The co-engineering of safety and security in modern systems is a complex endeavor that requires the combined consideration of these qualities and their interactions. This is problematic in existing approaches as they ...
详细信息
ISBN:
(纸本)9798350354508
The co-engineering of safety and security in modern systems is a complex endeavor that requires the combined consideration of these qualities and their interactions. This is problematic in existing approaches as they focus mostly on a single quality and hence hinder the explicit consideration and analysis of the interactions. In addition to the technical complex-ity, human factors and social constructs lead to socio-technical challenges in the co-engineering, that can potentially result in unsafe and insecure systems. This research aims to simplify the identification and management of socio-technical challenges in safety and security co-engineering of complex, safety-critical systems. This research proposes a tool-based solution using ontologies and knowledge bases to facilitate knowledge exchange among stakeholders. The proposed tool-based solution improves upon the existing manual identification and management of socio-technical gaps. As a start, the research focuses on the challenges imposed by the different models, engineering views and analysis techniques used by safety and security domains, which convey actionable information to the stakeholders from other domains. To validate the usefulness of the proposed ontological approach, a proof-of-concept was created using the data flow diagram model of an existing Industry 4.0 use case and its threat risk analysis. The created domain ontology leveraged the security model and threat analysis, and was able to identify certain socio-technical gaps in the existing security threat modelling and analysis. The gaps identified were in regard to the modeling choices made during the analysis, the engineering rigor adopted to protect the most critical elements identified during the analysis and avoiding confusions when communicating the results of the analysis. Thus, the potential of the ontological approach to enhance understanding and communication within the security team, as well as between the safety and security teams, wa
Segmentation of multiple sclerosis lesions plays an important role in understanding disease status. In this work, we focus on the effectiveness of brain parcellation in enhancing the performance of segmentation for mu...
详细信息
The advances in Neural Machine Translation (NMT) systems have cast a shadow over Machine Translation (MT), which was previously dominated by Rule-based Machine Translation (RBMT) and Statistical Machine Translation (S...
详细信息
We introduce BeTS, which stands for Bert Transformer Summarizer, an abstractive summarization model that is built using transfer learning. Our model consists of a pre-trained BERT encoder and a generative transformer ...
详细信息
Social media platforms are widely popular for communicating ideas, comments, and feelings. In a new digital age of communication, it is becoming more important to characterize online comments into their respective emo...
详细信息
Phishing is the attempt to trick someone into disclosing confidential and private information by using internet communication, such as bank account details, passwords, credit/debit card details, and usernames. The acc...
详细信息
Heart disease remains the leading cause of mortality globally, emphasizing the critical need for better diagnostics. This study used a variety of machine learning methods to forecast cardiac disease, using SVM, Random...
详细信息
Pattern analysis for converting a complete mixed code into a single language after determining confidence levels is a systematic approach crucial for applications requiring language uniformity. The process begins by t...
详细信息
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ...
详细信息
Advanced technology and the widespread use of deep fake technology has rendered the digital landscape vulnerable to deceptive manipulations, particularly through the creation of synthetic face images. This comprehensi...
详细信息
暂无评论