CINXE.COM
Search results for: cyber physical systems
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: cyber physical systems</title> <meta name="description" content="Search results for: cyber physical systems"> <meta name="keywords" content="cyber physical systems"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="cyber physical systems" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="cyber physical systems"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 14783</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: cyber physical systems</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14783</span> Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20Vili%C4%87%20Belina">Bruno Vilić Belina</a>, <a href="https://publications.waset.org/abstracts/search?q=Jadranko%20Matu%C5%A1ko"> Jadranko Matuško</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control%20systems" title="control systems">control systems</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=resiliency" title=" resiliency"> resiliency</a>, <a href="https://publications.waset.org/abstracts/search?q=robustness" title=" robustness"> robustness</a>, <a href="https://publications.waset.org/abstracts/search?q=tube%20based%20model%20predictive%20control" title=" tube based model predictive control"> tube based model predictive control</a> </p> <a href="https://publications.waset.org/abstracts/169652/robust-control-of-cyber-physical-system-under-cyber-attacks-based-on-invariant-tubes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14782</span> A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yatin%20Wadhawan">Yatin Wadhawan</a>, <a href="https://publications.waset.org/abstracts/search?q=Clifford%20Neuman"> Clifford Neuman</a>, <a href="https://publications.waset.org/abstracts/search?q=Anas%20Al%20Majali"> Anas Al Majali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title="smart grid">smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20pipeline" title=" gas pipeline"> gas pipeline</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-%20physical%20attack" title=" cyber- physical attack"> cyber- physical attack</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a> </p> <a href="https://publications.waset.org/abstracts/90242/a-systematic-approach-for-analyzing-multiple-cyber-physical-attacks-on-the-smart-grid" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">313</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14781</span> Challenges in Anti-Counterfeiting of Cyber-Physical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Kliewe">Daniel Kliewe</a>, <a href="https://publications.waset.org/abstracts/search?q=Arno%20K%C3%BChn"> Arno Kühn</a>, <a href="https://publications.waset.org/abstracts/search?q=Roman%20Dumitrescu"> Roman Dumitrescu</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%BCrgen%20Gausemeier"> Jürgen Gausemeier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-counterfeiting" title="anti-counterfeiting">anti-counterfeiting</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems" title=" cyber physical systems"> cyber physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property%20%28IP%29" title=" intellectual property (IP)"> intellectual property (IP)</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20protection" title=" system protection"> system protection</a> </p> <a href="https://publications.waset.org/abstracts/29278/challenges-in-anti-counterfeiting-of-cyber-physical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">498</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14780</span> Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ivan%20%C5%BDupan">Ivan Župan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20security" title=" cyber-physical security"> cyber-physical security</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20industry" title=" smart industry"> smart industry</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20methodology" title=" security methodology"> security methodology</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20technology" title=" security technology"> security technology</a> </p> <a href="https://publications.waset.org/abstracts/169637/models-methods-and-technologies-for-protection-of-critical-infrastructures-from-cyber-physical-threats" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14779</span> The Framework of System Safety for Multi Human-in-The-Loop System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hideyuki%20Shintani">Hideyuki Shintani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ichiro%20Koshijima"> Ichiro Koshijima</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Cyber Physical System (CPS), if there are a large number of persons in the process, a role of person in CPS might be different comparing with the one-man system. It is also necessary to consider how Human-in-The-Loop Cyber Physical Systems (HiTLCPS) ensure safety of each person in the loop process. In this paper, the authors discuss a system safety framework with an illustrative example with STAMP model to clarify what point for safety should be considered and what role of person in the should have. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-physical-system" title="cyber-physical-system">cyber-physical-system</a>, <a href="https://publications.waset.org/abstracts/search?q=human-in-the-loop" title=" human-in-the-loop"> human-in-the-loop</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=STAMP%20model" title=" STAMP model"> STAMP model</a> </p> <a href="https://publications.waset.org/abstracts/54442/the-framework-of-system-safety-for-multi-human-in-the-loop-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54442.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14778</span> Power System Cyber Security Risk in the Era of Digital Transformation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rafat%20Rob">Rafat Rob</a>, <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Alotaibi"> Khaled Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Dana%20Nour"> Dana Nour</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Albadrani"> Abdullah Albadrani</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulmohsen%20Mulhim"> Abdulmohsen Mulhim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=supply%20chain" title="supply chain">supply chain</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=maturity%20model" title=" maturity model"> maturity model</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a> </p> <a href="https://publications.waset.org/abstracts/160790/power-system-cyber-security-risk-in-the-era-of-digital-transformation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14777</span> A Collaborative Learning Model in Engineering Science Based on a Cyber-Physical Production Line</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yosr%20Ghozzi">Yosr Ghozzi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Cyber-Physical Systems terminology has been well received by the industrial community and specifically appropriated in educational settings. Indeed, our latest educational activities are based on the development of experimental platforms on an industrial scale. In fact, we built a collaborative learning model because of an international market study that led us to place ourselves at the heart of this technology. To align with these findings, a competency-based approach study was conducted, and program content was revised by reflecting the projectbased approach. Thus, this article deals with the development of educational devices according to a generated curriculum and specific educational activities while respecting the repository of skills adopted from what constitutes the educational cyber-physical production systems and the laboratories that are compliant and adapted to them. The implementation of these platforms was systematically carried out in the school's workshops spaces. The objective has been twofold, both research and teaching for the students in mechatronics and logistics of the electromechanical department. We act as trainers and industrial experts to involve students in the implementation of possible extension systems around multidisciplinary projects and reconnect with industrial projects for better professional integration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education%204.0" title="education 4.0">education 4.0</a>, <a href="https://publications.waset.org/abstracts/search?q=competency-based%20learning" title=" competency-based learning"> competency-based learning</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20factory" title=" teaching factory"> teaching factory</a>, <a href="https://publications.waset.org/abstracts/search?q=project-based%20learning" title=" project-based learning"> project-based learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20systems" title=" cyber-physical systems"> cyber-physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=industry%204.0" title=" industry 4.0"> industry 4.0</a> </p> <a href="https://publications.waset.org/abstracts/159160/a-collaborative-learning-model-in-engineering-science-based-on-a-cyber-physical-production-line" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159160.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">107</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14776</span> Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yunos%20Zahri">Yunos Zahri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ariffin%20Aswami"> Ariffin Aswami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20terrorism" title="cyber terrorism">cyber terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20analysis" title=" qualitative analysis"> qualitative analysis</a> </p> <a href="https://publications.waset.org/abstracts/61035/understanding-cyber-terrorism-from-motivational-perspectives-a-qualitative-data-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61035.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14775</span> Developing Cyber Security Asset Mangement Framework for UK Rail</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shruti%20Kohli">Shruti Kohli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=rail%20asset" title=" rail asset"> rail asset</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20threat" title=" security threat"> security threat</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20ontology" title=" cyber ontology"> cyber ontology</a> </p> <a href="https://publications.waset.org/abstracts/48915/developing-cyber-security-asset-mangement-framework-for-uk-rail" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48915.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">430</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14774</span> Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erdinc%20Ozturk">Erdinc Ozturk</a>, <a href="https://publications.waset.org/abstracts/search?q=Gizem%20Akcan"> Gizem Akcan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students whose ages are between 18 and 35 participated this study. According to findings of this study, men are more prone to cyber bullying than women. Moreover, men are also more prone to cyber victimization than women. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title="cyber bullying">cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20victimization" title=" cyber victimization"> cyber victimization</a>, <a href="https://publications.waset.org/abstracts/search?q=coping%20strategies" title=" coping strategies"> coping strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=sex" title=" sex"> sex</a> </p> <a href="https://publications.waset.org/abstracts/49753/preventing-and-coping-strategies-for-cyber-bullying-and-cyber-victimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49753.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">367</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14773</span> Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulrahman%20Yarali">Abdulrahman Yarali</a>, <a href="https://publications.waset.org/abstracts/search?q=Machica%20McClain"> Machica McClain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CPS" title="CPS">CPS</a>, <a href="https://publications.waset.org/abstracts/search?q=IAM" title=" IAM"> IAM</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=AI" title=" AI"> AI</a>, <a href="https://publications.waset.org/abstracts/search?q=ML" title=" ML"> ML</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=models" title=" models"> models</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a> </p> <a href="https://publications.waset.org/abstracts/191247/identity-and-access-management-for-medical-cyber-physical-systems-new-technology-and-security-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191247.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14772</span> Analysis on Cyber Threat Actors Targeting Automated Border Security Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirko%20Sailio">Mirko Sailio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20automation" title="border automation">border automation</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-security" title=" cyber-security"> cyber-security</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20actors" title=" threat actors"> threat actors</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20cyber-security" title=" border cyber-security"> border cyber-security</a> </p> <a href="https://publications.waset.org/abstracts/136134/analysis-on-cyber-threat-actors-targeting-automated-border-security-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14771</span> SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francesco%20Lubrano">Francesco Lubrano</a>, <a href="https://publications.waset.org/abstracts/search?q=Fabrizio%20Bertone"> Fabrizio Bertone</a>, <a href="https://publications.waset.org/abstracts/search?q=Federico%20Stirano"> Federico Stirano</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=defence%20strategies" title=" defence strategies"> defence strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=impact%20propagation" title=" impact propagation"> impact propagation</a>, <a href="https://publications.waset.org/abstracts/search?q=integrated%20security" title=" integrated security"> integrated security</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20security" title=" physical security "> physical security </a> </p> <a href="https://publications.waset.org/abstracts/123807/safecare-integrated-cyber-physical-security-solution-for-healthcare-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14770</span> Fostering Enriched Teaching and Learning Experience Using Effective Cyber-Physical Learning Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shubhakar%20K.">Shubhakar K.</a>, <a href="https://publications.waset.org/abstracts/search?q=Nachamma%20S."> Nachamma S.</a>, <a href="https://publications.waset.org/abstracts/search?q=Judy%20T."> Judy T.</a>, <a href="https://publications.waset.org/abstracts/search?q=Jacob%20S.%20C."> Jacob S. C.</a>, <a href="https://publications.waset.org/abstracts/search?q=Melvin%20Lee"> Melvin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Kenneth%20Lo"> Kenneth Lo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, technological advancements have ushered in a new era of education characterized by the integration of technology-enabled devices and online tools. The cyber-physical learning environment (CPLE) is a prime example of this evolution, merging remote cyber participants with in-class learners through immersive technology, interactive digital whiteboards, and online communication platforms like Zoom and MS Teams. This approach transforms the teaching and learning experience into a more seamless, immersive, and inclusive one. This paper outlines the design principles and key features of CPLE that support both teaching and group-based activities. We also explore the key characteristics and potential impact of such environments on educational practices. By analyzing user feedback, we evaluate how technology enhances teaching and learning in a cyber-physical setting, its impact on learning outcomes, user-friendliness, and areas for further enhancement to optimize the teaching and learning environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20class" title="cyber-physical class">cyber-physical class</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20teaching" title=" hybrid teaching"> hybrid teaching</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20learning" title=" online learning"> online learning</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20learning" title=" remote learning"> remote learning</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20enabled%20learning" title=" technology enabled learning"> technology enabled learning</a> </p> <a href="https://publications.waset.org/abstracts/188926/fostering-enriched-teaching-and-learning-experience-using-effective-cyber-physical-learning-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188926.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">36</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14769</span> Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrea%20Tundis">Andrea Tundis</a>, <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Garc%C3%ADa%20Cordero"> Carlos García Cordero</a>, <a href="https://publications.waset.org/abstracts/search?q=Rolf%20Egert"> Rolf Egert</a>, <a href="https://publications.waset.org/abstracts/search?q=Alfredo%20Garro"> Alfredo Garro</a>, <a href="https://publications.waset.org/abstracts/search?q=Max%20M%C3%BChlh%C3%A4user"> Max Mühlhäuser</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Resilience is an important system property that relies on the ability of a system to automatically recover from a degraded state so as to continue providing its services. Resilient systems have the means of detecting faults and failures with the added capability of automatically restoring their normal operations. Mastering resilience in the domain of Cyber-Physical Systems is challenging due to the interdependence of hybrid hardware and software components, along with physical limitations, laws, regulations and standards, among others. In order to overcome these challenges, this paper presents a modeling approach, based on the concept of Dynamic Cells, tailored to the management of Smart Grids. Additionally, a heuristic algorithm that works on top of the proposed modeling approach, to find resilient configurations, has been defined and implemented. More specifically, the model supports a flexible representation of Smart Grids and the algorithm is able to manage, at different abstraction levels, the resource consumption of individual grid elements on the presence of failures and faults. Finally, the proposal is evaluated in a test scenario where the effectiveness of such approach, when dealing with complex scenarios where adequate solutions are difficult to find, is shown. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20systems" title="cyber-physical systems">cyber-physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20management" title=" energy management"> energy management</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grids" title=" smart grids"> smart grids</a>, <a href="https://publications.waset.org/abstracts/search?q=self-healing" title=" self-healing"> self-healing</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/55196/increasing-the-resilience-of-cyber-physical-systems-in-smart-grid-environments-using-dynamic-cells" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55196.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">326</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14768</span> Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brian%20Connett">Brian Connett</a>, <a href="https://publications.waset.org/abstracts/search?q=Bryan%20O%27Halloran"> Bryan O'Halloran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems" title=" cyber physical systems"> cyber physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation" title=" exploitation"> exploitation</a> </p> <a href="https://publications.waset.org/abstracts/56665/modeling-of-timing-in-a-cyber-conflict-to-inform-critical-infrastructure-defense" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14767</span> New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20war" title="cyber war">cyber war</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threats" title=" cyber threats"> cyber threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20operation%20capabilities" title=" cyber operation capabilities"> cyber operation capabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a> </p> <a href="https://publications.waset.org/abstracts/31541/new-requirements-of-the-fifth-dimension-of-war-planning-of-cyber-operation-capabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14766</span> A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qiang">Li Qiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Ze-Ming"> Yang Ze-Ming</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Bao-Xu"> Liu Bao-Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiang%20Zheng-Wei"> Jiang Zheng-Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20networks" title=" Bayesian networks"> Bayesian networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack%20attribution" title=" cyber-attack attribution"> cyber-attack attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Kill%20Chain" title=" Kill Chain"> Kill Chain</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20intelligence" title=" threat intelligence"> threat intelligence</a> </p> <a href="https://publications.waset.org/abstracts/50175/a-reasoning-method-of-cyber-attack-attribution-based-on-threat-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14765</span> Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Da%20Eun%20Sung">Da Eun Sung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security%20strategic" title=" cyber security strategic"> cyber security strategic</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20relation%20in%20cyberspace" title=" international relation in cyberspace"> international relation in cyberspace</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a> </p> <a href="https://publications.waset.org/abstracts/79049/cyber-security-in-russia-offense-defense-and-strategy-in-cyberspace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14764</span> An Investigation on Organisation Cyber Resilience </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arniyati%20Ahmad">Arniyati Ahmad</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Johnson"> Christopher Johnson</a>, <a href="https://publications.waset.org/abstracts/search?q=Timothy%20Storer"> Timothy Storer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates organisation cyber resilience (OCR) of participation sectors in cyber exercise called X Maya in Malaysia. This study used a principal based cyber resilience survey called C-Suite Executive checklist developed by World Economic Forum in 2012. To ensure suitability of the survey to investigate the OCR, the reliability test was conducted on C-Suite Executive checklist items. The research further investigates the differences of OCR in ten Critical National Infrastructure Information (CNII) sectors participated in the cyber exercise. The One Way ANOVA test result showed a statistically significant difference of OCR among ten CNII sectors participated in the cyber exercise. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20information%20infrastructure" title="critical information infrastructure">critical information infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title=" cyber resilience"> cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=organisation%20cyber%20resilience" title=" organisation cyber resilience"> organisation cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20test" title=" reliability test"> reliability test</a> </p> <a href="https://publications.waset.org/abstracts/29946/an-investigation-on-organisation-cyber-resilience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14763</span> Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Kaur">Manpreet Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Amita%20Rani"> Amita Rani</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Kumar"> Sanjay Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20systems" title=" cyber-physical systems"> cyber-physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=congestion%20control" title=" congestion control"> congestion control</a>, <a href="https://publications.waset.org/abstracts/search?q=priority" title=" priority"> priority</a>, <a href="https://publications.waset.org/abstracts/search?q=transmission%20rate" title=" transmission rate"> transmission rate</a> </p> <a href="https://publications.waset.org/abstracts/108306/multi-level-clustering-based-congestion-control-protocol-for-cyber-physical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14762</span> A Holistic Approach to Institutional Cyber Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20defence" title="cyber defence">cyber defence</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/26126/a-holistic-approach-to-institutional-cyber-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26126.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14761</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14760</span> Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serkan%20Ya%C4%9Fl%C4%B1">Serkan Yağlı</a>, <a href="https://publications.waset.org/abstracts/search?q=Sel%C3%A7uk%20Dal"> Selçuk Dal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20cyber%20defence" title="active cyber defence">active cyber defence</a>, <a href="https://publications.waset.org/abstracts/search?q=advanced%20persistent%20treat" title=" advanced persistent treat"> advanced persistent treat</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=NATO" title=" NATO"> NATO</a> </p> <a href="https://publications.waset.org/abstracts/3927/active-cyber-defense-within-the-concept-of-natos-protection-of-critical-infrastructures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3927.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">243</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14759</span> A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haowen%20Xu">Haowen Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaobing%20Liu"> Xiaobing Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jin%20Dong"> Jin Dong</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianming%20Lian"> Jianming Lian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy-saving%20buildings" title="energy-saving buildings">energy-saving buildings</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20twins" title=" digital twins"> digital twins</a>, <a href="https://publications.waset.org/abstracts/search?q=HVAC" title=" HVAC"> HVAC</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20%20system" title=" cyber-physical system"> cyber-physical system</a>, <a href="https://publications.waset.org/abstracts/search?q=BIM" title=" BIM"> BIM</a> </p> <a href="https://publications.waset.org/abstracts/162727/a-digital-twin-approach-to-support-real-time-situational-awareness-and-intelligent-cyber-physical-control-in-energy-smart-buildings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">110</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14758</span> Adapting Cyber Physical Production Systems to Small and Mid-Size Manufacturing Companies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yohannes%20Haile">Yohannes Haile</a>, <a href="https://publications.waset.org/abstracts/search?q=Dipo%20Onipede"> Dipo Onipede</a>, <a href="https://publications.waset.org/abstracts/search?q=Jr."> Jr.</a>, <a href="https://publications.waset.org/abstracts/search?q=Omar%20Ashour"> Omar Ashour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main thrust of our research is to determine Industry 4.0 readiness of small and mid-size manufacturing companies in our region and assist them to implement Cyber Physical Production System (CPPS) capabilities. Adopting CPPS capabilities will help organizations realize improved quality, order delivery, throughput, new value creation, and reduced idle time of machines and work centers of their manufacturing operations. The key metrics for the assessment include the level of intelligence, internal and external connections, responsiveness to internal and external environmental changes, capabilities for customization of products with reference to cost, level of additive manufacturing, automation, and robotics integration, and capabilities to manufacture hybrid products in the near term, where near term is defined as 0 to 18 months. In our initial evaluation of several manufacturing firms which are profitable and successful in what they do, we found low level of Physical-Digital-Physical (PDP) loop in their manufacturing operations, whereas 100% of the firms included in this research have specialized manufacturing core competencies that have differentiated them from their competitors. The level of automation and robotics integration is low to medium range, where low is defined as less than 30%, and medium is defined as 30 to 70% of manufacturing operation to include automation and robotics. However, there is a significant drive to include these capabilities at the present time. As it pertains to intelligence and connection of manufacturing systems, it is observed to be low with significant variance in tying manufacturing operations management to Enterprise Resource Planning (ERP). Furthermore, it is observed that the integration of additive manufacturing in general, 3D printing, in particular, to be low, but with significant upside of integrating it in their manufacturing operations in the near future. To hasten the readiness of the local and regional manufacturing companies to Industry 4.0 and transitions towards CPPS capabilities, our working group (ADMAR Working Group) in partnership with our university have been engaged with the local and regional manufacturing companies. The goal is to increase awareness, share know-how and capabilities, initiate joint projects, and investigate the possibility of establishing the Center for Cyber Physical Production Systems Innovation (C2P2SI). The center is intended to support the local and regional university-industry research of implementing intelligent factories, enhance new value creation through disruptive innovations, the development of hybrid and data enhanced products, and the creation of digital manufacturing enterprises. All these efforts will enhance local and regional economic development and educate students that have well developed knowledge and applications of cyber physical manufacturing systems and Industry 4.0. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automation" title="automation">automation</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20production%20system" title=" cyber-physical production system"> cyber-physical production system</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20manufacturing%20enterprises" title=" digital manufacturing enterprises"> digital manufacturing enterprises</a>, <a href="https://publications.waset.org/abstracts/search?q=disruptive%20innovation" title=" disruptive innovation"> disruptive innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20value%20creation" title=" new value creation"> new value creation</a>, <a href="https://publications.waset.org/abstracts/search?q=physical-digital-physical%20loop" title=" physical-digital-physical loop"> physical-digital-physical loop</a> </p> <a href="https://publications.waset.org/abstracts/102165/adapting-cyber-physical-production-systems-to-small-and-mid-size-manufacturing-companies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14757</span> Cyber Operational Design and Military Decision Making Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Karaman">M. Karaman</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Catalkaya"> H. Catalkaya </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20operational%20design" title="cyber operational design">cyber operational design</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20decision%20making%20process%20%28MDMP%29" title=" military decision making process (MDMP)"> military decision making process (MDMP)</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a>, <a href="https://publications.waset.org/abstracts/search?q=end%20state" title=" end state"> end state</a> </p> <a href="https://publications.waset.org/abstracts/26415/cyber-operational-design-and-military-decision-making-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">589</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14756</span> Applications of AI, Machine Learning, and Deep Learning in Cyber Security </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hailyie%20Tekleselase">Hailyie Tekleselase</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=big%20data" title=" big data"> big data</a> </p> <a href="https://publications.waset.org/abstracts/124424/applications-of-ai-machine-learning-and-deep-learning-in-cyber-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124424.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14755</span> Cyber Aggression, Cyber Bullying and the Dark Triad: Effect on Workplace Behavior and Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anishya%20Obhrai%20Madan">Anishya Obhrai Madan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In an increasingly connected world, where speed of communication attempts to match the speed of thought and thus intentions; conflict gets actioned faster using media like the internet and telecommunication technology. This has led to a new form of aggression: “cyber bullying”. The present paper attempts to integrate existing theory on bullying, and the dark triad personality traits in a work environment and extrapolate it to the cyber context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflict%20at%20work" title="conflict at work">conflict at work</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20bullying" title=" cyber bullying"> cyber bullying</a>, <a href="https://publications.waset.org/abstracts/search?q=dark%20triad%20of%20personality" title=" dark triad of personality"> dark triad of personality</a>, <a href="https://publications.waset.org/abstracts/search?q=toxic%20employee" title=" toxic employee"> toxic employee</a> </p> <a href="https://publications.waset.org/abstracts/11191/cyber-aggression-cyber-bullying-and-the-dark-triad-effect-on-workplace-behavior-and-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">230</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14754</span> Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Baba%20Ahmed">Nasir Baba Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicolas%20Daclin"> Nicolas Daclin</a>, <a href="https://publications.waset.org/abstracts/search?q=Marc%20Olivaux"> Marc Olivaux</a>, <a href="https://publications.waset.org/abstracts/search?q=Gilles%20Dusserre"> Gilles Dusserre</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=assessment%20framework" title="assessment framework">assessment framework</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20resilience" title=" cyber resilience"> cyber resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20field%20hospital" title=" mobile field hospital"> mobile field hospital</a> </p> <a href="https://publications.waset.org/abstracts/130214/improving-cyber-resilience-in-mobile-field-hospitals-towards-an-assessment-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=492">492</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=493">493</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>