Filters








212 Hits in 8.1 sec

Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults [article]

Chuadhry Mujeeb Ahmed, Jay Prakash, Jianying Zhou
2020 arXiv   pre-print
Most of the proposed anomaly detection mechanisms are not able to differentiate between an attack and an anomaly due to a fault.  ...  This opinion paper strives to initiate discussion on the design algorithms which can segregate attacks from faults.  ...  Anomaly detection that aims at raising an alert when the controlled process in an ICS moves from its normal to an unexpected, i.e. anomalous, state.  ... 
arXiv:2005.00325v1 fatcat:qqbkdbekinba5iqubsrg744nty

Challenges in the Safety-Security Co-Assurance of Collaborative Industrial Robots [article]

Mario Gleirscher and Nikita Johnson and Panayiotis Karachristou and Radu Calinescu and James Law and John Clark
2020 arXiv   pre-print
Then, we highlight the state of the art and recent challenges in human-robot collaboration in manufacturing both from a safety and security perspective.  ...  In this chapter, we summarise approaches to the coordinated assurance of safety and security.  ...  Intrusion Detection Systems are effective counter-measures for detecting attacks or improper use of systems by detecting any anomalies or inappropriate use of the host machines or networks.  ... 
arXiv:2007.11099v1 fatcat:j37jaqevqjhxfespjzivqvm4qu

D1.1: COLLABS Innovations for Industrial IoT Systems1

Miloš Radovanović, Wafa Ben Jaballah, George Bravos, Erwan Le-Disez, Ernesto Gomez Marin, Erwin Moed, Md Masoom Rabbani, Valerio Senni, Fabio Federici, George Spanoudakis, Konstantinos Fysarakis, Martin Wimmer (+2 others)
2021 Zenodo  
Sections 2–8 respectively focus on the SotA in areas of: data protection (Section 2), distributed anomaly detection and remote attestation (Section 3), physical security (Section 4), function as a service  ...  During the past year there have been many works in the domains relevant to COLLABS, notably in blockchain applications, machine- and deep-learning based anomaly detection and wireless system design, remote  ...  Distributed anomaly detection Anomaly detection is a key task in identifying threats to industrial IoT systems in such a way as to introduce minimal communication overhead and energy consumption in the  ... 
doi:10.5281/zenodo.5256842 fatcat:xf4y27mcjvbwvfjxy7lo4kwqw4

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
2021 Zenodo  
(Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing  ...  This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4  ...  Anomaly detection systems can identify attacks against ICS networks in a proactive manner, reporting any suspicious activities.  ... 
doi:10.5281/zenodo.5667012 fatcat:xgzhqfeq6nbwte4h256pntlkau

A/B Testing [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
Anomaly detection finds extensive use in a wide variety of applications such as fraud detection for credit cards, insurance or healthcare, intrusion detection for cybersecurity, fault detection in safety  ...  Effective detection of anomalies allows extracting critical information from data which can then be used for a variety of applications, such as to stop malicious intruders, detect and repair faults in  ...  It has been shown that with a probability at least 1 ı, both E 3 and R-MAX learn approximately correct models whose optimal policies have an average rewardclose to the true optimal in time polynomial in  ... 
doi:10.1007/978-1-4899-7687-1_100507 fatcat:bg6sszljsrax5heho4glbcbicu

Average-Payoff Reinforcement Learning [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
Anomaly detection finds extensive use in a wide variety of applications such as fraud detection for credit cards, insurance or healthcare, intrusion detection for cybersecurity, fault detection in safety  ...  Effective detection of anomalies allows extracting critical information from data which can then be used for a variety of applications, such as to stop malicious intruders, detect and repair faults in  ...  It has been shown that with a probability at least 1 ı, both E 3 and R-MAX learn approximately correct models whose optimal policies have an average rewardclose to the true optimal in time polynomial in  ... 
doi:10.1007/978-1-4899-7687-1_100029 fatcat:jub4ulyg45abnf4qgutimczie4

Large meteorite impacts and planetary evolution

Richard Huggett
1995 Quaternary Science Reviews  
Acknowledgments: The author would like to thank the Grant Agency ofthe Czech Republic for support of this project under con-  ...  In addition, we have detected some centerward motion of fault-bounded wedges resulthag from displacements on subhorizontal faults that conjoin and die out within horizontal bedding in the perimeter of  ...  This experiment was aimed at the simulation of hyperveloeity im- pact-induced vaporization of a hypothetical meteorite.  ... 
doi:10.1016/0277-3791(95)90013-6 fatcat:aesdqzadlzfajdt5uxqgyssjaq

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
This textbook aims at preventing ubiquitous computing from becoming a pervasive nightmare.  ...  And technologists promise us a world of ubiquitous computing, in which myriads of tiny, untethered sensors and actuators will communicate with each other, promptly taking care of our various needs and  ...  of the chapters, and in particular in Chapter 2; Mark Felegyhazi, whose research greatly influenced Chapter 10 and the second part of Chapter 11, and who contributed very significantly in clarifying the  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

Program

2022 2022 International Conference on Decision Aid Sciences and Applications (DASA)  
The present study aims to develop an automatic AD detection using Electroencephalogram (EEG) signal to alleviate these problems and to support neurologists.  ...  A maximum of 92.90% classification accuracy is obtained using the features of IMF-4 with 10-fold cross-validation. The results conclude that the proposed method can detect AD patients efficiently.  ...  for fault detection.  ... 
doi:10.1109/dasa54658.2022.9765271 fatcat:ttqppf4j3navnaxe653mrzmezi

A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks

Javesh Boodnah, Stefan Poslad
2009 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns  
The work in this thesis is aimed at defining a framework for such an ad hoc network that provides ways for participants to distinguish and collaborate with their most trustworthy neighbours.  ...  The end result is a trust framework that fully meets the basic requirements for a sustainable model of trust that can be developed onto an ad hoc network and that provides enhancements in efficiency (using  ...  , black lists and variation lists (see Section 3.5) at every cycle as a back-up in case the cluster head ceases to operate either due to mechanical faults or because of an attack/capture.  ... 
doi:10.1109/computationworld.2009.62 fatcat:vtoz27ksj5aqvpesmjei5by5ju

Acoustic GIS‐based monitoring of Atlantic cod ecosystems in coastal Newfoundland

George A. Rose
2008 Journal of the Acoustical Society of America  
as well as group behaviour and speech characteristics, such as increased energy contents at low frequencies, voice levels, raised hearing sensitivity at high frequencies.  ...  Accumulating evidence of atypical mass strandings of beaked whales coincident with naval sonar exercises suggest that injury or death may result from behavioral responses of some species at lower exposure  ...  of speech in rooms: Revisited.  ... 
doi:10.1121/1.2932540 fatcat:v6w3j7upx5duhkunch6oai5jve

Antarctic climate change and the environment

P. Convey, R. Bindschadler, G. di Prisco, E. Fahrbach, J. Gutt, D.A. Hodgson, P.A. Mayewski, C.P. Summerhayes, J. Turner
2009 Antarctic Science  
The Antarctic is a highly coupled system with non-linear interactions between the atmosphere, ocean, ice and biota, along with complex links to the rest of the Earth system.  ...  We hope that it will be of value to all scientists with an interest in the Antarctic continent and the Southern Ocean, policy makers and those concerned with the deployment of observing systems and the  ...  ., WARNER, R. and ALLISON, I. 2000. Mass balance of the Lambert Glacier-Amery Ice shelf system, East Antarctica: a comparison of computed balance fluxes and measured fluxes, J. Glaciol  ... 
doi:10.1017/s0954102009990642 fatcat:zaj57sp4wzechlgadi7rlq5sni

Trends in preference, programming and design of concert halls for symphonic music

Anders C. Gade
2008 Journal of the Acoustical Society of America  
Acoustic pulse reflectometry ͑APR͒ has been used extensively in the study of wind instruments, for measuring input impedance, bore reconstruction, and fault detection.  ...  The aim of this work is to decrease noise level in rooms at these specific and most annoying frequencies.  ...  The aim of this study is to characterize the structural noise in order to better detect flaws in several heterogeneous materials ͑steels, welding, composites oe͒ using ultrasonic waves.  ... 
doi:10.1121/1.2932471 fatcat:hhka5ml2fvcszklkzau2lw3gka

The structural acoustic properties of stiffened shells

Yu Luan
2008 Journal of the Acoustical Society of America  
as well as group behaviour and speech characteristics, such as increased energy contents at low frequencies, voice levels, raised hearing sensitivity at high frequencies.  ...  Accumulating evidence of atypical mass strandings of beaked whales coincident with naval sonar exercises suggest that injury or death may result from behavioral responses of some species at lower exposure  ...  Acoustic pulse reflectometry ͑APR͒ has been used extensively in the study of wind instruments, for measuring input impedance, bore reconstruction, and fault detection.  ... 
doi:10.1121/1.2932806 fatcat:zohbewf2k5h7fly2hoqzfdk42e

Self-Organized Evolutionary Process in Sets of Interdependent Variables near the Midpoint of Phase Transition in K-Satisfiability [chapter]

Michael Korkin
2001 Lecture Notes in Computer Science  
Ackerman, John T Strategic Studies Quarterly: An Air Force-Sponsored Strategic Forum for Military, Government, and Academic Professionals. Volume 2, Number 1 -7 Acuff, Hugh F  ...  The aim of our research is estimation of GPS ground and orbital users positioning accuracy in different geomagnetic conditions.  ...  Amino acids were not detected in extracts collected at 325 degrees C ( at 20.0 MPa), probably due to amino acid decomposition at this temperature.  ... 
doi:10.1007/3-540-45443-8_20 fatcat:ght26tu6avh57kkp54kifofaee
« Previous Showing results 1 — 15 out of 212 results