130 Hits in 6.3 sec

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice [article]

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Victor Mayoral Vilches
2021 arXiv   pre-print
This book aims to stipulate the inclusion of security in robotics from the earliest design phases onward and with a special focus on the cost-benefit tradeoff that can otherwise be an inhibitor for the  ...  A powerful quantitative approach to model-based security is offered by game theory, providing a rich spectrum of techniques to optimize security against various kinds of attacks.  ...  We thank many of our friends and colleagues for their inputs and suggestions.  ... 
arXiv:2103.05789v4 fatcat:p3inkof6kbh3rds6jigvmq4doe

Security Attacks and Solutions for Digital Twins [article]

Sabah Suhail, Raja Jurdak, Rasheed Hussain, Davor Svetinovic
2022 arXiv   pre-print
Therefore, they might become a potential source of data breaches and a playground for attackers to launch covert attacks.  ...  Attackers may exploit the deep knowledge about the physical process and devices accessible through digital twins with a two-stage strategy: use the key input data source namely, digital twins into a malicious  ...  CONCLUSION In his work, we have focused on two aspects: (i) various types of attacks on digital twins, and (ii) defensive strategies to thwart such attacks on digital twins.  ... 
arXiv:2202.12501v2 fatcat:65saahms6jayziwwhi4zerlghu

A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

Lifu Zhang, Heng Zhang
2016 Sensors  
This paper also discusses several future research directions under these two umbrellas.  ...  communication network, which forms a closed-loop.  ...  Secure state estimation has been studied from the aspects of attack evaluation, intrusion detection and defense strategies. Teixeira et al.  ... 
doi:10.3390/s16040443 pmid:27023559 pmcid:PMC4850957 fatcat:ndpgvn3rdjhtvldrl2ih7lsvuu

Handling a Kullback--Leibler divergence random walk for scheduling effective patrol strategies in Stackelberg security games

César U. S. Solis, Julio B. Clempner, Alexander S. Poznyak
2019 Kybernetika (Praha)  
We also consider a game-theory realization of the problem that involves defenders and attackers performing a discrete-time random walk over a finite state space.  ...  This paper presents a new model for computing optimal randomized security policies in non-cooperative Stackelberg Security Games (SSGs) for multiple players.  ...  A particular case of Stackelberg security games considers the problem of multi-robot patrolling against intrusions around a given area with the existence of an attacker attempting to penetrate into the  ... 
doi:10.14736/kyb-2019-4-0618 fatcat:ugdzczf2cnhmxlbabp42zkd77y

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care, smart transportation, smart homes, and general grids); and (3) MADC (Measure, Attack, Defense  ...  Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation.  ...  As public IoT devices still use low-level security protection strategies, Wu and Wang [85] provided a collaborative security detection approach based on game theory for distributed IoT systems.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey

Mohammad Abu Alsheikh, Dinh Thai Hoang, Dusit Niyato, Hwee-Pink Tan, Shaowei Lin
2015 IEEE Communications Surveys and Tutorials  
In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals.  ...  Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs.  ...  defend Attacker: attack, do not attack MTTF [131] MDP Centralized Node's state (under-attack or secure) Defense a node Intrusion detection Resource starvation attacks [132] MDP Centralized  ... 
doi:10.1109/comst.2015.2420686 fatcat:422xkiciufedpljgcmfrwownau

Table of contents

2009 2009 17th Mediterranean Conference on Control and Automation  
Univ. of the Negev This paper establishes control strategies for a wheeled mobile robot model that includes the kinematic and dynamic equations of motion.  ...  This paper proposes an algorithm for planning mathcal{C}^infty paths with bound curvature and curvature derivative linking two fixed (initial and final) configurations and passing through a given number  ...  The first few sections of the paper provide a game model with probability of cost required to defend the nodes and the subsequent sections derives the model to detect malicious nodes using the probability  ... 
doi:10.1109/med.2009.5164498 fatcat:bi37lbkbhfaihj7lbc64vvplo4

Markov Chain–Based Stochastic Strategies for Robotic Surveillance

Xiaoming Duan, Francesco Bullo
2020 Annual Review of Control Robotics and Autonomous Systems  
This article surveys recent advancements in strategy designs for persistent robotic surveillance tasks, with a focus on stochastic approaches.  ...  We then discuss the two main criteria regarding the speed and unpredictability of surveillance strategies.  ...  game with a leader and a follower.  ... 
doi:10.1146/annurev-control-071520-120123 fatcat:kkn5mnjsyva6npgmuvt65ecppy

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
Two key lessons learned are as follows.  ...  Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion.  ...  AI as a guardian: AI for enhancing 6G security Defending against security attacks has been the task of many traditional solutions such as firewalls and intrusion detection systems, but AI makes such systems  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates

Department Of Defense Comptroller's Office
2015 Zenodo  
The Defense Advanced Research Projects Agency (DARPA) FY2016 amounted to $2.868 billion in the President's request to support high-risk, high-reward research.  ...  -Created a collection of research-based technologies that align with national educational standards. 11.815 -- -ENGAGE robotics games were used in over 16K classrooms by over 276K students.  ...  of Defense strategic needs by developing robotic technology for disaster response operations.  ... 
doi:10.5281/zenodo.1215366 fatcat:cqn5tyfixjanzp5x3tgfkpedri

Dreaming of clean nukes

Michael A. Levi
2004 Nature  
Defenses, active and passive. Current defenses do not support future strategy.  ...  Like the ALCM, it is armed with a W80 warhead and is designed to evade air-and groundbased defenses to strike heavily defended targets within an enemy's territory.  ...  SOCOM should work with other R&D agencies (e.g., DARPA, CECOM) to ensure that both a near-term ACTDlike demonstration system is implemented and that a technology plan exists for inserting new sensors,  ... 
doi:10.1038/428892a pmid:15118700 fatcat:4l7opgcfbzdm7merk5sw35a3ry

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
Included in this category is the National Center for Advancing Translational Sciences (NCATS) efforts to reengineer drug discovery and development in collaboration with industry, academia, the Food and  ...  Drug Administration (FDA), and the Defense Advanced Research Projects Agency (DARPA).  ...  Current cyber defenses are primarily based on network and host intrusion detection and look for break-ins and abnormal behavior without context.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
for long-term national security enhancement through the discovery of new phenomena and the exploration of the potential of such phenomena for defense applications.  ...  Defense Advanced Research Projects Agency (DARPA) Fiscal Year 2019 Budget Estimates (Justification Book) The DARPA Defense Research Sciences program elements (PE) seeks to provide the technical foundation  ...  Description: The Multi-Azimuth Defense Fast Intercept Round Engagement (MAD-FIRES) program seeks to develop a point defense system against today's most stressing threats by developing a highly maneuverable  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu


2002 AIDS and Infectious Diseases  
AFTER GLOBALIZATION: FUTURE SECURITY IN A TECHNOLOGY RICH WORLD 2 Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore  ...  We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered.  ...  We think that we understand nuclear weapons and are more comfortable discussing the strategies and defenses that we have used for 55 years.  ... 
doi:10.1142/9789812776945_0021 fatcat:e63bnhpdjfa5vghjlybcmfmjqq

Towards Reactive Programming for Object-Oriented Applications [chapter]

Guido Salvaneschi, Mira Mezini
2014 Lecture Notes in Computer Science  
To establish a solid background for our investigation, we propose a conceptual framework to model the design space of reactive applications and we study the flaws of the existing solutions.  ...  Traditional solutions based on event systems and the Observer pattern have a number of inconveniences, but programmers bear them in return for the benefits of OO design.  ...  Object-oriented programming does not provide specific mechanisms for implementing reactive behavior, with two consequences.  ... 
doi:10.1007/978-3-642-55099-7_7 fatcat:mgpc5wz7drck5ebjc4ffkfmohy
« Previous Showing results 1 — 15 out of 130 results