A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Network Coding for Critical Infrastructure Networks
[article]
2018
arXiv
pre-print
The applications in the critical infrastructure systems pose simultaneous resilience and performance requirements to the underlying computer network. ...
However, with the advent of programmable data-planes, it is now possible to use linear network coding (NC) at the intermediate network nodes (i.e. hardware and software switches) to meet resilience requirements ...
When such failures are addressed reactively, they result in prohibitively large restoration time for critical infrastructure applications [18] [1] . ...
arXiv:1809.09487v1
fatcat:54k3jcdmofckvfusarked5xpqy
Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure
2021
Mathematics and Computer Science
In this paper, I have proposed a Network Traffic Analyzer that will analyze source codes of web based critical infrastructures and detect vulnerability in the codes for better security from attacks. ...
Critical information infrastructure protection (CIIP) had become a lingering area of interest in the modern days of information dissemination, from the inauguration of internet to the modern elevated-profile ...
the vulnerabilities of and threats to their information infrastructure, and have proposed measures for the protection of those assets Critical Infrastructure Protection (CIP)/Critical Information Infrastructure ...
doi:10.11648/j.mcs.20210605.11
fatcat:ypxfe556qfdaljqcizhbjx4laa
Risk-Based Criticality Assessment for Smart Critical Infrastructures
2021
Infrastructures
This article introduces a holistic approach using network indicators and machine learning to better understand the geographical representation of critical infrastructure. ...
Today, critical infrastructure is more interconnected, which allows more vulnerabilities in the case of disasters. ...
One example of the results after modeling the network for one zip code is shown in Figure 4 , which uses 29 nodes from 4 different infrastructures. ...
doi:10.3390/infrastructures7010003
fatcat:5ypbrievznbt5lduetn22hljga
Mapping eResearch Ecosystems: the international situation is intensifying!
[article]
2019
Figshare
Researcher
Partnering with Science
Data, Methods, Models, Code
Research Platforms, Virtual Labs,
Scientific Gateways
Storage
Infrastructure
Network
Infrastructure
Compute
Infrastructure ...
Models, Code
Research Platforms, Virtual Labs,
Scientific Gateways
Storage
Infrastructure
Network
Infrastructure
Compute
Infrastructure
Research Artifact
Management
Advice, Support, Training ...
use of collaborative test/validate platforms ○ Provide the right environments for more packaged codes/tools ■ Hardware/OS/containers/etc. ➢ Link expertise to Compute Infrastructure to enable supercharged ...
doi:10.6084/m9.figshare.8066942
fatcat:k2bbmy2r5zhabbvap2o5kc4t6e
Feasibility Study on Disaster Management with Hybrid Network of LTE and Satellite Links
[article]
2016
arXiv
pre-print
It is on this ground that this work deals with the integration of LTE and satellite networks in both infrastructure-based and infrastructure-less topologies for PPDR purpose. ...
especially in critical rescue missions. ...
This kind of network is good but cannot still be sufficient by itself for critical scenarios. ...
arXiv:1609.02375v1
fatcat:pstyh7ycd5aftmt5svlwuqnlpy
An Innovative Cyber Security based Approach for National Infrastructure Resiliency for Sultanate of Oman
2019
International Journal of Academic Research in Business and Social Sciences
This paper proposes an innovative Cyber Security based approach for National Infrastructure Resiliency for Sultanate of Oman which can be used as a framework of initiating National Cyber Security Centre ...
Critical National Infrastructure (CNI) within Oman is becoming Inter-independent to each other, aiming to provide unified and faultless services from the perspective of economics, quality, and governance ...
For that, the collaboration and national monitoring firm for the national infrastructure come into the picture. ...
doi:10.6007/ijarbss/v9-i3/5780
fatcat:we2y5wktrbfkzjfz3yeglzpc6m
Modelling of multi-sectoral critical infrastructure interdependencies for vulnerability analysis
2022
Disaster Prevention and Resilience
of the critical infrastructures. ...
Critical infrastructure such as the transportation, power generation, water supply, telecommunications, security and health services/systems, etc. are essential for providing a reliable flow of goods and ...
Acknowledgments The authors wish to thank the anonymous reviewers for their constructive comments and valuable suggestions. ...
doi:10.20517/dpr.2021.05
fatcat:druzzfi4zrg43c3c547xbwc5gq
Open-Source Operational Risk: Should Public Blockchains Serve as Financial Market Infrastructures?
[chapter]
2018
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2
Unaccountable power is a bad fit for financial market infrastructures, or for other critical public systems. ...
This risk is problematic for any public blockchain that serves as the backbone of financial market infrastructure (or any other critically important public system). ...
doi:10.1016/b978-0-12-812282-2.00011-5
fatcat:g7xrewh4tnexdldivktynogfua
Authenticated encryption for time-sensitive critical infrastructure
2017
Proceedings of the Australasian Computer Science Week Multiconference on - ACSW '17
Indeed, some international standards for critical infrastructure systems explicitly recommend against using encryption. ...
Encryption is the primary tool for protecting information security, but cyber-physical systems that interact directly with critical infrastructure, in applications such as power, water and transport, typically ...
Acknowledgments This research was funded in part by ARC Linkage Project LP120200246, Practical Cyber Security for Next Generation Power Transmission Networks. ...
doi:10.1145/3014812.3014832
dblp:conf/acsw/HunterPRF17
fatcat:xbh45pokxjhlfe72ziydlozvya
Autonomic Critical Infrastructure Protection (ACIP) system
2013
2013 ACS International Conference on Computer Systems and Applications (AICCSA)
The trend toward operating the grid over IP networks using open standard protocols, and the growing number of attacks targeting critical infrastructure made the security of SCADA systems an important research ...
tasks of critical infrastructure control systems with a little or no involvement from the users or administrators. ...
Fig. 1 1 Fig. 1 Autonomic Critical Infrastructure Protection Architecture ...
doi:10.1109/aiccsa.2013.6616494
dblp:conf/aiccsa/BaalbakiAHK13
fatcat:p3dakghufzbaxmyhjjmvqyzsmi
Using the Oldest Military Force for the Newest National Defense
2015
Journal of Strategic Security
in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. ...
The National Guard forces can be activated for federal service under Title 10 US code or to perform state service under Title 32 US code. ...
Governance Compliance standards and regulations for critical infrastructure providers are necessary for effective cyber defense. 4.a. ...
doi:10.5038/1944-0472.8.4.1441
fatcat:7kekm33bcfay5nbd2lr6l3u53i
Zero day exploits and national readiness for cyber-warfare
2018
Nigerian Journal of Technology
The paper also adopts the defence-in-depth strategy for national readiness and a foolproof system that enforces the security of critical national infrastructure at all levels. ...
Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase. ...
THE CYBERSPACE AND NATIONAL CRITICAL INFRASTRUCTURE The cyberspace is a community of connections in which networks interact across distances to allow for the sharing of data, information and programs. ...
doi:10.4314/njt.v36i4.26
fatcat:p7wqsuyfefhdlpvagznymu2uca
MAlSim - Mobile Agent Malware Simulator
2008
Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems
of security threats to critical networked infrastructures. ...
Our Action: Security of Critical Networked Infrastructures (SCNI) aims at facilitating the description, assessment and governance from the security point of view of critical networked infrastructures, ...
Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. ...
doi:10.4108/icst.simutools2008.2942
dblp:conf/simutools/LeszczynaFM08
fatcat:tn7mjdn2irb2pcstnphfiivgru
Towards a Safe and Secure Internet of Things Critical Infrastructure
2021
Zenodo
Abstract—The IoT also have many applications in commercial sectors, such as environmental monitoring, infrastructure management, smart buildings, and smart cities. ...
of novel hardware-based secure authentication schemes for IoT devices; and (4) design of light-weight secure communication protocols for IoT devices. ...
In this paper, we present challenges and some effective, efficient security techniques for protecting industrial IoTs and IoT critical infrastructures.
II. ...
doi:10.5281/zenodo.4577525
fatcat:gjhzrn7tszgs5fxdjuwjkzngeq
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities
2012
Information & Security An International Journal
Presently, critical infrastructure sectors face various cyber threats. In particular, the electrical power infrastructure is the most critical infrastructure upon which other infrastructures depend. ...
Critical infrastructure protection policy has evolved since the mid-1990's. Since 11 September 2001, the critical link between cyberspace and physical space has been increasingly recognized. ...
All of these critical infrastructures increasingly rely on computers and networks for their operations. 2 The objective of cyber security includes protection of information and property from theft, corruption ...
doi:10.11610/isij.2808
fatcat:dvxbtat5k5fwthm7s5z5pb4pwu
« Previous
Showing results 1 — 15 out of 234,116 results