480 resultados para Cyber


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the energy management of a small power system, the scheduling of the generation units is a crucial problem for which adequate methodologies can maximize the performance of the energy supply. This paper proposes an innovative methodology for distributed energy resources management. The optimal operation of distributed generation, demand response and storage resources is formulated as a mixed-integer linear programming model (MILP) and solved by a deterministic optimization technique CPLEX-based implemented in General Algebraic Modeling Systems (GAMS). The paper deals with a vision for the grids of the future, focusing on conceptual and operational aspects of electrical grids characterized by an intensive penetration of DG, in the scope of competitive environments and using artificial intelligence methodologies to attain the envisaged goals. These concepts are implemented in a computational framework which includes both grid and market simulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Localization is a fundamental task in Cyber-Physical Systems (CPS), where data is tightly coupled with the environment and the location where it is generated. The research literature on localization has reached a critical mass, and several surveys have also emerged. This review paper contributes on the state-of-the-art with the proposal of a new and holistic taxonomy of the fundamental concepts of localization in CPS, based on a comprehensive analysis of previous research works and surveys. The main objective is to pave the way towards a deep understanding of the main localization techniques, and unify their descriptions. Furthermore, this review paper provides a complete overview on the most relevant localization and geolocation techniques. Also, we present the most important metrics for measuring the accuracy of localization approaches, which is meant to be the gap between the real location and its estimate. Finally, we present open issues and research challenges pertaining to localization. We believe that this review paper will represent an important and complete reference of localization techniques in CPS for researchers and practitioners and will provide them with an added value as compared to previous surveys.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a distributed algorithm for cyber-physical systems to obtain a snapshot of sensor data. The snapshot is an approximate representation of sensor data; it is an interpolation as a function of space coordinates. The new algorithm exploits a prioritized medium access control (MAC) protocol to efficiently transmit information of the sensor data. It scales to a very large number of sensors and it is able to operate in the presence of sensor faults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction : La cyber santé (CS) a le potentiel d’améliorer l'efficience et l'efficacité des services de santé. Malgré cela, son adoption demeure problématique et jusqu’à 70 % des projets d’implantation échouent. Objectifs : Cette étude vise à évaluer l’état de préparation d’une organisation par rapport à la CS et à identifier les facteurs personnels qui influencent cet état. Méthode : Une étude transversale a été réalisée auprès de 137 cliniciens, 28 gestionnaires et 47 membres du personnel non clinique d’un centre de réadaptation à Montréal. Les participants ont répondu à un questionnaire auto administré sur l’état de préparation organisationnelle vis-à-vis la CS qui comprend trois sous échelles (Individu, Organisation et Technologie) avec chacune un score sur 100. Des données ont aussi été colligées sur le profil des utilisateurs, leur utilisation des technologies et leur style de réponse à la nouvelle information. Résultats : Les participants se perçoivent prêts à adopter la CS dans leur travail ( = 73.8, SD = 8.5) et perçoivent aussi favorablement les technologies disponibles ( = 73.8, SD = 7.2). Toutefois, le personnel perçoit le centre comme étant modérément prête ( = 66.6, SD = 9.8). La charge de travail perçue et la fonction au sein de l'organisation ont été identifiées comme ayant une influence sur l'état de préparation à la CS. Discussion : Ces résultats appuient la pertinence d’aborder l’état de préparation organisationnelle comme un concept multidimensionnel. À partir des résultats obtenus, des stratégies d'implantation adaptées ont pu être identifiées.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber Physical systems (CPS) connect the physical world with cyber world. The events happening in the real world is enormous and most of it go unnoticed and information is lost. CPS enables to embed tiny smart devices to capture the data and send it to Internet for further processing. The entire set-up call for lots of challenges and open new research problems. This talk is a journey through the landscape of research problems in this emerging area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber-Mobbing-Tod eines Teenagers“ titelt Spiegel-Online 2007: auch auf Stern.de (2009) findet sich die Meldung: „15-jährige tötet sich nach Cyber-Mobbing“, Zeit Online (2009) berichtet ebenfalls über diesen Vorfall. In Deutschland sind bisher keine derartigen Extremfälle öffentlich bekannt, dennoch ist das Phänomen, vermutlich veranlasst durch diese oder ähnliche Vorfälle, in das Interesse der medialen Öffentlichkeit gerückt. Diese Arbeit geht daher der Frage auf den Grund, ob Cyber-Mobbing auch ein Problem an deutschen Schulen ist und in welchem Ausmaß es dort auftritt. Im Fokus stehen jedoch nicht die genannten Extremfälle, da sie glücklicherweise eher eine Seltenheit darstellen, sondern alltägliche Formen des Cyber-Mobbings, weil genau hier der Grundstein für solch furchtbare Ereignisse gelegt wird. Cyber-Mobbing ist ein recht neues und junges Phänomen, das noch nicht allzu lange im Fokus der wissenschaftlichen Welt steht. Daher gelten viele Facetten als noch nicht ausreichend erschlossen, um eindeutige Aussagen hinsichtlich bestimmter Kausalitäten zu machen. Eine Vielzahl der wissenschaftlichen Arbeiten orientiert sich daher am Konzept des Mobbings, um Unterschiede oder Gemeinsamkeiten zwischen diesen Spielarten der Gewalt herauszuarbeiten. Daher folgt die vorliegende Arbeit dieser Tradition in metaanalytischer Form, untersucht folglich bestehende Literatur und setzt diese in einen kausalen Zusammenhang. Leitend für die Literaturanalyse ist die Frage ob sich die Dimensionen schulischer Gewalt, in diesem Falle Mobbing, durch die neuen Kommunikationsmedien verändert haben. Die Beantwortung dieser Frage zielt primär darauf ab herauszufinden, ob Cyber-Mobbing ähnlichen Strukturen folgt, wie Mobbing oder aber spezifische Muster existieren und ob die Schüler, die in Cyber-Mobbing involviert sind, auch in Mobbing verwickelt sind oder von einer Verschiebung der Interaktionsmuster gesprochen werden kann. Handelt es sich bei Cyber-Mobbing also um eine neue Form des Mobbings, oder um ein eigenständiges und unabhängiges Phänomen?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Talk given by Gary Kibby from SOCA at the Web Science Industry Week in Dec 2012. Readings and task taken from previous years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This resource is an informational resource that attempts to inform the general public about security and privacy with using the internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resource and flyer produced for INFO2009 12/13. An animation on public-key encryption related to cybercrime and cybersecurity. Target audience is undergraduates, but the resource does not assume prior knowledge of the topics, or any in-depth knowledge of IT.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

These are white papers and reports on Command and Control and Cyber Kill Chain. Consider these readings "almost" required. That is, I'd like you to make a serious effort at reading them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cybersecurity is a complex challenge that has emerged alongside the evolving global socio-technical environment of social networks that feature connectivity across time and space in ways unimaginable even a decade ago. This paper reports on the preliminary findings of a NATO funded project that investigates the nature of innovation in open collaborative communities and its implications for cyber security. In this paper, the authors describe the framing of relevant issues, the articulation of the research questions, and the derivation of a conceptual framework based on open collaborative innovation that has emerged from preliminary field research in Russia and the UK.