This paper presents a security information distribution architecture that allows decentralised adaptation and response to security threats. The inspiration for this work and its underlying principles lie in the human immune system and its mechanisms for adapting to and sharing information about threats. The architecture assumes that the network is heterogeneous and contains low-level controllers (such as Siemens programmable logic controllers) as well as computers running conventional operating systems. It attempts to reduce computational overhead on components that are limited in resources and to exploit computational capacity where there is excess. In part this is achieved by using a set of metrics to measure damage that are analysed loca...
Decentralized monitors can be subject to robustness and security risks. Robustness risks include att...
A major trend in the automation and power industries is the transition from closed proprietary netwo...
The constant increase of malware threats clearly shows that the present countermeasures are not suff...
The complexity of modern network architectures and the epidemic diffusion of malware require collabo...
With the rapid development of functional requirements in the emerging Industry 4.0 era, modern indus...
Abstract. The complexity of modern network architectures and the epi-demic diffusion of malware requ...
In this paper, we consider networked systems in the presence of Denial-of-Service (DoS) attacks, nam...
In today's Industrial Control Systems (ICSs) interconnection and reliable communication are valuable...
The severity of cyber threats towards existing and future industrial systems has resulted in an incr...
Opinion Dynamics poses a novel technique to accurately locate the patterns of an advanced attack aga...
Critical infrastructure systems continue to foster predictable communication patterns and static con...
A new mixed-initiative hierarchical framework of humans and agents that is well suited to protecting...
Critical infrastructures are the backbone of everyday life and their protection from cyber-threats i...
The growing interest in fog and edge computing is gradually but inexorably outlining new architectur...
In this research, a security architecture based on the feedback control theory has been proposed. Th...
Decentralized monitors can be subject to robustness and security risks. Robustness risks include att...
A major trend in the automation and power industries is the transition from closed proprietary netwo...
The constant increase of malware threats clearly shows that the present countermeasures are not suff...
The complexity of modern network architectures and the epidemic diffusion of malware require collabo...
With the rapid development of functional requirements in the emerging Industry 4.0 era, modern indus...
Abstract. The complexity of modern network architectures and the epi-demic diffusion of malware requ...
In this paper, we consider networked systems in the presence of Denial-of-Service (DoS) attacks, nam...
In today's Industrial Control Systems (ICSs) interconnection and reliable communication are valuable...
The severity of cyber threats towards existing and future industrial systems has resulted in an incr...
Opinion Dynamics poses a novel technique to accurately locate the patterns of an advanced attack aga...
Critical infrastructure systems continue to foster predictable communication patterns and static con...
A new mixed-initiative hierarchical framework of humans and agents that is well suited to protecting...
Critical infrastructures are the backbone of everyday life and their protection from cyber-threats i...
The growing interest in fog and edge computing is gradually but inexorably outlining new architectur...
In this research, a security architecture based on the feedback control theory has been proposed. Th...
Decentralized monitors can be subject to robustness and security risks. Robustness risks include att...
A major trend in the automation and power industries is the transition from closed proprietary netwo...
The constant increase of malware threats clearly shows that the present countermeasures are not suff...