Search results for "Security"
showing 10 items of 1693 documents
Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems
2014
Abstract This paper addresses the problem of detecting possible intruders in a group of autonomous robots which coexist in a shared environment and interact with each other according to a set of common rules. We consider intruders as robots which misbehave, i.e. do not follow the rules, because of either spontaneous failures or malicious reprogramming. Our goal is to detect intruders by observing the congruence of their behavior with the social rules as applied to the current state of the overall system. Moreover, in accordance with the fully distributed nature of the problem, the detection itself must be performed by individual robots, based only on local information. We present a general …
A Reference Scenario for IMS Strategic Design
1999
Today is fully acknowledged that manufacturing is a formidable competitive weapon. The strength of such a weapon is essentially defined during the first step of the design phase called strategic design. During this phase, in fact, the principal characteristics of the manufacturing systems are to be defined taking into account the competitive environment and the competition strategy. Classical analytical models for IMS design often neglect this aspect and, perhaps, this is one of the causes of IMS failure. The paper proposes a set of analytical models for strategic IMS design; they have been classified into four classes, each one pursuing a determined set of objectives, providing, in this wa…
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems
2007
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…
Adaptative Network Topology for Data Centers
2016
Data centers have an important role in supporting cloud computing services (such as email, social networking, web search, etc.) enterprise computing needs, and infrastructure-based services. Data center networking is a research topic that aims at improving the overall performances of the data centers. It is a topic of high interest and importance for both academia and industry. Several architectures such as FatTree, FiConn, DCel, BCube, and SprintNet have been proposed. However, these topologies try to improve the scalability without any concerns about energy that data centers use and the network infrastructure cost, which are critical parameters that impact the performances of data centers…
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
2015
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …
Agile Deep Learning UAVs Operating in Smart Spaces: Collective Intelligence Versus “Mission-Impossible”
2017
The environments, in which we all live, are known to be complex and unpredictable. The complete discovery of these environments aiming to take full control over them is a “mission-impossible”, however, still in our common agenda. People intend to make their living spaces smarter utilizing innovations from the Internet of Things and Artificial Intelligence. Unmanned aerial vehicles (UAVs) as very dynamic, autonomous and intelligent things capable to discover and control large areas are becoming important “inhabitants” within existing and future smart cities. Our concern in this paper is to challenge the potential of UAVs in situations, which are evolving fast in a way unseen before, e.g., em…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
Warehouse threats and loss prevention management in case of fire
2016
Abstract Warehouses play an important role when it comes to the reception, delivery and storage of various types of goods. Due to the complex scenarios that may occur, as well as the heterogeneous nature of goods, warehouses bear a higher risk of accidents. Regardless if we’re taking about removing hassle or standardizing operations we speak the same language: insuring efficiency and increased efficiency leads to smart cost maintenances. In the article hear by we will observe the behavior of different warehouse materials in the case of trigger fired. Starting from the results obtained during the low scale tests and completing the premises with the large scale experiment (warehouse scale), w…
Stop there’s water on the road! Identifying key beliefs guiding people’s willingness to drive through flooded waterways
2016
Floods are among the most widespread of natural disasters and exposure to floodwaters increases drowning risk. A leading cause of flood related drowning deaths is driving through flooded waterways. Drawing on the Theory of Planned Behaviour, a two-phased research program was conducted. Phase 1 (N = 25; Mage = 32.38, SD = 11.46) identified common beliefs about driving through a flooded waterway. Phase 2 (N = 174; Mage = 27.43, SD = 10.76) adopted a cross-sectional design to examine the belief predictors of drivers' willingness to drive through a flooded waterway. Given differences in consequences due to the depth of water, scenarios of low (road covered in 20 cm of water) and high (road cove…
Management Structure Based Government Enterprise Architecture Framework Adaption in Situ
2017
Part 1: Regular Papers; International audience; The fragmentation of the public sector makes it difficult to manage strategically and architecturally as a whole. Enterprise Architecture (EA) is considered as an improvement to that. Architectural modeling and visualization of the general management strategy plans along with parallel database development in a local government forms the primary data in the longitudinal case study using Action Design Research Method. To find a proper organizational fit for the EA framework in public sector, we reflect on how the current state architectural descriptions got organized in situ in a deep corporate hierarchy, and what were the emerging management ne…