Filters








234,116 Hits in 3.4 sec

Network Coding for Critical Infrastructure Networks [article]

Rakesh Kumar, Vignesh Babu, David M. Nicol
2018 arXiv   pre-print
The applications in the critical infrastructure systems pose simultaneous resilience and performance requirements to the underlying computer network.  ...  However, with the advent of programmable data-planes, it is now possible to use linear network coding (NC) at the intermediate network nodes (i.e. hardware and software switches) to meet resilience requirements  ...  When such failures are addressed reactively, they result in prohibitively large restoration time for critical infrastructure applications [18] [1] .  ... 
arXiv:1809.09487v1 fatcat:54k3jcdmofckvfusarked5xpqy

Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure

Ibitoye Akinfola Akinrinnola, Aremu Idris Abiodun, Odesanya Oluwafunsho Idowu
2021 Mathematics and Computer Science  
In this paper, I have proposed a Network Traffic Analyzer that will analyze source codes of web based critical infrastructures and detect vulnerability in the codes for better security from attacks.  ...  Critical information infrastructure protection (CIIP) had become a lingering area of interest in the modern days of information dissemination, from the inauguration of internet to the modern elevated-profile  ...  the vulnerabilities of and threats to their information infrastructure, and have proposed measures for the protection of those assets Critical Infrastructure Protection (CIP)/Critical Information Infrastructure  ... 
doi:10.11648/j.mcs.20210605.11 fatcat:ypxfe556qfdaljqcizhbjx4laa

Risk-Based Criticality Assessment for Smart Critical Infrastructures

Abdulaziz Almaleh, David Tipper
2021 Infrastructures  
This article introduces a holistic approach using network indicators and machine learning to better understand the geographical representation of critical infrastructure.  ...  Today, critical infrastructure is more interconnected, which allows more vulnerabilities in the case of disasters.  ...  One example of the results after modeling the network for one zip code is shown in Figure 4 , which uses 29 nodes from 4 different infrastructures.  ... 
doi:10.3390/infrastructures7010003 fatcat:5ypbrievznbt5lduetn22hljga

Mapping eResearch Ecosystems: the international situation is intensifying! [article]

Mark Dietrich
2019 Figshare  
Researcher Partnering with Science Data, Methods, Models, Code Research Platforms, Virtual Labs, Scientific Gateways Storage Infrastructure Network Infrastructure Compute Infrastructure  ...  Models, Code Research Platforms, Virtual Labs, Scientific Gateways Storage Infrastructure Network Infrastructure Compute Infrastructure Research Artifact Management Advice, Support, Training  ...  use of collaborative test/validate platforms ○ Provide the right environments for more packaged codes/tools ■ Hardware/OS/containers/etc. ➢ Link expertise to Compute Infrastructure to enable supercharged  ... 
doi:10.6084/m9.figshare.8066942 fatcat:k2bbmy2r5zhabbvap2o5kc4t6e

Feasibility Study on Disaster Management with Hybrid Network of LTE and Satellite Links [article]

Julius Sechang Mboli
2016 arXiv   pre-print
It is on this ground that this work deals with the integration of LTE and satellite networks in both infrastructure-based and infrastructure-less topologies for PPDR purpose.  ...  especially in critical rescue missions.  ...  This kind of network is good but cannot still be sufficient by itself for critical scenarios.  ... 
arXiv:1609.02375v1 fatcat:pstyh7ycd5aftmt5svlwuqnlpy

An Innovative Cyber Security based Approach for National Infrastructure Resiliency for Sultanate of Oman

Badar Mohammed Al Mughairi, Haitham Hilal Al Hajri, Asif Mahbub Karim, Mohammad Imtiaz Hossain
2019 International Journal of Academic Research in Business and Social Sciences  
This paper proposes an innovative Cyber Security based approach for National Infrastructure Resiliency for Sultanate of Oman which can be used as a framework of initiating National Cyber Security Centre  ...  Critical National Infrastructure (CNI) within Oman is becoming Inter-independent to each other, aiming to provide unified and faultless services from the perspective of economics, quality, and governance  ...  For that, the collaboration and national monitoring firm for the national infrastructure come into the picture.  ... 
doi:10.6007/ijarbss/v9-i3/5780 fatcat:we2y5wktrbfkzjfz3yeglzpc6m

Modelling of multi-sectoral critical infrastructure interdependencies for vulnerability analysis

Jiwei Lin, Tso-Chien Pan
2022 Disaster Prevention and Resilience  
of the critical infrastructures.  ...  Critical infrastructure such as the transportation, power generation, water supply, telecommunications, security and health services/systems, etc. are essential for providing a reliable flow of goods and  ...  Acknowledgments The authors wish to thank the anonymous reviewers for their constructive comments and valuable suggestions.  ... 
doi:10.20517/dpr.2021.05 fatcat:druzzfi4zrg43c3c547xbwc5gq

Open-Source Operational Risk: Should Public Blockchains Serve as Financial Market Infrastructures? [chapter]

Angela Walch
2018 Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2  
Unaccountable power is a bad fit for financial market infrastructures, or for other critical public systems.  ...  This risk is problematic for any public blockchain that serves as the backbone of financial market infrastructure (or any other critically important public system).  ... 
doi:10.1016/b978-0-12-812282-2.00011-5 fatcat:g7xrewh4tnexdldivktynogfua

Authenticated encryption for time-sensitive critical infrastructure

Daniel Hunter, Jack Parry, Kenneth Radke, Colin Fidge
2017 Proceedings of the Australasian Computer Science Week Multiconference on - ACSW '17  
Indeed, some international standards for critical infrastructure systems explicitly recommend against using encryption.  ...  Encryption is the primary tool for protecting information security, but cyber-physical systems that interact directly with critical infrastructure, in applications such as power, water and transport, typically  ...  Acknowledgments This research was funded in part by ARC Linkage Project LP120200246, Practical Cyber Security for Next Generation Power Transmission Networks.  ... 
doi:10.1145/3014812.3014832 dblp:conf/acsw/HunterPRF17 fatcat:xbh45pokxjhlfe72ziydlozvya

Autonomic Critical Infrastructure Protection (ACIP) system

Bilal Al Baalbaki, Youssif Al-Nashif, Salim Hariri, Douglas Kelly
2013 2013 ACS International Conference on Computer Systems and Applications (AICCSA)  
The trend toward operating the grid over IP networks using open standard protocols, and the growing number of attacks targeting critical infrastructure made the security of SCADA systems an important research  ...  tasks of critical infrastructure control systems with a little or no involvement from the users or administrators.  ...  Fig. 1 1 Fig. 1 Autonomic Critical Infrastructure Protection Architecture  ... 
doi:10.1109/aiccsa.2013.6616494 dblp:conf/aiccsa/BaalbakiAHK13 fatcat:p3dakghufzbaxmyhjjmvqyzsmi

Using the Oldest Military Force for the Newest National Defense

Brian Claus, Robin Gandhi, Julia Rawnsley, John Crowe
2015 Journal of Strategic Security  
in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned.  ...  The National Guard forces can be activated for federal service under Title 10 US code or to perform state service under Title 32 US code.  ...  Governance Compliance standards and regulations for critical infrastructure providers are necessary for effective cyber defense. 4.a.  ... 
doi:10.5038/1944-0472.8.4.1441 fatcat:7kekm33bcfay5nbd2lr6l3u53i

Zero day exploits and national readiness for cyber-warfare

A.E. Ibor
2018 Nigerian Journal of Technology  
The paper also adopts the defence-in-depth strategy for national readiness and a foolproof system that enforces the security of critical national infrastructure at all levels.  ...  Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase.  ...  THE CYBERSPACE AND NATIONAL CRITICAL INFRASTRUCTURE The cyberspace is a community of connections in which networks interact across distances to allow for the sharing of data, information and programs.  ... 
doi:10.4314/njt.v36i4.26 fatcat:p7wqsuyfefhdlpvagznymu2uca

MAlSim - Mobile Agent Malware Simulator

Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera
2008 Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems  
of security threats to critical networked infrastructures.  ...  Our Action: Security of Critical Networked Infrastructures (SCNI) aims at facilitating the description, assessment and governance from the security point of view of critical networked infrastructures,  ...  Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures.  ... 
doi:10.4108/icst.simutools2008.2942 dblp:conf/simutools/LeszczynaFM08 fatcat:tn7mjdn2irb2pcstnphfiivgru

Towards a Safe and Secure Internet of Things Critical Infrastructure

Maha Alqallaf
2021 Zenodo  
Abstract—The IoT also have many applications in commercial sectors, such as environmental monitoring, infrastructure management, smart buildings, and smart cities.  ...  of novel hardware-based secure authentication schemes for IoT devices; and (4) design of light-weight secure communication protocols for IoT devices.  ...  In this paper, we present challenges and some effective, efficient security techniques for protecting industrial IoTs and IoT critical infrastructures. II.  ... 
doi:10.5281/zenodo.4577525 fatcat:gjhzrn7tszgs5fxdjuwjkzngeq

Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities

Vladimir Sklyar
2012 Information & Security An International Journal  
Presently, critical infrastructure sectors face various cyber threats. In particular, the electrical power infrastructure is the most critical infrastructure upon which other infrastructures depend.  ...  Critical infrastructure protection policy has evolved since the mid-1990's. Since 11 September 2001, the critical link between cyberspace and physical space has been increasingly recognized.  ...  All of these critical infrastructures increasingly rely on computers and networks for their operations. 2 The objective of cyber security includes protection of information and property from theft, corruption  ... 
doi:10.11610/isij.2808 fatcat:dvxbtat5k5fwthm7s5z5pb4pwu
« Previous Showing results 1 — 15 out of 234,116 results