Now showing 1 - 5 of 5
- PublicationRisk Management and Standard Compliance for Cyber-Physical Systems of SystemsThe Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.
104 138Scopus© Citations 7
- PublicationKnowledge Based Training Derived from Risk Evaluation Concerning Failure Mode, Effects and Criticality Analysis in Autonomous Railway Systems
102Scopus© Citations 1
- PublicationConsidering Cybersecurity with Trustworthy IoT in Smart Cities
- PublicationA Framework to identify People, Devices and Services in Cyber-physical system of systemsMany online services and their service providers require the electronic proof of identity for the secure authentication of citizens. Internet of Things (IoT)- and Cyber-Physical Systems (CPS)-services and devices are increasing and these are used in different areas. Furthermore, the increasing distribution of online services and IoT devices need to be monitored, especially in critical infrastructure. The proposal of a framework to authenticate and identify people, devices and services can be a useful tool to improve security and trust in CPS, linking them with identified people by utilizing and combining tools which do exist in isolation. IoT frameworks and identity protocols combined with responsible people, hardware, smartphone-applications, and certification authorities can provide secure authentication, trustworthy communication and the management of identities and permissions. This position paper proposes an IoT-framework for (critical infrastructure) service providers and public administration to authenticate, identify and manage their running devices and services as well as people, their electronic identification and sent records. This can improve the reaction time and processes additionally providing trust and secure communication between people, devices and services, especially for authorities in critical infrastructure areas, where humans and their safety are particularly important.
- PublicationProceedings of the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021)(Springer, 2022-02-02)
;Abraham, Ajith ;Engelbrecht, Andries ;Scotti, Fabio ;Gandhi, Niketa ;Manghirmalani Mishra, Pooja ;Fortino, Giancarlo ;Sakalauskas, VirgilijusThis book highlights the recent research on soft computing, pattern recognition, nature-inspired computing and their various practical applications. It presents 53 selected papers from the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021) and 11 papers from the 13th World Congress on Nature and Biologically Inspired Computing (NaBIC 2021), which was held online, from December 15 to 17, 2021. A premier conference in the field of soft computing, artificial intelligence and machine learning applications, SoCPaR-NaBIC 2021 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from over 20 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of computer science and engineering. 173