation of an assessment framework for cyberbiosecurity, accounting for both security and resilience factors in the physical and cyber domains.  ...  AUTHOR CONTRIBUTIONS DS conceived the manuscript and all authors have jointly contributed to the manuscript, with particular contribution of L-AL to the text on the cyberbiosecurity assessment framework  ... 
doi:10.3389/fbioe.2019.00061 pmid:31001526 pmcid:PMC6455068 fatcat:jzrqyborybgz7cbvybhxjxkifi

Big data analytics: a link between knowledge management capabilities and superior cyber protection

Peter Oluseyi Obitade
2019 Journal of Big Data  
Therefore, little is known about the way in which organizations are leveraging big data analytics functionalities to achieve greater protection from cyber intrusions.  ...  In particular, I develop a conceptual model of big data analytics-enabled (BDET) methodology and use this framework to examine how big data analytics enhances cybersecurity capabilities.  ...  Hadoop) to big data processing Davenport (2014) BDA4 We have explored or adopted different data visualization tools Davenport (2014)  ... 
doi:10.1186/s40537-019-0229-9 fatcat:vz2iuqo62nco3ou6lv72ccfi4y

Cybersecurity Risk Supervision

Tamas Gaidosch, Frank Adelmann, Anastasiia Morozova, Christopher Wilson
2019 Departmental Papers / Policy Papers  
an early stage of developing a supervisory approach to strengthen cyber resilience.  ...  Cyber risk often stems from malicious intent, and a successful cyber attack—unlike most other sources of risk—can shut down a supervised firm immediately and lead to systemwide disruptions and failures  ...  Simulated cyber attacks (called penetration tests) have been used by supervised firms for many years to find weaknesses in cyber defenses and using lessons learned to enhance security and resilience.  ... 
doi:10.5089/9781513507545.087 fatcat:yxdsbqykyvhopnecvhwmucp64a

Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language

Eoghan Casey, Sean Barnum, Ryan Griffith, Jonathan Snyder, Harm van Beek, Alex Nelson
2017 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Existing approaches to representing and exchanging cyber-investigation information are inadequate, particularly when combining data sources from numerous organizations or dealing with large amounts of  ...  This paper features a proof-of-concept implementation using the open source forensic framework named plaso to export data to CASE.  ...  Acknowledgements This work has been encouraged and supported by Steven Shirley and William Eber at DoD Cyber Crime Center, Barbara Guttman and Mary Laamanen at the National Institute of Standards and Technology  ... 
doi:10.1016/j.diin.2017.08.002 pmid:31579279 pmcid:PMC6774392 fatcat:eqax4roofrfa7ai4637y6mav5q

Lessons from the First Great Cyberwar Era

A.M. Rutkowski
2010 Info  
Excitement, euphoria, and innovation by geeks are followed by industry assimilation and exploitation which gives rise to pervasive public implementations, and then conflict among nations to maintain perceived  ...  Chaos and global cyber conflict then drives international cooperation and accommodations.  ...  While respecting the need to innovate, nations will impose obligations to use network protocols, techniques, and operating practices that promote interoperability.  Enhance infrastructure resilience and  ... 
doi:10.1108/14636691011015330 fatcat:gxx7aealn5bfbpwchqvrxlvgka

Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model

William Steingartner, Darko Galinec, Andrija Kozina
2021 Symmetry  
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods.  ...  The security industry has focused recent innovation on finding more accurate ways to recognize malicious activity with technologies such as user and entity behavioral analytics (UEBA), big data, artificial  ...  Any data about the methods or tools attackers leveraged to bypass security on a network decoy aids the analyst in identifying how a security control failed and to mitigate the risk of a returning adversary  ... 
doi:10.3390/sym13040597 fatcat:6thxnfbz4zf7jhi4lnenghqiqq

7 key challenges for visualization in cyber network defense

Daniel M. Best, Alex Endert, Daniel Kidwell
2014 Proceedings of the Eleventh Workshop on Visualization for Cyber Security - VizSec '14  
What does it take to be a successful visualization in cyber security?  ...  Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.  ...  This allows tracking of provenance and reduces context switching while leveraging the application.  ... 
doi:10.1145/2671491.2671497 dblp:conf/vizsec/BestEK14 fatcat:fdwifjkjyfhcjgi2z4adzqiyfe
« Previous Showing results 1 — 15 out of 2,098 results