J. Mingers
Hasil untuk "Cybernetics"
Menampilkan 20 dari ~134539 hasil · dari CrossRef, DOAJ, Semantic Scholar
Zeshui Xu
Bronagh Lanigan, Zeinab Rezaeifar, Federico Cruciani et al.
With the increasing diversity of IoT devices, keeping IT systems secure is becoming increasingly difficult. Attackers exploit vulnerabilities within the system in order to access sensitive information, typically reaching their objective through several steps. Current Intrusion Detection Systems (IDSs) focus on low-level alerts, and tend to produce a high rate of false positives. This type of information alone is insufficient for the detection of sophisticated attack scenarios such Advanced Persistent Threats (APTs). Consequently, correlation techniques have recently been introduced to correlate alerts and reconstruct attack scenarios, however, various attack scenarios exist, with diverse characteristics. Also, different steps of the APTs scenarios may have their own characteristics. Therefore, finding a proper method that covers all cases remains a challenge. Moreover, after detecting APTs, how the system should respond to these attacks to avoid sabotage to the system remains a challenge. Thus, in this paper, first for detection of the attacks, we classify different cases, and then, a method based on different characteristics of attack patterns is proposed to detect APT scenarios. The proposed method consists of two main phases: APT detection and the intelligent hybrid response framework. In APT detection phase, similar alerts are aggregated and attack graphs are generated based on a similarity matrix. These graphs, combined with third party API data enable alert correlation and APT scenario detection. Entity graphs are then created to visualise host behaviour, and alert graphs are analysed to detect APT scenarios. In the response phase, attack graphs produced from the correlation inform the hybrid response framework, integrating knowledge and data-driven components that facilitate automated or recommended mitigation. The approach was evaluated on the ZeekData24 dataset. Obtained precision and recall on the malicious traffic was observed to be 96.65% and 87.04% respectively. The results show that our approach can effectively filter false positive alerts with a reduction of the data going from 10,063 alerts daily to 586 meta-alerts, pruned to 48 attack graphs and finally reduced to 20 suspicious attack graphs.
A. Zwitter
Governance theory in political science and international relations has to adapt to the onset of an increasingly digital society. However, until now, technological advancements and the increasing convergence of technologies outpace regulatory efforts and frustrate any efforts to apply ethical and legal frameworks to these domains. This is due to the convergence of multiple, sometimes incompatible governance frameworks that accompany the integration of technologies on different platforms. This theoretical claim will be illustrated by examples such as the integration of technologies on the “human platform” as it is referred to in the case of enhanced soldiers. Hence, successful governance might require new approaches borrowed from a distant relative, namely cybernetics. Insights gained from cybernetics for governance theories might be able to give guidance for a more efficient and adaptive governance approach that is able to deal with increasing complexity caused by technology and governance convergence. While cybernetics itself might be considered a governance approach, it has had surprisingly little reception in the wider field of governance within the area of social and political sciences. This article will develop cybernetic governance as a set of expandable governance principles that are applicable to an increasingly complex digital and smart society. It thereby tries to further galvanise what could be termed cybernetic governance theory as a subject of worthwhile insights from the combination of otherwise largely the disjoined fields of cybernetics and governance.
Areej ElSayary
This paper explores the innovative integration of Generative AI (GenAI) in active learning environments to augment metacognitive knowledge and technological skill development among students. While active learning has been pivotal in promoting student engagement and learning, the incorporation of GenAI presents a novel approach to further enhance these outcomes. The study investigates how GenAI tools can be utilized within a reflective practice model to bolster metacognitive regulation and technological proficiency. By discussing the synergistic relationship between GenAI, active learning, and metacognitive strategies, this paper provides insights into the evolving landscape of educational technology and its impact on student learning processes. The paper offers a theoretical framework based on established concepts in metacognition, active learning, reflective practice, and technological skills, contextualized within the realm of GenAI. This paper contributes to the understanding of how GenAI can be harnessed as an educational tool, facilitating deeper and more effective learning experiences.
Mahfooz Ahmad, Eram Fatima, Ankit Shukla et al.
Quantum security is an evolving field that leverages principles of quantum physics to strengthen computing systems. Core concepts such as superposition and entanglement are foundation to this domain. However, current systems face significant challenges due to the extraordinary processing capabilities of quantum computers. As large-scale quantum computers with high qubit counts become operational, existing cybersecurity mechanisms are increasingly inadequate. This rapid advancement in quantum computing poses substantial risks to software, networks, web-based systems, and other security measures. To address these challenges, enhancing cybersecurity mechanisms is imperative. This paper explores various quantum security strategies categorized into six mechanisms (E1 to E6) and examines their effects on cybersecurity factors labeled H1 through H8. The analysis employs the Fuzzy Analytic Hierarchy Process (F-AHP) method, which assesses the relative importance of these factors based on an extensive literature review. By calculating the weight of different security aspects, the F-AHP method provides insights to prioritize critical components throughout the development cycle. The findings reveal that quantum-resistant cryptography is the most effective security measure. In contrast, digital signatures resistant to quantum errors were assigned the lowest priority, while the software system (H2) received the highest priority. These results underscore the importance of developing robust cybersecurity frameworks that align with the capabilities of quantum technology. As the field advances, it is crucial to design software, networks, and security systems that support the optimal functionality of quantum computers. Implementing quantum security mechanisms can significantly reduce vulnerabilities and mitigate the risk of cyberattacks. Over the next decade, new approaches to cybersecurity risk analysis leveraging quantum technology are expected to emerge, paving the way for enhanced cyber resilience in a quantum-powered future.
E.G. Abramochkin, V.V. Kotlyar, A.A. Kovalev
We obtain explicit analytic expressions for the Ince-Gaussian (IG) beams for several first indices p = 3, 4, 5, 6. Earlier, explicit expressions have been derived for amplitudes of the IG beams with p = 0, 1, 2 and without regard for the ellipticity parameter. Here, we give expressions for the amplitudes of 24 IG beams written as superpositions of the Laguerre-Gaussian (LG) or Hermite-Gaussian (HG) beams, with the superposition coefficients explicitly depending on the ellipticity parameter. Simultaneously expressing the IG modes both via the LG and HG modes allows easily obtaining the IG modes in the extreme cases when the ellipticity parameter is zero or infinite. Explicit dependence of the obtained expressions for the IG modes on the ellipticity allows the intensity pattern at the beam cross-section to be varied by continuously varying the parameter value. For the first time, intensity distributions are obtained for the IG beams with negative ellipticity parameter.
Seyedmohsen Hosseini, D. Ivanov, Jennifer Blackhurst
In this article, we explore the topic of supply chain resilience (SCR) in an open-system context. Systems theory and cybernetics are important methodologies in the analysis of complex networks. However, relatively little is known about their application in the supply chain (SC) operations. Using systems theory and cybernetics for SCR conceptualization, we argue that a systems-theoretical lens can help to extend the state-of-the-art research to describe SCR based on the concept of balancing vulnerability and recoverability over time. Toward this end, we define and test a new resilience measure for SCR using the Bayesian network approach with a compounding function of vulnerability and recoverability. We further propose managerial actions for implementing an open-system view of SCR. To demonstrate the applicability and usefulness of our method, we measure and analyze the resilience levels of a manufacturer. Our results provide useful decision-making support and can be valuable for SC managers seeking to balance risk mitigation and recovery capabilities. The framework and measure developed can also be used to guide firms seeking to analyze the impact of disruptions on SCs through the consideration of both performance degradation and recovery.
Alexander L. Fradkov
: Machine learning belongs to the crossroad of cybernetics (control science) and computer science. It is attracting recently an overwhelming interest, both of professionals and of the general public. In the talk a brief overview of the historical development of the machine learning field with a focus on the development of mathematical apparatus in its first decades is provided. A number of little-known facts published in hard to reach sources are presented.
J. Mingers, L. White
Maroš Krivý
M. Jackson
In 1956, Hans Selye tentatively suggested that the scientific study of stress could ‘help us to formulate a precise program of conduct’ and ‘teach us the wisdom to live a rich and meaningful life’. Nearly two decades later, Selye expanded this limited vision of social order into a full-blown philosophy of life. In Stress without Distress, first published in 1974, he proposed an ethical code of conduct designed to mitigate personal and social problems. Basing his arguments on contemporary understandings of the biological processes involved in stress reactions, Selye referred to this code as ‘altruistic egotism’. This article explores the origins and evolution of Selye’s ‘natural philosophy of life’, analysing the links between his theories and adjacent intellectual developments in biology, psychosomatic and psychosocial medicine, cybernetics and socio-biology, and situating his work in the broader cultural framework of modern western societies.
Andrey Zuev, Dmytro Karaman , Andrey Olshevskiy
Topicality. The key part of experimental research is obtaining the most accurate data about the studied object or event. Often, it is necessary to record parameters of processes that are c hallenging to precisely localize in space and time. The process or event under consideration can occur very rapidly, within fractions of a second, making it difficult for the researcher to deploy and configure recording equipment. This necessitates the creation of a network consisting of numerous recording devices to not miss critical events related to the studied process and obtain a sufficient volume of experimental data. Another issue is the synchronization of data obtained from different measurement devices. Spatially distributed recording devices must operate with a high degree of autonomy, leading to discrepancies in timekeeping and the need for synchronization. In processes with sub-millisecond durations, imperfections in timekeeping at each node have a significant impact: undetected and unaccounted discrepancies can lead to distortion or a misunderstanding of the overall picture of the studied process or event, even after acquiring all the necessary data. This is why the development and improvement of methods for synchronizing data recording nodes in distributed wireless sensor networks is important and urgent task. Task statement. One practical application of the proposed solution is the study of injuries caused by the penetration of foreign objects with high kinetic energy into the human body. These studies are conducted using artificial simulators of the human body made from composite materials and ballistic gelatin, with implanted electronic devices for recording changes in physical parameters. Results and conclusions. The article presents a hardware and software method, along with the technical implementation of the process for synchronizing the local clocks of wireless nodes, integrated into a unified information-measurement system located on the simulator. The proposed method allows achieving synchronization accuracy of no more than 12 μs/second using low-cost commercial off-the-shelf components. The practical part of the research discusses microprocessors from the ESP family, which, in general, provide sufficient time synchronization accuracy when using the proposed method, allowing for cost-effective node development within the system. The proposed method can also be applied in other fields, such as measuring vibrations in electrical machines and engines, as well as structural health monitoring.
Andrey V. Bondarenko, Konstantin V. Mushovets, Sergey V. Porshnev et al.
The paper is devoted to a complex analysis of the current system of regulations in the field of security of critical information infrastructure (CII) facilities of the Russian Federation from the point of view of the logic of formation of the legal basis and the chronology of their creation, the results of which have provided a systematic regulatory framework for the security of CII facilities. The main directions of legislative activity in the field of security CII of the Russian Federation have been highlighted and a classification of the current legal acts in terms of it’s requirements has been proposed..The evolution of the content of the regulatory system to ensure the security of significant CII facilities has been described. The results of the analysis led to the conclusion that the state and regulators in the field of IS has developed a sufficient regulatory framework that defines the basic rules, procedures and requirements for the process of categorization, monitoring of its results, as well as providing information security of significant CII facilities. At the same time, on the basis of the experience of categorization of significant objects of the gas industry by the heat and power complex of the Russian Federation, a hypothesis has been made that the establishment of the information security system at specific significant CII sites (e.g., a variety of types of CII objects and areas of activity of CII entities) will require not only the application of existing legal instruments, but also the development of existing sectoral methodical documents in the field of categorization of objects of CII and in the field of construction of the information security system, taking into account their sectoral characteristics.
Halaman 26 dari 6727