Securing Autonomous Networks through Virtual Closure
نویسندگان
چکیده
منابع مشابه
Securing Industrial Control Systems through Autonomous Hardening
The secure and reliable operation of industrial control systems is becoming more and more challenging due to the increasing size, complexity, and heterogeneity of such systems. A constant change of requirements and responsibilities results in an increased frequency of configuration and topological changes, which renders a manual verification of system security infeasible. Thus, there is a need ...
متن کاملSecuring Autonomous Systems
The security of an autonomous system, which consists of autonomous entities, could be compromised as a result of a physical or electronic attack. The compromise of information assets such as a system’s processing base or its communications links could potentially place an enemy ahead in terms of the OODA (Observe, Orient, Decide and Act) loop; it is this aspect of electronic warfare, which is c...
متن کاملBenchmarking smart spaces through autonomous virtual agents
In the recent years there has been a growing interest in the design and implementation of smart homes. The evaluation of these approaches requires massive datasets of measurements from deployed sensors in real prototypes. While datasets obtained by real smart homes are freely available, they are not sufficient for comparing different approaches and techniques in a variety of configurations. In ...
متن کاملSecuring Atm Networks Securing Atm Networks
This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) networks. We look at the challenge in providing such a secure ATM network and identify the important issues in achieving such goal. In this paper, we discuss the issues and problems involved and outline some techniques to solving these problems. The network environment is rst examined and we also cons...
متن کاملSecuring Virtual Coordinate System Based Routing in Wireless Sensor Networks
Virtual coordinate system (VCS) based routing provides a practical, efficient and scalable means for point-to-point routing in wireless sensor networks. Several VCS-based routing protocols have been proposed in the last few years, all assuming that nodes are cooperative. However, malicious nodes may violate this assumption, making VCS-based routing protocols vulnerable to numerous attacks. Thus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Intelligent Computing Research
سال: 2016
ISSN: 2042-4655
DOI: 10.20533/ijicr.2042.4655.2016.0085