Search results for "Security"

showing 10 items of 1693 documents

Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems

2014

Abstract This paper addresses the problem of detecting possible intruders in a group of autonomous robots which coexist in a shared environment and interact with each other according to a set of common rules. We consider intruders as robots which misbehave, i.e. do not follow the rules, because of either spontaneous failures or malicious reprogramming. Our goal is to detect intruders by observing the congruence of their behavior with the social rules as applied to the current state of the overall system. Moreover, in accordance with the fully distributed nature of the problem, the detection itself must be performed by individual robots, based only on local information. We present a general …

Engineeringbusiness.industryFormalism (philosophy)Distributed computingRoboticsIntrusion detection systemVariety (cybernetics)Robotics Security Industrial environmentRobotArtificial intelligenceState (computer science)Set (psychology)businessProtocol (object-oriented programming)IFAC Proceedings Volumes
researchProduct

A Reference Scenario for IMS Strategic Design

1999

Today is fully acknowledged that manufacturing is a formidable competitive weapon. The strength of such a weapon is essentially defined during the first step of the design phase called strategic design. During this phase, in fact, the principal characteristics of the manufacturing systems are to be defined taking into account the competitive environment and the competition strategy. Classical analytical models for IMS design often neglect this aspect and, perhaps, this is one of the causes of IMS failure. The paper proposes a set of analytical models for strategic IMS design; they have been classified into four classes, each one pursuing a determined set of objectives, providing, in this wa…

Engineeringbusiness.industryMechanical EngineeringPrincipal (computer security)ComputerApplications_COMPUTERSINOTHERSYSTEMSManufacturing systemsPhase (combat)Industrial and Manufacturing EngineeringCompetition strategyDesign phaseStrategic designSystems engineeringProgramming paradigmbusinessSet (psychology)CIRP Annals
researchProduct

Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems

2007

This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingMobile robotIntrusion detection systemsecuritySpace (commercial competition)Set (abstract data type)Settore ING-INF/04 - AutomaticaIntrusion detectionmulti-agent systemsRule of inferencebusinessProtocol (object-oriented programming)
researchProduct

Adaptative Network Topology for Data Centers

2016

Data centers have an important role in supporting cloud computing services (such as email, social networking, web search, etc.) enterprise computing needs, and infrastructure-based services. Data center networking is a research topic that aims at improving the overall performances of the data centers. It is a topic of high interest and importance for both academia and industry. Several architectures such as FatTree, FiConn, DCel, BCube, and SprintNet have been proposed. However, these topologies try to improve the scalability without any concerns about energy that data centers use and the network infrastructure cost, which are critical parameters that impact the performances of data centers…

Engineeringbusiness.industryNetwork TopologyData center networksupporting cloud computing servicesComputer securitycomputer.software_genreNetwork topologyAverage path lengthBottleneckLow latency (capital markets)ServerScalabilityData centerInstalled basebusinesscomputerComputer networkQatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1
researchProduct

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

2015

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …

Engineeringbusiness.industryNetwork securityInternet trafficComputer securitycomputer.software_genreInternet Architecture BoardInternational securityUse caseThe InternetbusinessResilience (network)computerTraffic generation model
researchProduct

Agile Deep Learning UAVs Operating in Smart Spaces: Collective Intelligence Versus “Mission-Impossible”

2017

The environments, in which we all live, are known to be complex and unpredictable. The complete discovery of these environments aiming to take full control over them is a “mission-impossible”, however, still in our common agenda. People intend to make their living spaces smarter utilizing innovations from the Internet of Things and Artificial Intelligence. Unmanned aerial vehicles (UAVs) as very dynamic, autonomous and intelligent things capable to discover and control large areas are becoming important “inhabitants” within existing and future smart cities. Our concern in this paper is to challenge the potential of UAVs in situations, which are evolving fast in a way unseen before, e.g., em…

Engineeringbusiness.industryProcess (engineering)media_common.quotation_subjectBig dataCollective intelligenceCloud computing02 engineering and technologyReuseComputer securitycomputer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingQuality (business)businesscomputerSemantic WebAgile software developmentmedia_common
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Warehouse threats and loss prevention management in case of fire

2016

Abstract Warehouses play an important role when it comes to the reception, delivery and storage of various types of goods. Due to the complex scenarios that may occur, as well as the heterogeneous nature of goods, warehouses bear a higher risk of accidents. Regardless if we’re taking about removing hassle or standardizing operations we speak the same language: insuring efficiency and increased efficiency leads to smart cost maintenances. In the article hear by we will observe the behavior of different warehouse materials in the case of trigger fired. Starting from the results obtained during the low scale tests and completing the premises with the large scale experiment (warehouse scale), w…

Engineeringflammable substances.business.industryScale (chemistry)010401 analytical chemistry0211 other engineering and technologieshealth and safety at work02 engineering and technologyComputer securitycomputer.software_genre01 natural sciences0104 chemical sciencesWarehouseRisk analysis (engineering)021105 building & constructionfire protectionGeneral Earth and Planetary Scienceswarehouseflammable substancesbusinessOSH culture fire fire protection warehousehealth and safety at work flammable substancescomputerfireGeneral Environmental ScienceOSH culture
researchProduct

Stop there’s water on the road! Identifying key beliefs guiding people’s willingness to drive through flooded waterways

2016

Floods are among the most widespread of natural disasters and exposure to floodwaters increases drowning risk. A leading cause of flood related drowning deaths is driving through flooded waterways. Drawing on the Theory of Planned Behaviour, a two-phased research program was conducted. Phase 1 (N = 25; Mage = 32.38, SD = 11.46) identified common beliefs about driving through a flooded waterway. Phase 2 (N = 174; Mage = 27.43, SD = 10.76) adopted a cross-sectional design to examine the belief predictors of drivers' willingness to drive through a flooded waterway. Given differences in consequences due to the depth of water, scenarios of low (road covered in 20 cm of water) and high (road cove…

Engineeringtheory of planned behaviourApplied psychologyPsychological interventionPoison controlComputer securitycomputer.software_genreSuicide prevention03 medical and health sciences0302 clinical medicinedriving0502 economics and businessInjury prevention030212 general & internal medicineSafety Risk Reliability and QualityNatural disasterta515050210 logistics & transportationbusiness.industry05 social sciencesPublic Health Environmental and Occupational HealthTheory of planned behaviorHuman factors and ergonomicsSignagefloodsbeliefsbusinessSafety ResearchcomputerSafety Science
researchProduct

Management Structure Based Government Enterprise Architecture Framework Adaption in Situ

2017

Part 1: Regular Papers; International audience; The fragmentation of the public sector makes it difficult to manage strategically and architecturally as a whole. Enterprise Architecture (EA) is considered as an improvement to that. Architectural modeling and visualization of the general management strategy plans along with parallel database development in a local government forms the primary data in the longitudinal case study using Action Design Research Method. To find a proper organizational fit for the EA framework in public sector, we reflect on how the current state architectural descriptions got organized in situ in a deep corporate hierarchy, and what were the emerging management ne…

Enterprise architecture framework0209 industrial biotechnologyKnowledge management[SHS.INFO]Humanities and Social Sciences/Library and information sciencesyritysstrategiatSherwood Applied Business Security ArchitectureEnterprise architecture02 engineering and technologygovernment enterprise architectureframework adaptionStrategy architectureFramework adaptionstrategy architecture020901 industrial engineering & automationEnterprise architecture management020204 information systemsBusiness architecture0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]View modelaction design researchbusiness.industryGovernment enterprise architecturejulkinen sektoriThe Open Group Architecture FrameworkBusinessInformation FrameworkAction design researchkokonaisarkkitehtuuri
researchProduct