A new mixed-initiative hierarchical framework of humans and agents that is well suited to protecting computational infrastructures. The framework, Cooperative Infrastructure Defense (CID), is designed to rapidly adapt to new cyber attacks via swarming software agents while enabling humans to supervise the system at an appropriate level. We interpose a hierarchy of rational software agents between the swarm and the human supervisors to provide a channel for system guidance and feedback. Using various kinds of rationality actually turns false positives into beneficial forms of positive feedback and improves system performance. CID represents a revolutionary new way of looking at system control for cyber security. Traditionally, humans control...
Cyber-physical systems (CPSs) are nowadays an important component of most industrial infrastructure...
egistered parties behind firewalls in strictly controlled environments carry out most substantial, a...
In this article, we describe how we implement human-machine teamwork in Sol, a framework for cyber o...
The last few years have witnessed the radical transformation in structure and functionality of elect...
We study the application of cyber-physical hierarchy on a class of smart grid systems to improve sca...
International audienceThe North Atlantic Treaty Organization (NATO) Research Task Group IST-152 deve...
TDMAA provides a framework for cooperative cyber defense for groups of interdependent enclaves via a...
Security of control systems is becoming a pivotal concern in critical national infrastructures such ...
This paper describes a security platform as a complex system of holonic communities, that are hierar...
M.Com. (Informatics)Critical Infrastructure is the term used to describe assets that are of utmost i...
. A metacomputing environment is a collection of geographically distributed resources (people, compu...
The increased decentralisation and heterogeneity of critical infrastructure systems pose a threat to...
M.Sc. (Information Technology)The purpose of the research presented in this dissertation is to explo...
The network-centric warfare philosophy is becoming more firmly entrenched in US military doctrine an...
The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it b...
Cyber-physical systems (CPSs) are nowadays an important component of most industrial infrastructure...
egistered parties behind firewalls in strictly controlled environments carry out most substantial, a...
In this article, we describe how we implement human-machine teamwork in Sol, a framework for cyber o...
The last few years have witnessed the radical transformation in structure and functionality of elect...
We study the application of cyber-physical hierarchy on a class of smart grid systems to improve sca...
International audienceThe North Atlantic Treaty Organization (NATO) Research Task Group IST-152 deve...
TDMAA provides a framework for cooperative cyber defense for groups of interdependent enclaves via a...
Security of control systems is becoming a pivotal concern in critical national infrastructures such ...
This paper describes a security platform as a complex system of holonic communities, that are hierar...
M.Com. (Informatics)Critical Infrastructure is the term used to describe assets that are of utmost i...
. A metacomputing environment is a collection of geographically distributed resources (people, compu...
The increased decentralisation and heterogeneity of critical infrastructure systems pose a threat to...
M.Sc. (Information Technology)The purpose of the research presented in this dissertation is to explo...
The network-centric warfare philosophy is becoming more firmly entrenched in US military doctrine an...
The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it b...
Cyber-physical systems (CPSs) are nowadays an important component of most industrial infrastructure...
egistered parties behind firewalls in strictly controlled environments carry out most substantial, a...
In this article, we describe how we implement human-machine teamwork in Sol, a framework for cyber o...