Cloud Computing has emerged as one of the vital part of the IT industry and it requires users to entrust their valuable data to cloud providers and so, there has been increasing security and privacy concerns on outsou...
详细信息
security assessment is an important task for operation of modern computernetworks. The paper suggests the security assessment technique based on attack graphs which can be implemented in contemporary SIEM systems. It...
详细信息
ISBN:
(纸本)9783642550324;9783642550317
security assessment is an important task for operation of modern computernetworks. The paper suggests the security assessment technique based on attack graphs which can be implemented in contemporary SIEM systems. It is based on the security metrics taxonomy and different techniques for calculation of security metrics according to the data about current events. Proposed metrics form the basis for security awareness and reflect current security situation, including development of attacks, attacks sources and targets, attackers' characteristics. The technique suggested is demonstrated on a case study.
The proceedings contain 16 papers. The topics discussed include: towards assurance cases for resilient control systems;practical use of formal verification for safety critical cyber-physical systems: a case study;peak...
ISBN:
(纸本)9781479953875
The proceedings contain 16 papers. The topics discussed include: towards assurance cases for resilient control systems;practical use of formal verification for safety critical cyber-physical systems: a case study;peak covariance stability of kalman filtering with Markovian packet losses;towards independent in-cloud evolution of cyber-physical systems;human interaction issues in a digital-physical hybrid world;an intelligent hearing aid system based on real-time signal processing;smart cells for embedded battery management;scalable path and time coordination for robot formation;connected smartphones and high-performance servers for remote object detection;smartphone-controlled telerobotic systems;modeling random deployment in wireless sensor networks for infrastructure-less cyber physical systems;and service recovery for large scale distributed publish and subscription services for cyber-physical systems and disaster management.
distributed file systems such as HDFS are facing the threat of Advanced Persistent Threat, APT. Although security mechanisms such as Kerberos and ACL are implemented in distributed file systems, most of them are not s...
详细信息
Information and communication technology (ICT) played a critical role in disaster management in last few decades. One example is the messaging service for disaster alerts, rescue workers, and victims. Many of these me...
详细信息
Educational and governmental organizations are heavy users of Free and Open Source Software (FOSS) due to the numerous economic advantages it offers. But because of the lack of formal notification of vulnerabilities i...
详细信息
ISBN:
(纸本)9781479935802
Educational and governmental organizations are heavy users of Free and Open Source Software (FOSS) due to the numerous economic advantages it offers. But because of the lack of formal notification of vulnerabilities in them these users are left with exploitable risks in their systems with known vulnerabilities which could completely offset the economic gains and lead to unrecoverable losses. India is one of the largest consumers of Free and Open Source Software (FOSS) though in the last few years there has been concerted effort to contribute to the movement as well as create its own FOSS to support local languages. This paper compares and analyses the public disclosure of vulnerabilities in Free and Open Source Software (FOSS) to those of non-open source systems. Our case study with (N=218) Information Technology (IT) professionals working in computersystems, networks and application development areas indicates an urgent need to enhance vulnerability handling practices for Free and Open Source Software based applications. This study has interesting implications for Information and Communications Technology (ICT) policy makers in the government as well as private sector who are increasingly advocating the use of FOSS.
Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into ...
详细信息
Cyber Physical systems (CPSs), such as those found in modern vehicles, include a number of important time and safety-critical functions. Traditionally, applications are mapped to several dedicated electronic control u...
详细信息
The present article attempts to support the process of classification of multi-characteristic spatial data in order to develop the correct cartographic visualisation of complex geographical information in the thematic...
详细信息
ISBN:
(纸本)9783319087290;9783319087283
The present article attempts to support the process of classification of multi-characteristic spatial data in order to develop the correct cartographic visualisation of complex geographical information in the thematic geoportal. Rough sets, decision rules and artificial neural networks were selected as relevant methods of spatially distributed monument classification. Basing on the obtained results it was determined that the attributes reflecting the spatial relations between specific objects play an extremely significant role in the process of classification, reducts allow to select exclusively essential attributes of objects and neural networks and decision rules are highly useful for the purposes of classification of multi-characteristic spatial data.
暂无评论