Security and Privacy in Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.
As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less
Optimization and Control of Cyber-Physical Vehicle Systems
Bradley, Justin M.; Atkins, Ella M.
2015-01-01
A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined. PMID:26378541
Optimization and Control of Cyber-Physical Vehicle Systems.
Bradley, Justin M; Atkins, Ella M
2015-09-11
A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.
Analysis of white box test of cyber-physical system
NASA Astrophysics Data System (ADS)
Li, Bo; Zhang, Lichen
2017-05-01
The Cyber-Physical System is a complex system in which the information system is closely integrated with the physical system. Through the environment detection and the combination of computing, communication and control process, the physical real-time perception and dynamic control function are realized. CPS is another information revolution after the Internet, and his presence will change the way people interact with the physical world. In this paper, the concept of CPS and white box testing is introduced, and then the white box test for CPS hardware, software, network and system is discussed in detail. Finally, the research on CPS is prospected.
High Assurance Control of Cyber-Physical Systems with Application to Unmanned Aircraft Systems
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
With recent progress in the networked embedded control technology, cyber attacks have become one of the major threats to Cyber-Physical Systems (CPSs) due to their close integration of physical processes, computational resources, and communication capabilities. While CPSs have various applications in both military and civilian uses, their on-board automation and communication afford significant advantages over a system without such abilities, but these benefits come at the cost of possible vulnerability to cyber attacks. Traditionally, most cyber security studies in CPSs are mainly based on the computer security perspective, focusing on issues such as the trustworthiness of data flow, without rigorously considering the system's physical processes such as real-time dynamic behaviors. While computer security components are key elements in the hardware/software layer, these methods alone are not sufficient for diagnosing the healthiness of the CPSs' physical behavior. In seeking to address this problem, this research work proposes a control theoretic perspective approach which can accurately represent the interactions between the physical behavior and the logical behavior (computing resources) of the CPS. Then a controls domain aspect is explored extending beyond just the logical process of the CPS to include the underlying physical behavior. This approach will allow the CPS whose physical operations are robust/resilient to the damage caused by cyber attacks, successfully complementing the existing CPS security architecture. It is important to note that traditional fault-tolerant/robust control methods could not be directly applicable to achieve resiliency against malicious cyber attacks which can be designed sophisticatedly to spoof the security/safety monitoring system (note this is different from common faults). Thus, security issues at this layer require different risk management to detect cyber attacks and mitigate their impact within the context of a unified physical and logical process model of the CPS. Specifically, three main tasks are discussed in this presentation: (i) we first investigate diverse granularity of the interactions inside the CPS and propose feasible cyber attack models to characterize the compromised behavior of the CPS with various measures, from its severity to detectability; (ii) based on this risk information, our approach to securing the CPS addresses both monitoring of and high assurance control design against cyber attacks by developing on-line safety assessment and mitigation algorithms; and (iii) by extending the developed theories and methods from a single CPS to multiple CPSs, we examine the security and safety of multi-CPS network that are strongly dependent on the network topology, cooperation protocols between individual CPSs, etc. The effectiveness of the analytical findings is demonstrated and validated with illustrative examples, especially unmanned aircraft system (UAS) applications.
NASA Astrophysics Data System (ADS)
Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong
2017-05-01
During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.
Cyber Physical System Modelling of Distribution Power Systems for Dynamic Demand Response
NASA Astrophysics Data System (ADS)
Chu, Xiaodong; Zhang, Rongxiang; Tang, Maosen; Huang, Haoyi; Zhang, Lei
2018-01-01
Dynamic demand response (DDR) is a package of control methods to enhance power system security. A CPS modelling and simulation platform for DDR in distribution power systems is presented in this paper. CPS modelling requirements of distribution power systems are analyzed. A coupled CPS modelling platform is built for assessing DDR in the distribution power system, which combines seamlessly modelling tools of physical power networks and cyber communication networks. Simulations results of IEEE 13-node test system demonstrate the effectiveness of the modelling and simulation platform.
Security analysis of cyber-physical system
NASA Astrophysics Data System (ADS)
Li, Bo; Zhang, Lichen
2017-05-01
In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.
Restricted Authentication and Encryption for Cyber-physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T
2009-01-01
Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less
Medical cyber-physical systems: A survey.
Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Fong, Simon James; Tavares, João Manuel R S
2018-03-10
Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device's network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.
A game-theoretic method for cross-layer stochastic resilient control design in CPS
NASA Astrophysics Data System (ADS)
Shen, Jiajun; Feng, Dongqin
2018-03-01
In this paper, the cross-layer security problem of cyber-physical system (CPS) is investigated from the game-theoretic perspective. Physical dynamics of plant is captured by stochastic differential game with cyber-physical influence being considered. The sufficient and necessary condition for the existence of state-feedback equilibrium strategies is given. The attack-defence cyber interactions are formulated by a Stackelberg game intertwined with stochastic differential game in physical layer. The condition such that the Stackelberg equilibrium being unique and the corresponding analytical solutions are both provided. An algorithm is proposed for obtaining hierarchical security strategy by solving coupled games, which ensures the operational normalcy and cyber security of CPS subject to uncertain disturbance and unexpected cyberattacks. Simulation results are given to show the effectiveness and performance of the proposed algorithm.
The past, present and future of cyber-physical systems: a focus on models.
Lee, Edward A
2015-02-26
This paper is about better engineering of cyber-physical systems (CPSs) through better models. Deterministic models have historically proven extremely useful and arguably form the kingpin of the industrial revolution and the digital and information technology revolutions. Key deterministic models that have proven successful include differential equations, synchronous digital logic and single-threaded imperative programs. Cyber-physical systems, however, combine these models in such a way that determinism is not preserved. Two projects show that deterministic CPS models with faithful physical realizations are possible and practical. The first project is PRET, which shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction. The second project is Ptides (programming temporally-integrated distributed embedded systems), which shows that deterministic models for distributed cyber-physical systems have practical faithful realizations. These projects are existence proofs that deterministic CPS models are possible and practical.
The Past, Present and Future of Cyber-Physical Systems: A Focus on Models
Lee, Edward A.
2015-01-01
This paper is about better engineering of cyber-physical systems (CPSs) through better models. Deterministic models have historically proven extremely useful and arguably form the kingpin of the industrial revolution and the digital and information technology revolutions. Key deterministic models that have proven successful include differential equations, synchronous digital logic and single-threaded imperative programs. Cyber-physical systems, however, combine these models in such a way that determinism is not preserved. Two projects show that deterministic CPS models with faithful physical realizations are possible and practical. The first project is PRET, which shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction. The second project is Ptides (programming temporally-integrated distributed embedded systems), which shows that deterministic models for distributed cyber-physical systems have practical faithful realizations. These projects are existence proofs that deterministic CPS models are possible and practical. PMID:25730486
Meta II: Multi-Model Language Suite for Cyber Physical Systems
2013-03-01
AVM META) projects have developed tools for designing cyber physical (or Mechatronic ) Systems . These systems are increasingly complex, take much...projects have developed tools for designing cyber physical (CPS) (or Mechatronic ) systems . Exemplified by modern amphibious and ground military...and parametric interface of Simulink models and defines associations with CyPhy components and component interfaces. 2. Embedded Systems Modeling
SecureCPS: Defending a nanosatellite cyber-physical system
NASA Astrophysics Data System (ADS)
Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark
2014-06-01
Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-the-shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical - Attack Description Language (CP-ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.
Positioning navigation and timing service applications in cyber physical systems
NASA Astrophysics Data System (ADS)
Qu, Yi; Wu, Xiaojing; Zeng, Lingchuan
2017-10-01
The positioning navigation and timing (PNT) architecture was discussed in detail, whose history, evolvement, current status and future plan were presented, main technologies were listed, advantages and limitations of most technologies were compared, novel approaches were introduced, and future capacities were sketched. The concept of cyber-physical system (CPS) was described and their primary features were interpreted. Then the three-layer architecture of CPS was illustrated. Next CPS requirements on PNT services were analyzed, including requirements on position reference and time reference, requirements on temporal-spatial error monitor, requirements on dynamic services, real-time services, autonomous services, security services and standard services. Finally challenges faced by PNT applications in CPS were concluded. The conclusion was expected to facilitate PNT applications in CPS, and furthermore to provide references to the design and implementation of both architectures.
NASA Astrophysics Data System (ADS)
Bhardwaj, Jyotirmoy; Gupta, Karunesh K.; Gupta, Rajiv
2018-02-01
New concepts and techniques are replacing traditional methods of water quality parameter measurement systems. This paper introduces a cyber-physical system (CPS) approach for water quality assessment in a distribution network. Cyber-physical systems with embedded sensors, processors and actuators can be designed to sense and interact with the water environment. The proposed CPS is comprised of sensing framework integrated with five different water quality parameter sensor nodes and soft computing framework for computational modelling. Soft computing framework utilizes the applications of Python for user interface and fuzzy sciences for decision making. Introduction of multiple sensors in a water distribution network generates a huge number of data matrices, which are sometimes highly complex, difficult to understand and convoluted for effective decision making. Therefore, the proposed system framework also intends to simplify the complexity of obtained sensor data matrices and to support decision making for water engineers through a soft computing framework. The target of this proposed research is to provide a simple and efficient method to identify and detect presence of contamination in a water distribution network using applications of CPS.
Cyber Physical Systems for User Reliability Measurements in a Sharing Economy Environment
Seo, Aria; Kim, Yeichang
2017-01-01
As the sharing economic market grows, the number of users is also increasing but many problems arise in terms of reliability between providers and users in the processing of services. The existing methods provide shared economic systems that judge the reliability of the provider from the viewpoint of the user. In this paper, we have developed a system for establishing mutual trust between providers and users in a shared economic environment to solve existing problems. In order to implement a system that can measure and control users’ situation in a shared economic environment, we analyzed the necessary factors in a cyber physical system (CPS). In addition, a user measurement system based on a CPS structure in a sharing economic environment is implemented through analysis of the factors to consider when constructing a CPS. PMID:28805709
Cyber Physical Systems for User Reliability Measurements in a Sharing Economy Environment.
Seo, Aria; Jeong, Junho; Kim, Yeichang
2017-08-13
As the sharing economic market grows, the number of users is also increasing but many problems arise in terms of reliability between providers and users in the processing of services. The existing methods provide shared economic systems that judge the reliability of the provider from the viewpoint of the user. In this paper, we have developed a system for establishing mutual trust between providers and users in a shared economic environment to solve existing problems. In order to implement a system that can measure and control users' situation in a shared economic environment, we analyzed the necessary factors in a cyber physical system (CPS). In addition, a user measurement system based on a CPS structure in a sharing economic environment is implemented through analysis of the factors to consider when constructing a CPS.
Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.
Cyber physical system based on resilient ICT
NASA Astrophysics Data System (ADS)
Iwatsuki, Katsumi
2016-02-01
While development of science and technology has built up the sophisticated civilized society, it has also resulted in quite a few disadvantages in global environment and human society. The common recognition has been increasingly shared worldwide on sustainable development society attaching greater importance to the symbiotic relationship with nature and social ethics. After the East Japan Great Earthquake, it is indispensable for sustainable social development to enhance capacity of resistance and restoration of society against natural disaster, so called "resilient society". Our society consists of various Cyber Physical Systems (CPSs) that make up the physical systems by fusing with an Information Communication Technology (ICT). We describe the proposed structure of CPS in order to realize resilient society. The configuration of resilient CPS consisting of ICT and physical system is discussed to introduce "autonomous, distributed, and cooperative" structure, where subsystems of ICT and physical system are simultaneously coordinated and cooperated with Business Continuity Planning (BCP) engine, respectively. We show the disaster response information system and energy network as examples of BCP engine and resilient CPS, respectively. We also propose the structure and key technology of resilient ICT.
Wu, Zhenyu; Xu, Yuan; Yang, Yunong; Zhang, Chunhong; Zhu, Xinning; Ji, Yang
2017-02-20
Web of Things (WoT) facilitates the discovery and interoperability of Internet of Things (IoT) devices in a cyber-physical system (CPS). Moreover, a uniform knowledge representation of physical resources is quite necessary for further composition, collaboration, and decision-making process in CPS. Though several efforts have integrated semantics with WoT, such as knowledge engineering methods based on semantic sensor networks (SSN), it still could not represent the complex relationships between devices when dynamic composition and collaboration occur, and it totally depends on manual construction of a knowledge base with low scalability. In this paper, to addresses these limitations, we propose the semantic Web of Things (SWoT) framework for CPS (SWoT4CPS). SWoT4CPS provides a hybrid solution with both ontological engineering methods by extending SSN and machine learning methods based on an entity linking (EL) model. To testify to the feasibility and performance, we demonstrate the framework by implementing a temperature anomaly diagnosis and automatic control use case in a building automation system. Evaluation results on the EL method show that linking domain knowledge to DBpedia has a relative high accuracy and the time complexity is at a tolerant level. Advantages and disadvantages of SWoT4CPS with future work are also discussed.
A new practice-driven approach to develop software in a cyber-physical system environment
NASA Astrophysics Data System (ADS)
Jiang, Yiping; Chen, C. L. Philip; Duan, Junwei
2016-02-01
Cyber-physical system (CPS) is an emerging area, which cannot work efficiently without proper software handling of the data and business logic. Software and middleware is the soul of the CPS. The software development of CPS is a critical issue because of its complicity in a large scale realistic system. Furthermore, object-oriented approach (OOA) is often used to develop CPS software, which needs some improvements according to the characteristics of CPS. To develop software in a CPS environment, a new systematic approach is proposed in this paper. It comes from practice, and has been evolved from software companies. It consists of (A) Requirement analysis in event-oriented way, (B) architecture design in data-oriented way, (C) detailed design and coding in object-oriented way and (D) testing in event-oriented way. It is a new approach based on OOA; the difference when compared with OOA is that the proposed approach has different emphases and measures in every stage. It is more accord with the characteristics of event-driven CPS. In CPS software development, one should focus on the events more than the functions or objects. A case study of a smart home system is designed to reveal the effectiveness of the approach. It shows that the approach is also easy to be operated in the practice owing to some simplifications. The running result illustrates the validity of this approach.
Nondeducibility-Based Analysis of Cyber-Physical Systems
NASA Astrophysics Data System (ADS)
Gamage, Thoshitha; McMillin, Bruce
Controlling information flow in a cyber-physical system (CPS) is challenging because cyber domain decisions and actions manifest themselves as visible changes in the physical domain. This paper presents a nondeducibility-based observability analysis for CPSs. In many CPSs, the capacity of a low-level (LL) observer to deduce high-level (HL) actions ranges from limited to none. However, a collaborative set of observers strategically located in a network may be able to deduce all the HL actions. This paper models a distributed power electronics control device network using a simple DC circuit in order to understand the effect of multiple observers in a CPS. The analysis reveals that the number of observers required to deduce all the HL actions in a system increases linearly with the number of configurable units. A simple definition of nondeducibility based on the uniqueness of low-level projections is also presented. This definition is used to show that a system with two security domain levels could be considered “nondeducibility secure” if no unique LL projections exist.
Wu, Zhenyu; Xu, Yuan; Yang, Yunong; Zhang, Chunhong; Zhu, Xinning; Ji, Yang
2017-01-01
Web of Things (WoT) facilitates the discovery and interoperability of Internet of Things (IoT) devices in a cyber-physical system (CPS). Moreover, a uniform knowledge representation of physical resources is quite necessary for further composition, collaboration, and decision-making process in CPS. Though several efforts have integrated semantics with WoT, such as knowledge engineering methods based on semantic sensor networks (SSN), it still could not represent the complex relationships between devices when dynamic composition and collaboration occur, and it totally depends on manual construction of a knowledge base with low scalability. In this paper, to addresses these limitations, we propose the semantic Web of Things (SWoT) framework for CPS (SWoT4CPS). SWoT4CPS provides a hybrid solution with both ontological engineering methods by extending SSN and machine learning methods based on an entity linking (EL) model. To testify to the feasibility and performance, we demonstrate the framework by implementing a temperature anomaly diagnosis and automatic control use case in a building automation system. Evaluation results on the EL method show that linking domain knowledge to DBpedia has a relative high accuracy and the time complexity is at a tolerant level. Advantages and disadvantages of SWoT4CPS with future work are also discussed. PMID:28230725
SLAE–CPS: Smart Lean Automation Engine Enabled by Cyber-Physical Systems Technologies
Ma, Jing; Wang, Qiang; Zhao, Zhibiao
2017-01-01
In the context of Industry 4.0, the demand for the mass production of highly customized products will lead to complex products and an increasing demand for production system flexibility. Simply implementing lean production-based human-centered production or high automation to improve system flexibility is insufficient. Currently, lean automation (Jidoka) that utilizes cyber-physical systems (CPS) is considered a cost-efficient and effective approach for improving system flexibility under shrinking global economic conditions. Therefore, a smart lean automation engine enabled by CPS technologies (SLAE–CPS), which is based on an analysis of Jidoka functions and the smart capacity of CPS technologies, is proposed in this study to provide an integrated and standardized approach to design and implement a CPS-based smart Jidoka system. A set of comprehensive architecture and standardized key technologies should be presented to achieve the above-mentioned goal. Therefore, a distributed architecture that joins service-oriented architecture, agent, function block (FB), cloud, and Internet of things is proposed to support the flexible configuration, deployment, and performance of SLAE–CPS. Then, several standardized key techniques are proposed under this architecture. The first one is for converting heterogeneous physical data into uniform services for subsequent abnormality analysis and detection. The second one is a set of Jidoka scene rules, which is abstracted based on the analysis of the operator, machine, material, quality, and other factors in different time dimensions. These Jidoka rules can support executive FBs in performing different Jidoka functions. Finally, supported by the integrated and standardized approach of our proposed engine, a case study is conducted to verify the current research results. The proposed SLAE–CPS can serve as an important reference value for combining the benefits of innovative technology and proper methodology. PMID:28657577
SLAE-CPS: Smart Lean Automation Engine Enabled by Cyber-Physical Systems Technologies.
Ma, Jing; Wang, Qiang; Zhao, Zhibiao
2017-06-28
In the context of Industry 4.0, the demand for the mass production of highly customized products will lead to complex products and an increasing demand for production system flexibility. Simply implementing lean production-based human-centered production or high automation to improve system flexibility is insufficient. Currently, lean automation (Jidoka) that utilizes cyber-physical systems (CPS) is considered a cost-efficient and effective approach for improving system flexibility under shrinking global economic conditions. Therefore, a smart lean automation engine enabled by CPS technologies (SLAE-CPS), which is based on an analysis of Jidoka functions and the smart capacity of CPS technologies, is proposed in this study to provide an integrated and standardized approach to design and implement a CPS-based smart Jidoka system. A set of comprehensive architecture and standardized key technologies should be presented to achieve the above-mentioned goal. Therefore, a distributed architecture that joins service-oriented architecture, agent, function block (FB), cloud, and Internet of things is proposed to support the flexible configuration, deployment, and performance of SLAE-CPS. Then, several standardized key techniques are proposed under this architecture. The first one is for converting heterogeneous physical data into uniform services for subsequent abnormality analysis and detection. The second one is a set of Jidoka scene rules, which is abstracted based on the analysis of the operator, machine, material, quality, and other factors in different time dimensions. These Jidoka rules can support executive FBs in performing different Jidoka functions. Finally, supported by the integrated and standardized approach of our proposed engine, a case study is conducted to verify the current research results. The proposed SLAE-CPS can serve as an important reference value for combining the benefits of innovative technology and proper methodology.
Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems.
Yin, Yuyu; Yu, Fangzheng; Xu, Yueshen; Yu, Lifeng; Mu, Jinglong
2017-09-08
Cyber-physical systems (CPS) have received much attention from both academia and industry. An increasing number of functions in CPS are provided in the way of services, which gives rise to an urgent task, that is, how to recommend the suitable services in a huge number of available services in CPS. In traditional service recommendation, collaborative filtering (CF) has been studied in academia, and used in industry. However, there exist several defects that limit the application of CF-based methods in CPS. One is that under the case of high data sparsity, CF-based methods are likely to generate inaccurate prediction results. In this paper, we discover that mining the potential similarity relations among users or services in CPS is really helpful to improve the prediction accuracy. Besides, most of traditional CF-based methods are only capable of using the service invocation records, but ignore the context information, such as network location, which is a typical context in CPS. In this paper, we propose a novel service recommendation method for CPS, which utilizes network location as context information and contains three prediction models using random walking. We conduct sufficient experiments on two real-world datasets, and the results demonstrate the effectiveness of our proposed methods and verify that the network location is indeed useful in QoS prediction.
Kuang, Li; Yu, Long; Huang, Lan; Wang, Yin; Ma, Pengju; Li, Chuanbin; Zhu, Yujia
2018-05-14
With the rapid development of cyber-physical systems (CPS), building cyber-physical systems with high quality of service (QoS) has become an urgent requirement in both academia and industry. During the procedure of building Cyber-physical systems, it has been found that a large number of functionally equivalent services exist, so it becomes an urgent task to recommend suitable services from the large number of services available in CPS. However, since it is time-consuming, and even impractical, for a single user to invoke all of the services in CPS to experience their QoS, a robust QoS prediction method is needed to predict unknown QoS values. A commonly used method in QoS prediction is collaborative filtering, however, it is hard to deal with the data sparsity and cold start problem, and meanwhile most of the existing methods ignore the data credibility issue. Thence, in order to solve both of these challenging problems, in this paper, we design a framework of QoS prediction for CPS services, and propose a personalized QoS prediction approach based on reputation and location-aware collaborative filtering. Our approach first calculates the reputation of users by using the Dirichlet probability distribution, so as to identify untrusted users and process their unreliable data, and then it digs out the geographic neighborhood in three levels to improve the similarity calculation of users and services. Finally, the data from geographical neighbors of users and services are fused to predict the unknown QoS values. The experiments using real datasets show that our proposed approach outperforms other existing methods in terms of accuracy, efficiency, and robustness.
Huang, Lan; Wang, Yin; Ma, Pengju; Li, Chuanbin; Zhu, Yujia
2018-01-01
With the rapid development of cyber-physical systems (CPS), building cyber-physical systems with high quality of service (QoS) has become an urgent requirement in both academia and industry. During the procedure of building Cyber-physical systems, it has been found that a large number of functionally equivalent services exist, so it becomes an urgent task to recommend suitable services from the large number of services available in CPS. However, since it is time-consuming, and even impractical, for a single user to invoke all of the services in CPS to experience their QoS, a robust QoS prediction method is needed to predict unknown QoS values. A commonly used method in QoS prediction is collaborative filtering, however, it is hard to deal with the data sparsity and cold start problem, and meanwhile most of the existing methods ignore the data credibility issue. Thence, in order to solve both of these challenging problems, in this paper, we design a framework of QoS prediction for CPS services, and propose a personalized QoS prediction approach based on reputation and location-aware collaborative filtering. Our approach first calculates the reputation of users by using the Dirichlet probability distribution, so as to identify untrusted users and process their unreliable data, and then it digs out the geographic neighborhood in three levels to improve the similarity calculation of users and services. Finally, the data from geographical neighbors of users and services are fused to predict the unknown QoS values. The experiments using real datasets show that our proposed approach outperforms other existing methods in terms of accuracy, efficiency, and robustness. PMID:29757995
Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems
Yin, Yuyu; Yu, Fangzheng; Xu, Yueshen; Yu, Lifeng; Mu, Jinglong
2017-01-01
Cyber-physical systems (CPS) have received much attention from both academia and industry. An increasing number of functions in CPS are provided in the way of services, which gives rise to an urgent task, that is, how to recommend the suitable services in a huge number of available services in CPS. In traditional service recommendation, collaborative filtering (CF) has been studied in academia, and used in industry. However, there exist several defects that limit the application of CF-based methods in CPS. One is that under the case of high data sparsity, CF-based methods are likely to generate inaccurate prediction results. In this paper, we discover that mining the potential similarity relations among users or services in CPS is really helpful to improve the prediction accuracy. Besides, most of traditional CF-based methods are only capable of using the service invocation records, but ignore the context information, such as network location, which is a typical context in CPS. In this paper, we propose a novel service recommendation method for CPS, which utilizes network location as context information and contains three prediction models using random walking. We conduct sufficient experiments on two real-world datasets, and the results demonstrate the effectiveness of our proposed methods and verify that the network location is indeed useful in QoS prediction. PMID:28885602
Extending AADL for Security Design Assurance of Cyber Physical Systems
2015-12-16
a detailed system architecture design of a CPS can be analyzed using AADL to prevent such types of CWEs. We divided the work into two tasks as...security modeling to CPSs, and develop a case study to show how formal modeling using AADL could be applied to a CPS to improve the security design of the... CPS . These examples of recent attacks against automobiles have been reported: A wireless device used by Progressive Insurance to gather information
Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Khan, Muhammad Farhan; Naeem, Muhammad; Anpalagan, Alagan
2015-03-25
The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.
Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Farhan Khan, Muhammad; Naeem, Muhammad; Anpalagan, Alagan
2015-01-01
The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed. PMID:25815444
A Taxonomy on Accountability and Privacy Issues in Smart Grids
NASA Astrophysics Data System (ADS)
Naik, Ameya; Shahnasser, Hamid
2017-07-01
Cyber-Physical Systems (CPS) are combinations of computation, networking, and physical processes. Embedded computers and networks monitor control the physical processes, which affect computations and vice versa. Two applications of cyber physical systems include health-care and smart grid. In this paper, we have considered privacy aspects of cyber-physical system applicable to smart grid. Smart grid in collaboration with different stockholders can help in the improvement of power generation, communication, circulation and consumption. The proper management with monitoring feature by customers and utility of energy usage can be done through proper transmission and electricity flow; however cyber vulnerability could be increased due to an increased assimilation and linkage. This paper discusses various frameworks and architectures proposed for achieving accountability in smart grids by addressing privacy issues in Advance Metering Infrastructure (AMI). This paper also highlights additional work needed for accountability in more precise specifications such as uncertainty or ambiguity, indistinct, unmanageability, and undetectably.
Study on perception and control layer of mine CPS with mixed logic dynamic approach
NASA Astrophysics Data System (ADS)
Li, Jingzhao; Ren, Ping; Yang, Dayu
2017-01-01
Mine inclined roadway transportation system of mine cyber physical system is a hybrid system consisting of a continuous-time system and a discrete-time system, which can be divided into inclined roadway signal subsystem, error-proofing channel subsystems, anti-car subsystems, and frequency control subsystems. First, to ensure stable operation, improve efficiency and production safety, this hybrid system model with n inputs and m outputs is constructed and analyzed in detail, then its steady schedule state to be solved. Second, on the basis of the formal modeling for real-time systems, we use hybrid toolbox for system security verification. Third, the practical application of mine cyber physical system shows that the method for real-time simulation of mine cyber physical system is effective.
Cyber physical systems based on cloud computing and internet of things for energy efficiency
NASA Astrophysics Data System (ADS)
Suciu, George; Butca, Cristina; Suciu, Victor; Cretu, Alexandru; Fratu, Octavian
2016-12-01
Cyber Physical Systems (CPS) and energy efficiency play a major role in the context of industry expansion. Management practices for improving efficiency in the field of energy consumption became a priority of many major industries who are inefficient in terms of exploitation costs. The effort of adopting energy management means in an organization is quite challenging due to the lack of resources and expertise. One major problem consists in the lack of knowledge for energy management and practices. This paper aims to present authors' concept in creating a Cyber Physical Energy System (CPES) that will change organizations' way of consuming energy, by making them aware of their use. The presented concept will consider the security of the whole system and the easy integration with the existing electric network infrastructure.
Cyber-Physical System Security of a Power Grid: State-of-the-Art
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
2016-07-14
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Cyber-Physical System Security of a Power Grid: State-of-the-Art
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
NASA Astrophysics Data System (ADS)
Harrison, Robert; Vera, Daniel; Ahmad, Bilal
2016-10-01
The fourth industrial revolution promises to create what has been called the smart factory. The vision is that within such modular structured smart factories, cyber-physical systems monitor physical processes, create a virtual copy of the physical world and make decentralised decisions. This paper provides a view of this initiative from an automation systems perspective. In this context it considers how future automation systems might be effectively configured and supported through their lifecycles and how integration, application modelling, visualisation and reuse of such systems might be best achieved. The paper briefly describes limitations in current engineering methods, and new emerging approaches including the cyber physical systems (CPS) engineering tools being developed by the automation systems group (ASG) at Warwick Manufacturing Group, University of Warwick, UK.
Autonomous perception and decision making in cyber-physical systems
NASA Astrophysics Data System (ADS)
Sarkar, Soumik
2011-07-01
The cyber-physical system (CPS) is a relatively new interdisciplinary technology area that includes the general class of embedded and hybrid systems. CPSs require integration of computation and physical processes that involves the aspects of physical quantities such as time, energy and space during information processing and control. The physical space is the source of information and the cyber space makes use of the generated information to make decisions. This dissertation proposes an overall architecture of autonomous perception-based decision & control of complex cyber-physical systems. Perception involves the recently developed framework of Symbolic Dynamic Filtering for abstraction of physical world in the cyber space. For example, under this framework, sensor observations from a physical entity are discretized temporally and spatially to generate blocks of symbols, also called words that form a language. A grammar of a language is the set of rules that determine the relationships among words to build sentences. Subsequently, a physical system is conjectured to be a linguistic source that is capable of generating a specific language. The proposed technology is validated on various (experimental and simulated) case studies that include health monitoring of aircraft gas turbine engines, detection and estimation of fatigue damage in polycrystalline alloys, and parameter identification. Control of complex cyber-physical systems involve distributed sensing, computation, control as well as complexity analysis. A novel statistical mechanics-inspired complexity analysis approach is proposed in this dissertation. In such a scenario of networked physical systems, the distribution of physical entities determines the underlying network topology and the interaction among the entities forms the abstract cyber space. It is envisioned that the general contributions, made in this dissertation, will be useful for potential application areas such as smart power grids and buildings, distributed energy systems, advanced health care procedures and future ground and air transportation systems.
NASA Astrophysics Data System (ADS)
Sun, Xinyao; Wang, Xue; Wu, Jiangwei; Liu, Youda
2014-05-01
Cyber physical systems(CPS) recently emerge as a new technology which can provide promising approaches to demand side management(DSM), an important capability in industrial power systems. Meanwhile, the manufacturing center is a typical industrial power subsystem with dozens of high energy consumption devices which have complex physical dynamics. DSM, integrated with CPS, is an effective methodology for solving energy optimization problems in manufacturing center. This paper presents a prediction-based manufacturing center self-adaptive energy optimization method for demand side management in cyber physical systems. To gain prior knowledge of DSM operating results, a sparse Bayesian learning based componential forecasting method is introduced to predict 24-hour electric load levels for specific industrial areas in China. From this data, a pricing strategy is designed based on short-term load forecasting results. To minimize total energy costs while guaranteeing manufacturing center service quality, an adaptive demand side energy optimization algorithm is presented. The proposed scheme is tested in a machining center energy optimization experiment. An AMI sensing system is then used to measure the demand side energy consumption of the manufacturing center. Based on the data collected from the sensing system, the load prediction-based energy optimization scheme is implemented. By employing both the PSO and the CPSO method, the problem of DSM in the manufacturing center is solved. The results of the experiment show the self-adaptive CPSO energy optimization method enhances optimization by 5% compared with the traditional PSO optimization method.
A Cyber-Physical System for Girder Hoisting Monitoring Based on Smartphones.
Han, Ruicong; Zhao, Xuefeng; Yu, Yan; Guan, Quanhua; Hu, Weitong; Li, Mingchu
2016-07-07
Offshore design and construction is much more difficult than land-based design and construction, particularly due to hoisting operations. Real-time monitoring of the orientation and movement of a hoisted structure is thus required for operators' safety. In recent years, rapid development of the smart-phone commercial market has offered the possibility that everyone can carry a mini personal computer that is integrated with sensors, an operating system and communication system that can act as an effective aid for cyber-physical systems (CPS) research. In this paper, a CPS for hoisting monitoring using smartphones was proposed, including a phone collector, a controller and a server. This system uses smartphones equipped with internal sensors to obtain girder movement information, which will be uploaded to a server, then returned to controller users. An alarming system will be provided on the controller phone once the returned data exceeds a threshold. The proposed monitoring system is used to monitor the movement and orientation of a girder during hoisting on a cross-sea bridge in real time. The results show the convenience and feasibility of the proposed system.
TASK ALLOCATION IN GEO-DISTRIBUTED CYBER-PHYSICAL SYSTEMS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aggarwal, Rachit; Smidts, Carol
This paper studies the task allocation algorithm for a distributed test facility (DTF), which aims to assemble geo-distributed cyber (software) and physical (hardware in the loop components into a prototype cyber-physical system (CPS). This allows low cost testing on an early conceptual prototype (ECP) of the ultimate CPS (UCPS) to be developed. The DTF provides an instrumentation interface for carrying out reliability experiments remotely such as fault propagation analysis and in-situ testing of hardware and software components in a simulated environment. Unfortunately, the geo-distribution introduces an overhead that is not inherent to the UCPS, i.e. a significant time delay inmore » communication that threatens the stability of the ECP and is not an appropriate representation of the behavior of the UCPS. This can be mitigated by implementing a task allocation algorithm to find a suitable configuration and assign the software components to appropriate computational locations, dynamically. This would allow the ECP to operate more efficiently with less probability of being unstable due to the delays introduced by geo-distribution. The task allocation algorithm proposed in this work uses a Monte Carlo approach along with Dynamic Programming to identify the optimal network configuration to keep the time delays to a minimum.« less
Mordecai, Yaniv; Dori, Dov
2017-07-17
The cyber-physical gap (CPG) is the difference between the 'real' state of the world and the way the system perceives it. This discrepancy often stems from the limitations of sensing and data collection technologies and capabilities, and is inevitable at some degree in any cyber-physical system (CPS). Ignoring or misrepresenting such limitations during system modeling, specification, design, and analysis can potentially result in systemic misconceptions, disrupted functionality and performance, system failure, severe damage, and potential detrimental impacts on the system and its environment. We propose CPG-Aware Modeling & Engineering (CPGAME), a conceptual model-based approach to capturing, explaining, and mitigating the CPG. CPGAME enhances the systems engineer's ability to cope with CPGs, mitigate them by design, and prevent erroneous decisions and actions. We demonstrate CPGAME by applying it for modeling and analysis of the 1979 Three Miles Island 2 nuclear accident, and show how its meltdown could be mitigated. We use ISO-19450:2015-Object Process Methodology as our conceptual modeling framework.
Cyber-Physical Attacks With Control Objectives
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-08-18
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Cyber-Physical Attacks With Control Objectives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozel, Omur; Weekrakkody, Sean; Sinopoli, Bruno
Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. Withmore » the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.« less
Service differentiated and adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems.
Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia
2013-01-01
Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.
Service Differentiated and Adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems
Gao, Ruixia
2013-01-01
Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay. PMID:24260021
2017-01-01
The cyber-physical gap (CPG) is the difference between the ‘real’ state of the world and the way the system perceives it. This discrepancy often stems from the limitations of sensing and data collection technologies and capabilities, and is inevitable at some degree in any cyber-physical system (CPS). Ignoring or misrepresenting such limitations during system modeling, specification, design, and analysis can potentially result in systemic misconceptions, disrupted functionality and performance, system failure, severe damage, and potential detrimental impacts on the system and its environment. We propose CPG-Aware Modeling & Engineering (CPGAME), a conceptual model-based approach to capturing, explaining, and mitigating the CPG. CPGAME enhances the systems engineer’s ability to cope with CPGs, mitigate them by design, and prevent erroneous decisions and actions. We demonstrate CPGAME by applying it for modeling and analysis of the 1979 Three Miles Island 2 nuclear accident, and show how its meltdown could be mitigated. We use ISO-19450:2015—Object Process Methodology as our conceptual modeling framework. PMID:28714910
NASA Astrophysics Data System (ADS)
Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao
2015-05-01
An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.
Hou, Kun-Mean; Zhang, Zhan
2017-01-01
Cyber Physical Systems (CPSs) need to interact with the changeable environment under various interferences. To provide continuous and high quality services, a self-managed CPS should automatically reconstruct itself to adapt to these changes and recover from failures. Such dynamic adaptation behavior introduces systemic challenges for CPS design, advice evaluation and decision process arrangement. In this paper, a formal compositional framework is proposed to systematically improve the dependability of the decision process. To guarantee the consistent observation of event orders for causal reasoning, this work first proposes a relative time-based method to improve the composability and compositionality of the timing property of events. Based on the relative time solution, a formal reference framework is introduced for self-managed CPSs, which includes a compositional FSM-based actor model (subsystems of CPS), actor-based advice and runtime decomposable decisions. To simplify self-management, a self-similar recursive actor interface is proposed for decision (actor) composition. We provide constraints and seven patterns for the composition of reliability and process time requirements. Further, two decentralized decision process strategies are proposed based on our framework, and we compare the reliability with the static strategy and the centralized processing strategy. The simulation results show that the one-order feedback strategy has high reliability, scalability and stability against the complexity of decision and random failure. This paper also shows a way to simplify the evaluation for dynamic system by improving the composability and compositionality of the subsystem. PMID:29120357
Zhou, Peng; Zuo, Decheng; Hou, Kun-Mean; Zhang, Zhan
2017-11-09
Cyber Physical Systems (CPSs) need to interact with the changeable environment under various interferences. To provide continuous and high quality services, a self-managed CPS should automatically reconstruct itself to adapt to these changes and recover from failures. Such dynamic adaptation behavior introduces systemic challenges for CPS design, advice evaluation and decision process arrangement. In this paper, a formal compositional framework is proposed to systematically improve the dependability of the decision process. To guarantee the consistent observation of event orders for causal reasoning, this work first proposes a relative time-based method to improve the composability and compositionality of the timing property of events. Based on the relative time solution, a formal reference framework is introduced for self-managed CPSs, which includes a compositional FSM-based actor model (subsystems of CPS), actor-based advice and runtime decomposable decisions. To simplify self-management, a self-similar recursive actor interface is proposed for decision (actor) composition. We provide constraints and seven patterns for the composition of reliability and process time requirements. Further, two decentralized decision process strategies are proposed based on our framework, and we compare the reliability with the static strategy and the centralized processing strategy. The simulation results show that the one-order feedback strategy has high reliability, scalability and stability against the complexity of decision and random failure. This paper also shows a way to simplify the evaluation for dynamic system by improving the composability and compositionality of the subsystem.
A cyber-physical management system for delivering and monitoring surgical instruments in the OR.
Li, Yu-Ting; Jacob, Mithun; Akingba, George; Wachs, Juan P
2013-08-01
The standard practice in the operating room (OR) is having a surgical technician deliver surgical instruments to the surgeon quickly and inexpensively, as required. This human "in the loop" system may result in mistakes (eg, missing information, ambiguity of instructions, and delays). Errors can be reduced or eliminated by integrating information technology (IT) and cybernetics into the OR. Gesture and voice automatic acquisition, processing, and interpretation allow interaction with these new systems without disturbing the normal flow of surgery. This article describes the development of a cyber-physical management system (CPS), including a robotic scrub nurse, to support surgeons by passing surgical instruments during surgery as required and recording counts of surgical instruments into a personal health record (PHR). The robot used responds to hand signals and voice messages detected through sophisticated computer vision and data mining techniques. The CPS was tested during a mock surgery in the OR. The in situ experiment showed that the robot recognized hand gestures reliably (with an accuracy of 97%), it can retrieve instruments as close as 25 mm, and the total delivery time was less than 3 s on average. This online health tool allows the exchange of clinical and surgical information to electronic medical record-based and PHR-based applications among different hospitals, regardless of the style viewer. The CPS has the potential to be adopted in the OR to handle surgical instruments and track them in a safe and accurate manner, releasing the human scrub tech from these tasks.
NASA Astrophysics Data System (ADS)
Roth, Eatai; Howell, Darrin; Beckwith, Cydney; Burden, Samuel A.
2017-05-01
Humans, interacting with cyber-physical systems (CPS), formulate beliefs about the system's dynamics. It is natural to expect that human operators, tasked with teleoperation, use these beliefs to control the remote robot. For tracking tasks in the resulting human-cyber-physical system (HCPS), theory suggests that human operators can achieve exponential tracking (in stable systems) without state estimation provided they possess an accurate model of the system's dynamics. This internalized inverse model, however, renders a portion of the system state unobservable to the human operator—the zero dynamics. Prior work shows humans can track through observable linear dynamics, thus we focus on nonlinear dynamics rendered unobservable through tracking control. We propose experiments to assess the human operator's ability to learn and invert such models, and distinguish this behavior from that achieved by pure feedback control.
Viewpoints, Formalisms, Languages, and Tools for Cyber-Physical Systems
2014-05-16
Organization]: Special-Purpose and Application-Based Systems —real-time and embedded sys- tems; F.1.2 [Computation by Abstract Devices]: Mod- els of...domain CPS is not new. For example, early automotive embedded systems in the 1970s already combined closed-loop control of the brake and engine subsystems...Consider for example the development of an embedded control system such as an advanced driver assistance system (ADAS) (e.g., adaptive cruise control
NASA Astrophysics Data System (ADS)
Taha, Ahmad Fayez
Transportation networks, wearable devices, energy systems, and the book you are reading now are all ubiquitous cyber-physical systems (CPS). These inherently uncertain systems combine physical phenomena with communication, data processing, control and optimization. Many CPSs are controlled and monitored by real-time control systems that use communication networks to transmit and receive data from systems modeled by physical processes. Existing studies have addressed a breadth of challenges related to the design of CPSs. However, there is a lack of studies on uncertain CPSs subject to dynamic unknown inputs and cyber-attacks---an artifact of the insertion of communication networks and the growing complexity of CPSs. The objective of this dissertation is to create secure, computational foundations for uncertain CPSs by establishing a framework to control, estimate and optimize the operation of these systems. With major emphasis on power networks, the dissertation deals with the design of secure computational methods for uncertain CPSs, focusing on three crucial issues---(1) cyber-security and risk-mitigation, (2) network-induced time-delays and perturbations and (3) the encompassed extreme time-scales. The dissertation consists of four parts. In the first part, we investigate dynamic state estimation (DSE) methods and rigorously examine the strengths and weaknesses of the proposed routines under dynamic attack-vectors and unknown inputs. In the second part, and utilizing high-frequency measurements in smart grids and the developed DSE methods in the first part, we present a risk mitigation strategy that minimizes the encountered threat levels, while ensuring the continual observability of the system through available, safe measurements. The developed methods in the first two parts rely on the assumption that the uncertain CPS is not experiencing time-delays, an assumption that might fail under certain conditions. To overcome this challenge, networked unknown input observers---observers/estimators for uncertain CPSs---are designed such that the effect of time-delays and cyber-induced perturbations are minimized, enabling secure DSE and risk mitigation in the first two parts. The final part deals with the extreme time-scales encompassed in CPSs, generally, and smart grids, specifically. Operational decisions for long time-scales can adversely affect the security of CPSs for faster time-scales. We present a model that jointly describes steady-state operation and transient stability by combining convex optimal power flow with semidefinite programming formulations of an optimal control problem. This approach can be jointly utilized with the aforementioned parts of the dissertation work, considering time-delays and DSE. The research contributions of this dissertation furnish CPS stakeholders with insights on the design and operation of uncertain CPSs, whilst guaranteeing the system's real-time safety. Finally, although many of the results of this dissertation are tailored to power systems, the results are general enough to be applied for a variety of uncertain CPSs.
Hernández Díaz, Vicente; Martínez, José-Fernán; Lucas Martínez, Néstor; del Toro, Raúl M
2015-09-18
The solutions to cope with new challenges that societies have to face nowadays involve providing smarter daily systems. To achieve this, technology has to evolve and leverage physical systems automatic interactions, with less human intervention. Technological paradigms like Internet of Things (IoT) and Cyber-Physical Systems (CPS) are providing reference models, architectures, approaches and tools that are to support cross-domain solutions. Thus, CPS based solutions will be applied in different application domains like e-Health, Smart Grid, Smart Transportation and so on, to assure the expected response from a complex system that relies on the smooth interaction and cooperation of diverse networked physical systems. The Wireless Sensors Networks (WSN) are a well-known wireless technology that are part of large CPS. The WSN aims at monitoring a physical system, object, (e.g., the environmental condition of a cargo container), and relaying data to the targeted processing element. The WSN communication reliability, as well as a restrained energy consumption, are expected features in a WSN. This paper shows the results obtained in a real WSN deployment, based on SunSPOT nodes, which carries out a fuzzy based control strategy to improve energy consumption while keeping communication reliability and computational resources usage among boundaries.
Hernández Díaz, Vicente; Martínez, José-Fernán; Lucas Martínez, Néstor; del Toro, Raúl M.
2015-01-01
The solutions to cope with new challenges that societies have to face nowadays involve providing smarter daily systems. To achieve this, technology has to evolve and leverage physical systems automatic interactions, with less human intervention. Technological paradigms like Internet of Things (IoT) and Cyber-Physical Systems (CPS) are providing reference models, architectures, approaches and tools that are to support cross-domain solutions. Thus, CPS based solutions will be applied in different application domains like e-Health, Smart Grid, Smart Transportation and so on, to assure the expected response from a complex system that relies on the smooth interaction and cooperation of diverse networked physical systems. The Wireless Sensors Networks (WSN) are a well-known wireless technology that are part of large CPS. The WSN aims at monitoring a physical system, object, (e.g., the environmental condition of a cargo container), and relaying data to the targeted processing element. The WSN communication reliability, as well as a restrained energy consumption, are expected features in a WSN. This paper shows the results obtained in a real WSN deployment, based on SunSPOT nodes, which carries out a fuzzy based control strategy to improve energy consumption while keeping communication reliability and computational resources usage among boundaries. PMID:26393612
Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Díaz-Bouza, Manuel A
2018-06-17
Pipes are one of the key elements in the construction of ships, which usually contain between 15,000 and 40,000 of them. This huge number, as well as the variety of processes that may be performed on a pipe, require rigorous identification, quality assessment and traceability. Traditionally, such tasks have been carried out by using manual procedures and following documentation on paper, which slows down the production processes and reduces the output of a pipe workshop. This article presents a system that allows for identifying and tracking the pipes of a ship through their construction cycle. For such a purpose, a fog computing architecture is proposed to extend cloud computing to the edge of the shipyard network. The system has been developed jointly by Navantia, one of the largest shipbuilders in the world, and the University of A Coruña (Spain), through a project that makes use of some of the latest Industry 4.0 technologies. Specifically, a Cyber-Physical System (CPS) is described, which uses active Radio Frequency Identification (RFID) tags to track pipes and detect relevant events. Furthermore, the CPS has been integrated and tested in conjunction with Siemens’ Manufacturing Execution System (MES) (Simatic IT). The experiments performed on the CPS show that, in the selected real-world scenarios, fog gateways respond faster than the tested cloud server, being such gateways are also able to process successfully more samples under high-load situations. In addition, under regular loads, fog gateways react between five and 481 times faster than the alternative cloud approach.
Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signalsmore » are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.« less
Effectiveness of a Littoral Combat Ship as a Major Node in a Wireless Mesh Network
2017-03-01
17 Figure 6. Cloud Relay Groups . Source: Persistent Systems (2014a). .......................18 Figure 7. SolarWinds Network Performance Monitor...CIG Commander’s Initiative Group CLI Command Line Interface CN Core Network CODA Common Optical Digital Architecture CPS Cyber-Physical Systems...CSBA Center for Strategic and Budgetary CSG Carrier Strike Group DAMA Demand Assigned Multiple Access DDG Guided Missile Destroyer DL Distributed
NASA Astrophysics Data System (ADS)
Zheng, Pai; wang, Honghui; Sang, Zhiqian; Zhong, Ray Y.; Liu, Yongkui; Liu, Chao; Mubarok, Khamdi; Yu, Shiqiang; Xu, Xun
2018-06-01
Information and communication technology is undergoing rapid development, and many disruptive technologies, such as cloud computing, Internet of Things, big data, and artificial intelligence, have emerged. These technologies are permeating the manufacturing industry and enable the fusion of physical and virtual worlds through cyber-physical systems (CPS), which mark the advent of the fourth stage of industrial production (i.e., Industry 4.0). The widespread application of CPS in manufacturing environments renders manufacturing systems increasingly smart. To advance research on the implementation of Industry 4.0, this study examines smart manufacturing systems for Industry 4.0. First, a conceptual framework of smart manufacturing systems for Industry 4.0 is presented. Second, demonstrative scenarios that pertain to smart design, smart machining, smart control, smart monitoring, and smart scheduling, are presented. Key technologies and their possible applications to Industry 4.0 smart manufacturing systems are reviewed based on these demonstrative scenarios. Finally, challenges and future perspectives are identified and discussed.
Smart factory in the context of 4th industrial revolution: challenges and opportunities for Romania
NASA Astrophysics Data System (ADS)
Pîrvu, B. C.; Zamfirescu, C. B.
2017-08-01
Manufacturing companies, independent of operation sector and size, must be able to produce lot size one products, just-in-time at a competitive cost. Coping with this high adaptability and short reaction times proves to be very challenging. New approaches must be taken into consideration for designing modular, intelligent and cooperative production systems which are easy to integrate with the entire factory. The coined term for this network of intelligent interacting artefacts system is cyber-physical systems (CPS). CPS is often used in the context of Industry 4.0 - or what many consider the forth industrial revolution. The paper presents an overview of key technological and social requirements to map the Smart Factory vision into reality. Finally, global and Romanian specific challenges hindering the vision of a true Smart Factory to become reality are presented.
Cyber Physical Intelligence for Oil Spills (CPI)
NASA Astrophysics Data System (ADS)
Lary, D. J.
2015-12-01
The National Academy of Sciences estimate 1.7 to 8.8 million tons of oil are released into global waters every year. The effects of these spills include dead wildlife, oil covered marshlands and contaminated water. Deepwater horizon cost approximately $50 billion and severely challenged response capabilities. In such large spills optimizing a coordinated response is a particular challenge. This challenge can be met in a revolutionary new way by using an objectively optimized Cyber Physical Decision Making System (CPS) for rapid response products and a framework for objectively optimized decision-making in an uncertain environment. The CPS utilizes machine learning for the processing of the massive real-time streams of Big Data from comprehensive hyperspectral remote sensing acquired by a team of low-cost robotic aerial vehicles, providing a real-time aerial view and stream of hyperspectral imagery from the near UV to the thermal infrared, and a characterization of oil thickness, oil type and oil weathering. The objective decision making paradigm is modeled on the human brain and provides the optimal course trajectory for response vessels to achieve the most expeditious cleanup of oil spills using the available resources. In addition, oil spill cleanups often involve surface oil burns that can lead to air quality issues. The aerial vehicles comprehensively characterize air quality in real-time, streaming location, temperature, pressure, humidity, the abundance of 6 criterion pollutants (O3, CO, NO, NO2, SO2, and H2S) and the full size distribution of airborne particulates. This CPS can be readily applied to other systems in agriculture, water conversation, monitoring of stream quality, air quality, diagnosing risk of wild fires, etc..
Macho, Jorge Berzosa; Montón, Luis Gardeazabal; Rodriguez, Roberto Cortiñas
2017-08-01
The Cyber Physical Systems (CPS) paradigm is based on the deployment of interconnected heterogeneous devices and systems, so interoperability is at the heart of any CPS architecture design. In this sense, the adoption of standard and generic data formats for data representation and communication, e.g., XML or JSON, effectively addresses the interoperability problem among heterogeneous systems. Nevertheless, the verbosity of those standard data formats usually demands system resources that might suppose an overload for the resource-constrained devices that are typically deployed in CPS. In this work we present Context- and Template-based Compression (CTC), a data compression approach targeted to resource-constrained devices, which allows reducing the resources needed to transmit, store and process data models. Additionally, we provide a benchmark evaluation and comparison with current implementations of the Efficient XML Interchange (EXI) processor, which is promoted by the World Wide Web Consortium (W3C), and it is the most prominent XML compression mechanism nowadays. Interestingly, the results from the evaluation show that CTC outperforms EXI implementations in terms of memory usage and speed, keeping similar compression rates. As a conclusion, CTC is shown to be a good candidate for managing standard data model representation formats in CPS composed of resource-constrained devices.
Montón, Luis Gardeazabal
2017-01-01
The Cyber Physical Systems (CPS) paradigm is based on the deployment of interconnected heterogeneous devices and systems, so interoperability is at the heart of any CPS architecture design. In this sense, the adoption of standard and generic data formats for data representation and communication, e.g., XML or JSON, effectively addresses the interoperability problem among heterogeneous systems. Nevertheless, the verbosity of those standard data formats usually demands system resources that might suppose an overload for the resource-constrained devices that are typically deployed in CPS. In this work we present Context- and Template-based Compression (CTC), a data compression approach targeted to resource-constrained devices, which allows reducing the resources needed to transmit, store and process data models. Additionally, we provide a benchmark evaluation and comparison with current implementations of the Efficient XML Interchange (EXI) processor, which is promoted by the World Wide Web Consortium (W3C), and it is the most prominent XML compression mechanism nowadays. Interestingly, the results from the evaluation show that CTC outperforms EXI implementations in terms of memory usage and speed, keeping similar compression rates. As a conclusion, CTC is shown to be a good candidate for managing standard data model representation formats in CPS composed of resource-constrained devices. PMID:28763013
NASA Astrophysics Data System (ADS)
Li, Yong-Fu; Xiao-Pei, Kou; Zheng, Tai-Xiong; Li, Yin-Guo
2015-05-01
In transportation cyber-physical-systems (T-CPS), vehicle-to-vehicle (V2V) communications play an important role in the coordination between individual vehicles as well as between vehicles and the roadside infrastructures, and engine cylinder pressure is significant for engine diagnosis on-line and torque control within the information exchange process under V2V communications. However, the parametric uncertainties caused from measurement noise in T-CPS lead to the dynamic performance deterioration of the engine cylinder pressure estimation. Considering the high accuracy requirement under V2V communications, a high gain observer based on the engine dynamic model is designed to improve the accuracy of pressure estimation. Then, the analyses about convergence, converge speed and stability of the corresponding error model are conducted using the Laplace and Lyapunov method. Finally, results from combination of Simulink with GT-Power based numerical experiments and comparisons demonstrate the effectiveness of the proposed approach with respect to robustness and accuracy. Project supported by the National Natural Science Foundation of China (Grant No. 61304197), the Scientific and Technological Talents of Chongqing, China (Grant No. cstc2014kjrc-qnrc30002), the Key Project of Application and Development of Chongqing, China (Grant No. cstc2014yykfB40001), the Natural Science Funds of Chongqing, China (Grant No. cstc2014jcyjA60003), and the Doctoral Start-up Funds of Chongqing University of Posts and Telecommunications, China (Grant No. A2012-26).
A CPS Based Optimal Operational Control System for Fused Magnesium Furnace
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chai, Tian-you; Wu, Zhi-wei; Wang, Hong
Fused magnesia smelting for fused magnesium furnace (FMF) is an energy intensive process with high temperature and comprehensive complexities. Its operational index namely energy consumption per ton (ECPT) is defined as the consumed electrical energy per ton of acceptable quality and is difficult to measure online. Moreover, the dynamics of ECPT cannot be precisely modelled mathematically. The model parameters of the three-phase currents of the electrodes such as the molten pool level, its variation rate and resistance are uncertain and nonlinear functions of the changes in both the smelting process and the raw materials composition. In this paper, an integratedmore » optimal operational control algorithm proposed is composed of a current set-point control, a current switching control and a self-optimized tuning mechanism. The tight conjoining of and coordination between the computational resources including the integrated optimal operational control, embedded software, industrial cloud, wireless communication and the physical resources of FMF constitutes a cyber-physical system (CPS) based embedded optimal operational control system. Successful application of this system has been made for a production line with ten fused magnesium furnaces in a factory in China, leading to a significant reduced ECPT.« less
In-Factory Learning - Qualification For The Factory Of The Future
NASA Astrophysics Data System (ADS)
Quint, Fabian; Mura, Katharina; Gorecky, Dominic
2015-07-01
The Industry 4.0 vision anticipates that internet technologies will find their way into future factories replacing traditional components by dynamic and intelligent cyber-physical systems (CPS) that combine the physical objects with their digital representation. Reducing the gap between the real and digital world makes the factory environment more flexible, more adaptive, but also more complex for the human workers. Future workers require interdisciplinary competencies from engineering, information technology, and computer science in order to understand and manage the diverse interrelations between physical objects and their digital counterpart. This paper proposes a mixed-reality based learning environment, which combines physical objects and visualisation of digital content via Augmented Reality. It uses reality-based interaction in order to make the dynamic interrelations between real and digital factory visible and tangible. We argue that our learning system does not work as a stand-alone solution, but should fit into existing academic and advanced training curricula.
Risk Assessment of Power System considering the CPS of Transformers
NASA Astrophysics Data System (ADS)
Zhou, Long; Peng, Zewu; Liu, Xindong; Li, Canbing; Chen, Can
2018-02-01
This paper constructs a risk assessment framework of power system for device-level information security, analyzes the typical protection configuration of power transformers, and takes transformer gas protection and differential protection as examples to put forward a method that analyzes the cyber security in electric power system, which targets transformer protection parameters. We estimate the risk of power system accounting for the cyber security of transformer through utilizing Monte Carlo method and two indexes, which are the loss of load probability and the expected demand not supplied. The proposed approach is tested with IEEE 9 bus system and IEEE 118 bus system.
Lv, Chen; Liu, Yahui; Hu, Xiaosong; Guo, Hongyan; Cao, Dongpu; Wang, Fei-Yue
2017-08-22
As a typical cyber-physical system (CPS), electrified vehicle becomes a hot research topic due to its high efficiency and low emissions. In order to develop advanced electric powertrains, accurate estimations of the unmeasurable hybrid states, including discrete backlash nonlinearity and continuous half-shaft torque, are of great importance. In this paper, a novel estimation algorithm for simultaneously identifying the backlash position and half-shaft torque of an electric powertrain is proposed using a hybrid system approach. System models, including the electric powertrain and vehicle dynamics models, are established considering the drivetrain backlash and flexibility, and also calibrated and validated using vehicle road testing data. Based on the developed system models, the powertrain behavior is represented using hybrid automata according to the piecewise affine property of the backlash dynamics. A hybrid-state observer, which is comprised of a discrete-state observer and a continuous-state observer, is designed for the simultaneous estimation of the backlash position and half-shaft torque. In order to guarantee the stability and reachability, the convergence property of the proposed observer is investigated. The proposed observer are validated under highly dynamical transitions of vehicle states. The validation results demonstrates the feasibility and effectiveness of the proposed hybrid-state observer.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
Podgórski, Daniel; Majchrzycka, Katarzyna; Dąbrowska, Anna; Gralewicz, Grzegorz; Okrasa, Małgorzata
2017-03-01
Recent developments in domains of ambient intelligence (AmI), Internet of Things, cyber-physical systems (CPS), ubiquitous/pervasive computing, etc., have led to numerous attempts to apply ICT solutions in the occupational safety and health (OSH) area. A literature review reveals a wide range of examples of smart materials, smart personal protective equipment and other AmI applications that have been developed to improve workers' safety and health. Because the use of these solutions modifies work methods, increases complexity of production processes and introduces high dynamism into thus created smart working environments (SWE), a new conceptual framework for dynamic OSH management in SWE is called for. A proposed framework is based on a new paradigm of OSH risk management consisting of real-time risk assessment and the capacity to monitor the risk level of each worker individually. A rationale for context-based reasoning in SWE and a respective model of the SWE-dedicated CPS are also proposed.
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-03-31
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarmmore » rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.« less
Human Capital Development - Resilient Cyber Physical Systems
2017-09-29
Human Capital Development – Resilient Cyber Physical Systems Technical Report SERC-2017-TR-113 September 29, 2017 Principal Investigator...4.2.2 Cyber Attack Taxonomy for Cyber Physical Systems .............................................................................. 43 4.2.3...Cyber- physical System Attack Taxonomy ................................................................................................ 44 4.2.4
Automated Analysis of Stateflow Models
NASA Technical Reports Server (NTRS)
Bourbouh, Hamza; Garoche, Pierre-Loic; Garion, Christophe; Gurfinkel, Arie; Kahsaia, Temesghen; Thirioux, Xavier
2017-01-01
Stateflow is a widely used modeling framework for embedded and cyber physical systems where control software interacts with physical processes. In this work, we present a framework a fully automated safety verification technique for Stateflow models. Our approach is two-folded: (i) we faithfully compile Stateflow models into hierarchical state machines, and (ii) we use automated logic-based verification engine to decide the validity of safety properties. The starting point of our approach is a denotational semantics of State flow. We propose a compilation process using continuation-passing style (CPS) denotational semantics. Our compilation technique preserves the structural and modal behavior of the system. The overall approach is implemented as an open source toolbox that can be integrated into the existing Mathworks Simulink Stateflow modeling framework. We present preliminary experimental evaluations that illustrate the effectiveness of our approach in code generation and safety verification of industrial scale Stateflow models.
Controlling high-throughput manufacturing at the nano-scale
NASA Astrophysics Data System (ADS)
Cooper, Khershed P.
2013-09-01
Interest in nano-scale manufacturing research and development is growing. The reason is to accelerate the translation of discoveries and inventions of nanoscience and nanotechnology into products that would benefit industry, economy and society. Ongoing research in nanomanufacturing is focused primarily on developing novel nanofabrication techniques for a variety of applications—materials, energy, electronics, photonics, biomedical, etc. Our goal is to foster the development of high-throughput methods of fabricating nano-enabled products. Large-area parallel processing and highspeed continuous processing are high-throughput means for mass production. An example of large-area processing is step-and-repeat nanoimprinting, by which nanostructures are reproduced again and again over a large area, such as a 12 in wafer. Roll-to-roll processing is an example of continuous processing, by which it is possible to print and imprint multi-level nanostructures and nanodevices on a moving flexible substrate. The big pay-off is high-volume production and low unit cost. However, the anticipated cost benefits can only be realized if the increased production rate is accompanied by high yields of high quality products. To ensure product quality, we need to design and construct manufacturing systems such that the processes can be closely monitored and controlled. One approach is to bring cyber-physical systems (CPS) concepts to nanomanufacturing. CPS involves the control of a physical system such as manufacturing through modeling, computation, communication and control. Such a closely coupled system will involve in-situ metrology and closed-loop control of the physical processes guided by physics-based models and driven by appropriate instrumentation, sensing and actuation. This paper will discuss these ideas in the context of controlling high-throughput manufacturing at the nano-scale.
On Design and Implementation of Neural-Machine Interface for Artificial Legs
Zhang, Xiaorong; Liu, Yuhong; Zhang, Fan; Ren, Jin; Sun, Yan (Lindsay); Yang, Qing
2011-01-01
The quality of life of leg amputees can be improved dramatically by using a cyber physical system (CPS) that controls artificial legs based on neural signals representing amputees’ intended movements. The key to the CPS is the neural-machine interface (NMI) that senses electromyographic (EMG) signals to make control decisions. This paper presents a design and implementation of a novel NMI using an embedded computer system to collect neural signals from a physical system - a leg amputee, provide adequate computational capability to interpret such signals, and make decisions to identify user’s intent for prostheses control in real time. A new deciphering algorithm, composed of an EMG pattern classifier and a post-processing scheme, was developed to identify the user’s intended lower limb movements. To deal with environmental uncertainty, a trust management mechanism was designed to handle unexpected sensor failures and signal disturbances. Integrating the neural deciphering algorithm with the trust management mechanism resulted in a highly accurate and reliable software system for neural control of artificial legs. The software was then embedded in a newly designed hardware platform based on an embedded microcontroller and a graphic processing unit (GPU) to form a complete NMI for real time testing. Real time experiments on a leg amputee subject and an able-bodied subject have been carried out to test the control accuracy of the new NMI. Our extensive experiments have shown promising results on both subjects, paving the way for clinical feasibility of neural controlled artificial legs. PMID:22389637
A Model-Driven Co-Design Framework for Fusing Control and Scheduling Viewpoints.
Sundharam, Sakthivel Manikandan; Navet, Nicolas; Altmeyer, Sebastian; Havet, Lionel
2018-02-20
Model-Driven Engineering (MDE) is widely applied in the industry to develop new software functions and integrate them into the existing run-time environment of a Cyber-Physical System (CPS). The design of a software component involves designers from various viewpoints such as control theory, software engineering, safety, etc. In practice, while a designer from one discipline focuses on the core aspects of his field (for instance, a control engineer concentrates on designing a stable controller), he neglects or considers less importantly the other engineering aspects (for instance, real-time software engineering or energy efficiency). This may cause some of the functional and non-functional requirements not to be met satisfactorily. In this work, we present a co-design framework based on timing tolerance contract to address such design gaps between control and real-time software engineering. The framework consists of three steps: controller design, verified by jitter margin analysis along with co-simulation, software design verified by a novel schedulability analysis, and the run-time verification by monitoring the execution of the models on target. This framework builds on CPAL (Cyber-Physical Action Language), an MDE design environment based on model-interpretation, which enforces a timing-realistic behavior in simulation through timing and scheduling annotations. The application of our framework is exemplified in the design of an automotive cruise control system.
A Model-Driven Co-Design Framework for Fusing Control and Scheduling Viewpoints
Navet, Nicolas; Havet, Lionel
2018-01-01
Model-Driven Engineering (MDE) is widely applied in the industry to develop new software functions and integrate them into the existing run-time environment of a Cyber-Physical System (CPS). The design of a software component involves designers from various viewpoints such as control theory, software engineering, safety, etc. In practice, while a designer from one discipline focuses on the core aspects of his field (for instance, a control engineer concentrates on designing a stable controller), he neglects or considers less importantly the other engineering aspects (for instance, real-time software engineering or energy efficiency). This may cause some of the functional and non-functional requirements not to be met satisfactorily. In this work, we present a co-design framework based on timing tolerance contract to address such design gaps between control and real-time software engineering. The framework consists of three steps: controller design, verified by jitter margin analysis along with co-simulation, software design verified by a novel schedulability analysis, and the run-time verification by monitoring the execution of the models on target. This framework builds on CPAL (Cyber-Physical Action Language), an MDE design environment based on model-interpretation, which enforces a timing-realistic behavior in simulation through timing and scheduling annotations. The application of our framework is exemplified in the design of an automotive cruise control system. PMID:29461489
Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks.
Zhang, Zhaoyang; Wang, Honggang; Wang, Chonggang; Fang, Hua
2013-06-01
Wireless body area networks (WBANs) are cyber-physical systems (CPS) that have emerged as a key technology to provide real-time health monitoring and ubiquitous healthcare services. WBANs could operate in dense environments such as in a hospital and lead to a high mutual communication interference in many application scenarios. The excessive interferences will significantly degrade the network performance including depleting the energy of WBAN nodes more quickly, and even eventually jeopardize people's lives due to unreliable (caused by the interference) healthcare data collections. Therefore, It is critical to mitigate the interference among WBANs to increase the reliability of the WBAN system while minimizing the system power consumption. Many existing approaches can deal with communication interference mitigation in general wireless networks but are not suitable for WBANs due to their ignoring the social nature of WBANs. Unlike the previous research, we for the first time propose a power game based approach to mitigate the communication interferences for WBANs based on the people's social interaction information. Our major contributions include: (1) model the inter-WBANs interference, and determine the distance distribution of the interference through both theoretical analysis and Monte Carlo simulations; (2) develop social interaction detection and prediction algorithms for people carrying WBANs; (3) develop a power control game based on the social interaction information to maximize the system's utility while minimize the energy consumption of WBANs system. The extensive simulation results show the effectiveness of the power control game for inter-WBAN interference mitigation using social interaction information. Our research opens a new research vista of WBANs using social networks.
Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks
Zhang, Zhaoyang; Wang, Honggang; Wang, Chonggang; Fang, Hua
2014-01-01
Wireless body area networks (WBANs) are cyber-physical systems (CPS) that have emerged as a key technology to provide real-time health monitoring and ubiquitous healthcare services. WBANs could operate in dense environments such as in a hospital and lead to a high mutual communication interference in many application scenarios. The excessive interferences will significantly degrade the network performance including depleting the energy of WBAN nodes more quickly, and even eventually jeopardize people’s lives due to unreliable (caused by the interference) healthcare data collections. Therefore, It is critical to mitigate the interference among WBANs to increase the reliability of the WBAN system while minimizing the system power consumption. Many existing approaches can deal with communication interference mitigation in general wireless networks but are not suitable for WBANs due to their ignoring the social nature of WBANs. Unlike the previous research, we for the first time propose a power game based approach to mitigate the communication interferences for WBANs based on the people’s social interaction information. Our major contributions include: (1) model the inter-WBANs interference, and determine the distance distribution of the interference through both theoretical analysis and Monte Carlo simulations; (2) develop social interaction detection and prediction algorithms for people carrying WBANs; (3) develop a power control game based on the social interaction information to maximize the system’s utility while minimize the energy consumption of WBANs system. The extensive simulation results show the effectiveness of the power control game for inter-WBAN interference mitigation using social interaction information. Our research opens a new research vista of WBANs using social networks. PMID:25436180
FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER PHYSICAL SYSTEMS
2018-02-23
FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL SYSTEMS UNIVERSITY OF TEXAS AT ARLINGTON FEBRUARY 2018 FINAL...COVERED (From - To) APR 2015 – APR 2017 4. TITLE AND SUBTITLE FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL ...dated 16 Jan 09 13. SUPPLEMENTARY NOTES 14. ABSTRACT This project studied emergent behavior in distributed cyber- physical systems (DCPS). Emergent
NASA Astrophysics Data System (ADS)
Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting
2016-10-01
Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.
Reconstruction of Cyber and Physical Software Using Novel Spread Method
NASA Astrophysics Data System (ADS)
Ma, Wubin; Deng, Su; Huang, Hongbin
2018-03-01
Cyber and Physical software has been concerned for many years since 2010. Actually, many researchers would disagree with the deployment of traditional Spread Method for reconstruction of Cyber and physical software, which embodies the key principles reconstruction of cyber physical system. NSM(novel spread method), our new methodology for reconstruction of cyber and physical software, is the solution to all of these challenges.
CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems
2018-04-19
AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386-16-1-4099 5c. PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical
DOT National Transportation Integrated Search
2010-01-01
The Smart Grid is a cyber-physical system comprised of physical components, such as transmission lines and generators, and a : network of embedded systems deployed for their cyber control. Our objective is to qualitatively and quantitatively analyze ...
Cyber-Physical System Security of Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dagle, Jeffery E.
2012-01-31
Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less
Dataset of anomalies and malicious acts in a cyber-physical subsystem.
Laso, Pedro Merino; Brosset, David; Puentes, John
2017-10-01
This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.
Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar
Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
Time-Centric Models For Designing Embedded Cyber-physical Systems
2009-10-09
Time -centric Models For Designing Embedded Cyber- physical Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou Electrical... Time -centric Models For Designing Embedded Cyber-physical Systems ∗ John C. Eidson , Edward A. Lee, Slobodan Matic, Sanjit A. Seshia, Jia Zou...implementations, such a uniform notion of time cannot be precisely realized. Time triggered networks [10] and time synchronization [9] can be used to
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
Cyber and physical equipment digital control system in Industry 4.0 item designing company
NASA Astrophysics Data System (ADS)
Gurjanov, A. V.; Zakoldaev, D. A.; Shukalov, A. V.; Zharinov, I. O.
2018-05-01
The problem of organization of digital control of the item designing company equipped with cyber and physical systems is being studied. A scheme of cyber and physical systems and personnel interaction in the Industry 4.0 smart factory company is presented. A scheme of assembly units transportation in the Industry 4.0 smart factory company is provided. A scheme of digital control system in the Industry 4.0 smart factory company is given.
CPAD: Cyber-Physical Attack Detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ferragut, Erik M; Laska, Jason A
The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.
Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glenn, Colleen; Sterbentz, Dane; Wright, Aaron
With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less
Cyber-physical approach to the network-centric robotics control task
NASA Astrophysics Data System (ADS)
Muliukha, Vladimir; Ilyashenko, Alexander; Zaborovsky, Vladimir; Lukashin, Alexey
2016-10-01
Complex engineering tasks concerning control for groups of mobile robots are developed poorly. In our work for their formalization we use cyber-physical approach, which extends the range of engineering and physical methods for a design of complex technical objects by researching the informational aspects of communication and interaction between objects and with an external environment [1]. The paper analyzes network-centric methods for control of cyber-physical objects. Robots or cyber-physical objects interact with each other by transmitting information via computer networks using preemptive queueing system and randomized push-out mechanism [2],[3]. The main field of application for the results of our work is space robotics. The selection of cyber-physical systems as a special class of designed objects is due to the necessity of integrating various components responsible for computing, communications and control processes. Network-centric solutions allow using universal means for the organization of information exchange to integrate different technologies for the control system.
Zhang, Jun; Tian, Gui Yun; Marindra, Adi M J; Sunny, Ali Imam; Zhao, Ao Bo
2017-01-29
In recent few years, the antenna and sensor communities have witnessed a considerable integration of radio frequency identification (RFID) tag antennas and sensors because of the impetus provided by internet of things (IoT) and cyber-physical systems (CPS). Such types of sensor can find potential applications in structural health monitoring (SHM) because of their passive, wireless, simple, compact size, and multimodal nature, particular in large scale infrastructures during their lifecycle. The big data from these ubiquitous sensors are expected to generate a big impact for intelligent monitoring. A remarkable number of scientific papers demonstrate the possibility that objects can be remotely tracked and intelligently monitored for their physical/chemical/mechanical properties and environment conditions. Most of the work focuses on antenna design, and significant information has been generated to demonstrate feasibilities. Further information is needed to gain deep understanding of the passive RFID antenna sensor systems in order to make them reliable and practical. Nevertheless, this information is scattered over much literature. This paper is to comprehensively summarize and clearly highlight the challenges and state-of-the-art methods of passive RFID antenna sensors and systems in terms of sensing and communication from system point of view. Future trends are also discussed. The future research and development in UK are suggested as well.
Analyzing SystemC Designs: SystemC Analysis Approaches for Varying Applications
Stoppe, Jannis; Drechsler, Rolf
2015-01-01
The complexity of hardware designs is still increasing according to Moore's law. With embedded systems being more and more intertwined and working together not only with each other, but also with their environments as cyber physical systems (CPSs), more streamlined development workflows are employed to handle the increasing complexity during a system's design phase. SystemC is a C++ library for the design of hardware/software systems, enabling the designer to quickly prototype, e.g., a distributed CPS without having to decide about particular implementation details (such as whether to implement a feature in hardware or in software) early in the design process. Thereby, this approach reduces the initial implementation's complexity by offering an abstract layer with which to build a working prototype. However, as SystemC is based on C++, analyzing designs becomes a difficult task due to the complex language features that are available to the designer. Several fundamentally different approaches for analyzing SystemC designs have been suggested. This work illustrates several different SystemC analysis approaches, including their specific advantages and shortcomings, allowing designers to pick the right tools to assist them with a specific problem during the design of a system using SystemC. PMID:25946632
Analyzing SystemC Designs: SystemC Analysis Approaches for Varying Applications.
Stoppe, Jannis; Drechsler, Rolf
2015-05-04
The complexity of hardware designs is still increasing according to Moore's law. With embedded systems being more and more intertwined and working together not only with each other, but also with their environments as cyber physical systems (CPSs), more streamlined development workflows are employed to handle the increasing complexity during a system's design phase. SystemC is a C++ library for the design of hardware/software systems, enabling the designer to quickly prototype, e.g., a distributed CPS without having to decide about particular implementation details (such as whether to implement a feature in hardware or in software) early in the design process. Thereby, this approach reduces the initial implementation's complexity by offering an abstract layer with which to build a working prototype. However, as SystemC is based on C++, analyzing designs becomes a difficult task due to the complex language features that are available to the designer. Several fundamentally different approaches for analyzing SystemC designs have been suggested. This work illustrates several different SystemC analysis approaches, including their specific advantages and shortcomings, allowing designers to pick the right tools to assist them with a specific problem during the design of a system using SystemC.
Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert
2015-07-28
Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
Using Robots and Contract Learning to Teach Cyber-Physical Systems to Undergraduates
ERIC Educational Resources Information Center
Crenshaw, T. L. A.
2013-01-01
Cyber-physical systems are a genre of networked real-time systems that monitor and control the physical world. Examples include unmanned aerial vehicles and industrial robotics. The experts who develop these complex systems are retiring much faster than universities are graduating engineering majors. As a result, it is important for undergraduates…
Cyber-Physical Human Systems: Putting People in the Loop.
Sowe, Sulayman K; Zettsu, Koji; Simmon, Eric; de Vaulx, Frederic; Bojanova, Irena
2016-01-01
This article outlines the challenge to understand how to integrate people into a new generation of cyber-physical-human systems (CPHSs) and proposes a human service capability description model to help.
Noguero, Adrián; Calvo, Isidro; Pérez, Federico; Almeida, Luis
2013-01-01
There is an increasing number of Ambient Intelligence (AmI) systems that are time-sensitive and resource-aware. From healthcare to building and even home/office automation, it is now common to find systems combining interactive and sensing multimedia traffic with relatively simple sensors and actuators (door locks, presence detectors, RFIDs, HVAC, information panels, etc.). Many of these are today known as Cyber-Physical Systems (CPS). Quite frequently, these systems must be capable of (1) prioritizing different traffic flows (process data, alarms, non-critical data, etc.), (2) synchronizing actions in several distributed devices and, to certain degree, (3) easing resource management (e.g., detecting faulty nodes, managing battery levels, handling overloads, etc.). This work presents FTT-MA, a high-level middleware architecture aimed at easing the design, deployment and operation of such AmI systems. FTT-MA ensures that both functional and non-functional aspects of the applications are met even during reconfiguration stages. The paper also proposes a methodology, together with a design tool, to create this kind of systems. Finally, a sample case study is presented that illustrates the use of the middleware and the methodology proposed in the paper. PMID:23669711
Noguero, Adrián; Calvo, Isidro; Pérez, Federico; Almeida, Luis
2013-05-13
There is an increasing number of Ambient Intelligence (AmI) systems that are time-sensitive and resource-aware. From healthcare to building and even home/office automation, it is now common to find systems combining interactive and sensing multimedia traffic with relatively simple sensors and actuators (door locks, presence detectors, RFIDs, HVAC, information panels, etc.). Many of these are today known as Cyber-Physical Systems (CPS). Quite frequently, these systems must be capable of (1) prioritizing different traffic flows (process data, alarms, non-critical data, etc.), (2) synchronizing actions in several distributed devices and, to certain degree, (3) easing resource management (e.g., detecting faulty nodes, managing battery levels, handling overloads, etc.). This work presents FTT-MA, a high-level middleware architecture aimed at easing the design, deployment and operation of such AmI systems. FTT-MA ensures that both functional and non-functional aspects of the applications are met even during reconfiguration stages. The paper also proposes a methodology, together with a design tool, to create this kind of systems. Finally, a sample case study is presented that illustrates the use of the middleware and the methodology proposed in the paper.
Code of Federal Regulations, 2014 CFR
2014-01-01
... sectors and their functional systems, physical assets, and cyber networks. “(a) Membership. The NIAC shall... critical infrastructure and their supporting functional systems, physical assets, and cyber networks, and...
Cyber physical systems role in manufacturing technologies
NASA Astrophysics Data System (ADS)
Al-Ali, A. R.; Gupta, Ragini; Nabulsi, Ahmad Al
2018-04-01
Empowered by the recent development in single System-on-Chip, Internet of Things, and cloud computing technologies, cyber physical systems are evolving as a major controller during and post the manufacturing products process. In additional to their real physical space, cyber products nowadays have a virtual space. A product virtual space is a digital twin that is attached to it to enable manufacturers and their clients to better manufacture, monitor, maintain and operate it throughout its life time cycles, i.e. from the product manufacturing date, through operation and to the end of its lifespan. Each product is equipped with a tiny microcontroller that has a unique identification number, access code and WiFi conductivity to access it anytime and anywhere during its life cycle. This paper presents the cyber physical systems architecture and its role in manufacturing. Also, it highlights the role of Internet of Things and cloud computing in industrial manufacturing and factory automation.
Cyber / Physical Security Vulnerability Assessment Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Simpkins, Bret E.
Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, Austin; Chakraborty, Sudipta; Wang, Dexin
This paper presents a cyber-physical testbed, developed to investigate the complex interactions between emerging microgrid technologies such as grid-interactive power sources, control systems, and a wide variety of communication platforms and bandwidths. The cyber-physical testbed consists of three major components for testing and validation: real time models of a distribution feeder model with microgrid assets that are integrated into the National Renewable Energy Laboratory's (NREL) power hardware-in-the-loop (PHIL) platform; real-time capable network-simulator-in-the-loop (NSIL) models; and physical hardware including inverters and a simple system controller. Several load profiles and microgrid configurations were tested to examine the effect on system performance withmore » increasing channel delays and router processing delays in the network simulator. Testing demonstrated that the controller's ability to maintain a target grid import power band was severely diminished with increasing network delays and laid the foundation for future testing of more complex cyber-physical systems.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
NASA Astrophysics Data System (ADS)
Gurjanov, A. V.; Zakoldaev, D. A.; Shukalov, A. V.; Zharinov, I. O.
2018-03-01
The task of developing principles of cyber-physical system constitution at the Industry 4.0 company of the item designing components of mechanical assembly production is being studied. The task has been solved by analyzing the components and technologies, which have some practical application in the digital production organization. The list of components has been defined and the authors proposed the scheme of the components and technologies interconnection in the Industry 4.0 of mechanical assembly production to make an uninterrupted manufacturing route of the item designing components with application of some cyber-physical systems.
Zhang, Jun; Tian, Gui Yun; Marindra, Adi M. J.; Sunny, Ali Imam; Zhao, Ao Bo
2017-01-01
In recent few years, the antenna and sensor communities have witnessed a considerable integration of radio frequency identification (RFID) tag antennas and sensors because of the impetus provided by internet of things (IoT) and cyber-physical systems (CPS). Such types of sensor can find potential applications in structural health monitoring (SHM) because of their passive, wireless, simple, compact size, and multimodal nature, particular in large scale infrastructures during their lifecycle. The big data from these ubiquitous sensors are expected to generate a big impact for intelligent monitoring. A remarkable number of scientific papers demonstrate the possibility that objects can be remotely tracked and intelligently monitored for their physical/chemical/mechanical properties and environment conditions. Most of the work focuses on antenna design, and significant information has been generated to demonstrate feasibilities. Further information is needed to gain deep understanding of the passive RFID antenna sensor systems in order to make them reliable and practical. Nevertheless, this information is scattered over much literature. This paper is to comprehensively summarize and clearly highlight the challenges and state-of-the-art methods of passive RFID antenna sensors and systems in terms of sensing and communication from system point of view. Future trends are also discussed. The future research and development in UK are suggested as well. PMID:28146067
Mohammed, Abdul-Wahid; Xu, Yang; Hu, Haixiao; Agyemang, Brighter
2016-09-21
In novel collaborative systems, cooperative entities collaborate services to achieve local and global objectives. With the growing pervasiveness of cyber-physical systems, however, such collaboration is hampered by differences in the operations of the cyber and physical objects, and the need for the dynamic formation of collaborative functionality given high-level system goals has become practical. In this paper, we propose a cross-layer automation and management model for cyber-physical systems. This models the dynamic formation of collaborative services pursuing laid-down system goals as an ontology-oriented hierarchical task network. Ontological intelligence provides the semantic technology of this model, and through semantic reasoning, primitive tasks can be dynamically composed from high-level system goals. In dealing with uncertainty, we further propose a novel bridge between hierarchical task networks and Markov logic networks, called the Markov task network. This leverages the efficient inference algorithms of Markov logic networks to reduce both computational and inferential loads in task decomposition. From the results of our experiments, high-precision service composition under uncertainty can be achieved using this approach.
2017-11-01
Public Release; Distribution Unlimited. PA# 88ABW-2017-5388 Date Cleared: 30 OCT 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Cyber- physical systems... physical processes that interact in intricate manners. This makes verification of the software complex and unwieldy. In this report, an approach towards...resulting implementations. 15. SUBJECT TERMS Cyber- physical systems, Formal guarantees, Code generation 16. SECURITY CLASSIFICATION OF: 17
Emulytics for Cyber-Enabled Physical Attack Scenarios: Interim LDRD Report of Year One Results.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clem, John; Urias, Vincent; Atkins, William Dee
Sandia National Laboratories has funded the research and development of a new capability to interactively explore the effects of cyber exploits on the performance of physical protection systems. This informal, interim report of progress summarizes the project’s basis and year one (of two) accomplishments. It includes descriptions of confirmed cyber exploits against a representative testbed protection system and details the development of an emulytics capability to support live, virtual, and constructive experiments. This work will support stakeholders to better engineer, operate, and maintain reliable protection systems.
Perkins, Casey; Muller, George
2015-10-08
The number of connections between physical and cyber security systems is rapidly increasing due to centralized control from automated and remotely connected means. As the number of interfaces between systems continues to grow, the interactions and interdependencies between them cannot be ignored. Historically, physical and cyber vulnerability assessments have been performed independently. This independent evaluation omits important aspects of the integrated system, where the impacts resulting from malicious or opportunistic attacks are not easily known or understood. Here, we describe a discrete event simulation model that uses information about integrated physical and cyber security systems, attacker characteristics and simple responsemore » rules to identify key safeguards that limit an attacker's likelihood of success. Key features of the proposed model include comprehensive data generation to support a variety of sophisticated analyses, and full parameterization of safeguard performance characteristics and attacker behaviours to evaluate a range of scenarios. Lastly, we also describe the core data requirements and the network of networks that serves as the underlying simulation structure.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perkins, Casey; Muller, George
The number of connections between physical and cyber security systems is rapidly increasing due to centralized control from automated and remotely connected means. As the number of interfaces between systems continues to grow, the interactions and interdependencies between them cannot be ignored. Historically, physical and cyber vulnerability assessments have been performed independently. This independent evaluation omits important aspects of the integrated system, where the impacts resulting from malicious or opportunistic attacks are not easily known or understood. Here, we describe a discrete event simulation model that uses information about integrated physical and cyber security systems, attacker characteristics and simple responsemore » rules to identify key safeguards that limit an attacker's likelihood of success. Key features of the proposed model include comprehensive data generation to support a variety of sophisticated analyses, and full parameterization of safeguard performance characteristics and attacker behaviours to evaluate a range of scenarios. Lastly, we also describe the core data requirements and the network of networks that serves as the underlying simulation structure.« less
NASA Astrophysics Data System (ADS)
Papageorgas, Panagiotis G.; Agavanakis, Kyriakos; Dogas, Ioannis; Piromalis, Dimitrios D.
2018-05-01
A cloud-based architecture is presented for the internetworking of sensors and actuators through a universal gateway, network server and application user interface design. The proposed approach targets to Energy Efficiency and sustainability in a holistic way, by integrating an open-source test bed prototype based on long-range low-bandwidth wireless networking technology for sensing and actuation as the elementary block of a viable, cost-effective and reliable solution. The prototype presented is capable of supporting both sensors and actuators, processing data locally and transmitting the results of the imposed computations to a higher level node. Additionally, it is combined with a service-oriented architecture and involves publish/subscribe middleware protocols and cloud technology to confront with the system needs in terms of data volume and processing power. In this context, the integration of instant message (chat) services is demonstrated so that they can be part of an emerging global-scope eco-system of Cyber-Physical Systems to support a wide variety of IoT applications, with strong advantages such as usability, scalability and security, while adopting a unified gateway design and a simple - yet powerful - user interface.
ERIC Educational Resources Information Center
Ansari, Fazel; Seidenberg, Ulrich
2016-01-01
This paper discusses the complementarity of human and cyber physical production systems (CPPS). The discourse of complementarity is elaborated by defining five criteria for comparing the characteristics of human and CPPS. Finally, a management portfolio matrix is proposed for examining the feasibility of optimal collaboration between them. The…
NASA Astrophysics Data System (ADS)
Mueller, Egon; Chen, Xiao-Li; Riedel, Ralph
2017-09-01
Considered as a top priority of industrial development, Industry 4.0 (or Industrie 4.0 as the German version) has being highlighted as the pursuit of both academy and practice in companies. In this paper, based on the review of state of art and also the state of practice in different countries, shortcomings have been revealed as the lacking of applicable framework for the implementation of Industrie 4.0. Therefore, in order to shed some light on the knowledge of the details, a reference architecture is developed, where four perspectives namely manufacturing process, devices, software and engineering have been highlighted. Moreover, with a view on the importance of Cyber-Physical systems, the structure of Cyber-Physical System are established for the in-depth analysis. Further cases with the usage of Cyber-Physical System are also arranged, which attempts to provide some implications to match the theoretical findings together with the experience of companies. In general, results of this paper could be useful for the extending on the theoretical understanding of Industrie 4.0. Additionally, applied framework and prototypes based on the usage of Cyber-Physical Systems are also potential to help companies to design the layout of sensor nets, to achieve coordination and controlling of smart machines, to realize synchronous production with systematic structure, and to extend the usage of information and communication technologies to the maintenance scheduling.
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
NASA Astrophysics Data System (ADS)
Quaranta, Giacomo; Abisset-Chavanne, Emmanuelle; Chinesta, Francisco; Duval, Jean-Louis
2018-05-01
In this work, a Cyber Physical System called Hybrid Twin is proposed for composite parts manufactured from RTM. This allows to introduce in the virtual twin of the parts the defect and the final properties induced by the real manufacturing process and to use on line data collection for predictive maintenance.
NASA Astrophysics Data System (ADS)
Yuan, Yuan; Sun, Fuchun; Liu, Huaping
2016-07-01
This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.
Key issues and technical route of cyber physical distribution system
NASA Astrophysics Data System (ADS)
Zheng, P. X.; Chen, B.; Zheng, L. J.; Zhang, G. L.; Fan, Y. L.; Pei, T.
2017-01-01
Relying on the National High Technology Research and Development Program, this paper introduced the key issues in Cyber Physical Distribution System (CPDS), mainly includes: composite modelling method and interaction mechanism, system planning method, security defence technology, distributed control theory. Then on this basis, the corresponding technical route is proposed, and a more detailed research framework along with main schemes to be adopted is also presented.
Data distribution service-based interoperability framework for smart grid testbed infrastructure
Youssef, Tarek A.; Elsayed, Ahmed T.; Mohammed, Osama A.
2016-03-02
This study presents the design and implementation of a communication and control infrastructure for smart grid operation. The proposed infrastructure enhances the reliability of the measurements and control network. The advantages of utilizing the data-centric over message-centric communication approach are discussed in the context of smart grid applications. The data distribution service (DDS) is used to implement a data-centric common data bus for the smart grid. This common data bus improves the communication reliability, enabling distributed control and smart load management. These enhancements are achieved by avoiding a single point of failure while enabling peer-to-peer communication and an automatic discoverymore » feature for dynamic participating nodes. The infrastructure and ideas presented in this paper were implemented and tested on the smart grid testbed. A toolbox and application programing interface for the testbed infrastructure are developed in order to facilitate interoperability and remote access to the testbed. This interface allows control, monitoring, and performing of experiments remotely. Furthermore, it could be used to integrate multidisciplinary testbeds to study complex cyber-physical systems (CPS).« less
New Educational Modules Using a Cyber-Distribution System Testbed
Xie, Jing; Bedoya, Juan Carlos; Liu, Chen-Ching; ...
2018-03-30
At Washington State University (WSU), a modern cyber-physical system testbed has been implemented based on an industry grade distribution management system (DMS) that is integrated with remote terminal units (RTUs), smart meters, and a solar photovoltaic (PV). In addition, the real model from the Avista Utilities distribution system in Pullman, WA, is modeled in DMS. The proposed testbed environment allows students and instructors to utilize these facilities for innovations in learning and teaching. For power engineering education, this testbed helps students understand the interaction between a cyber system and a physical distribution system through industrial level visualization. The testbed providesmore » a distribution system monitoring and control environment for students. Compared with a simulation based approach, the testbed brings the students' learning environment a step closer to the real world. The educational modules allow students to learn the concepts of a cyber-physical system and an electricity market through an integrated testbed. Furthermore, the testbed provides a platform in the study mode for students to practice working on a real distribution system model. Here, this paper describes the new educational modules based on the testbed environment. Three modules are described together with the underlying educational principles and associated projects.« less
New Educational Modules Using a Cyber-Distribution System Testbed
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xie, Jing; Bedoya, Juan Carlos; Liu, Chen-Ching
At Washington State University (WSU), a modern cyber-physical system testbed has been implemented based on an industry grade distribution management system (DMS) that is integrated with remote terminal units (RTUs), smart meters, and a solar photovoltaic (PV). In addition, the real model from the Avista Utilities distribution system in Pullman, WA, is modeled in DMS. The proposed testbed environment allows students and instructors to utilize these facilities for innovations in learning and teaching. For power engineering education, this testbed helps students understand the interaction between a cyber system and a physical distribution system through industrial level visualization. The testbed providesmore » a distribution system monitoring and control environment for students. Compared with a simulation based approach, the testbed brings the students' learning environment a step closer to the real world. The educational modules allow students to learn the concepts of a cyber-physical system and an electricity market through an integrated testbed. Furthermore, the testbed provides a platform in the study mode for students to practice working on a real distribution system model. Here, this paper describes the new educational modules based on the testbed environment. Three modules are described together with the underlying educational principles and associated projects.« less
An Evaluation method for C2 Cyber-Physical Systems Reliability Based on Deep Learning
2014-06-01
the reliability testing data of the system, we obtain the prior distribution of the relia- bility is 1 1( ) ( ; , )R LG R r . By Bayes theo- rem ...criticality cyber-physical sys- tems[C]//Proc of ICDCS. Piscataway, NJ: IEEE, 2010:169-178. [17] Zimmer C, Bhat B, Muller F, et al. Time-based intrusion de
Fall 2014 SEI Research Review High Confidence Cyber Physical Systems
2014-10-28
2014 Carnegie Mellon University Fall 2014 SEI Research Review High Confidence Cyber Physical Systems Software Engineering Institute Carnegie... Research Review de Niz Oct 28th, 2014 © 2014 Carnegie Mellon University Copyright 2014 Carnegie Mellon University This material is based upon work...Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed
Gbps wireless transceivers for high bandwidth interconnections in distributed cyber physical systems
NASA Astrophysics Data System (ADS)
Saponara, Sergio; Neri, Bruno
2015-05-01
In Cyber Physical Systems there is a growing use of high speed sensors like photo and video camera, radio and light detection and ranging (Radar/Lidar) sensors. Hence Cyber Physical Systems can benefit from the high communication data rate, several Gbps, that can be provided by mm-wave wireless transceivers. At such high frequency the wavelength is few mm and hence the whole transceiver including the antenna can be integrated in a single chip. To this aim this paper presents the design of 60 GHz transceiver architecture to ensure connection distances up to 10 m and data rate up to 4 Gbps. At 60 GHz there are more than 7 GHz of unlicensed bandwidth (available for free for development of new services). By using a CMOS SOI technology RF, analog and digital baseband circuitry can be integrated in the same chip minimizing noise coupling. Even the antenna is integrated on chip reducing cost and size vs. classic off-chip antenna solutions. Therefore the proposed transceiver can enable at physical layer the implementation of low cost nodes for a Cyber Physical System with data rates of several Gbps and with a communication distance suitable for home/office scenarios, or on-board vehicles such as cars, trains, ships, airplanes
Development of a smart flood warning system in urban areas: A case study of Huwei area in Taiwan
NASA Astrophysics Data System (ADS)
Yang, Sheng-Chi; Hsu, Hao-Ming; Kao, Hong-Ming
2016-04-01
In this study, we developed a smart flood warning system to clearly understand flood propagations in urban areas. The science and technology park of Huwei, located in the southwest of Taiwan, was selected as a study area. It was designated to be an important urban area of optoelectronics and biotechnology. The region has an area about 1 km2 with approximately 1 km in both length and width. The discrepancy between the highest and lowest elevations is 6.3 m and its elevation decreases along the northeast to the southwest. It is an isolated urban drainage area due to its urban construction plan. The storm sewer system in this region includes three major networks that collect the runoff and drain to the detention pond where is located in the southwest corner of the region. The proposed smart flood warning system combines three important parts, i.e. the physical world, the cyber-physical interface, and the cyber space, to identify how the flood affects urban areas from now until the next three hours. In the physical world, when a rainfall event occurs, monitoring sensors (e.g. rainfall gauges and water level gauges built in the sewer system and ground surface), which are established in several essential locations of the study area, collect in situ hydrological data and then these data being transported to the cyber-physical interface. The cyber-physical interface is a data preprocess space that includes data analysis, quality control and assurance, and data integration and standardization to produce the validated data. In the cyber space, it has missions to receive the validated data from the cyber-physical interface and to run the time machine that has flood analyses of data mining, inundation scenarios simulation, risk and economic assessments, and so on, based on the validated data. After running the time machine, it offers the analyzed results related to flooding planning, mitigation, response, and recovery. According to the analyzed results, the decision supporting system, therefore, can publish warning information in urban areas at the right time. Keywords: flood warning system, flood mitigation, inundation.
Federating Cyber and Physical Models for Event-Driven Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stephan, Eric G.; Pawlowski, Ronald A.; Sridhar, Siddharth
The purpose of this paper is to describe a novel method to improve electric power system monitoring and control software application interoperability. This method employs the concept of federation, which is defined as the use of existing models that represent aspects of a system in specific domains (such as physical and cyber security domains) and building interface to link all of domain models.
Contract-Based Integration of Cyber-Physical Analyses
2014-10-14
for cyber-physical systems , 2013 [3] Torngren et al. Integrating viewpoints in the development of mechatronic products, 2013 [4] Rajhans et al...Conference on Embedded Software Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...failures 5 Analytic aspect of integration Sensor Sampling PID Controller Actuator Controller Communication bus Sensor board CPU Actuator board System Bin
Towards Co-Engineering Communicating Autonomous Cyber-Physical Systems
NASA Technical Reports Server (NTRS)
Bujorianu, Marius C.; Bujorianu, Manuela L.
2009-01-01
In this paper, we sketch a framework for interdisciplinary modeling of space systems, by proposing a holistic view. We consider different system dimensions and their interaction. Specifically, we study the interactions between computation, physics, communication, uncertainty and autonomy. The most comprehensive computational paradigm that supports a holistic perspective on autonomous space systems is given by cyber-physical systems. For these, the state of art consists of collaborating multi-engineering efforts that prompt for an adequate formal foundation. To achieve this, we propose a leveraging of the traditional content of formal modeling by a co-engineering process.
Federation of UML models for cyber physical use cases
DOE Office of Scientific and Technical Information (OSTI.GOV)
This method employs the concept of federation, which is defined as the use of existing models that represent aspects of a system in specific domains (such as physical and cyber security domains) and building interfaces to link all of domain models. Federation seeks to build on existing bodies of work. Some examples include the Common Information Models (CIM) maintained by the International Electrotechnical Commission Technical Committee 57 (IEC TC 57) for the electric power industry. Another relevant model is the CIM maintained by the Distributed Management Task Force (DMTF)? this CIM defines a representation of the managed elements in anmore » Information Technology (IT) environment. The power system is an example of a cyber-physical system, where the cyber systems, consisting of computing infrastructure such as networks and devices, play a critical role in the operation of the underlying physical electricity delivery system. Measurements from remote field devices are relayed to control centers through computer networks, and the data is processed to determine suitable control actions. Control decisions are then relayed back to field devices. It has been observed that threat actors may be able to successfully compromise this cyber layer in order to impact power system operation. Therefore, future control center applications must be wary of potentially compromised measurements coming from field devices. In order to ensure the integrity of the field measurements, these applications could make use of compromise indicators from alternate sources of information such as cyber security. Thus, modern control applications may require access to data from sources that are not defined in the local information model. In such cases, software application interfaces will require integration of data objects from cross-domain data models. When incorporating or federating different domains, it is important to have subject matter experts work together, recognizing that not everyone has the same knowledge, responsibilities, focus, or skill set.« less
Efficient evaluation of wireless real-time control networks.
Horvath, Peter; Yampolskiy, Mark; Koutsoukos, Xenofon
2015-02-11
In this paper, we present a system simulation framework for the design and performance evaluation of complex wireless cyber-physical systems. We describe the simulator architecture and the specific developments that are required to simulate cyber-physical systems relying on multi-channel, multihop mesh networks. We introduce realistic and efficient physical layer models and a system simulation methodology, which provides statistically significant performance evaluation results with low computational complexity. The capabilities of the proposed framework are illustrated in the example of WirelessHART, a centralized, real-time, multi-hop mesh network designed for industrial control and monitor applications.
2018-04-30
quality assurance, parts, materials, processes, and domain-specific considerations such as radiation effects in space missions which are all part of MA...Bulletin, 138(2), p.211. Katz, R. and Allen, T.J. (1982). Investigating the Not Invented Here (NIH) syndrome : A look at the performance, tenure, and...actual modularity of a cyber-physical system is particularly acute . As Lee [2008] points out, cyber-physical systems have always been held to a higher
Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.
Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin
2016-08-18
Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.
Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach
NASA Technical Reports Server (NTRS)
Roy, Sandip; Sridhar, Banavar
2016-01-01
Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure, and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.
NASA Astrophysics Data System (ADS)
Zhu, Junjie
Aeration accounts for a large fraction of energy consumption in conventional water reclamation plants (WRPs). Although process operations at older WRPs can satisfy effluent permit requirements, they typically operate with excess aeration. More effective process controls at older WRPs can be challenging as operators work to balance higher energy costs and more stringent effluent limitations while managing fluctuating loads. Therefore, understandings of process resilience or ability to quickly return to original operation conditions at a WRP are important. A state-of-art WRP should maintain process resilience to deal with different kinds of perturbations even after optimization of energy demands. This work was to evaluate the applicability and feasibility of cyber-physical system (CPS) for improving operation at Metropolitan Water Reclamation District of Greater Chicago (MWRDGC) Calumet WRP. In this work, a process model was developed and used to better understand the conditions of current Calumet WRP, with additional valuable information from two dissolved oxygen field measurements. Meanwhile, a classification system was developed to reveal the pattern of historical influent scenario based on cluster analysis and cross-tabulation analysis. Based on the results from the classification, typical process control options were investigated. To ensure the feasibility of information acquisition, the reliability and flexibility of soft sensors were assessed to typical influent conditions. Finally, the process resilience was investigated to better balance influent perturbations, energy demands, and effluent quality for long-term operations. These investigations and evaluations show that although the energy demands change as the influent conditions and process controls. In general, aeration savings could be up to 50% from the level of current consumption; with a more complex process controls, the saving could be up to 70% in relatively steady-state conditions and at least 40% in relatively challenging transient conditions. The soft sensors can provide reliable and flexible performance on target predictions. The plant can still maintain at a similar level of process resilience after 50% aeration saving, even during long-term perturbations. Overall, this work shows that it is well feasible to provide more cost-effective operations at the Calumet WRP, and meanwhile influent perturbations, effluent quality, and process resilience are well in balance.
Susceptibility of SCADA systems and the energy sector
NASA Astrophysics Data System (ADS)
Goike, Lindsay
The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
A preliminary cyber-physical security assessment of the Robot Operating System (ROS)
NASA Astrophysics Data System (ADS)
McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David
2013-05-01
Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan
The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used tomore » demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
Obstacle Recognition Based on Machine Learning for On-Chip LiDAR Sensors in a Cyber-Physical System
Beruvides, Gerardo
2017-01-01
Collision avoidance is an important feature in advanced driver-assistance systems, aimed at providing correct, timely and reliable warnings before an imminent collision (with objects, vehicles, pedestrians, etc.). The obstacle recognition library is designed and implemented to address the design and evaluation of obstacle detection in a transportation cyber-physical system. The library is integrated into a co-simulation framework that is supported on the interaction between SCANeR software and Matlab/Simulink. From the best of the authors’ knowledge, two main contributions are reported in this paper. Firstly, the modelling and simulation of virtual on-chip light detection and ranging sensors in a cyber-physical system, for traffic scenarios, is presented. The cyber-physical system is designed and implemented in SCANeR. Secondly, three specific artificial intelligence-based methods for obstacle recognition libraries are also designed and applied using a sensory information database provided by SCANeR. The computational library has three methods for obstacle detection: a multi-layer perceptron neural network, a self-organization map and a support vector machine. Finally, a comparison among these methods under different weather conditions is presented, with very promising results in terms of accuracy. The best results are achieved using the multi-layer perceptron in sunny and foggy conditions, the support vector machine in rainy conditions and the self-organized map in snowy conditions. PMID:28906450
Obstacle Recognition Based on Machine Learning for On-Chip LiDAR Sensors in a Cyber-Physical System.
Castaño, Fernando; Beruvides, Gerardo; Haber, Rodolfo E; Artuñedo, Antonio
2017-09-14
Collision avoidance is an important feature in advanced driver-assistance systems, aimed at providing correct, timely and reliable warnings before an imminent collision (with objects, vehicles, pedestrians, etc.). The obstacle recognition library is designed and implemented to address the design and evaluation of obstacle detection in a transportation cyber-physical system. The library is integrated into a co-simulation framework that is supported on the interaction between SCANeR software and Matlab/Simulink. From the best of the authors' knowledge, two main contributions are reported in this paper. Firstly, the modelling and simulation of virtual on-chip light detection and ranging sensors in a cyber-physical system, for traffic scenarios, is presented. The cyber-physical system is designed and implemented in SCANeR. Secondly, three specific artificial intelligence-based methods for obstacle recognition libraries are also designed and applied using a sensory information database provided by SCANeR. The computational library has three methods for obstacle detection: a multi-layer perceptron neural network, a self-organization map and a support vector machine. Finally, a comparison among these methods under different weather conditions is presented, with very promising results in terms of accuracy. The best results are achieved using the multi-layer perceptron in sunny and foggy conditions, the support vector machine in rainy conditions and the self-organized map in snowy conditions.
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
ERIC Educational Resources Information Center
Anderst, James; Kellogg, Nancy; Jung, Inkyung
2009-01-01
Objectives: To characterize the changes regarding the diagnosis of physical abuse provided to Child Protective Services (CPS) when CPS asks a Child Abuse Pediatrics (CAP) specialty group for a second opinion and works in concert with that CAP group. Methods: Subjects were reported to CPS for suspected physical abuse and were first evaluated by a…
Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M
2014-06-24
A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.
Complex Failure Forewarning System - DHS Conference Proceedings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J
2011-01-01
As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain, aging bridges, is used to explain the Complex Structure Failure Forewarning System. We discuss the workings ofmore » such a system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less
Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System
Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin
2016-01-01
Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171
Real-time parameter optimization based on neural network for smart injection molding
NASA Astrophysics Data System (ADS)
Lee, H.; Liau, Y.; Ryu, K.
2018-03-01
The manufacturing industry has been facing several challenges, including sustainability, performance and quality of production. Manufacturers attempt to enhance the competitiveness of companies by implementing CPS (Cyber-Physical Systems) through the convergence of IoT(Internet of Things) and ICT(Information & Communication Technology) in the manufacturing process level. Injection molding process has a short cycle time and high productivity. This features have been making it suitable for mass production. In addition, this process is used to produce precise parts in various industry fields such as automobiles, optics and medical devices. Injection molding process has a mixture of discrete and continuous variables. In order to optimized the quality, variables that is generated in the injection molding process must be considered. Furthermore, Optimal parameter setting is time-consuming work to predict the optimum quality of the product. Since the process parameter cannot be easily corrected during the process execution. In this research, we propose a neural network based real-time process parameter optimization methodology that sets optimal process parameters by using mold data, molding machine data, and response data. This paper is expected to have academic contribution as a novel study of parameter optimization during production compare with pre - production parameter optimization in typical studies.
Forewarning of Failure in Complex Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J
2011-01-01
As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain is failure in critical equipment. A second is aging bridges. We discuss the workings of such amore » system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less
NASA Astrophysics Data System (ADS)
Takaya, Yuhei; Hirahara, Shoji; Yasuda, Tamaki; Matsueda, Satoko; Toyoda, Takahiro; Fujii, Yosuke; Sugimoto, Hiroyuki; Matsukawa, Chihiro; Ishikawa, Ichiro; Mori, Hirotoshi; Nagasawa, Ryoji; Kubo, Yutaro; Adachi, Noriyuki; Yamanaka, Goro; Kuragano, Tsurane; Shimpo, Akihiko; Maeda, Shuhei; Ose, Tomoaki
2018-02-01
This paper describes the Japan Meteorological Agency/Meteorological Research Institute-Coupled Prediction System version 2 (JMA/MRI-CPS2), which was put into operation in June 2015 for the purpose of performing seasonal predictions. JMA/MRI-CPS2 has various upgrades from its predecessor, JMA/MRI-CPS1, including improved resolution and physics in its atmospheric and oceanic components, introduction of an interactive sea-ice model and realistic initialization of its land component. Verification of extensive re-forecasts covering a 30-year period (1981-2010) demonstrates that JMA/MRI-CPS2 possesses improved seasonal predictive skills for both atmospheric and oceanic interannual variability as well as key coupled variability such as the El Niño-Southern Oscillation (ENSO). For ENSO prediction, the new system better represents the forecast uncertainty and transition/duration of ENSO phases. Our analysis suggests that the enhanced predictive skills are attributable to incremental improvements resulting from all of the changes, as is apparent in the beneficial effects of sea-ice coupling and land initialization on 2-m temperature predictions. JMA/MRI-CPS2 is capable of reasonably representing the seasonal cycle and secular trends of sea ice. The sea-ice coupling remarkably enhances the predictive capability for the Arctic 2-m temperature, indicating the importance of this factor, particularly for seasonal predictions in the Arctic region.
Cyber threat impact assessment and analysis for space vehicle architectures
NASA Astrophysics Data System (ADS)
McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.
2014-06-01
This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.
2015-03-13
A. Lee. “A Programming Model for Time - Synchronized Distributed Real- Time Systems”. In: Proceedings of Real Time and Em- bedded Technology and Applications Symposium. 2007, pp. 259–268. ...From MetroII to Metronomy, Designing Contract-based Function-Architecture Co-simulation Framework for Timing Verification of Cyber-Physical Systems...the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...
2015-04-06
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y
2016-04-01
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.
Towards a Standard for Highly Secure SCADA Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlson, R.
1998-09-25
The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less
Physical Analytics: An emerging field with real-world applications and impact
NASA Astrophysics Data System (ADS)
Hamann, Hendrik
2015-03-01
In the past most information on the internet has been originated by humans or computers. However with the emergence of cyber-physical systems, vast amount of data is now being created by sensors from devices, machines etc digitizing the physical world. While cyber-physical systems are subject to active research around the world, the vast amount of actual data generated from the physical world has attracted so far little attention from the engineering and physics community. In this presentation we use examples to highlight the opportunities in this new subject of ``Physical Analytics'' for highly inter-disciplinary research (including physics, engineering and computer science), which aims understanding real-world physical systems by leveraging cyber-physical technologies. More specifically, the convergence of the physical world with the digital domain allows applying physical principles to everyday problems in a much more effective and informed way than what was possible in the past. Very much like traditional applied physics and engineering has made enormous advances and changed our lives by making detailed measurements to understand the physics of an engineered device, we can now apply the same rigor and principles to understand large-scale physical systems. In the talk we first present a set of ``configurable'' enabling technologies for Physical Analytics including ultralow power sensing and communication technologies, physical big data management technologies, numerical modeling for physical systems, machine learning based physical model blending, and physical analytics based automation and control. Then we discuss in detail several concrete applications of Physical Analytics ranging from energy management in buildings and data centers, environmental sensing and controls, precision agriculture to renewable energy forecasting and management.
Holistic Context-Sensitivity for Run-Time Optimization of Flexible Manufacturing Systems.
Scholze, Sebastian; Barata, Jose; Stokic, Dragan
2017-02-24
Highly flexible manufacturing systems require continuous run-time (self-) optimization of processes with respect to diverse parameters, e.g., efficiency, availability, energy consumption etc. A promising approach for achieving (self-) optimization in manufacturing systems is the usage of the context sensitivity approach based on data streaming from high amount of sensors and other data sources. Cyber-physical systems play an important role as sources of information to achieve context sensitivity. Cyber-physical systems can be seen as complex intelligent sensors providing data needed to identify the current context under which the manufacturing system is operating. In this paper, it is demonstrated how context sensitivity can be used to realize a holistic solution for (self-) optimization of discrete flexible manufacturing systems, by making use of cyber-physical systems integrated in manufacturing systems/processes. A generic approach for context sensitivity, based on self-learning algorithms, is proposed aiming at a various manufacturing systems. The new solution encompasses run-time context extractor and optimizer. Based on the self-learning module both context extraction and optimizer are continuously learning and improving their performance. The solution is following Service Oriented Architecture principles. The generic solution is developed and then applied to two very different manufacturing processes.
Holistic Context-Sensitivity for Run-Time Optimization of Flexible Manufacturing Systems
Scholze, Sebastian; Barata, Jose; Stokic, Dragan
2017-01-01
Highly flexible manufacturing systems require continuous run-time (self-) optimization of processes with respect to diverse parameters, e.g., efficiency, availability, energy consumption etc. A promising approach for achieving (self-) optimization in manufacturing systems is the usage of the context sensitivity approach based on data streaming from high amount of sensors and other data sources. Cyber-physical systems play an important role as sources of information to achieve context sensitivity. Cyber-physical systems can be seen as complex intelligent sensors providing data needed to identify the current context under which the manufacturing system is operating. In this paper, it is demonstrated how context sensitivity can be used to realize a holistic solution for (self-) optimization of discrete flexible manufacturing systems, by making use of cyber-physical systems integrated in manufacturing systems/processes. A generic approach for context sensitivity, based on self-learning algorithms, is proposed aiming at a various manufacturing systems. The new solution encompasses run-time context extractor and optimizer. Based on the self-learning module both context extraction and optimizer are continuously learning and improving their performance. The solution is following Service Oriented Architecture principles. The generic solution is developed and then applied to two very different manufacturing processes. PMID:28245564
Cyber-physical experiments on the efficiency of swimming protocols
NASA Astrophysics Data System (ADS)
Wei, Nathaniel; Floryan, Daniel; van Buren, Tyler; Smits, Alexander
2016-11-01
We present results from experiments on a biologically inspired cyber-physical system, composed of a two-dimensional heaving and pitching rigid airfoil attached to a six component load cell, mounted to a traverse that can move along a water channel. A feedback controller, influenced by the apparatus of Mackowski and Williamson, introduces the effects of a fictional drag force specified by a virtual body profile and drives the traverse accordingly. Free-swimming protocols using the force-feedback system are compared with similar motions on a motionless traverse. The propulsive efficiency of burst-and-coast kinematics is also considered. Of particular interest are (1) the implementation of the cyber-physical control system with respect to the accessible experimental parameter space, (2) the impact of force-based streamwise actuation on experimental data, and (3) the effects of burst-and-coast motions on propulsive efficiency. The work was supported by the Office of Naval Research (ONR) under MURI Grant N00014-14-1-0533.
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
Vortex-Induced Vibrations of a Flexibly-Mounted Cyber-Physical Rectangular Plate
NASA Astrophysics Data System (ADS)
Onoue, Kyohei; Strom, Benjamin; Song, Arnold; Breuer, Kenneth
2013-11-01
We have developed a cyber-physical system to explore the vortex-induced vibration (VIV) behavior of a flat plate mounted on a virtual spring damper support. The plate is allowed to oscillate about its mid-chord and the measured angular position, velocity, and torque are used as inputs to a feedback control system that provides a restoring torque and can simulate a wide range of structural dynamic behavior. A series of experiments were carried out using different sized plates, and over a range of freestream velocities, equilibrium angles of attack, and simulated stiffness and damping. We observe a synchronization phenomenon over a wide range of parameter space, wherein the plate oscillates at moderate to large amplitude with a frequency dictated by the natural structural frequency of the system. Additionally, the existence of bistable states is reflected in the hysteretic response of the system. The cyber-physical damping extracts energy from the flow and the efficiency of this harvesting mechanism is characterized over a range of dimensionless stiffness and damping parameters. This research is funded by the Air Force Office of Scientific Research (AFOSR).
Is It Time for a US Cyber Force?
2015-02-17
network of information technology (IT) and resident data, including the Internet , telecommunications networks, computer systems, and embedded processors...and controllers.13 JP 3-12 further goes on to explain cyberspace in terms of three layers: physical network, logical network, and cyber- persona .14...zero day) vulnerabilities against Microsoft operating system code using trusted hardware vendor certificates to cloak their presence. Though not
Protecting drinking water utilities from cyberthreats
Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.; ...
2017-02-01
Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less
Protecting drinking water utilities from cyberthreats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.
Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less
Cyber-physical networking for wireless mesh infrastructures
NASA Astrophysics Data System (ADS)
Mannweiler, C.; Lottermann, C.; Klein, A.; Schneider, J.; Schotten, H. D.
2012-09-01
This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.
Vectorization of transport and diffusion computations on the CDC Cyber 205
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abu-Shumays, I.K.
1986-01-01
The development and testing of alternative numerical methods and computational algorithms specifically designed for the vectorization of transport and diffusion computations on a Control Data Corporation (CDC) Cyber 205 vector computer are described. Two solution methods for the discrete ordinates approximation to the transport equation are summarized and compared. Factors of 4 to 7 reduction in run times for certain large transport problems were achieved on a Cyber 205 as compared with run times on a CDC-7600. The solution of tridiagonal systems of linear equations, central to several efficient numerical methods for multidimensional diffusion computations and essential for fluid flowmore » and other physics and engineering problems, is also dealt with. Among the methods tested, a combined odd-even cyclic reduction and modified Cholesky factorization algorithm for solving linear symmetric positive definite tridiagonal systems is found to be the most effective for these systems on a Cyber 205. For large tridiagonal systems, computation with this algorithm is an order of magnitude faster on a Cyber 205 than computation with the best algorithm for tridiagonal systems on a CDC-7600.« less
Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franusich, Michael D.
SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as amore » Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less
Cyber-physical geographical information service-enabled control of diverse in-situ sensors.
Chen, Nengcheng; Xiao, Changjiang; Pu, Fangling; Wang, Xiaolei; Wang, Chao; Wang, Zhili; Gong, Jianya
2015-01-23
Realization of open online control of diverse in-situ sensors is a challenge. This paper proposes a Cyber-Physical Geographical Information Service-enabled method for control of diverse in-situ sensors, based on location-based instant sensing of sensors, which provides closed-loop feedbacks. The method adopts the concepts and technologies of newly developed cyber-physical systems (CPSs) to combine control with sensing, communication, and computation, takes advantage of geographical information service such as services provided by the Tianditu which is a basic geographic information service platform in China and Sensor Web services to establish geo-sensor applications, and builds well-designed human-machine interfaces (HMIs) to support online and open interactions between human beings and physical sensors through cyberspace. The method was tested with experiments carried out in two geographically distributed scientific experimental fields, Baoxie Sensor Web Experimental Field in Wuhan city and Yemaomian Landslide Monitoring Station in Three Gorges, with three typical sensors chosen as representatives using the prototype system Geospatial Sensor Web Common Service Platform. The results show that the proposed method is an open, online, closed-loop means of control.
Cyber-Physical Geographical Information Service-Enabled Control of Diverse In-Situ Sensors
Chen, Nengcheng; Xiao, Changjiang; Pu, Fangling; Wang, Xiaolei; Wang, Chao; Wang, Zhili; Gong, Jianya
2015-01-01
Realization of open online control of diverse in-situ sensors is a challenge. This paper proposes a Cyber-Physical Geographical Information Service-enabled method for control of diverse in-situ sensors, based on location-based instant sensing of sensors, which provides closed-loop feedbacks. The method adopts the concepts and technologies of newly developed cyber-physical systems (CPSs) to combine control with sensing, communication, and computation, takes advantage of geographical information service such as services provided by the Tianditu which is a basic geographic information service platform in China and Sensor Web services to establish geo-sensor applications, and builds well-designed human-machine interfaces (HMIs) to support online and open interactions between human beings and physical sensors through cyberspace. The method was tested with experiments carried out in two geographically distributed scientific experimental fields, Baoxie Sensor Web Experimental Field in Wuhan city and Yemaomian Landslide Monitoring Station in Three Gorges, with three typical sensors chosen as representatives using the prototype system Geospatial Sensor Web Common Service Platform. The results show that the proposed method is an open, online, closed-loop means of control. PMID:25625906
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
Continuous palliative sedation: not only a response to physical suffering.
Swart, Siebe J; van der Heide, Agnes; van Zuylen, Lia; Perez, Roberto S G M; Zuurmond, Wouter W A; van der Maas, Paul J; van Delden, Johannes J M; Rietjens, Judith A C
2014-01-01
Palliative sedation is a medical intervention aimed at relieving symptoms that can no longer be controlled by conventional treatment. Ample knowledge is available regarding the nature of such symptoms, but there is no in-depth information regarding how health care workers decide about palliative sedation. The study objective was to investigate considerations concerning the indications for continuous palliative sedation (CPS) and issues that influence these considerations. The study consisted of qualitative interviews regarding patients who had recently received CPS. The study involved physicians and nurses working in general practice, nursing homes, and hospitals. Analyses by a multidisciplinary research team used the constant comparative method. Together with physical symptoms, psychological and existential suffering may combine to produce a refractory state for which other treatment options than CPS were not available or considered inappropriate. A limited life expectancy was by many considered crucial (e.g., to avoid hastening death) and by some less important (e.g., because the patient's suffering was considered to be key). Issues influencing the decision to use CPS related to patient preferences (e.g., dignity, not wanting to experience further suffering) or family issues (impact of suffering on family, family requesting CPS). The indication for CPS typically originates from physical symptoms and nonphysical problems producing a refractory state in which a patient suffers unbearably. In such states, preferences of patients and families and the life expectancy criterion are weighed against the severity of refractory symptoms. Therefore the use of CPS is not only a response to the physical suffering of patients in the dying phase.
What is the current state of the science of Cyber defense?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Alan J.
My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward thismore » end are emerging.« less
Lattice hydrodynamic model based traffic control: A transportation cyber-physical system approach
NASA Astrophysics Data System (ADS)
Liu, Hui; Sun, Dihua; Liu, Weining
2016-11-01
Lattice hydrodynamic model is a typical continuum traffic flow model, which describes the jamming transition of traffic flow properly. Previous studies in lattice hydrodynamic model have shown that the use of control method has the potential to improve traffic conditions. In this paper, a new control method is applied in lattice hydrodynamic model from a transportation cyber-physical system approach, in which only one lattice site needs to be controlled in this control scheme. The simulation verifies the feasibility and validity of this method, which can ensure the efficient and smooth operation of the traffic flow.
Cyber-Physical Correlations for Infrastructure Resilience: A Game-Theoretic Approach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S; He, Fei; Ma, Chris Y. T.
In several critical infrastructures, the cyber and physical parts are correlated so that disruptions to one affect the other and hence the whole system. These correlations may be exploited to strategically launch components attacks, and hence must be accounted for ensuring the infrastructure resilience, specified by its survival probability. We characterize the cyber-physical interactions at two levels: (i) the failure correlation function specifies the conditional survival probability of cyber sub-infrastructure given the physical sub-infrastructure as a function of their marginal probabilities, and (ii) the individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions. We formulate a resiliencemore » problem for infrastructures composed of discrete components as a game between the provider and attacker, wherein their utility functions consist of an infrastructure survival probability term and a cost term expressed in terms of the number of components attacked and reinforced. We derive Nash Equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure resilience on the cost term, correlation function and sub-infrastructure survival probabilities. These results generalize earlier ones based on linear failure correlation functions and independent component failures. We apply the results to models of cloud computing infrastructures and energy grids.« less
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
Possibilities of identifying cyber attack in noisy space of n-dimensional abstract system
NASA Astrophysics Data System (ADS)
Jašek, Roman; Dvořák, Jiří; Janková, Martina; Sedláček, Michal
2016-06-01
This article briefly mentions some selected options of current concept for identifying cyber attacks from the perspective of the new cyberspace of real system. In the cyberspace, there is defined n-dimensional abstract system containing elements of the spatial arrangement of partial system elements such as micro-environment of cyber systems surrounded by other suitably arranged corresponding noise space. This space is also gradually supplemented by a new image of dynamic processes in a discreet environment, and corresponding again to n-dimensional expression of time space defining existence and also the prediction for expected cyber attacksin the noise space. Noises are seen here as useful and necessary for modern information and communication technologies (e.g. in processes of applied cryptography in ICT) and then the so-called useless noises designed for initial (necessary) filtering of this highly aggressive environment and in future expectedly offensive background in cyber war (e.g. the destruction of unmanned means of an electromagnetic pulse, or for destruction of new safety barriers created on principles of electrostatic field or on other principles of modern physics, etc.). The key to these new options is the expression of abstract systems based on the models of microelements of cyber systems and their hierarchical concept in structure of n-dimensional system in given cyberspace. The aim of this article is to highlight the possible systemic expression of cyberspace of abstract system and possible identification in time-spatial expression of real environment (on microelements of cyber systems and their surroundings with noise characteristics and time dimension in dynamic of microelements' own time and externaltime defined by real environment). The article was based on a partial task of faculty specific research.
Possibilities of identifying cyber attack in noisy space of n-dimensional abstract system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jašek, Roman; Dvořák, Jiří; Janková, Martina
This article briefly mentions some selected options of current concept for identifying cyber attacks from the perspective of the new cyberspace of real system. In the cyberspace, there is defined n-dimensional abstract system containing elements of the spatial arrangement of partial system elements such as micro-environment of cyber systems surrounded by other suitably arranged corresponding noise space. This space is also gradually supplemented by a new image of dynamic processes in a discreet environment, and corresponding again to n-dimensional expression of time space defining existence and also the prediction for expected cyber attacksin the noise space. Noises are seen heremore » as useful and necessary for modern information and communication technologies (e.g. in processes of applied cryptography in ICT) and then the so-called useless noises designed for initial (necessary) filtering of this highly aggressive environment and in future expectedly offensive background in cyber war (e.g. the destruction of unmanned means of an electromagnetic pulse, or for destruction of new safety barriers created on principles of electrostatic field or on other principles of modern physics, etc.). The key to these new options is the expression of abstract systems based on the models of microelements of cyber systems and their hierarchical concept in structure of n-dimensional system in given cyberspace. The aim of this article is to highlight the possible systemic expression of cyberspace of abstract system and possible identification in time-spatial expression of real environment (on microelements of cyber systems and their surroundings with noise characteristics and time dimension in dynamic of microelements’ own time and externaltime defined by real environment). The article was based on a partial task of faculty specific research.« less
Resilient Control Systems Practical Metrics Basis for Defining Mission Impact
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig G. Rieger
"Resilience” describes how systems operate at an acceptable level of normalcy despite disturbances or threats. In this paper we first consider the cognitive, cyber-physical interdependencies inherent in critical infrastructure systems and how resilience differs from reliability to mitigate these risks. Terminology and metrics basis are provided to integrate the cognitive, cyber-physical aspects that should be considered when defining solutions for resilience. A practical approach is taken to roll this metrics basis up to system integrity and business case metrics that establish “proper operation” and “impact.” A notional chemical processing plant is the use case for demonstrating how the system integritymore » metrics can be applied to establish performance, and« less
The whole picture: Child maltreatment experiences of youths who were physically abused.
Stevens, Kristopher I; Schneiderman, Janet U; Negriff, Sonya; Brinkmann, Andrea; Trickett, Penelope K
2015-05-01
The purpose of the current study was to describe the maltreatment experiences of a sample of urban youths identified as physically abused using the Maltreatment Case Record Abstraction Instrument (MCRAI). The sample (n=303) of 9-12 year old youths was recruited from active child protective services (CPS) cases in 2002-2005, and five years of child protective service records were reviewed. The demographic and maltreatment experiences of MCRAI-identified youths with physical abuse were compared to maltreated youths who were not physically abused and youths who were identified as physically abused by CPS when they entered this longitudinal study. T-tests and chi-square tests were used to compare the demographics and maltreatment experiences of the sample MCRAI-identified physically abused to the sample MCRAI-identified as nonphysically abused maltreated by gender. Of the total sample, 156 (51%) were identified by MCRAI as physically abused and 96.8% of these youth also experienced other types of maltreatment. Whereas youth with the initial CPS identification of physical abuse showed little co-occurrence (37.7%) with other forms of maltreatment. The MCRAI-identified physically abused youths had a significantly higher mean number of CPS reports and higher mean number of incidents of maltreatment than MCRAI-identified nonphysically maltreated youths. Lifeline plots of case record history from the time of first report to CPS to entry into the study found substantial individual variability in maltreatment experiences for both boys and girls. Thus, obtaining maltreatment information from a single report vastly underestimates the prevalence of physical abuse and the co-occurrence of other maltreatment types. Copyright © 2015 Elsevier Ltd. All rights reserved.
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2013-01-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2014-07-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
2014-11-01
unclassified tools and techniques that can be shared with PNs, to include social engineering, spear phishing , fake web sites, physical access attempts, and...and instead rely on commercial services such as Yahoo or Google . Some nations have quite advanced cyber security practices, but may take vastly...unauthorized access to data/systems Inject external network scanning, email phishing , malicious website access, social engineering Sample
An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network
Brennan, Robert W.
2017-01-01
With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452
An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.
Taboun, Mohammed S; Brennan, Robert W
2017-09-14
With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.
Dynamic inverse models in human-cyber-physical systems
NASA Astrophysics Data System (ADS)
Robinson, Ryan M.; Scobee, Dexter R. R.; Burden, Samuel A.; Sastry, S. Shankar
2016-05-01
Human interaction with the physical world is increasingly mediated by automation. This interaction is characterized by dynamic coupling between robotic (i.e. cyber) and neuromechanical (i.e. human) decision-making agents. Guaranteeing performance of such human-cyber-physical systems will require predictive mathematical models of this dynamic coupling. Toward this end, we propose a rapprochement between robotics and neuromechanics premised on the existence of internal forward and inverse models in the human agent. We hypothesize that, in tele-robotic applications of interest, a human operator learns to invert automation dynamics, directly translating from desired task to required control input. By formulating the model inversion problem in the context of a tracking task for a nonlinear control system in control-a_ne form, we derive criteria for exponential tracking and show that the resulting dynamic inverse model generally renders a portion of the physical system state (i.e., the internal dynamics) unobservable from the human operator's perspective. Under stability conditions, we show that the human can achieve exponential tracking without formulating an estimate of the system's state so long as they possess an accurate model of the system's dynamics. These theoretical results are illustrated using a planar quadrotor example. We then demonstrate that the automation can intervene to improve performance of the tracking task by solving an optimal control problem. Performance is guaranteed to improve under the assumption that the human learns and inverts the dynamic model of the altered system. We conclude with a discussion of practical limitations that may hinder exact dynamic model inversion.
Rodríguez, Alfonso; Valverde, Juan; Portilla, Jorge; Otero, Andrés; Riesgo, Teresa; de la Torre, Eduardo
2018-06-08
Cyber-Physical Systems are experiencing a paradigm shift in which processing has been relocated to the distributed sensing layer and is no longer performed in a centralized manner. This approach, usually referred to as Edge Computing, demands the use of hardware platforms that are able to manage the steadily increasing requirements in computing performance, while keeping energy efficiency and the adaptability imposed by the interaction with the physical world. In this context, SRAM-based FPGAs and their inherent run-time reconfigurability, when coupled with smart power management strategies, are a suitable solution. However, they usually fail in user accessibility and ease of development. In this paper, an integrated framework to develop FPGA-based high-performance embedded systems for Edge Computing in Cyber-Physical Systems is presented. This framework provides a hardware-based processing architecture, an automated toolchain, and a runtime to transparently generate and manage reconfigurable systems from high-level system descriptions without additional user intervention. Moreover, it provides users with support for dynamically adapting the available computing resources to switch the working point of the architecture in a solution space defined by computing performance, energy consumption and fault tolerance. Results show that it is indeed possible to explore this solution space at run time and prove that the proposed framework is a competitive alternative to software-based edge computing platforms, being able to provide not only faster solutions, but also higher energy efficiency for computing-intensive algorithms with significant levels of data-level parallelism.
Towards Stochastic Optimization-Based Electric Vehicle Penetration in a Novel Archipelago Microgrid.
Yang, Qingyu; An, Dou; Yu, Wei; Tan, Zhengan; Yang, Xinyu
2016-06-17
Due to the advantage of avoiding upstream disturbance and voltage fluctuation from a power transmission system, Islanded Micro-Grids (IMG) have attracted much attention. In this paper, we first propose a novel self-sufficient Cyber-Physical System (CPS) supported by Internet of Things (IoT) techniques, namely "archipelago micro-grid (MG)", which integrates the power grid and sensor networks to make the grid operation effective and is comprised of multiple MGs while disconnected with the utility grid. The Electric Vehicles (EVs) are used to replace a portion of Conventional Vehicles (CVs) to reduce CO 2 emission and operation cost. Nonetheless, the intermittent nature and uncertainty of Renewable Energy Sources (RESs) remain a challenging issue in managing energy resources in the system. To address these issues, we formalize the optimal EV penetration problem as a two-stage Stochastic Optimal Penetration (SOP) model, which aims to minimize the emission and operation cost in the system. Uncertainties coming from RESs (e.g., wind, solar, and load demand) are considered in the stochastic model and random parameters to represent those uncertainties are captured by the Monte Carlo-based method. To enable the reasonable deployment of EVs in each MGs, we develop two scheduling schemes, namely Unlimited Coordinated Scheme (UCS) and Limited Coordinated Scheme (LCS), respectively. An extensive simulation study based on a modified 9 bus system with three MGs has been carried out to show the effectiveness of our proposed schemes. The evaluation data indicates that our proposed strategy can reduce both the environmental pollution created by CO 2 emissions and operation costs in UCS and LCS.
Towards Stochastic Optimization-Based Electric Vehicle Penetration in a Novel Archipelago Microgrid
Yang, Qingyu; An, Dou; Yu, Wei; Tan, Zhengan; Yang, Xinyu
2016-01-01
Due to the advantage of avoiding upstream disturbance and voltage fluctuation from a power transmission system, Islanded Micro-Grids (IMG) have attracted much attention. In this paper, we first propose a novel self-sufficient Cyber-Physical System (CPS) supported by Internet of Things (IoT) techniques, namely “archipelago micro-grid (MG)”, which integrates the power grid and sensor networks to make the grid operation effective and is comprised of multiple MGs while disconnected with the utility grid. The Electric Vehicles (EVs) are used to replace a portion of Conventional Vehicles (CVs) to reduce CO2 emission and operation cost. Nonetheless, the intermittent nature and uncertainty of Renewable Energy Sources (RESs) remain a challenging issue in managing energy resources in the system. To address these issues, we formalize the optimal EV penetration problem as a two-stage Stochastic Optimal Penetration (SOP) model, which aims to minimize the emission and operation cost in the system. Uncertainties coming from RESs (e.g., wind, solar, and load demand) are considered in the stochastic model and random parameters to represent those uncertainties are captured by the Monte Carlo-based method. To enable the reasonable deployment of EVs in each MGs, we develop two scheduling schemes, namely Unlimited Coordinated Scheme (UCS) and Limited Coordinated Scheme (LCS), respectively. An extensive simulation study based on a modified 9 bus system with three MGs has been carried out to show the effectiveness of our proposed schemes. The evaluation data indicates that our proposed strategy can reduce both the environmental pollution created by CO2 emissions and operation costs in UCS and LCS. PMID:27322281
A PetriNet-Based Approach for Supporting Traceability in Cyber-Physical Manufacturing Systems
Huang, Jiwei; Zhu, Yeping; Cheng, Bo; Lin, Chuang; Chen, Junliang
2016-01-01
With the growing popularity of complex dynamic activities in manufacturing processes, traceability of the entire life of every product has drawn significant attention especially for food, clinical materials, and similar items. This paper studies the traceability issue in cyber-physical manufacturing systems from a theoretical viewpoint. Petri net models are generalized for formulating dynamic manufacturing processes, based on which a detailed approach for enabling traceability analysis is presented. Models as well as algorithms are carefully designed, which can trace back the lifecycle of a possibly contaminated item. A practical prototype system for supporting traceability is designed, and a real-life case study of a quality control system for bee products is presented to validate the effectiveness of the approach. PMID:26999141
A PetriNet-Based Approach for Supporting Traceability in Cyber-Physical Manufacturing Systems.
Huang, Jiwei; Zhu, Yeping; Cheng, Bo; Lin, Chuang; Chen, Junliang
2016-03-17
With the growing popularity of complex dynamic activities in manufacturing processes, traceability of the entire life of every product has drawn significant attention especially for food, clinical materials, and similar items. This paper studies the traceability issue in cyber-physical manufacturing systems from a theoretical viewpoint. Petri net models are generalized for formulating dynamic manufacturing processes, based on which a detailed approach for enabling traceability analysis is presented. Models as well as algorithms are carefully designed, which can trace back the lifecycle of a possibly contaminated item. A practical prototype system for supporting traceability is designed, and a real-life case study of a quality control system for bee products is presented to validate the effectiveness of the approach.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamentalmore » need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.« less
48 CFR 642.1503-70 - Contractor Performance System (CPS).
Code of Federal Regulations, 2011 CFR
2011-10-01
... Performance System (CPS) maintained by the National Institutes of Health. CPS is an Internet-based tool... with access to the Internet shall use CPS to evaluate contractor's past performance for all contracts... the CPS; or (2) At overseas locations where access to the Internet is not practicable. (d) Heads of...
The co-occurrence of physical and cyber dating violence and bullying among teens.
Yahner, Jennifer; Dank, Meredith; Zweig, Janine M; Lachman, Pamela
2015-04-01
This study examined the overlap in teen dating violence and bullying perpetration and victimization, with regard to acts of physical violence, psychological abuse, and-for the first time ever-digitally perpetrated cyber abuse. A total of 5,647 youth (51% female, 74% White) from 10 schools participated in a cross-sectional anonymous survey. Results indicated substantial co-occurrence of all types of teen dating violence and bullying. Youth who perpetrated and/or experienced physical, psychological, and cyber bullying were likely to have also perpetrated/experienced physical and sexual dating violence, and psychological and cyber dating abuse. © The Author(s) 2014.
Testbed-based Performance Evaluation of Attack Resilient Control for AGC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Sridhar, Siddharth; McKinnon, Archibald D.
The modern electric power grid is a complex cyber-physical system whose reliable operation is enabled by a wide-area monitoring and control infrastructure. This infrastructure, supported by an extensive communication backbone, enables several control applications functioning at multiple time scales to ensure the grid is maintained within stable operating limits. Recent events have shown that vulnerabilities in this infrastructure may be exploited to manipulate the data being exchanged. Such a scenario could cause the associated control application to mis-operate, potentially causing system-wide instabilities. There is a growing emphasis on looking beyond traditional cybersecurity solutions to mitigate such threats. In this papermore » we perform a testbed-based validation of one such solution - Attack Resilient Control (ARC) - on Iowa State University's \\textit{PowerCyber} testbed. ARC is a cyber-physical security solution that combines domain-specific anomaly detection and model-based mitigation to detect stealthy attacks on Automatic Generation Control (AGC). In this paper, we first describe the implementation architecture of the experiment on the testbed. Next, we demonstrate the capability of stealthy attack templates to cause forced under-frequency load shedding in a 3-area test system. We then validate the performance of ARC by measuring its ability to detect and mitigate these attacks. Our results reveal that ARC is efficient in detecting stealthy attacks and enables AGC to maintain system operating frequency close to its nominal value during an attack. Our studies also highlight the importance of testbed-based experimentation for evaluating the performance of cyber-physical security and control applications.« less
Cybersecurity for distributed energy resources and smart inverters
Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...
2016-12-01
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
Cybersecurity for distributed energy resources and smart inverters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qi, Junjian; Hahn, Adam; Lu, Xiaonan
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less
NASA Astrophysics Data System (ADS)
Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.
2015-12-01
The CyberShake computational platform, developed by the Southern California Earthquake Center (SCEC), is an integrated collection of scientific software and middleware that performs 3D physics-based probabilistic seismic hazard analysis (PSHA) for Southern California. CyberShake integrates large-scale and high-throughput research codes to produce probabilistic seismic hazard curves for individual locations of interest and hazard maps for an entire region. A recent CyberShake calculation produced about 500,000 two-component seismograms for each of 336 locations, resulting in over 300 million synthetic seismograms in a Los Angeles-area probabilistic seismic hazard model. CyberShake calculations require a series of scientific software programs. Early computational stages produce data used as inputs by later stages, so we describe CyberShake calculations using a workflow definition language. Scientific workflow tools automate and manage the input and output data and enable remote job execution on large-scale HPC systems. To satisfy the requests of broad impact users of CyberShake data, such as seismologists, utility companies, and building code engineers, we successfully completed CyberShake Study 15.4 in April and May 2015, calculating a 1 Hz urban seismic hazard map for Los Angeles. We distributed the calculation between the NSF Track 1 system NCSA Blue Waters, the DOE Leadership-class system OLCF Titan, and USC's Center for High Performance Computing. This study ran for over 5 weeks, burning about 1.1 million node-hours and producing over half a petabyte of data. The CyberShake Study 15.4 results doubled the maximum simulated seismic frequency from 0.5 Hz to 1.0 Hz as compared to previous studies, representing a factor of 16 increase in computational complexity. We will describe how our workflow tools supported splitting the calculation across multiple systems. We will explain how we modified CyberShake software components, including GPU implementations and migrating from file-based communication to MPI messaging, to greatly reduce the I/O demands and node-hour requirements of CyberShake. We will also present performance metrics from CyberShake Study 15.4, and discuss challenges that producers of Big Data on open-science HPC resources face moving forward.
A Multi-Component Automated Laser-Origami System for Cyber-Manufacturing
NASA Astrophysics Data System (ADS)
Ko, Woo-Hyun; Srinivasa, Arun; Kumar, P. R.
2017-12-01
Cyber-manufacturing systems can be enhanced by an integrated network architecture that is easily configurable, reliable, and scalable. We consider a cyber-physical system for use in an origami-type laser-based custom manufacturing machine employing folding and cutting of sheet material to manufacture 3D objects. We have developed such a system for use in a laser-based autonomous custom manufacturing machine equipped with real-time sensing and control. The basic elements in the architecture are built around the laser processing machine. They include a sensing system to estimate the state of the workpiece, a control system determining control inputs for a laser system based on the estimated data and user’s job requests, a robotic arm manipulating the workpiece in the work space, and middleware, named Etherware, supporting the communication among the systems. We demonstrate automated 3D laser cutting and bending to fabricate a 3D product as an experimental result.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T.
Cyber physical computing infrastructures typically consist of a number of sites are interconnected. Its operation critically depends both on cyber components and physical components. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure via information security analysis. Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, andmore » information assets. We concentrated our analysis on the electric sector failure scenarios and impact analyses by the NESCOR Working Group Study, From the Section 5 electric sector representative failure scenarios; we extracted the four generic failure scenarios and grouped them into three specific threat categories (confidentiality, integrity, and availability) to the system. These specific failure scenarios serve as a demonstration of our simulation. The analysis using our ABGT simulation demonstrates how to model the electric sector functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the cyber physical infrastructure network with respect to CIA.« less
Adaptive optimisation-offline cyber attack on remote state estimator
NASA Astrophysics Data System (ADS)
Huang, Xin; Dong, Jiuxiang
2017-10-01
Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.
School bullying among adolescents in the United States: physical, verbal, relational, and cyber.
Wang, Jing; Iannotti, Ronald J; Nansel, Tonja R
2009-10-01
Four forms of school bullying behaviors among US adolescents and their association with sociodemographic characteristics, parental support, and friends were examined. Data were obtained from the Health Behavior in School-Aged Children (HBSC) 2005 Survey, a nationally representative sample of grades 6-10 (N = 7,182). The revised Olweus Bully/Victim Questionnaire was used to measure physical, verbal, and relational forms of bullying. Two items were added using the same format to measure cyber bullying. For each form, four categories were created: bully, victim, bully-victim, and not involved. Multinomial logistic regressions were applied, with sociodemographic variables, parental support, and number of friends as predictors. Prevalence rates of having bullied others or having been bullied at school for at least once in the last 2 months were 20.8% physically, 53.6% verbally, 51.4% socially, or 13.6% electronically. Boys were more involved in physical or verbal bullying, whereas girls were more involved in relational bullying. Boys were more likely to be cyber bullies, whereas girls were more likely to be cyber victims. African-American adolescents were involved in more bullying (physical, verbal, or cyber) but less victimization (verbal or relational). Higher parental support was associated with less involvement across all forms and classifications of bullying. Having more friends was associated with more bullying and less victimization for physical, verbal, and relational forms but was not associated with cyber bullying. Parental support may protect adolescents from all four forms of bullying. Friends associate differentially with traditional and cyber bullying. Results indicate that cyber bullying is a distinct nature from that of traditional bullying.
School Bullying Among US Adolescents: Physical, Verbal, Relational and Cyber
Wang, Jing; Iannotti, Ronald J.; Nansel, Tonja R.
2009-01-01
Purpose Four forms of school bullying behaviors among US adolescents and their association with socio-demographic characteristics, parental support and friends were examined. Methods Data were obtained from the Health Behavior in School-Aged Children (HBSC) 2005 Survey, a nationally-representative sample of grades 6 to 10 (N = 7182). The Olweus Bully/Victim Questionnaire was used to measure physical, verbal and relational forms of bullying. Two items were added using the same format to measure cyber bullying. For each form, four categories were created: bully, victim, bully-victim, and not involved. Multinomial logistic regressions were applied, with socio-demographic variables, parental support and number of friends as predictors. Results Prevalence rates of having bullied others or having been bullied at school for at least once in the last 2 months were 20.8% physically, 53.6% verbally, 51.4% socially or 13.6% electronically. Boys were more involved in physical or verbal bullying, while girls were more involved in relational bullying. Boys were more likely to be cyber bullies, while girls were more likely to be cyber victims. African-American adolescents were involved in more bullying (physical, verbal or cyber) but less victimization (verbal or relational). Higher parental support was associated with less involvement across all forms and classifications of bullying. Having more friends was associated with more bullying and less victimization for physical, verbal and relational forms, but was not associated with cyber bullying. Conclusions Parental support may protect adolescents from all four forms of bullying. Friends associate differentially with traditional and cyber bullying. Results indicate that cyber bullying has a distinct nature from traditional bullying. PMID:19766941
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yu X. H.; Shanklin J.; Rawat, R.
Cyclopropane fatty acids (CPA) have been found in certain gymnosperms, Malvales, Litchi and other Sapindales. The presence of their unique strained ring structures confers physical and chemical properties characteristic of unsaturated fatty acids with the oxidative stability displayed by saturated fatty acids making them of considerable industrial interest. While cyclopropenoid fatty acids (CPE) are well-known inhibitors of fatty acid desaturation in animals, CPE can also inhibit the stearoyl-CoA desaturase and interfere with the maturation and reproduction of some insect species suggesting that in addition to their traditional role as storage lipids, CPE can contribute to the protection of plants frommore » herbivory. Three genes encoding cyclopropane synthase homologues GhCPS1, GhCPS2 and GhCPS3 were identified in cotton. Determination of gene transcript abundance revealed differences among the expression of GhCPS1, 2 and 3 showing high, intermediate and low levels, respectively, of transcripts in roots and stems; whereas GhCPS1 and 2 are both expressed at low levels in seeds. Analyses of fatty acid composition in different tissues indicate that the expression patterns of GhCPS1 and 2 correlate with cyclic fatty acid (CFA) distribution. Deletion of the N-terminal oxidase domain lowered GhCPS's ability to produce cyclopropane fatty acid by approximately 70%. GhCPS1 and 2, but not 3 resulted in the production of cyclopropane fatty acids upon heterologous expression in yeast, tobacco BY2 cell and Arabidopsis seed. In cotton GhCPS1 and 2 gene expression correlates with the total CFA content in roots, stems and seeds. That GhCPS1 and 2 are expressed at a similar level in seed suggests both of them can be considered potential targets for gene silencing to reduce undesirable seed CPE accumulation. Because GhCPS1 is more active in yeast than the published Sterculia CPS and shows similar activity when expressed in model plant systems, it represents a strong candidate gene for CFA accumulation via heterologous expression in production plants.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yin, George; Wang, Le Yi; Zhang, Hongwei
2014-12-10
Stochastic approximation methods have found extensive and diversified applications. Recent emergence of networked systems and cyber-physical systems has generated renewed interest in advancing stochastic approximation into a general framework to support algorithm development for information processing and decisions in such systems. This paper presents a survey on some recent developments in stochastic approximation methods and their applications. Using connected vehicles in platoon formation and coordination as a platform, we highlight some traditional and new methodologies of stochastic approximation algorithms and explain how they can be used to capture essential features in networked systems. Distinct features of networked systems with randomlymore » switching topologies, dynamically evolving parameters, and unknown delays are presented, and control strategies are provided.« less
Conceptual problem solving in high school physics
NASA Astrophysics Data System (ADS)
Docktor, Jennifer L.; Strand, Natalie E.; Mestre, José P.; Ross, Brian H.
2015-12-01
Problem solving is a critical element of learning physics. However, traditional instruction often emphasizes the quantitative aspects of problem solving such as equations and mathematical procedures rather than qualitative analysis for selecting appropriate concepts and principles. This study describes the development and evaluation of an instructional approach called Conceptual Problem Solving (CPS) which guides students to identify principles, justify their use, and plan their solution in writing before solving a problem. The CPS approach was implemented by high school physics teachers at three schools for major theorems and conservation laws in mechanics and CPS-taught classes were compared to control classes taught using traditional problem solving methods. Information about the teachers' implementation of the approach was gathered from classroom observations and interviews, and the effectiveness of the approach was evaluated from a series of written assessments. Results indicated that teachers found CPS easy to integrate into their curricula, students engaged in classroom discussions and produced problem solutions of a higher quality than before, and students scored higher on conceptual and problem solving measures.
2016-06-10
DODIN) is being threatened by state actors, non-state actors, and continuous hacking and cyber-attacks. These threats against the network come in a...variety of forms; physical attacks from radio jamming, logical cyber threats from hacking , or a combination of both physical and logical attacks. Each...year the number of hacking attacks is increasing. Corporations like Symantec publish annual reports on cyber threats and provide tips for best
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barada, K., E-mail: kshitish@ucla.edu; Rhodes, T. L.; Crocker, N. A.
We present new measurements of internal magnetic fluctuations obtained with a novel eight channel cross polarization scattering (CPS) system installed on the DIII-D tokamak. Measurements of internal, localized magnetic fluctuations provide a window on an important physics quantity that we heretofore have had little information on. Importantly, these measurements provide a new ability to challenge and test linear and nonlinear simulations and basic theory. The CPS method, based upon the scattering of an incident microwave beam into the opposite polarization by magnetic fluctuations, has been significantly extended and improved over the method as originally developed on the Tore Supra tokamak.more » A new scattering geometry, provided by a unique probe beam, is utilized to improve the spatial localization and wavenumber range. Remotely controllable polarizer and mirror angles allow polarization matching and wavenumber selection for a range of plasma conditions. The quasi-optical system design, its advantages and challenges, as well as important physics validation tests are presented and discussed. Effect of plasma beta (ratio of kinetic to magnetic pressure) on both density and magnetic fluctuations is studied and it is observed that internal magnetic fluctuations increase with beta. During certain quiescent high confinement operational regimes, coherent low frequency modes not detected by magnetic probes are detected locally by CPS diagnostics.« less
Towards a Multiscale Approach to Cybersecurity Modeling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hogan, Emilie A.; Hui, Peter SY; Choudhury, Sutanay
2013-11-12
We propose a multiscale approach to modeling cyber networks, with the goal of capturing a view of the network and overall situational awareness with respect to a few key properties--- connectivity, distance, and centrality--- for a system under an active attack. We focus on theoretical and algorithmic foundations of multiscale graphs, coming from an algorithmic perspective, with the goal of modeling cyber system defense as a specific use case scenario. We first define a notion of \\emph{multiscale} graphs, in contrast with their well-studied single-scale counterparts. We develop multiscale analogs of paths and distance metrics. As a simple, motivating example ofmore » a common metric, we present a multiscale analog of the all-pairs shortest-path problem, along with a multiscale analog of a well-known algorithm which solves it. From a cyber defense perspective, this metric might be used to model the distance from an attacker's position in the network to a sensitive machine. In addition, we investigate probabilistic models of connectivity. These models exploit the hierarchy to quantify the likelihood that sensitive targets might be reachable from compromised nodes. We believe that our novel multiscale approach to modeling cyber-physical systems will advance several aspects of cyber defense, specifically allowing for a more efficient and agile approach to defending these systems.« less
Cyber risk and privacy liability: a click in the right direction?
McDonough, William J
2007-01-01
Cyber risk and privacy exposure exert an impact upon virtually every aspect of a healthcare organization (HCO)--assets, clinical operations, finances and reputation. Exposure is enterprise-wide and includes risk to both physical and non-physical assets in increasing degrees. The consequences of a cyber attack or privacy breach could be operationally and financially catastrophic, so an HCO's move toward an enterprise-wide approach at identifying and minimizing risk, cyber and privacy liability should be on the radar screen for risk managers and leadership.
Enabling Smart Manufacturing Research and Development using a Product Lifecycle Test Bed.
Helu, Moneer; Hedberg, Thomas
2015-01-01
Smart manufacturing technologies require a cyber-physical infrastructure to collect and analyze data and information across the manufacturing enterprise. This paper describes a concept for a product lifecycle test bed built on a cyber-physical infrastructure that enables smart manufacturing research and development. The test bed consists of a Computer-Aided Technologies (CAx) Lab and a Manufacturing Lab that interface through the product model creating a "digital thread" of information across the product lifecycle. The proposed structure and architecture of the test bed is presented, which highlights the challenges and requirements of implementing a cyber-physical infrastructure for manufacturing. The novel integration of systems across the product lifecycle also helps identify the technologies and standards needed to enable interoperability between design, fabrication, and inspection. Potential research opportunities enabled by the test bed are also discussed, such as providing publicly accessible CAx and manufacturing reference data, virtual factory data, and a representative industrial environment for creating, prototyping, and validating smart manufacturing technologies.
Enabling Smart Manufacturing Research and Development using a Product Lifecycle Test Bed
Helu, Moneer; Hedberg, Thomas
2017-01-01
Smart manufacturing technologies require a cyber-physical infrastructure to collect and analyze data and information across the manufacturing enterprise. This paper describes a concept for a product lifecycle test bed built on a cyber-physical infrastructure that enables smart manufacturing research and development. The test bed consists of a Computer-Aided Technologies (CAx) Lab and a Manufacturing Lab that interface through the product model creating a “digital thread” of information across the product lifecycle. The proposed structure and architecture of the test bed is presented, which highlights the challenges and requirements of implementing a cyber-physical infrastructure for manufacturing. The novel integration of systems across the product lifecycle also helps identify the technologies and standards needed to enable interoperability between design, fabrication, and inspection. Potential research opportunities enabled by the test bed are also discussed, such as providing publicly accessible CAx and manufacturing reference data, virtual factory data, and a representative industrial environment for creating, prototyping, and validating smart manufacturing technologies. PMID:28664167
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burdick, G.R.; Wilson, J.R.
COMCAN2A and COMCAN are designed to analyze complex systems such as nuclear plants for common causes of failure. A common cause event, or common mode failure, is a secondary cause that could contribute to the failure of more than one component and violates the assumption of independence. Analysis of such events is an integral part of system reliability and safety analysis. A significant common cause event is a secondary cause common to all basic events in one or more minimal cut sets. Minimal cut sets containing events from components sharing a common location or a common link are called commonmore » cause candidates. Components share a common location if no barrier insulates any one of them from the secondary cause. A common link is a dependency among components which cannot be removed by a physical barrier (e.g., a common energy source or common maintenance instructions).IBM360;CDC CYBER176,175; FORTRAN IV (30%) and BAL (70%) (IBM360), FORTRAN IV (97%) and COMPASS (3%) (CDC CYBER176).; OS/360 (IBM360) and NOS/BE 1.4 (CDC CYBER176), NOS 1.3 (CDC CYBER175); 140K bytes of memory for COMCAN and 242K (octal) words of memory for COMCAN2A.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feng, Yixiong; Hu, Bingtao; Hao, He
With the development of communication and control technology, intelligent transportation systems have received increasing attention from both industry and academia. Intelligent transportation systems are supported by the Internet of Things, Cyber-Physical System, Artificial Intelligence, Cloud Computing and many other technologies, which supply fundamental information for connected and automated vehicles. Although plenty of studies have provided different formulations for intelligent transportation systems, many of them depend on Master Control Center. However, a centralized control mode requires a huge amount of data transmission and high level of hardware configuration and may cause communication delay and privacy leak. Some distributed architectures have beenmore » proposed to overcome the above problems but systematized technologies to collect and exchange information, process large amounts of data, model the dynamics of vehicles, and safely control the connected and automated vehicles are not explored in detail. In this paper, we proposed a novel distributed cyber-physical system for connected and automated vehicles in which every vehicle is modeled as a double-integrator using edge computing to analyze information collected from its nearest neighbors. The vehicles are supposed to travel along a desired trajectory and to maintain a rigid formation geometry. Related methodologies for the proposed system are illustrated and experiments are conducted showing that the performance of the connected and automated vehicles matches very well with analytic predictions. Some design guidelines and open questions are provided for the future study.« less
Feng, Yixiong; Hu, Bingtao; Hao, He; ...
2018-02-14
With the development of communication and control technology, intelligent transportation systems have received increasing attention from both industry and academia. Intelligent transportation systems are supported by the Internet of Things, Cyber-Physical System, Artificial Intelligence, Cloud Computing and many other technologies, which supply fundamental information for connected and automated vehicles. Although plenty of studies have provided different formulations for intelligent transportation systems, many of them depend on Master Control Center. However, a centralized control mode requires a huge amount of data transmission and high level of hardware configuration and may cause communication delay and privacy leak. Some distributed architectures have beenmore » proposed to overcome the above problems but systematized technologies to collect and exchange information, process large amounts of data, model the dynamics of vehicles, and safely control the connected and automated vehicles are not explored in detail. In this paper, we proposed a novel distributed cyber-physical system for connected and automated vehicles in which every vehicle is modeled as a double-integrator using edge computing to analyze information collected from its nearest neighbors. The vehicles are supposed to travel along a desired trajectory and to maintain a rigid formation geometry. Related methodologies for the proposed system are illustrated and experiments are conducted showing that the performance of the connected and automated vehicles matches very well with analytic predictions. Some design guidelines and open questions are provided for the future study.« less
Technical skills measurement based on a cyber-physical system for endovascular surgery simulation.
Tercero, Carlos; Kodama, Hirokatsu; Shi, Chaoyang; Ooe, Katsutoshi; Ikeda, Seiichi; Fukuda, Toshio; Arai, Fumihito; Negoro, Makoto; Kwon, Guiryong; Najdovski, Zoran
2013-09-01
Quantification of medical skills is a challenge, particularly simulator-based training. In the case of endovascular intervention, it is desirable that a simulator accurately recreates the morphology and mechanical characteristics of the vasculature while enabling scoring. For this purpose, we propose a cyber-physical system composed of optical sensors for a catheter's body motion encoding, a magnetic tracker for motion capture of an operator's hands, and opto-mechatronic sensors for measuring the interaction of the catheter tip with the vasculature model wall. Two pilot studies were conducted for measuring technical skills, one for distinguishing novices from experts and the other for measuring unnecessary motion. The proficiency levels were measurable between expert and novice and also between individual novice users. The results enabled scoring of the user's proficiency level, using sensitivity, reaction time, time to complete a task and respect for tissue integrity as evaluation criteria. Additionally, unnecessary motion was also measurable. The development of cyber-physical simulators for other domains of medicine depend on the study of photoelastic materials for human tissue modelling, and enables quantitative evaluation of skills using surgical instruments and a realistic representation of human tissue. Copyright © 2012 John Wiley & Sons, Ltd.
Human-centered design of a cyber-physical system for advanced response to Ebola (CARE).
Dimitrov, Velin; Jagtap, Vinayak; Skorinko, Jeanine; Chernova, Sonia; Gennert, Michael; Padir, Taşkin
2015-01-01
We describe the process towards the design of a safe, reliable, and intuitive emergency treatment unit to facilitate a higher degree of safety and situational awareness for medical staff, leading to an increased level of patient care during an epidemic outbreak in an unprepared, underdeveloped, or disaster stricken area. We start with a human-centered design process to understand the design challenge of working with Ebola treatment units in Western Africa in the latest Ebola outbreak, and show preliminary work towards cyber-physical technologies applicable to potentially helping during the next outbreak.
2008 Defense Industrial Base Critical Infrastructure Protection Conference (DIB-CBIP)
2008-04-09
a cloak -and- dagger thing. It’s about computer architecture and the soundness of electronic systems." Joel Brenner, ODNI Counterintelligence Office...to support advanced network exploitation and launch attacks on the informational and physical elements of our cyber infrastructure. In order to...entities and is vulnerable to attacks and manipulation. Operations in the cyber domain have the ability to impact operations in other war-fighting
Improvements of cyberspace and effects to the battlefield
NASA Astrophysics Data System (ADS)
Gedıklı, Münir
2014-06-01
Wars previously being executed at land and sea have also become applicable in air and space due to the advancements of aircraft and satellite systems. Rapid improvements in information technologies have triggered the concept of cyberspace which is considered as the fifth dimension of war. While transferring information quickly from physical area to electronic/digital area, cyberspace has caused to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which are spreading too rapidly. Individuals, institutions and establishments have begun to take their own cyber security precautions to cope with these threats. This study gives information about the concepts and advances on cyberspace in order to raise comprehensive awareness. The study also focuses on the effects of these improvements in the battlefield, and analyzes them.
Workload Model Based Dynamic Adaptation of Social Internet of Vehicles
Alam, Kazi Masudul; Saini, Mukesh; El Saddik, Abdulmotaleb
2015-01-01
Social Internet of Things (SIoT) has gained much interest among different research groups in recent times. As a key member of a smart city, the vehicular domain of SIoT (SIoV) is also undergoing steep development. In the SIoV, vehicles work as sensor-hub to capture surrounding information using the in-vehicle and Smartphone sensors and later publish them for the consumers. A cloud centric cyber-physical system better describes the SIoV model where physical sensing-actuation process affects the cloud based service sharing or computation in a feedback loop or vice versa. The cyber based social relationship abstraction enables distributed, easily navigable and scalable peer-to-peer communication among the SIoV subsystems. These cyber-physical interactions involve a huge amount of data and it is difficult to form a real instance of the system to test the feasibility of SIoV applications. In this paper, we propose an analytical model to measure the workloads of various subsystems involved in the SIoV process. We present the basic model which is further extended to incorporate complex scenarios. We provide extensive simulation results for different parameter settings of the SIoV system. The findings of the analyses are further used to design example adaptation strategies for the SIoV subsystems which would foster deployment of intelligent transport systems. PMID:26389905
Workload Model Based Dynamic Adaptation of Social Internet of Vehicles.
Alam, Kazi Masudul; Saini, Mukesh; El Saddik, Abdulmotaleb
2015-09-15
Social Internet of Things (SIoT) has gained much interest among different research groups in recent times. As a key member of a smart city, the vehicular domain of SIoT (SIoV) is also undergoing steep development. In the SIoV, vehicles work as sensor-hub to capture surrounding information using the in-vehicle and Smartphone sensors and later publish them for the consumers. A cloud centric cyber-physical system better describes the SIoV model where physical sensing-actuation process affects the cloud based service sharing or computation in a feedback loop or vice versa. The cyber based social relationship abstraction enables distributed, easily navigable and scalable peer-to-peer communication among the SIoV subsystems. These cyber-physical interactions involve a huge amount of data and it is difficult to form a real instance of the system to test the feasibility of SIoV applications. In this paper, we propose an analytical model to measure the workloads of various subsystems involved in the SIoV process. We present the basic model which is further extended to incorporate complex scenarios. We provide extensive simulation results for different parameter settings of the SIoV system. The findings of the analyses are further used to design example adaptation strategies for the SIoV subsystems which would foster deployment of intelligent transport systems.
CyberShake: Running Seismic Hazard Workflows on Distributed HPC Resources
NASA Astrophysics Data System (ADS)
Callaghan, S.; Maechling, P. J.; Graves, R. W.; Gill, D.; Olsen, K. B.; Milner, K. R.; Yu, J.; Jordan, T. H.
2013-12-01
As part of its program of earthquake system science research, the Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, to perform physics-based probabilistic seismic hazard analysis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by simulating a tensor-valued wavefield of Strain Green Tensors, and then using seismic reciprocity to calculate synthetic seismograms for about 415,000 events per site of interest. These seismograms are processed to compute ground motion intensity measures, which are then combined with probabilities from an earthquake rupture forecast to produce a site-specific hazard curve. Seismic hazard curves for hundreds of sites in a region can be used to calculate a seismic hazard map, representing the seismic hazard for a region. We present a recently completed PHSA study in which we calculated four CyberShake seismic hazard maps for the Southern California area to compare how CyberShake hazard results are affected by different SGT computational codes (AWP-ODC and AWP-RWG) and different community velocity models (Community Velocity Model - SCEC (CVM-S4) v11.11 and Community Velocity Model - Harvard (CVM-H) v11.9). We present our approach to running workflow applications on distributed HPC resources, including systems without support for remote job submission. We show how our approach extends the benefits of scientific workflows, such as job and data management, to large-scale applications on Track 1 and Leadership class open-science HPC resources. We used our distributed workflow approach to perform CyberShake Study 13.4 on two new NSF open-science HPC computing resources, Blue Waters and Stampede, executing over 470 million tasks to calculate physics-based hazard curves for 286 locations in the Southern California region. For each location, we calculated seismic hazard curves with two different community velocity models and two different SGT codes, resulting in over 1100 hazard curves. We will report on the performance of this CyberShake study, four times larger than previous studies. Additionally, we will examine the challenges we face applying these workflow techniques to additional open-science HPC systems and discuss whether our workflow solutions continue to provide value to our large-scale PSHA calculations.
A Model-Based Approach to Support Validation of Medical Cyber-Physical Systems.
Silva, Lenardo C; Almeida, Hyggo O; Perkusich, Angelo; Perkusich, Mirko
2015-10-30
Medical Cyber-Physical Systems (MCPS) are context-aware, life-critical systems with patient safety as the main concern, demanding rigorous processes for validation to guarantee user requirement compliance and specification-oriented correctness. In this article, we propose a model-based approach for early validation of MCPS, focusing on promoting reusability and productivity. It enables system developers to build MCPS formal models based on a library of patient and medical device models, and simulate the MCPS to identify undesirable behaviors at design time. Our approach has been applied to three different clinical scenarios to evaluate its reusability potential for different contexts. We have also validated our approach through an empirical evaluation with developers to assess productivity and reusability. Finally, our models have been formally verified considering functional and safety requirements and model coverage.
A Model-Based Approach to Support Validation of Medical Cyber-Physical Systems
Silva, Lenardo C.; Almeida, Hyggo O.; Perkusich, Angelo; Perkusich, Mirko
2015-01-01
Medical Cyber-Physical Systems (MCPS) are context-aware, life-critical systems with patient safety as the main concern, demanding rigorous processes for validation to guarantee user requirement compliance and specification-oriented correctness. In this article, we propose a model-based approach for early validation of MCPS, focusing on promoting reusability and productivity. It enables system developers to build MCPS formal models based on a library of patient and medical device models, and simulate the MCPS to identify undesirable behaviors at design time. Our approach has been applied to three different clinical scenarios to evaluate its reusability potential for different contexts. We have also validated our approach through an empirical evaluation with developers to assess productivity and reusability. Finally, our models have been formally verified considering functional and safety requirements and model coverage. PMID:26528982
A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.
Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less
Reliability Validation and Improvement Framework
2012-11-01
systems . Steps in that direction include the use of the Architec- ture Tradeoff Analysis Method ® (ATAM®) developed at the Carnegie Mellon...embedded software • cyber - physical systems (CPSs) to indicate that the embedded software interacts with, manag - es, and controls a physical system [Lee...the use of formal static analysis methods to increase our confidence in system operation beyond testing. However, analysis results
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nuqui, Reynaldo
This report summarizes the activities conducted under the DOE-OE funded project DEOE0000674, where ABB Inc. (ABB), in collaboration with University of Illinois at Urbana-Champaign (UIUC), Bonneville Power Administration (BPA), and Ameren-Illinois (Ameren-IL) pursued the development of a system of collaborative defense of electrical substation’s intelligent electronic devices against cyber-attacks (CODEF). An electrical substation with CODEF features will be more capable of mitigating cyber-attacks especially those that seek to control switching devices. It leverages the security extensions of IEC 61850 to empower existing devices to collaborate in identifying and blocking malicious intents to trip circuit breakers, mis-coordinate devices settings, even thoughmore » the commands and the measurements comply with correct syntax. The CODEF functions utilize the physics of electromagnetic systems, electric power engineering principles, and computer science to bring more in depth cyber defense closer to the protected substation devices.« less
Sensor Network Middleware for Cyber-Physical Systems: Opportunities and Challenges
NASA Astrophysics Data System (ADS)
Singh, G.
2015-12-01
Wireless Sensor Network middleware typically provides abstractions for common tasks such as atomicity, synchronization and communication with the intention of isolating the developers of distributed applications from lower-level details of the underlying platforms. Developing middleware to meet the performance constraints of applications is an important challenge. Although one would like to develop generic middleware services which can be used in a variety of different applications, efficiency considerations often force developers to design middleware and algorithms customized to specific operational contexts. This presentation will discuss techniques to design middleware that is customizable to suit the performance needs of specific applications. We also discuss the challenges poised in designing middleware for pervasive sensor networks and cyber-physical systems with specific focus on environmental monitoring.
Characterization of attacks on public telephone networks
NASA Astrophysics Data System (ADS)
Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet
2001-02-01
The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.
Clinical pharmacists: The major support to Indian healthcare system in near future
Deshpande, Prasanna R.; Vantipalli, Raghuram; Chaitanya Lakshmi, C. H.; Rao, E. Jagadeswara; Regmi, Bishnu; Ahad, Abdul; Nirojini, P. Sharmila
2015-01-01
Pharmacy practice is still in the initial stages of development in India, but launching of Doctor of Pharmacy (PharmD) study program has brought serious discussions about clinical pharmacy in the country. As the profession is in budding stage in the country, the patients, physicians, nurses, other healthcare providers, recruiters in pharmaceutical industries, prospective students, and their parents have numerous questions about this profession and study course. The objective of this article is to create awareness about clinical pharmacy services (CPS) and to introduce the role of clinical pharmacists (CPs). After reading this article, one will know about the usefulness of CPs in the Indian healthcare system against the current flaws in the system. The article describes the role of CPs in the hospitals, in research, in pharmaceutical/contract research companies, in community service and it also tells about the related myths and facts. Prospective job opportunities for CPs, present challenges and the possible solutions are elaborated as well. In conclusion, CPs are going to be the major support to the Indian healthcare system in near future; the reasons being (1) CPS are beneficial in many ways to improve healthcare; CPS have already proved their importance in western countries (2) India was never officially and efficiently exposed to CPS; so launching of CPS shall revolutionize the country's healthcare scenario. PMID:26229349
Fault-tolerant Control of a Cyber-physical System
NASA Astrophysics Data System (ADS)
Roxana, Rusu-Both; Eva-Henrietta, Dulf
2017-10-01
Cyber-physical systems represent a new emerging field in automatic control. The fault system is a key component, because modern, large scale processes must meet high standards of performance, reliability and safety. Fault propagation in large scale chemical processes can lead to loss of production, energy, raw materials and even environmental hazard. The present paper develops a multi-agent fault-tolerant control architecture using robust fractional order controllers for a (13C) cryogenic separation column cascade. The JADE (Java Agent DEvelopment Framework) platform was used to implement the multi-agent fault tolerant control system while the operational model of the process was implemented in Matlab/SIMULINK environment. MACSimJX (Multiagent Control Using Simulink with Jade Extension) toolbox was used to link the control system and the process model. In order to verify the performance and to prove the feasibility of the proposed control architecture several fault simulation scenarios were performed.
2011-09-01
concert with a physical attack. Additionally, the importance of preventive measures implemented by a social human network to counteract a cyber attack...integrity of the data stored on specific computers. This coordinated cyber attack would have been successful if not for the trusted social network...established by Mr. Hillar Aarelaid, head of the Estonian computer 6 emergency response team (CERT). This social network consisted of Mr. Hillar Aarelaid
Conducting Polymers and Their Applications in Diabetes Management.
Zhao, Yu; Cao, Luyao; Li, Lanlan; Cheng, Wen; Xu, Liangliang; Ping, Xinyu; Pan, Lijia; Shi, Yi
2016-10-26
Advances in conducting polymers (CPs) have promoted the development of diabetic monitoring and treatment, which is of great significance in human healthcare and modern medicine. CPs are special polymers with physical and electrochemical features resembling metals, inorganic semiconductors and non-conducting polymers. To improve and extend their properties, the fabrication of CPs and CP composites has attracted intensive attention in recent decades. Some CPs are biocompatible and suitable for biomedical use. Thus, the intriguing properties of CPs make wearable, noninvasive, continuous diabetes managing devices and other potential applications in diabetes possible in the near future. To highlight the recent advances of CPs and their derived materials (especially in conducting polymer hydrogels), here we discuss their fabrication and characterization, review the current state-of-the-art research in diabetes management based on these materials and describe current challenges as well as future potential research directions.
Conducting Polymers and Their Applications in Diabetes Management
Zhao, Yu; Cao, Luyao; Li, Lanlan; Cheng, Wen; Xu, Liangliang; Ping, Xinyu; Pan, Lijia; Shi, Yi
2016-01-01
Advances in conducting polymers (CPs) have promoted the development of diabetic monitoring and treatment, which is of great significance in human healthcare and modern medicine. CPs are special polymers with physical and electrochemical features resembling metals, inorganic semiconductors and non-conducting polymers. To improve and extend their properties, the fabrication of CPs and CP composites has attracted intensive attention in recent decades. Some CPs are biocompatible and suitable for biomedical use. Thus, the intriguing properties of CPs make wearable, noninvasive, continuous diabetes managing devices and other potential applications in diabetes possible in the near future. To highlight the recent advances of CPs and their derived materials (especially in conducting polymer hydrogels), here we discuss their fabrication and characterization, review the current state-of-the-art research in diabetes management based on these materials and describe current challenges as well as future potential research directions. PMID:27792179
Wang, Chien-Chuan; Lin, Huang-Chi; Chen, Mu-Hong; Ko, Nai-Ying; Chang, Yu-Ping; Lin, I-Mei; Yen, Cheng-Fang
2018-01-01
Objective This study examined the differences in the current levels of depression, anxiety, and physical pain in emerging adulthood among gay and bisexual men with various experiences of traditional and cyber homophobic bullying based on gender role nonconformity and sexual orientation and the moderating effects of family and peer support. Methods A total of 500 gay or bisexual men (age 20–25 years) in Taiwan were recruited from August 2015 to July 2017. The levels of depression, anxiety, and physical pain among gay or bisexual men who had experienced both traditional and cyber homophobic bullying (n=109), only traditional or cyber bullying (n=173), and neither traditional nor cyber bullying during childhood (n=218) were compared. The moderating effects of family and peer support on the effects of homophobic bullying victimization on depression, anxiety, and physical pain were also examined. Results Victims of any type of homophobic bullying in childhood had more severe depression, anxiety, and physical pain in emerging adulthood than nonvictims. Victims of both traditional and cyber homophobic bullying had more severe anxiety in adulthood than victims of only traditional or cyber homophobic bullying. Family but not peer support in childhood moderated the effects of homophobic bullying victimization on current levels of anxiety and physical pain in emerging adulthood among gay and bisexual men. Conclusion The results of the present study support that early prevention and intervention for homophobic bullying and enhancement of family support are essential to reduce mental health problems in emergent adults among gay and bisexual men. PMID:29872298
Wang, Chien-Chuan; Lin, Huang-Chi; Chen, Mu-Hong; Ko, Nai-Ying; Chang, Yu-Ping; Lin, I-Mei; Yen, Cheng-Fang
2018-01-01
This study examined the differences in the current levels of depression, anxiety, and physical pain in emerging adulthood among gay and bisexual men with various experiences of traditional and cyber homophobic bullying based on gender role nonconformity and sexual orientation and the moderating effects of family and peer support. A total of 500 gay or bisexual men (age 20-25 years) in Taiwan were recruited from August 2015 to July 2017. The levels of depression, anxiety, and physical pain among gay or bisexual men who had experienced both traditional and cyber homophobic bullying (n=109), only traditional or cyber bullying (n=173), and neither traditional nor cyber bullying during childhood (n=218) were compared. The moderating effects of family and peer support on the effects of homophobic bullying victimization on depression, anxiety, and physical pain were also examined. Victims of any type of homophobic bullying in childhood had more severe depression, anxiety, and physical pain in emerging adulthood than nonvictims. Victims of both traditional and cyber homophobic bullying had more severe anxiety in adulthood than victims of only traditional or cyber homophobic bullying. Family but not peer support in childhood moderated the effects of homophobic bullying victimization on current levels of anxiety and physical pain in emerging adulthood among gay and bisexual men. The results of the present study support that early prevention and intervention for homophobic bullying and enhancement of family support are essential to reduce mental health problems in emergent adults among gay and bisexual men.
Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Milos Manic; Miles McQueen
Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenariosmore » is demonstrated on several control system network topologies.« less
Litwiller, Brett J; Brausch, Amy M
2013-05-01
The impact of bullying in all forms on the mental health and safety of adolescents is of particular interest, especially in the wake of new methods of bullying that victimize youths through technology. The current study examined the relationship between victimization from both physical and cyber bullying and adolescent suicidal behavior. Violent behavior, substance use, and unsafe sexual behavior were tested as mediators between two forms of bullying, cyber and physical, and suicidal behavior. Data were taken from a large risk-behavior screening study with a sample of 4,693 public high school students (mean age = 16.11, 47 % female). The study's findings showed that both physical bullying and cyber bullying associated with substance use, violent behavior, unsafe sexual behavior, and suicidal behavior. Substance use, violent behavior, and unsafe sexual behavior also all associated with suicidal behavior. Substance use and violent behavior partially mediated the relationship between both forms of bullying and suicidal behavior. The comparable amount of variance in suicidal behavior accounted for by both cyber bullying and physical bullying underscores the important of further cyber bullying research. The direct association of each risk behavior with suicidal behavior also underscores the importance of reducing risk behaviors. Moreover, the role of violence and substance use as mediating behaviors offers an explanation of how risk behaviors can increase an adolescent's likelihood of suicidal behavior through habituation to physical pain and psychological anxiety.
Quantifying the Impact of Unavailability in Cyber-Physical Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.
2014-01-01
The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability.more » This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-16
... agents and toxins list; whether minimum standards for personnel reliability, physical and cyber security... toxins list; (3) whether minimum standards for personnel reliability, physical and cyber security should...
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop.
Zhang, Lifu; Zhang, Heng
2016-03-26
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas.
Porous TiO₂-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis.
Galstyan, Vardan
2017-12-19
Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO₂, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO₂-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO₂ may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material.
Porous TiO2-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis
2017-01-01
Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO2, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO2-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO2 may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material. PMID:29257076
Intersections of Family Homelessness, CPS Involvement, and Race in Alameda County, California
Shinn, Marybeth
2016-01-01
The homelessness and child protective services (CPS) systems are closely linked. This study examines the patterns and sequence of families’ involvement with homeless shelters and CPS, as well as whether involvement in each system predicts involvement in the other using linked administrative records for 258 families recruited in emergency shelters in Alameda County, California. More than half of families were reported to CPS at some point, but less than one fifth ever had a report substantiated. Reports that were uninvestigated or unfounded increased in the months leading up to shelter entry and spiked immediately afterward, but substantiations and child removals increased only later. Shelter use before study entry was associated with CPS referrals and investigations after study entry, although not with substantiated cases or child removals. However, CPS involvement before study entry was not associated with returns to shelter after study entry. These results imply that an unsubstantiated report of neglect or abuse may serve as an early warning signal for homelessness and that preventive strategies aiming to affect both homeless and child protective systems should focus on reducing homelessness. CPS workers should evaluate families’ housing needs and attempt to link families to appropriate resources. Black families were disproportionately referred to CPS after shelter entry after controlling for other family characteristics, but race was not associated with substantiations of neglect or abuse or with child removals. Findings lend modest support to human decision-making and institutional explanations of racial disproportionalities in CPS involvement, especially for reporters outside of the CPS system. PMID:27318034
An Integrated Simulation Module for Cyber-Physical Automation Systems †
Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario
2016-01-01
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called “GILOO” (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new “Advanced Sky GUI” have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system. PMID:27164109
An Integrated Simulation Module for Cyber-Physical Automation Systems.
Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario
2016-05-05
The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called "GILOO" (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new "Advanced Sky GUI" have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system.
77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
.... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...
NASA Astrophysics Data System (ADS)
Zhao, Kai-hua
1990-05-01
Creating modern scientific terminology in their own languages has been the common problem of all developing countries. Direct borrowing of Graeco-Latin terms from western languages is the most straightforward way in countries using alphabetic writing systems; it is, however, quite inconvenient for Chinese. In this article the effort to work out a Chinese nomenclature for physics by the CPS is reviewed. The significance for physics education of assimilating terminology in the mother tongue is also examined at the end.
On Improving 4-km Mesoscale Model Simulations
NASA Astrophysics Data System (ADS)
Deng, Aijun; Stauffer, David R.
2006-03-01
A previous study showed that use of analysis-nudging four-dimensional data assimilation (FDDA) and improved physics in the fifth-generation Pennsylvania State University National Center for Atmospheric Research Mesoscale Model (MM5) produced the best overall performance on a 12-km-domain simulation, based on the 18 19 September 1983 Cross-Appalachian Tracer Experiment (CAPTEX) case. However, reducing the simulated grid length to 4 km had detrimental effects. The primary cause was likely the explicit representation of convection accompanying a cold-frontal system. Because no convective parameterization scheme (CPS) was used, the convective updrafts were forced on coarser-than-realistic scales, and the rainfall and the atmospheric response to the convection were too strong. The evaporative cooling and downdrafts were too vigorous, causing widespread disruption of the low-level winds and spurious advection of the simulated tracer. In this study, a series of experiments was designed to address this general problem involving 4-km model precipitation and gridpoint storms and associated model sensitivities to the use of FDDA, planetary boundary layer (PBL) turbulence physics, grid-explicit microphysics, a CPS, and enhanced horizontal diffusion. Some of the conclusions include the following: 1) Enhanced parameterized vertical mixing in the turbulent kinetic energy (TKE) turbulence scheme has shown marked improvements in the simulated fields. 2) Use of a CPS on the 4-km grid improved the precipitation and low-level wind results. 3) Use of the Hong and Pan Medium-Range Forecast PBL scheme showed larger model errors within the PBL and a clear tendency to predict much deeper PBL heights than the TKE scheme. 4) Combining observation-nudging FDDA with a CPS produced the best overall simulations. 5) Finer horizontal resolution does not always produce better simulations, especially in convectively unstable environments, and a new CPS suitable for 4-km resolution is needed. 6) Although use of current CPSs may violate their underlying assumptions related to the size of the convective element relative to the grid size, the gridpoint storm problem was greatly reduced by applying a CPS to the 4-km grid.
Cyber security risk assessment for SCADA and DCS networks.
Ralston, P A S; Graham, J H; Hieb, J L
2007-10-01
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.
The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents.
Temple, Jeff R; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L; Peskin, Melissa Fleschler; Elmquist, JoAnna
2016-02-01
While research has explored adolescents' use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58 % female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration 1 year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts.
The Temporal Association between Traditional and Cyber Dating Abuse among Adolescents
Temple, Jeff R.; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L.; Peskin, Melissa Fleschler; Elmquist, JoAnna
2015-01-01
While research has explored adolescents’ use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58% female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration one year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts. PMID:26525389
Mones, Enys; Stopczynski, Arkadiusz; Pentland, Alex 'Sandy'; Hupert, Nathaniel; Lehmann, Sune
2018-01-01
Targeted vaccination, whether to minimize the forward transmission of infectious diseases or their clinical impact, is one of the 'holy grails' of modern infectious disease outbreak response, yet it is difficult to achieve in practice due to the challenge of identifying optimal targets in real time. If interruption of disease transmission is the goal, targeting requires knowledge of underlying person-to-person contact networks. Digital communication networks may reflect not only virtual but also physical interactions that could result in disease transmission, but the precise overlap between these cyber and physical networks has never been empirically explored in real-life settings. Here, we study the digital communication activity of more than 500 individuals along with their person-to-person contacts at a 5-min temporal resolution. We then simulate different disease transmission scenarios on the person-to-person physical contact network to determine whether cyber communication networks can be harnessed to advance the goal of targeted vaccination for a disease spreading on the network of physical proximity. We show that individuals selected on the basis of their closeness centrality within cyber networks (what we call 'cyber-directed vaccination') can enhance vaccination campaigns against diseases with short-range (but not full-range) modes of transmission. © 2018 The Author(s).
7 CFR 1730.22 - Borrower analysis.
Code of Federal Regulations, 2011 CFR
2011-01-01
... which could indicate deterioration in the physical or cyber condition or the operational effectiveness of the system or suggest a need for changes in security, operations or maintenance policies... AGRICULTURE ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.22...
7 CFR 1730.22 - Borrower analysis.
Code of Federal Regulations, 2012 CFR
2012-01-01
... which could indicate deterioration in the physical or cyber condition or the operational effectiveness of the system or suggest a need for changes in security, operations or maintenance policies... AGRICULTURE ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.22...
Code of Federal Regulations, 2013 CFR
2013-01-01
... and maintaining an Emergency Restoration Plan (ERP), maintaining records of the physical, cyber and... ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.20 General. Each... and maintain its system in compliance with prudent utility practice, in compliance with its loan...
Code of Federal Regulations, 2012 CFR
2012-01-01
... and maintaining an Emergency Restoration Plan (ERP), maintaining records of the physical, cyber and... ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.20 General. Each... and maintain its system in compliance with prudent utility practice, in compliance with its loan...
Code of Federal Regulations, 2011 CFR
2011-01-01
... and maintaining an Emergency Restoration Plan (ERP), maintaining records of the physical, cyber and... ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.20 General. Each... and maintain its system in compliance with prudent utility practice, in compliance with its loan...
7 CFR 1730.22 - Borrower analysis.
Code of Federal Regulations, 2013 CFR
2013-01-01
... which could indicate deterioration in the physical or cyber condition or the operational effectiveness of the system or suggest a need for changes in security, operations or maintenance policies... AGRICULTURE ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.22...
7 CFR 1730.22 - Borrower analysis.
Code of Federal Regulations, 2014 CFR
2014-01-01
... which could indicate deterioration in the physical or cyber condition or the operational effectiveness of the system or suggest a need for changes in security, operations or maintenance policies... AGRICULTURE ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.22...
Code of Federal Regulations, 2014 CFR
2014-01-01
... and maintaining an Emergency Restoration Plan (ERP), maintaining records of the physical, cyber and... ELECTRIC SYSTEM OPERATIONS AND MAINTENANCE Operations and Maintenance Requirements § 1730.20 General. Each... and maintain its system in compliance with prudent utility practice, in compliance with its loan...
Life satisfaction and school performance of children exposed to classic and cyber peer bullying.
Bilić, Vesna; Flander, Gordana Buljan; Rafajac, Branko
2014-03-01
This paper analyses the relationship between the exposure of school children to various forms of peer bullying (classic/cyber) and their life satisfaction in the domain of school, family, friends and school performance. The sample included 562 children from rural and urban areas of Croatia who were attending the seventh and the eighth grade of primary school. Results show that children were more often exposed to classic forms of peer bullying, especially verbal, and then physical bullying. On the other hand, cyber bullying most often comprises harassment in forums, blogs, chats or social networks, then on the web, by e-mail and mobile phone. Almost half of the examinees knew the identity of the bully, while a minority believes that bullies are the same ones who also physically abuse them at school. We found that children exposed to all forms of both classic and cyber bullying, unlike their peers who do not have such experience, show less satisfaction with friends, while those exposed to physical and cyber bullying show dissatisfaction with their family, too. However no statistically significant difference was found in their satisfaction with school. Children exposed to physical bullying showed poorer school performance, poorer achievement in Croatian and math, while children exposed to verbal and cyber bullying and children who were not exposed to such forms of bullying showed no differences in their school achievement.
Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelic, Andjelka; Campbell, Philip L
The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.
Isolation and identification of citrus psorosis virus Egyptian isolate (CPsV-EG).
Ghazal, S A; El-Dougdoug, Kh A; Mousa, A A; Fahmy, H; Sofy, A R
2008-01-01
Citrus psorosis ophiovirus (CPsV), is considered to be of the most serious and deter mental virus pathogen's citrus species trees in Egypt. CPsV-EG was isolated from infected citrus grapefruit (C. paradisi Macf.) at Agric. Res. Centre (ARC). The grapefruit which used for CPsV-EG isolate was found to be free from CTV, CEVd and Spiroplasma citri where as gave -ve results with DTBIA, tissue print hybridization and Diene's stain respectively. CPsV-EG was detected on the basis of biological indexing by graft inoculation which gave oak leaf pattern (OLP) on Dweet tangor and serological assay by DAS-ELISA using Mab specific CPsV. CPsV-EG was reacted with variable responses on 16 host plants belonging to 6 families. Only 8 host plants are susceptible and showed visible external symptoms which appeared as local, systemic and local followed by systemic infections. CPsV-EG isolate was transmitted from infected citrus to citrus by syringe and grafting and herbaceous plants by forefinger inoculation and syringe. The woody indicators and rootstocks were differed in response to CPsV-EG isolate which appeared as no-response, response, sensitivity and hypersensitivity. The serological characters represented as the antigenic determinants of CPsV-EG isolate related to monoclonal antibodies specific CPsV strain where as appeared precipitation reaction by DAS-ELISA and DTBIA. The partial fragment of RNA3 (coat protein gene) of CPsV-EG (-1140bp and -571bp) was amplified by reverse transcription-polymerase chain reaction (RT-PCR) from grapefruit tissues using two sets primers specific CPsV (CPV3 and CPV4) and (PS66 and PS65) respectively. The virus under study was identified as CPsV-EG isolate according to biological, serological and molecular characters.
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
Zhang, Lifu; Zhang, Heng
2016-01-01
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas. PMID:27023559
Von eingebetteten Systemen zu Cyber-Physical Systems
NASA Astrophysics Data System (ADS)
Wedde, Rorst F.; Lehnhoff, Sebastian; Rehtanz, Christian; Krause, Olav
Das Hauptanliegen des Papiers ist, ein Paradigma für Probleme mit neuartigen Integrationsanforderungen für Forschung und Entwicklung in verteilten eingebetteten Echtzeitsystemen zu motivieren und vorzustellen, nämlich den Begriff Cyber-Physical Systems. Bei einer in letzter Zeit stark zunehmenden Anzahl von Realzeitanwendungen können ohne die Berücksichtigung solcher Forderungen keine praktisch brauchbaren Lösungen erwartet werden. Einige Anwendungsfelder werden angesprochen. Im Einzelnen werden dann für Elektroautos, die mit erneuerbaren Energien betrieben werden sollen, einerseits die Management-, verteilte Verhandlungs- und Verteilungsprobleme der benötigten Energie in einem bottom-up Ansatz gelöst. Andererseits wird als Teil unserer Projektarbeit die Bereitstellung von Reserveenergie für den allgemeinen Bedarf durch Autobatterien vorgestellt. Es zeigt sich, dass dies effizienter und wesentlich kurzfristiger in unserem verteilten Vorgehen geschehen kann als in traditionellen Verfahren.
Chui, Michelle A; Mott, David A; Maxwell, Leigh
2012-01-01
Although lack of time, trained personnel, and reimbursement have been identified as barriers to pharmacists providing cognitive pharmaceutical services (CPS) in community pharmacies, the underlying contributing factors of these barriers have not been explored. One approach to better understand barriers and facilitators to providing CPS is to use a work system approach to examine different components of a work system and how the components may impact care processes. The goals of this study were to identify and describe pharmacy work system characteristics that pharmacists identified and changed to provide CPS in a demonstration program. A qualitative approach was used for data collection. A purposive sample of 8 pharmacists at 6 community pharmacies participating in a demonstration program was selected to be interviewed. Each semistructured interview was audio recorded and transcribed, and the text was analyzed in a descriptive and interpretive manner by 3 analysts. Themes were identified in the text and aligned with 1 of 5 components of the Systems Engineering Initiative for Patient Safety (SEIPS) work system model (organization, tasks, tools/technology, people, and environment). A total of 21 themes were identified from the interviews, and 7 themes were identified across all 6 interviews. The organization component of the SEIPS model contained the most (n=10) themes. Numerous factors within a pharmacy work system appear important to enable pharmacists to provide CPS. Leadership and foresight by the organization to implement processes (communication, coordination, planning, etc.) to facilitate providing CPS was a key finding across the interviews. Expanding technician responsibilities was reported to be essential for successfully implementing CPS. To be successful in providing CPS, pharmacists must be cognizant of the different components of the pharmacy work system and how these components influence providing CPS. Copyright © 2012 Elsevier Inc. All rights reserved.
Chui, Michelle A.; Mott, David A.; Maxwell, Leigh
2012-01-01
Background Although lack of time, trained personnel, and reimbursement have been identified as barriers to pharmacists providing cognitive pharmaceutical services (CPS) in community pharmacies, the underlying contributing factors of these barriers have not been explored. One approach to better understand barriers and facilitators to providing CPS is to use a work system approach to examine different components of a work system and how the components may impact care processes. Objectives The goals of this study were to identify and describe pharmacy work system characteristics that pharmacists identified and changed to provide CPS in a demonstration program. Methods A qualitative approach was used for data collection. A purposive sample of 8 pharmacists at 6 community pharmacies participating in a demonstration program was selected to be interviewed. Each semistructured interview was audio recorded and transcribed, and the text was analyzed in a descriptive and interpretive manner by 3 analysts. Themes were identified in the text and aligned with 1 of 5 components of the Systems Engineering Initiative for Patient Safety (SEIPS) work system model (organization, tasks, tools/technology, people, and environment). Results A total of 21 themes were identified from the interviews, and 7 themes were identified across all 6 interviews. The organization component of the SEIPS model contained the most (n = 10) themes. Numerous factors within a pharmacy work system appear important to enable pharmacists to provide CPS. Leadership and foresight by the organization to implement processes (communication, coordination, planning, etc.) to facilitate providing CPS was a key finding across the interviews. Expanding technician responsibilities was reported to be essential for successfully implementing CPS. Conclusions To be successful in providing CPS, pharmacists must be cognizant of the different components of the pharmacy work system and how these components influence providing CPS. PMID:21824822
Zeng, Hongliang; Miao, Song; Zheng, Baodong; Lin, Shan; Jian, Yeye; Chen, Shen; Zhang, Yi
2015-11-01
The objective of this study was to investigate the multiple relations between the preliminary molecular structural characteristics and antioxidant activities of polysaccharides from Canarium album (Lour.) Raeusch (CPS). Three polysaccharide fractions, CPS1, CPS2, and CPS3, were isolated from CPS by column chromatography. CPS1 and CPS3 were mainly composed of neutral polysaccharides linked by α- and β-glycosidic linkages while CPS2 was pectin polysaccharides mainly linked by β-glycosidic linkages. According to the SEC-MALLS-RI system, the molecular weight of CPS1 was greater compared to CPS2 and CPS3, and the molecular weight and radius of CPS did not display positive correlation. The chain conformation analysis indicated CPS1 and CPS2 were typical highly branched polysaccharides while CPS3 existed as a globular shape in aqueous. Furthermore, the antioxidant activity of CPS2 was better than that of CPS3, while that of CPS1 was the weakest. The antioxidant activities of polysaccharide fractions were affected by their monosaccharide composition, glycosidic linkage, molecular weight, and chain conformation. This functional property was a result of a combination of multiple molecular structural factors. CPS2 was the major antioxidant component of CPS and it could be exploited as a valued antioxidant product. The molecular structural characteristics, antioxidant activities, and structure-function relationships of polysaccharide fractions from Canarium album were first investigated in this study. The results provided background and practical knowledge for the deep-processed products of C. album with high added value. CPS2 was the major antioxidant component of CPS, which could be exploited as a valued antioxidant ingredient in food and pharmaceutical industries. © 2015 Institute of Food Technologists®
Energy Systems Integration News | Energy Systems Integration Facility |
-matter experts to develop cyber-physical systems security testing methodologies and resilience best the Energy Systems Integration Facility as part of NREL's work with SolarCity and the Hawaiian Electric Companies. Photo by Amy Glickson, NREL Welcome to Energy Systems Integration News, NREL's monthly
Cybersecurity through Real-Time Distributed Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kisner, Roger A; Manges, Wayne W; MacIntyre, Lawrence Paul
2010-04-01
Critical infrastructure sites and facilities are becoming increasingly dependent on interconnected physical and cyber-based real-time distributed control systems (RTDCSs). A mounting cybersecurity threat results from the nature of these ubiquitous and sometimes unrestrained communications interconnections. Much work is under way in numerous organizations to characterize the cyber threat, determine means to minimize risk, and develop mitigation strategies to address potential consequences. While it seems natural that a simple application of cyber-protection methods derived from corporate business information technology (IT) domain would lead to an acceptable solution, the reality is that the characteristics of RTDCSs make many of those methods inadequatemore » and unsatisfactory or even harmful. A solution lies in developing a defense-in-depth approach that ranges from protection at communications interconnect levels ultimately to the control system s functional characteristics that are designed to maintain control in the face of malicious intrusion. This paper summarizes the nature of RTDCSs from a cybersecurity perspec tive and discusses issues, vulnerabilities, candidate mitigation approaches, and metrics.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Okhravi, Hamed; Sheldon, Frederick T.; Haines, Joshua
Data diodes provide protection of critical cyber assets by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to understand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we study data diodes, their functionalities and limitations. We then propose two critical infrastructure systems that can benefit from the additional protection offered by data diodes: process control networks and net-centric cyber decision support systems. We review the security requirements of these systems, describe the architectures,more » and study the trade-offs. Finally, the architectures are evaluated against different attack patterns.« less
Liu, Ren; Srivastava, Anurag K.; Bakken, David E.; ...
2017-08-17
Intermittency of wind energy poses a great challenge for power system operation and control. Wind curtailment might be necessary at the certain operating condition to keep the line flow within the limit. Remedial Action Scheme (RAS) offers quick control action mechanism to keep reliability and security of the power system operation with high wind energy integration. In this paper, a new RAS is developed to maximize the wind energy integration without compromising the security and reliability of the power system based on specific utility requirements. A new Distributed Linear State Estimation (DLSE) is also developed to provide the fast andmore » accurate input data for the proposed RAS. A distributed computational architecture is designed to guarantee the robustness of the cyber system to support RAS and DLSE implementation. The proposed RAS and DLSE is validated using the modified IEEE-118 Bus system. Simulation results demonstrate the satisfactory performance of the DLSE and the effectiveness of RAS. Real-time cyber-physical testbed has been utilized to validate the cyber-resiliency of the developed RAS against computational node failure.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Ren; Srivastava, Anurag K.; Bakken, David E.
Intermittency of wind energy poses a great challenge for power system operation and control. Wind curtailment might be necessary at the certain operating condition to keep the line flow within the limit. Remedial Action Scheme (RAS) offers quick control action mechanism to keep reliability and security of the power system operation with high wind energy integration. In this paper, a new RAS is developed to maximize the wind energy integration without compromising the security and reliability of the power system based on specific utility requirements. A new Distributed Linear State Estimation (DLSE) is also developed to provide the fast andmore » accurate input data for the proposed RAS. A distributed computational architecture is designed to guarantee the robustness of the cyber system to support RAS and DLSE implementation. The proposed RAS and DLSE is validated using the modified IEEE-118 Bus system. Simulation results demonstrate the satisfactory performance of the DLSE and the effectiveness of RAS. Real-time cyber-physical testbed has been utilized to validate the cyber-resiliency of the developed RAS against computational node failure.« less
Energy Systems Integration News | Energy Systems Integration Facility |
data analytics and forecasting methods to identify correlations between electricity consumption threats, or cyber and physical attacks-our nation's electricity grid must evolve. As part of the Grid other national labs, and several industry partners-to advance resilient electricity distribution systems
Expanding CyberShake Physics-Based Seismic Hazard Calculations to Central California
NASA Astrophysics Data System (ADS)
Silva, F.; Callaghan, S.; Maechling, P. J.; Goulet, C. A.; Milner, K. R.; Graves, R. W.; Olsen, K. B.; Jordan, T. H.
2016-12-01
As part of its program of earthquake system science, the Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, to perform physics-based probabilistic seismic hazard analysis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by first simulating a tensor-valued wavefield of Strain Green Tensors. CyberShake then takes an earthquake rupture forecast and extends it by varying the hypocenter location and slip distribution, resulting in about 500,000 rupture variations. Seismic reciprocity is used to calculate synthetic seismograms for each rupture variation at each computation site. These seismograms are processed to obtain intensity measures, such as spectral acceleration, which are then combined with probabilities from the earthquake rupture forecast to produce a hazard curve. Hazard curves are calculated at seismic frequencies up to 1 Hz for hundreds of sites in a region and the results interpolated to obtain a hazard map. In developing and verifying CyberShake, we have focused our modeling in the greater Los Angeles region. We are now expanding the hazard calculations into Central California. Using workflow tools running jobs across two large-scale open-science supercomputers, NCSA Blue Waters and OLCF Titan, we calculated 1-Hz PSHA results for over 400 locations in Central California. For each location, we produced hazard curves using both a 3D central California velocity model created via tomographic inversion, and a regionally averaged 1D model. These new results provide low-frequency exceedance probabilities for the rapidly expanding metropolitan areas of Santa Barbara, Bakersfield, and San Luis Obispo, and lend new insights into the effects of directivity-basin coupling associated with basins juxtaposed to major faults such as the San Andreas. Particularly interesting are the basin effects associated with the deep sediments of the southern San Joaquin Valley. We will compare hazard estimates from the 1D and 3D models, summarize the challenges of expanding CyberShake to a new geographic region, and describe our future CyberShake plans.
Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K
2014-01-01
Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies tomore » SCADA systems; our metric is a specialization of the generic measure of mean failure cost.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...
Security Informatics Research Challenges for Mitigating Cyber Friendly Fire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closelymore » related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.« less
Potential environmental effects of the leading edge hydrokinetic energy technology.
DOT National Transportation Integrated Search
2017-05-01
The Volpe Center evaluated potential environmental challenges and benefits of the ARPA-E funded research project, Marine Hydrokinetic Energy Harvesting Using Cyber-Physical Systems, led by Brown University. The Leading Edge research team develo...
Süß, Heinz-Martin; Kretzschmar, André
2018-01-01
The original aim of complex problem solving (CPS) research was to bring the cognitive demands of complex real-life problems into the lab in order to investigate problem solving behavior and performance under controlled conditions. Up until now, the validity of psychometric intelligence constructs has been scrutinized with regard to its importance for CPS performance. At the same time, different CPS measurement approaches competing for the title of the best way to assess CPS have been developed. In the first part of the paper, we investigate the predictability of CPS performance on the basis of the Berlin Intelligence Structure Model and Cattell's investment theory as well as an elaborated knowledge taxonomy. In the first study, 137 students managed a simulated shirt factory ( Tailorshop ; i.e., a complex real life-oriented system) twice, while in the second study, 152 students completed a forestry scenario ( FSYS ; i.e., a complex artificial world system). The results indicate that reasoning - specifically numerical reasoning (Studies 1 and 2) and figural reasoning (Study 2) - are the only relevant predictors among the intelligence constructs. We discuss the results with reference to the Brunswik symmetry principle. Path models suggest that reasoning and prior knowledge influence problem solving performance in the Tailorshop scenario mainly indirectly. In addition, different types of system-specific knowledge independently contribute to predicting CPS performance. The results of Study 2 indicate that working memory capacity, assessed as an additional predictor, has no incremental validity beyond reasoning. We conclude that (1) cognitive abilities and prior knowledge are substantial predictors of CPS performance, and (2) in contrast to former and recent interpretations, there is insufficient evidence to consider CPS a unique ability construct. In the second part of the paper, we discuss our results in light of recent CPS research, which predominantly utilizes the minimally complex systems (MCS) measurement approach. We suggest ecologically valid microworlds as an indispensable tool for future CPS research and applications.
Whither Space Power? Forging a Strategy for the New Century
2002-09-01
cyber dimension. The physical assets that comprise communications networks— Courtesy of NASA Advanced Communication Technology Satellite 90...location to the energy produc tion and use site. As long-distance energy transmission be- comes feasible, this physical transport will undoubtedly mi grate...to space-based transmission systems much as communications systems have done and are continuing to do. 96 WORDEN Once this happens, we will have
Rhodes, Terry L.; Peebles, William A.; Crocker, Neal A.; ...
2014-08-05
The design and performance of a new cross-polarization scattering (CPS) system for the localized measurement of internal magnetic fluctuations is presented. CPS is a process whereby magnetic fluctuations scatter incident electromagnetic radiation into a perpendicular polarization which is subsequently detected. A new CPS design that incorporates a unique scattering geometry was laboratory tested, optimized, and installed on the DIII-D tokamak. Plasma tests of signal-to-noise, polarization purity, and frequency response indicate proper functioning of the system. Lastly, CPS data show interesting features related to internal MHD perturbations known as sawteeth that are not observed on density fluctuations.
Does It Matter How the U.S. Army Organizes To Deal with Cyber Threats?
2013-12-10
document “Joint Operating Environment 2010” conceptualizes the cyber domain into three layers: the physical layer, the logical layer, and the social ...the network of nodes; and the social layer consists of the human and cognitive aspects of the cyber domain.14 The layers of the cyber domain...Innovations and Organizations. (1973), 131. Expanding upon the findings of Zaltman et al., social scientists developed a model to illustrate four
The psychological effects of cyber terrorism.
Gross, Michael L; Canetti, Daphna; Vashdi, Dana R
2016-01-01
When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.
Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.
Ganin, Alexander A; Quach, Phuoc; Panwar, Mahesh; Collier, Zachary A; Keisler, Jeffrey M; Marchese, Dayton; Linkov, Igor
2017-09-05
Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data. Published 2017. This article is a U.S. Government work and is in the public domain in the U.S.A.
International Cyber Incident Repository System: Information Sharing on a Global Scale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.
According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelatedmore » Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.« less
A cyber-physical system for senior collapse detection
NASA Astrophysics Data System (ADS)
Grewe, Lynne; Magaña-Zook, Steven
2014-06-01
Senior Collapse Detection (SCD) is a system that uses cyber-physical techniques to create a "smart home" system to predict and detect the falling of senior/geriatric participants in home environments. This software application addresses the needs of millions of senior citizens who live at home by themselves and can find themselves in situations where they have fallen and need assistance. We discuss how SCD uses imagery, depth and audio to fuse and interact in a system that does not require the senior to wear any devices allowing them to be more autonomous. The Microsoft Kinect Sensor is used to collect imagery, depth and audio. We will begin by discussing the physical attributes of the "collapse detection problem". Next, we will discuss the task of feature extraction resulting in skeleton and joint tracking. Improvements in error detection of joint tracking will be highlighted. Next, we discuss the main module of "fall detection" using our mid-level skeleton features. Attributes including acceleration, position and room environment factor into the SCD fall detection decision. Finally, how a detected fall and the resultant emergency response are handled will be presented. Results in a home environment will be given.
NASA Astrophysics Data System (ADS)
Raghu Gowda, Belagumba Venkatachalaiah
This dissertation examines how simple structural compliance impacts a specific transient vortex phenomenon that occurs on high angle of attack lifting surfaces termed dynamic stall. In many Fluid structure interaction (FSI) research efforts, a purely physical or purely computational approach is taken. In this work a low cost cyber-physical (CPFD) system is designed and developed for representing the FSI in the leading edge vortex (LEV) development problem. The leading edge compliance appears to be favorable in a specific spring constant range for a given wing. When the leading edge compliance prescribed via CPFD system is too low compared with the moment due to dynamic pressure or fluid unsteady effect, the LEV behavior is similar to that of a rigid wing system. When the leading edge compliance is too high, excessive compliance is introduced into the wing system and the leading edge vortex evolution is affected by the large change in wing angle. At moderate leading edge compliance, a balance appears to be achieved in which the leading edge vorticity shedding rate supports the long term evolution of the leading edge vortex. Further investigation is required to determine specific parameters governing these leading edge compliance ranges.
Cyber Friendly Fire: Research Challenges for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less
Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems.
Huang, Shuqiang; Tao, Ming
2017-01-22
Wireless sensor network topology optimization is a highly important issue, and topology control through node selection can improve the efficiency of data forwarding, while saving energy and prolonging lifetime of the network. To address the problem of connecting a wireless sensor network to the Internet in cyber-physical systems, here we propose a geometric gateway deployment based on a competitive swarm optimizer algorithm. The particle swarm optimization (PSO) algorithm has a continuous search feature in the solution space, which makes it suitable for finding the geometric center of gateway deployment; however, its search mechanism is limited to the individual optimum (pbest) and the population optimum (gbest); thus, it easily falls into local optima. In order to improve the particle search mechanism and enhance the search efficiency of the algorithm, we introduce a new competitive swarm optimizer (CSO) algorithm. The CSO search algorithm is based on an inter-particle competition mechanism and can effectively avoid trapping of the population falling into a local optimum. With the improvement of an adaptive opposition-based search and its ability to dynamically parameter adjustments, this algorithm can maintain the diversity of the entire swarm to solve geometric K -center gateway deployment problems. The simulation results show that this CSO algorithm has a good global explorative ability as well as convergence speed and can improve the network quality of service (QoS) level of cyber-physical systems by obtaining a minimum network coverage radius. We also find that the CSO algorithm is more stable, robust and effective in solving the problem of geometric gateway deployment as compared to the PSO or Kmedoids algorithms.
NASA Astrophysics Data System (ADS)
Takaya, Yuhei; Yasuda, Tamaki; Fujii, Yosuke; Matsumoto, Satoshi; Soga, Taizo; Mori, Hirotoshi; Hirai, Masayuki; Ishikawa, Ichiro; Sato, Hitoshi; Shimpo, Akihiko; Kamachi, Masafumi; Ose, Tomoaki
2017-01-01
This paper describes the operational seasonal prediction system of the Japan Meteorological Agency (JMA), the Japan Meteorological Agency/Meteorological Research Institute-Coupled Prediction System version 1 (JMA/MRI-CPS1), which was in operation at JMA during the period between February 2010 and May 2015. The predictive skill of the system was assessed with a set of retrospective seasonal predictions (reforecasts) covering 30 years (1981-2010). JMA/MRI-CPS1 showed reasonable predictive skill for the El Niño-Southern Oscillation, comparable to the skills of other state-of-the-art systems. The one-tiered approach adopted in JMA/MRI-CPS1 improved its overall predictive skills for atmospheric predictions over those of the two-tiered approach of the previous uncoupled system. For 3-month predictions with a 1-month lead, JMA/MRI-CPS1 showed statistically significant skills in predicting 500-hPa geopotential height and 2-m temperature in East Asia in most seasons; thus, it is capable of providing skillful seasonal predictions for that region. Furthermore, JMA/MRI-CPS1 was superior overall to the previous system for atmospheric predictions with longer (4-month) lead times. In particular, JMA/MRI-CPS1 was much better able to predict the Asian Summer Monsoon than the previous two-tiered system. This enhanced performance was attributed to the system's ability to represent atmosphere-ocean coupled variability over the Indian Ocean and the western North Pacific from boreal winter to summer following winter El Niño events, which in turn influences the East Asian summer climate through the Pacific-Japan teleconnection pattern. These substantial improvements obtained by using an atmosphere-ocean coupled general circulation model underpin its success in providing more skillful seasonal forecasts on an operational basis.
Learning in and beyond School Gardens with Cyber-Physical Systems
ERIC Educational Resources Information Center
Zuiker, Steven J.; Wright, Kyle
2015-01-01
This design-based research study considers the learner-generated design and refinement of a school garden. We report one enactment of the Connected Gardening project in order to illuminate and understand how a fourth-grade class organizes and refines its garden plot using observations of the physical environment and evaluations of data from a…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sintov, Nicole; Orosz, Michael; Schultz, P. Wesley
2015-01-01
The mission of the Personalized Energy Reduction Cyber-physical System (PERCS) is to create new possibilities for improving building operating efficiency, enhancing grid reliability, avoiding costly power interruptions, and mitigating greenhouse gas emissions. PERCS proposes to achieve these outcomes by engaging building occupants as partners in a user-centered smart service platform. Using a non-intrusive load monitoring approach, PERCS uses a single sensing point in each home to capture smart electric meter data in real time. The household energy signal is disaggregated into individual load signatures of common appliances (e.g., air conditioners), yielding near real-time appliance-level energy information. Users interact with PERCSmore » via a mobile phone platform that provides household- and appliance-level energy feedback, tailored recommendations, and a competitive game tied to energy use and behavioral changes. PERCS challenges traditional energy management approaches by directly engaging occupant as key elements in a technological system.« less
Cyber Astronomy: A Cyber University Course for School Students
ERIC Educational Resources Information Center
Chan, C. W.; Wong, K. Y. Michael
2003-01-01
Teaching university physics through the internet is not new, but a new course providing the same service for secondary school students is the first of its kind in Hong Kong. Taking advantage of the fast and affordable broadband internet in the region, some university courses have been converted to a cyber curriculum suitable for secondary school…
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2013 CFR
2013-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2014 CFR
2014-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
Prognostic scores in oesophageal or gastric variceal bleeding.
Ohmann, C; Stöltzing, H; Wins, L; Busch, E; Thon, K
1990-05-01
Numerous scoring systems have been developed for the prediction of outcome of variceal bleeding; however, only a few have been evaluated adequately. The object of this study was to improve the classical Child-Pugh score (CPS) and to test other scores from the literature. Patients (n = 82) with endoscopically confirmed variceal bleeding and long-term sclerotherapy were included in the study. Linear logistic regression (LR) was applied to different sets of prognostic variables with regard to 30-day mortality. In addition, scores from the literature were evaluated on the data set. Performance was measured by the accuracy and receiver-operating characteristic curves. The application of LR to all five CPS variables (accuracy, 80%) was superior to the classical CPS (70%). LR with selection from the CPS variables or from other sets of variables resulted in no improvement. Compared with CPS only three scores from the literature, mainly based on subsets of the CPS variables, showed an improved accuracy. It is concluded that CPS is still a good scoring system; however, it can be improved by statistical analysis using the same variables.
A Baseline Patient Model to Support Testing of Medical Cyber-Physical Systems.
Silva, Lenardo C; Perkusich, Mirko; Almeida, Hyggo O; Perkusich, Angelo; Lima, Mateus A M; Gorgônio, Kyller C
2015-01-01
Medical Cyber-Physical Systems (MCPS) are currently a trending topic of research. The main challenges are related to the integration and interoperability of connected medical devices, patient safety, physiologic closed-loop control, and the verification and validation of these systems. In this paper, we focus on patient safety and MCPS validation. We present a formal patient model to be used in health care systems validation without jeopardizing the patient's health. To determine the basic patient conditions, our model considers the four main vital signs: heart rate, respiratory rate, blood pressure and body temperature. To generate the vital signs we used regression models based on statistical analysis of a clinical database. Our solution should be used as a starting point for a behavioral patient model and adapted to specific clinical scenarios. We present the modeling process of the baseline patient model and show its evaluation. The conception process may be used to build different patient models. The results show the feasibility of the proposed model as an alternative to the immediate need for clinical trials to test these medical systems.
Potential Collaborative Research topics with Korea’s Agency for Defense Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farrar, Charles R.; Todd, Michael D.
2012-08-23
This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involvedmore » the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.« less
The psychological effects of cyber terrorism
Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.
2016-01-01
When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962
Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism
2017-03-03
Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism Hamed Okhravi and Howard Shrobe Overview: The static...nature of computer systems makes them vulnerable to cyber attacks. Consider a situation where an attacker wants to compromise a remote system running... cyber resilience that attempts to rebalance the cyber landscape is known as cyber moving target (MT) (or just moving target) techniques. Moving target
Cyber Bullying and Traditional Bullying: Differential Association with Depression
Wang, Jing; Nansel, Tonja R.; Iannotti, Ronald J.
2010-01-01
Purpose The study compared levels of depression among bullies, victims and bully-victims of traditional (physical, verbal and relational) and cyber bullying, and examined the association between depression and frequency of involvement in each form of bullying. Methods A U.S. nationally-representative sample of students in grades 6 to 10 (N = 7313) completed the bullying and depression items in the Health Behavior in School-Aged Children (HBSC) 2005 Survey. Results Depression was associated with each of four forms of bullying. Cyber victims reported higher depression than bullies or bully-victims, a finding not observed in other forms of bullying. For physical, verbal and relational bullies, victims and bully victims, the frequently-involved group reported significantly higher level of depression than the corresponding occasionally-involved group. For cyber bullying, differences were found only between occasional and frequent victims. Conclusion Findings indicate the importance of further study of cyber bullying as its association with depression is distinct from traditional forms of bullying. PMID:21402273
Palomar, Esther; Chen, Xiaohong; Liu, Zhiming; Maharjan, Sabita; Bowen, Jonathan
2016-10-28
Smart city systems embrace major challenges associated with climate change, energy efficiency, mobility and future services by embedding the virtual space into a complex cyber-physical system. Those systems are constantly evolving and scaling up, involving a wide range of integration among users, devices, utilities, public services and also policies. Modelling such complex dynamic systems' architectures has always been essential for the development and application of techniques/tools to support design and deployment of integration of new components, as well as for the analysis, verification, simulation and testing to ensure trustworthiness. This article reports on the definition and implementation of a scalable component-based architecture that supports a cooperative energy demand response (DR) system coordinating energy usage between neighbouring households. The proposed architecture, called refinement of Cyber-Physical Component Systems (rCPCS), which extends the refinement calculus for component and object system (rCOS) modelling method, is implemented using Eclipse Extensible Coordination Tools (ECT), i.e., Reo coordination language. With rCPCS implementation in Reo, we specify the communication, synchronisation and co-operation amongst the heterogeneous components of the system assuring, by design scalability and the interoperability, correctness of component cooperation.
Oh, Lawrence J; Nguyen, Chu Luan; Wong, Eugene; Wang, Samuel S Y; Francis, Ian C
2017-01-01
To evaluate surgical outcomes (SOs) and visual outcomes (VOs) in cataract surgery comparing the Centurion ® phacoemulsification system (CPS) with the Infiniti ® phacoemulsification system (IPS). Prospective, consecutive study in a single-site private practice. Totally 412 patients undergoing cataract surgery with either the CPS using the 30-degree balanced ® tip ( n =207) or the IPS using the 30-degree Kelman ® tip ( n =205). Intraoperative and postoperative outcomes were documented prospectively up to one month follow-up. Nuclear sclerosis (NS) grade, cumulated dissipated energy (CDE), preoperative corrected distance visual acuity (CDVA), and CDVA at one month were recorded. CDE was 13.50% less in the whole CPS compared with the whole IPS subcohort. In eyes with NS grade III or greater, CDE was 28.87% less with CPS ( n =70) compared with IPS ( n =44) ( P =0.010). Surgical complications were not statistically different between the two subcohorts ( P =0.083), but in the one case of vitreous loss using the CPS, CDVA of 6/4 was achieved at one month. The mean CDVAs (VOs) at one month for NS grade III and above cataracts were -0.17 logMAR (6/4.5) in the CPS and -0.15 logMAR (6/4.5) in the IPS subcohort respectively ( P =0.033). CDE is 28.87% less, and VOs are significantly improved, in denser cataracts in the CPS compared with the IPS. The authors recommend the CPS for cases with denser nuclei.
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy; Colonna-Romano, John; Eslami, Mohammed
2017-05-01
The United States increasingly relies on cyber-physical systems to conduct military and commercial operations. Attacks on these systems have increased dramatically around the globe. The attackers constantly change their methods, making state-of-the-art commercial and military intrusion detection systems ineffective. In this paper, we present a model to identify functional behavior of network devices from netflow traces. Our model includes two innovations. First, we define novel features for a host IP using detection of application graph patterns in IP's host graph constructed from 5-min aggregated packet flows. Second, we present the first application, to the best of our knowledge, of Graph Semi-Supervised Learning (GSSL) to the space of IP behavior classification. Using a cyber-attack dataset collected from NetFlow packet traces, we show that GSSL trained with only 20% of the data achieves higher attack detection rates than Support Vector Machines (SVM) and Naïve Bayes (NB) classifiers trained with 80% of data points. We also show how to improve detection quality by filtering out web browsing data, and conclude with discussion of future research directions.
Palomar, Esther; Chen, Xiaohong; Liu, Zhiming; Maharjan, Sabita; Bowen, Jonathan
2016-01-01
Smart city systems embrace major challenges associated with climate change, energy efficiency, mobility and future services by embedding the virtual space into a complex cyber-physical system. Those systems are constantly evolving and scaling up, involving a wide range of integration among users, devices, utilities, public services and also policies. Modelling such complex dynamic systems’ architectures has always been essential for the development and application of techniques/tools to support design and deployment of integration of new components, as well as for the analysis, verification, simulation and testing to ensure trustworthiness. This article reports on the definition and implementation of a scalable component-based architecture that supports a cooperative energy demand response (DR) system coordinating energy usage between neighbouring households. The proposed architecture, called refinement of Cyber-Physical Component Systems (rCPCS), which extends the refinement calculus for component and object system (rCOS) modelling method, is implemented using Eclipse Extensible Coordination Tools (ECT), i.e., Reo coordination language. With rCPCS implementation in Reo, we specify the communication, synchronisation and co-operation amongst the heterogeneous components of the system assuring, by design scalability and the interoperability, correctness of component cooperation. PMID:27801829
Geno, K. Aaron; Hauser, Jocelyn R.; Gupta, Kanupriya
2014-01-01
Streptococcus pneumoniae produces a protective capsular polysaccharide whose production must be modulated for bacterial survival within various host niches. Capsule production is affected in part by a phosphoregulatory system comprised of CpsB, CpsC, and CpsD. Here, we found that growth of serotype 2 strain D39 under conditions of increased oxygen availability resulted in decreased capsule levels concurrent with an ∼5-fold increase in Cps2B-mediated phosphatase activity. The change in Cps2B phosphatase activity did not result from alterations in the levels of either the cps2B transcript or the Cps2B protein. Recombinant Cps2B expressed in Escherichia coli similarly exhibited increased phosphatase activity under conditions of high-oxygen growth. S. pneumoniae D39 derivatives with defined deletion or point mutations in cps2B demonstrated reduced phosphatase activity with corresponding increases in levels of Cps2D tyrosine phosphorylation. There was, however, no correlation between these phenotypes and the level of capsule production. During growth under reduced-oxygen conditions, the Cps2B protein was essential for parental levels of capsule, but phosphatase activity alone could be eliminated without an effect on capsule. Under increased-oxygen conditions, deletion of cps2B did not affect capsule levels. These results indicate that neither Cps2B phosphatase activity nor Cps2D phosphorylation levels per se are determinants of capsule levels, whereas the Cps2B protein is important for capsule production during growth under conditions of reduced but not enhanced oxygen availability. Roles for factors outside the capsule locus, possible interactions between capsule regulatory proteins, and links to other cellular processes are also suggested by the results described in this study. PMID:24659769
17 CFR 39.18 - System safeguards.
Code of Federal Regulations, 2012 CFR
2012-04-01
... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...
49 CFR 15.5 - Sensitive security information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...
49 CFR 15.5 - Sensitive security information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...
17 CFR 39.18 - System safeguards.
Code of Federal Regulations, 2014 CFR
2014-04-01
... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...
49 CFR 15.5 - Sensitive security information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...
49 CFR 15.5 - Sensitive security information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... sources and methods used to gather or develop threat information, including threats against cyber infrastructure. (8) Security measures. Specific details of aviation or maritime transportation security measures... infrastructure asset information. Any list identifying systems or assets, whether physical or virtual, so vital...
17 CFR 39.18 - System safeguards.
Code of Federal Regulations, 2013 CFR
2013-04-01
... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...
Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering
NASA Technical Reports Server (NTRS)
Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan
2015-01-01
The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.
2017-12-21
deterrence approach is capable of exer- cising deterrence with virtual, psychological , moral, and physical aspects in an integrated way, thus lever...Julie Ryan T H E F I F T H D O M A I N Integrating cyber and electronic warfare capabilities increases the commander’s situational awareness. (U.S...cyber organizations and the interagency; and integrating cyber requirements into operational planning and execution. It will take continued
Review of Supervisory Control and Data Acquisition (SCADA) Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reva Nickelson; Briam Johnson; Ken Barnes
2004-01-01
A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.
On Cyber Warfare Command and Control Systems
2004-06-01
longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures
A Delay-Aware and Reliable Data Aggregation for Cyber-Physical Sensing
Zhang, Jinhuan; Long, Jun; Zhang, Chengyuan; Zhao, Guihu
2017-01-01
Physical information sensed by various sensors in a cyber-physical system should be collected for further operation. In many applications, data aggregation should take reliability and delay into consideration. To address these problems, a novel Tiered Structure Routing-based Delay-Aware and Reliable Data Aggregation scheme named TSR-DARDA for spherical physical objects is proposed. By dividing the spherical network constructed by dispersed sensor nodes into circular tiers with specifically designed widths and cells, TSTR-DARDA tries to enable as many nodes as possible to transmit data simultaneously. In order to ensure transmission reliability, lost packets are retransmitted. Moreover, to minimize the latency while maintaining reliability for data collection, in-network aggregation and broadcast techniques are adopted to deal with the transmission between data collecting nodes in the outer layer and their parent data collecting nodes in the inner layer. Thus, the optimization problem is transformed to minimize the delay under reliability constraints by controlling the system parameters. To demonstrate the effectiveness of the proposed scheme, we have conducted extensive theoretical analysis and comparisons to evaluate the performance of TSR-DARDA. The analysis and simulations show that TSR-DARDA leads to lower delay with reliability satisfaction. PMID:28218668
Protecting Networks Via Automated Defense of Cyber Systems
2016-09-01
autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our
Süß, Heinz-Martin; Kretzschmar, André
2018-01-01
The original aim of complex problem solving (CPS) research was to bring the cognitive demands of complex real-life problems into the lab in order to investigate problem solving behavior and performance under controlled conditions. Up until now, the validity of psychometric intelligence constructs has been scrutinized with regard to its importance for CPS performance. At the same time, different CPS measurement approaches competing for the title of the best way to assess CPS have been developed. In the first part of the paper, we investigate the predictability of CPS performance on the basis of the Berlin Intelligence Structure Model and Cattell’s investment theory as well as an elaborated knowledge taxonomy. In the first study, 137 students managed a simulated shirt factory (Tailorshop; i.e., a complex real life-oriented system) twice, while in the second study, 152 students completed a forestry scenario (FSYS; i.e., a complex artificial world system). The results indicate that reasoning – specifically numerical reasoning (Studies 1 and 2) and figural reasoning (Study 2) – are the only relevant predictors among the intelligence constructs. We discuss the results with reference to the Brunswik symmetry principle. Path models suggest that reasoning and prior knowledge influence problem solving performance in the Tailorshop scenario mainly indirectly. In addition, different types of system-specific knowledge independently contribute to predicting CPS performance. The results of Study 2 indicate that working memory capacity, assessed as an additional predictor, has no incremental validity beyond reasoning. We conclude that (1) cognitive abilities and prior knowledge are substantial predictors of CPS performance, and (2) in contrast to former and recent interpretations, there is insufficient evidence to consider CPS a unique ability construct. In the second part of the paper, we discuss our results in light of recent CPS research, which predominantly utilizes the minimally complex systems (MCS) measurement approach. We suggest ecologically valid microworlds as an indispensable tool for future CPS research and applications. PMID:29867627
Enhancing infrastructure resilience through business continuity planning.
Fisher, Ronald; Norman, Michael; Klett, Mary
2017-01-01
Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.
Pham, Tammy B; Adesman, Andrew
2017-11-23
Objective To examine, in a nationally-representative sample of high school students, to what extent one or more additional threats to physical safety exacerbates the risk of sadness and suicidality among victims of school and/or cyber-bullying. Methods National data from the 2015 Youth Risk Behavior Survey (YRBS) were analyzed for grades 9-12 (n = 15,624). Victimization groups were characterized by school-bullying and cyber-bullying, with and without additional threats to physical safety: fighting at school, being threatened/injured at school, and skipping school out of fear for one's safety. Outcomes included 2-week sadness and suicidality. Outcomes for victimization groups were compared to non-victims using logistic regression adjusting for sex, grade and race/ethnicity. Results Overall, 20.2% of students were school-bullied, and 15.5% were cyber-bullied in the past year. Compared to non-victims, victims of school-bullying and victims of cyber-bullying (VoCBs) who did not experience additional threats to physical safety were 2.76 and 3.83 times more likely to report 2-week sadness, and 3.39 and 3.27 times more likely to exhibit suicidality, respectively. Conversely, victims of bullying who experienced one or more additional threats to physical safety were successively more likely to report these adverse outcomes. Notably, victims of school-bullying and VoCBs with all three additional risk factors were 13.13 and 17.75 times more likely to exhibit suicidality, respectively. Conclusion Risk of depression symptoms and suicidality among victims of school-bullying and/or cyber-bullying is greatly increased among those who have experienced additional threats to physical safety: fighting at school, being threatened/injured at school and skipping school out of fear for their safety.
78 FR 22846 - Smart Grid Advisory Committee Meeting Cancellation
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-17
... DEPARTMENT OF COMMERCE National Institute of Standards and Technology Smart Grid Advisory... Commerce. ACTION: Notice of meeting cancellation. SUMMARY: The meeting of the Smart Grid Advisory Committee... INFORMATION CONTACT: Mr. Cuong Nguyen, Smart Grid and Cyber-Physical Systems Program Office, National...
ERIC Educational Resources Information Center
Litwiller, Brett J.; Brausch, Amy M.
2013-01-01
The impact of bullying in all forms on the mental health and safety of adolescents is of particular interest, especially in the wake of new methods of bullying that victimize youths through technology. The current study examined the relationship between victimization from both physical and cyber bullying and adolescent suicidal behavior. Violent…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less
Consequence-driven cyber-informed engineering (CCE)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freeman, Sarah G.; St Michel, Curtis; Smith, Robert
The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal ofmore » the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.« less
Oh, Lawrence J.; Nguyen, Chu Luan; Wong, Eugene; Wang, Samuel S.Y.; Francis, Ian C.
2017-01-01
AIM To evaluate surgical outcomes (SOs) and visual outcomes (VOs) in cataract surgery comparing the Centurion® phacoemulsification system (CPS) with the Infiniti® phacoemulsification system (IPS). METHODS Prospective, consecutive study in a single-site private practice. Totally 412 patients undergoing cataract surgery with either the CPS using the 30-degree balanced® tip (n=207) or the IPS using the 30-degree Kelman® tip (n=205). Intraoperative and postoperative outcomes were documented prospectively up to one month follow-up. Nuclear sclerosis (NS) grade, cumulated dissipated energy (CDE), preoperative corrected distance visual acuity (CDVA), and CDVA at one month were recorded. RESULTS CDE was 13.50% less in the whole CPS compared with the whole IPS subcohort. In eyes with NS grade III or greater, CDE was 28.87% less with CPS (n=70) compared with IPS (n=44) (P=0.010). Surgical complications were not statistically different between the two subcohorts (P=0.083), but in the one case of vitreous loss using the CPS, CDVA of 6/4 was achieved at one month. The mean CDVAs (VOs) at one month for NS grade III and above cataracts were -0.17 logMAR (6/4.5) in the CPS and -0.15 logMAR (6/4.5) in the IPS subcohort respectively (P=0.033). CONCLUSION CDE is 28.87% less, and VOs are significantly improved, in denser cataracts in the CPS compared with the IPS. The authors recommend the CPS for cases with denser nuclei. PMID:29181313
Cyber Deterrence by Engagement and Surprise
2017-12-21
virtual, psychological , moral, and physical aspects in an integrated way, thus lever- aging cyber power (i.e. information power) together with...are going to receive if they continue what they are doing. This psychologi - cal state could be reached through a number of factors, to include...dominance if they are integrated appropriately into conventional military capabil- ities.7 An examination of retaliation in the cyber domain reveals
78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-05
... shore up our defenses against physical and cyber incidents. In tandem with my Executive Order on... hazards including terrorism and natural disasters, as well as cyber attacks. We must ensure that the...
Model-based approach for cyber-physical attack detection in water distribution systems.
Housh, Mashor; Ohar, Ziv
2018-08-01
Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net). Copyright © 2018. Published by Elsevier Ltd.
Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems
Huang, Shuqiang; Tao, Ming
2017-01-01
Wireless sensor network topology optimization is a highly important issue, and topology control through node selection can improve the efficiency of data forwarding, while saving energy and prolonging lifetime of the network. To address the problem of connecting a wireless sensor network to the Internet in cyber-physical systems, here we propose a geometric gateway deployment based on a competitive swarm optimizer algorithm. The particle swarm optimization (PSO) algorithm has a continuous search feature in the solution space, which makes it suitable for finding the geometric center of gateway deployment; however, its search mechanism is limited to the individual optimum (pbest) and the population optimum (gbest); thus, it easily falls into local optima. In order to improve the particle search mechanism and enhance the search efficiency of the algorithm, we introduce a new competitive swarm optimizer (CSO) algorithm. The CSO search algorithm is based on an inter-particle competition mechanism and can effectively avoid trapping of the population falling into a local optimum. With the improvement of an adaptive opposition-based search and its ability to dynamically parameter adjustments, this algorithm can maintain the diversity of the entire swarm to solve geometric K-center gateway deployment problems. The simulation results show that this CSO algorithm has a good global explorative ability as well as convergence speed and can improve the network quality of service (QoS) level of cyber-physical systems by obtaining a minimum network coverage radius. We also find that the CSO algorithm is more stable, robust and effective in solving the problem of geometric gateway deployment as compared to the PSO or Kmedoids algorithms. PMID:28117735
Integrated situational awareness for cyber attack detection, analysis, and mitigation
NASA Astrophysics Data System (ADS)
Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng
2012-06-01
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
Chai, Rifai; Naik, Ganesh R; Ling, Sai Ho; Nguyen, Hung T
2017-01-07
One of the key challenges of the biomedical cyber-physical system is to combine cognitive neuroscience with the integration of physical systems to assist people with disabilities. Electroencephalography (EEG) has been explored as a non-invasive method of providing assistive technology by using brain electrical signals. This paper presents a unique prototype of a hybrid brain computer interface (BCI) which senses a combination classification of mental task, steady state visual evoked potential (SSVEP) and eyes closed detection using only two EEG channels. In addition, a microcontroller based head-mounted battery-operated wireless EEG sensor combined with a separate embedded system is used to enhance portability, convenience and cost effectiveness. This experiment has been conducted with five healthy participants and five patients with tetraplegia. Generally, the results show comparable classification accuracies between healthy subjects and tetraplegia patients. For the offline artificial neural network classification for the target group of patients with tetraplegia, the hybrid BCI system combines three mental tasks, three SSVEP frequencies and eyes closed, with average classification accuracy at 74% and average information transfer rate (ITR) of the system of 27 bits/min. For the real-time testing of the intentional signal on patients with tetraplegia, the average success rate of detection is 70% and the speed of detection varies from 2 to 4 s.
48 CFR 642.1503-70 - Contractor Performance System (CPS).
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Contractor Performance System (CPS). 642.1503-70 Section 642.1503-70 Federal Acquisition Regulations System DEPARTMENT OF STATE CONTRACT MANAGEMENT CONTRACT ADMINISTRATION AND AUDIT SERVICES Contractor Performance Information 642.1503...
Psychological, physical, and academic correlates of cyberbullying and traditional bullying.
Kowalski, Robin M; Limber, Susan P
2013-07-01
To examine the relationship between children's and adolescents' experiences with cyberbullying and traditional bullying and psychological health, physical health, and academic performance. Nine hundred thirty-one students in grades 6 through 12 completed an anonymous survey examining their experiences with cyberbullying and traditional bullying. Also included were measures of anxiety, depression, self-esteem, physical well-being, school attendance, and academic performance. Participants were categorized as belonging to one of four groups: cyber victims, cyberbullies, cyber bully/victims, and those not involved in cyberbullying. A similar categorization was done with traditional bullying. Those in the bully/victim groups (and particularly the cyber bully/victim group) had the most negative scores on most measures of psychological health, physical, health, and academic performance. There appears to be a substantial, although not perfect, overlap between involvement in traditional bullying and cyberbullying. Additionally, the physical, psychological, and academic correlates of the two types of bullying resembled one another. Copyright © 2013 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Marmé, Frederik; Lederer, Bianca; Blohmer, Jens-Uwe; Costa, Serban Dan; Denkert, Carsten; Eidtmann, Holger; Gerber, Bernd; Hanusch, Claus; Hilfrich, Jörn; Huober, Jens; Jackisch, Christian; Kümmel, Sherko; Loibl, Sibylle; Paepke, Stefan; Untch, Michael; von Minckwitz, Gunter; Schneeweiss, Andreas
2016-01-01
Pathologic complete response after neoadjuvant chemotherapy (NACT) correlates with overall survival (OS) in primary breast cancer. A recently described staging system based on pre-treatment clinical stage (CS), final pathological stage (PS), estrogen receptor (ER) status and nuclear grade (NG) leads to a refined estimation of prognosis in unselected patients. Its performance in luminal type breast cancers has not been determined. This study investigates the clinical utility of this CPS+EG score when restricted to hormone receptor-positive (HR+)/human epidermal growth factor receptor 2-negative (HER2-) patients and compares the results to a cohort of unselected patients. The CPS+EG score was calculated for 6637 unselected patients and 2454 patients with HR+/HER2- tumours who received anthracycline/taxane-based NACT within 8 prospective German trials. Five-year disease-free survival (DFS) and OS were 75.6% and 84.1% for the unselected cohort and 80.6% and 87.8% for the HR+/HER2- subgroup, respectively. The CPS+EG system distinguished different prognostic groups with 5-year DFS ranging from 0% to 91%. The CPS+EG system leads to an improved categorisation of patients by outcome compared to CS, PS, ER or NG alone. When applying the CPS+EG score to the HR+/HER2- subgroup, a shift to lower scores was observed compared to the overall population, but 5-year DFS and OS for the individual scores were identical to that observed in the overall population. In HR+/HER2- patients, the CPS+EG staging system retains its ability to facilitate a refined stratification of patients according to outcome. It can help to select candidates for post-neoadjuvant clinical trials in luminal breast cancer. Copyright © 2015 Elsevier Ltd. All rights reserved.
2014-05-22
CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey
ERIC Educational Resources Information Center
Kang, Myunghee; Kim, Seyoung; Yoon, Seonghye; Chung, Warren
2017-01-01
The purpose of this study was to set future directions of the Cyber Home Learning System in Korea based on its current status. The Cyber Home Learning System has been designed and used by K-12 students to study voluntarily at home using online lessons. The development process of the Cyber Home Learning System was composed of the following four…
Halverson, Julie L; Russell, Jesse Rio; Kerwin, Colleen
2018-06-05
The mission and responsibility of child protective services (CPS) is to investigate maltreatment; intervene to protect children from harm; and promote safety, permanency, and well-being (DePanfilis & Salus, 2003; Goldman, Salus, Wolcott, & Kennedy, 2003). In 2015, approximately 7.2 million children in the United States were referred to CPS agencies, and 3.4 million children had an investigation or received an alternative response (US Department of Health & Human Services, 2017). Fluke, Shusterman, Hollinshead, and Yuan (2005) found that about one third of children with an allegation of maltreatment would have at least one re-report within a five-year period. Research indicates that the rates of child maltreatment or changes in indicators of child maltreatment have remained unchanged over time (Gilbert et al., 2012). Despite policies aimed at reducing or preventing maltreatment, the development of CPS systems across the United States, and a CPS workforce, the aggregate effects of the CPS system, services, and worker efforts are not well understood. Copyright © 2018 Elsevier Ltd. All rights reserved.
Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan; Cheng, Liang; Chuah, Mooi Choo
In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less
Maximally Permissive Composition of Actors in Ptolemy II
2013-03-20
into our physical world by means of sensors and actuators . This global network of Cyber-Physical Systems (i.e., integrations of computation with...physical processes [Lee, 2008]), is often referred to as the “Internet of Things” ( IoT ). This term was coined by Kevin Ashton [Ashton, 2009] in 1999 to...processing capabilities. A newly emerging outer- most peripheral layer of the Cloud that is key to the full realization of the IoT , is identified as “The
Roos, Leslie E; Kim, Hyoun K; Schnabler, Simone; Fisher, Philip A
2016-12-01
Prior research has identified the presence of executive function (EF) deficits in child protective service (CPS) involved (versus non-involved) children but minimal work has examined predictors that might explain individual differences within these CPS-involved children. Here, we sought to characterize EF in a large sample (N=694) of CPS-involved children and examine how specific adversities (physical abuse, neglect, caregiver domestic violence, and caregiver substance dependence) and cumulative adversity (at ages 0-3 and 3-6 years) predict EF (at approximately 5-6 years). It was expected that the sample would exhibit low EF overall based on previous research in maltreated children. Specific adversity and cumulative adversity analyses were largely exploratory given the limited previous work in this area. Results indicated poor EF overall, with 43.5% of children performing worse than chance. Amongst children who performed greater than chance, higher cumulative adversity, physical abuse, and caregiver substance use (at ages 3-6 years) predicted better EF. These findings join literature documenting that, within CPS-involved children, the presence of certain adversities predicts variable cognitive function. Findings highlight the potential relevance of evolutionary psychology to understanding how alterations in behavior linked to harsh and unpredictable early environments may cue accelerated brain development underlying relative cognitive advantages, within at-risk, low performing samples. Longitudinal studies are critical to determine if the relative EF advantages linked to higher adversity persist over time or result in lower EF later on, reflecting a more rapid, but overall limited, trajectory of cognitive development.
Bader, Shannon M; Scalora, Mario J; Casady, Thomas K; Black, Shannon
2008-01-01
The current study compared a sample of female perpetrators reported to Child Protective Services (CPS) to a sample of women from the criminal justice system. Instead of examining a clinical or criminal justice sample in isolation, this comparison allows a more accurate description of female sexual offending. Cases were drawn from a Midwestern state's child abuse registry, law enforcement records, and sex offender registry. The CPS sample consisted of 179 women, and the criminal justice system sample consisted of 57 women. All cases were reported to the agencies between 1994 and 2004. Victims ranged in age from 1 to 18 years old (M=9.98, SD=4.37). As hypothesized, there were statistically significant differences between the CPS and criminal justice samples. Specifically, the CPS sample had a majority of victims under age 12 (74.9%), while the criminal justice sample had a majority of victims between ages 13 and 19 (73.8%). The CPS sample had predominantly intrafamilial victims (97.8%), while the criminal justice sample had a majority of extrafamilial victims (63.3%). The CPS sample also showed significantly more female victims (63.7%), while the criminal justice sample had mostly male victims (62.1%). There were significant differences in the victim's age, the victim's gender and the perpetrator-victim relationship between cases managed in the CPS and the criminal justice system. The results highlight the need for further research into child welfare and law enforcement collaboration.
Cyberterrorism: is the U.S. healthcare system safe?
Harries, David; Yellowlees, Peter M
2013-01-01
The Internet has brought with it many benefits; key among them has been its ability to allow the expansion of communication and transfer of all kinds of information throughout the U.S. healthcare system. As a consequence, healthcare has become increasingly dependent on the activities carried out in that environment. It is this very dependence that increases the likelihood of individuals or organizations conducting activities through the Internet that will cause physical and/or psychological harm. These activities have become known by the term "cyberterrorism." In the healthcare landscape this can appear in a variety of forms, such as bringing down a hospital computer system or publicly revealing private medical records. Whatever shape it takes, the general effects are the same: patient care is compromised, and trust in the health system is diminished. Fortunately no significant cyber attack has been successfully launched against a U.S. healthcare organization to date. However, there is evidence to suggest that cyber threats are increasing and that much of the U.S. healthcare system is ill equipped to deal with them. Securing cyberspace is not an easy proposition as the threats are constantly changing, and recognizing that cyberterrorism should be part of a broader information technology risk management strategy, there are several"best practices" that can be adopted by healthcare organizations to protect themselves against cyber attacks.
Cyber Forensics Ontology for Cyber Criminal Investigation
NASA Astrophysics Data System (ADS)
Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul
We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.
Hatala, Rose; Issenberg, S Barry; Kassen, Barry; Cole, Gary; Bacchus, C Maria; Scalese, Ross J
2008-06-01
High-stakes assessments of doctors' physical examination skills often employ standardised patients (SPs) who lack physical abnormalities. Simulation technology provides additional opportunities to assess these skills by mimicking physical abnormalities. The current study examined the relationship between internists' cardiac physical examination competence as assessed with simulation technology compared with that assessed with real patients (RPs). The cardiac physical examination skills and bedside diagnostic accuracy of 28 internists were assessed during an objective structured clinical examination (OSCE). The OSCE included 3 modalities of cardiac patients: RPs with cardiac abnormalities; SPs combined with computer-based, audio-video simulations of auscultatory abnormalities, and a cardiac patient simulator (CPS) manikin. Four cardiac diagnoses and their associated cardiac findings were matched across modalities. At each station, 2 examiners independently rated a participant's physical examination technique and global clinical competence. Two investigators separately scored diagnostic accuracy. Inter-rater reliability between examiners for global ratings (GRs) ranged from 0.75-0.78 for the different modalities. Although there was no significant difference between participants' mean GRs for each modality, the correlations between participants' performances on each modality were low to modest: RP versus SP, r = 0.19; RP versus CPS, r = 0.22; SP versus CPS, r = 0.57 (P < 0.01). Methodological limitations included variability between modalities in the components contributing to examiners' GRs, a paucity of objective outcome measures and restricted case sampling. No modality provided a clear 'gold standard' for the assessment of cardiac physical examination competence. These limitations need to be addressed before determining the optimal patient modality for high-stakes assessment purposes.
Hu, Liyan; Diez-Fernandez, Carmen; Rüfenacht, Véronique; Hismi, Burcu Öztürk; Ünal, Özlem; Soyucen, Erdogan; Çoker, Mahmut; Bayraktar, Bilge Tanyeri; Gunduz, Mehmet; Kiykim, Ertugrul; Olgac, Asburce; Pérez-Tur, Jordi; Rubio, Vicente; Häberle, Johannes
2014-12-01
Carbamoyl phosphate synthetase 1 (CPS1) deficiency due to CPS1 mutations is a rare autosomal-recessive urea cycle disorder causing hyperammonemia that can lead to death or severe neurological impairment. CPS1 catalyzes carbamoyl phosphate formation from ammonia, bicarbonate and two molecules of ATP, and requires the allosteric activator N-acetyl-L-glutamate. Clinical mutations occur in the entire CPS1 coding region, but mainly in single families, with little recurrence. We characterized here the only currently known recurrent CPS1 mutation, p.Val1013del, found in eleven unrelated patients of Turkish descent using recombinant His-tagged wild type or mutant CPS1 expressed in baculovirus/insect cell system. The global CPS1 reaction and the ATPase and ATP synthesis partial reactions that reflect, respectively, the bicarbonate and the carbamate phosphorylation steps, were assayed. We found that CPS1 wild type and V1013del mutant showed comparable expression levels and purity but the mutant CPS1 exhibited no significant residual activities. In the CPS1 structural model, V1013 belongs to a highly hydrophobic β-strand at the middle of the central β-sheet of the A subdomain of the carbamate phosphorylation domain and is close to the predicted carbamate tunnel that links both phosphorylation sites. Haplotype studies suggested that p.Val1013del is a founder mutation. In conclusion, the mutation p.V1013del inactivates CPS1 but does not render the enzyme grossly unstable or insoluble. Recurrence of this particular mutation in Turkish patients is likely due to a founder effect, which is consistent with the frequent consanguinity observed in the affected population. Copyright © 2014 Elsevier Inc. All rights reserved.
An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample.
Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C; Stuart, Gregory L
2016-01-01
To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. College students in a dating relationship ( N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2-31%. Men and women did not differ in their victimization by cyber abuse. Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem.
Capsule Polysaccharide Mediates Bacterial Resistance to Antimicrobial Peptides
Campos, Miguel A.; Vargas, Miguel A.; Regueiro, Verónica; Llompart, Catalina M.; Albertí, Sebastián; Bengoechea, José A.
2004-01-01
The innate immune system plays a critical role in the defense of areas exposed to microorganisms. There is an increasing body of evidence indicating that antimicrobial peptides and proteins (APs) are one of the most important weapons of this system and that they make up the protective front for the respiratory tract. On the other hand, it is known that pathogenic organisms have developed countermeasures to resist these agents such as reducing the net negative charge of the bacterial membranes. Here we report the characterization of a novel mechanism of resistance to APs that is dependent on the bacterial capsule polysaccharide (CPS). Klebsiella pneumoniae CPS mutant was more sensitive than the wild type to human neutrophil defensin 1, β-defensin 1, lactoferrin, protamine sulfate, and polymyxin B. K. pneumoniae lipopolysaccharide O antigen did not play an important role in AP resistance, and CPS was the only factor conferring protection against polymyxin B in strains lacking O antigen. In addition, we found a significant correlation between the amount of CPS expressed by a given strain and the resistance to polymyxin B. We also showed that K. pneumoniae CPS mutant bound more polymyxin B than the wild-type strain with a concomitant increased in the self-promoted pathway. Taken together, our results suggest that CPS protects bacteria by limiting the interaction of APs with the surface. Finally, we report that K. pneumoniae increased the amount of CPS and upregulated cps transcription when grown in the presence of polymyxin B and lactoferrin. PMID:15557634
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.
2008-08-01
This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less
Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.
Modecki, Kathryn L; Minchin, Jeannie; Harbaugh, Allen G; Guerra, Nancy G; Runions, Kevin C
2014-11-01
Bullying involvement in any form can have lasting physical and emotional consequences for adolescents. For programs and policies to best safeguard youth, it is important to understand prevalence of bullying across cyber and traditional contexts. We conducted a thorough review of the literature and identified 80 studies that reported corresponding prevalence rates for cyber and traditional bullying and/or aggression in adolescents. Weighted mean effect sizes were calculated, and measurement features were entered as moderators to explain variation in prevalence rates and in traditional-cyber correlations within the sample of studies. Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber and traditional bullying were highly correlated. A number of measurement features moderated variability in bullying prevalence; whereas a focus on traditional relational aggression increased correlations between cyber and traditional aggressions. In our meta-analytic review, traditional bullying was twice as common as cyber bullying. Cyber and traditional bullying were also highly correlated, suggesting that polyaggression involvement should be a primary target for interventions and policy. Results of moderation analyses highlight the need for greater consensus in measurement approaches for both cyber and traditional bullying. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Code of Federal Regulations, 2014 CFR
2014-01-01
... defenses against physical and cyber incidents. In tandem with my Executive Order on cybersecurity, this... natural disasters, as well as cyber attacks. We must ensure that the Federal Government works with all...
Vieno, Alessio; Gini, Gianluca; Santinello, Massimo
2011-07-01
Using data from the 2006 Health Behavior in School-aged Children (HBSC) survey, the prevalence of 6 forms of bullying (physical, verbal, relational, sexual, cyber, and racist), and the role of smoking and drinking in bullying was examined among Italian adolescents for this study. The sample was composed of 2667 Italian middle and secondary school students (49.9% girls) randomly selected. The revised Olweus Bully/Victim Questionnaire was used to measure physical, verbal, relational, sexual, cyber, and racist forms of bullying. For each form, 3 categories were created and compared with students "not involved in bullying": bully, victim, and bully-victim. Logistic regressions were applied to test the connections among the 3 forms of involvement in different types of bullying and smoking and drinking. Prevalence of having been bullied or having bullied others at school at least once in the last 2 months was 11.6% for physical, 52% for verbal, 47.9% for relational, 18.5% for sexual, 19.4% for cyber, and 9.4% for racist bullying. Compared to girls, boys were more likely to be involved in physical bullying; moreover, boys were more involved as bullies in verbal, sexual, cyber, and racist bullying. In contrast, girls were more likely to be victims of verbal, relational, sexual, and cyber bullying than were boys. Logistic regressions showed the connection between the different forms of involvement in bullying and smoking and drinking. Our results indicate that all forms of bullying behavior are associated with legal substance use. Implication for prevention program was discussed. © 2011, American School Health Association.
NASA Astrophysics Data System (ADS)
Byrd, Gene G.; Coleman, Susanna; Werneth, Charles
Our University of Alabama introductory astronomy course has large enrollments, with the usual problems of low attendance and students putting off studying until just before major exams--with predictable consequences. We tried one strategy--cooperatively answering quiz questions--during our May 2002 interim term. Classes were long: three hours a day over three weeks. Before midclass break, we presented a multiple-choice open-book-and-notes quiz to be answered after the break. Quizzes could increase grades without excessively diluting the importance of closed-book major exams. The interim 2002 final exam average was 80%, much better than the 2001 class average of 57%. During a regular semester, handing out and taking up papers would take up much time during the more frequent classes. It's also more interesting if students vote for different answers together, then see the correct answer. We obtained funds for a Classroom Performance System (CPS) consisting of two computer receiver units, a hub, and 128 TV remote-style response pads. We used the CPS during interim 2003. Ease of giving quizzes and grading permitted two shorter quizzes a day. Improvement was maintained, with a slight 3% increase. In addition, students graded the "cooperative quiz" 2002 and 2003 courses higher than the 2001 course. We also used the CPS for public astronomy events and introductory physics courses.
Automated Derivation of Complex System Constraints from User Requirements
NASA Technical Reports Server (NTRS)
Foshee, Mark; Murey, Kim; Marsh, Angela
2010-01-01
The Payload Operations Integration Center (POIC) located at the Marshall Space Flight Center has the responsibility of integrating US payload science requirements for the International Space Station (ISS). All payload operations must request ISS system resources so that the resource usage will be included in the ISS on-board execution timelines. The scheduling of resources and building of the timeline is performed using the Consolidated Planning System (CPS). The ISS resources are quite complex due to the large number of components that must be accounted for. The planners at the POIC simplify the process for Payload Developers (PD) by providing the PDs with a application that has the basic functionality PDs need as well as list of simplified resources in the User Requirements Collection (URC) application. The planners maintained a mapping of the URC resources to the CPS resources. The process of manually converting PD's science requirements from a simplified representation to a more complex CPS representation is a time-consuming and tedious process. The goal is to provide a software solution to allow the planners to build a mapping of the complex CPS constraints to the basic URC constraints and automatically convert the PD's requirements into systems requirements during export to CPS.
Information System Incidents: The Development of a Damage Assessment Model
1999-12-01
Cyber criminals use creativity, knowledge, software, and hardware to attack and infiltrate information systems (IS) in order to copy, delete, or...the Internet led to an increase in cyber criminals and a variety or cyber crimes such as attacks, intrusions, introduction of viruses, and data theft...organizations on information systems is contributing to the increased number of cyber criminals . Additionally, the growing sophistication and availability of
Cyber Warfare: Protecting Military Systems
2000-01-01
Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.
Extending human proprioception to cyber-physical systems
NASA Astrophysics Data System (ADS)
Keller, Kevin; Robinson, Ethan; Dickstein, Leah; Hahn, Heidi A.; Cattaneo, Alessandro; Mascareñas, David
2016-04-01
Despite advances in computational cognition, there are many cyber-physical systems where human supervision and control is desirable. One pertinent example is the control of a robot arm, which can be found in both humanoid and commercial ground robots. Current control mechanisms require the user to look at several screens of varying perspective on the robot, then give commands through a joystick-like mechanism. This control paradigm fails to provide the human operator with an intuitive state feedback, resulting in awkward and slow behavior and underutilization of the robot's physical capabilities. To overcome this bottleneck, we introduce a new human-machine interface that extends the operator's proprioception by exploiting sensory substitution. Humans have a proprioceptive sense that provides us information on how our bodies are configured in space without having to directly observe our appendages. We constructed a wearable device with vibrating actuators on the forearm, where frequency of vibration corresponds to the spatial configuration of a robotic arm. The goal of this interface is to provide a means to communicate proprioceptive information to the teleoperator. Ultimately we will measure the change in performance (time taken to complete the task) achieved by the use of this interface.
2011-08-01
design space is large. His research contributions are to the field of Decision-based Design, specifically in linking consumer preferences and...Integrating Consumer Preferences into Engineering Design, to be published in 2012. He received his PhD from Northwestern University in Mechanical
IEC 61850: Technology Standards and Cyber-Security Threats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek A; El Hariri, mohamed; Bugay, Nicole
Substations constitute a fundamental part in providing reliable electricity to consumers. For a substation to maintain electricity reliability and its own real-time operability, communication between its components is inevitable. Before the emergence of IEC 61850, inter-substation communication was established via expensive copper wires with limited capabilities. IEC 61850 is the standard set by the International Electrotechnical Commission (IEC) Technical Committee Number 57 Working Group 10 and IEEE for Ethernet (IEEE 802.3)-based communication in electrical substations. Like many power grid systems standards, IEC 61850 was set without extensive consideration for critical security measures. This paper discusses IEC 61850 technology standards andmore » applications thoroughly and points out major security vulnerabilities it introduces in the context of current cyber-physical smart grid systems.« less
Jouriles, Ernest N; McDonald, Renee; Rosenfield, David; Norwood, William D; Spiller, Laura; Stephens, Nanette; Corbitt-Shindler, Deborah; Ehrensaft, Miriam
2010-06-01
Project Support is an intervention designed to decrease coercive patterns of aggressive discipline and increase positive parenting. This research evaluates Project Support in a sample of families reported to Children's Protective Services (CPS) for allegations of physical abuse or neglect; 35 families with a child between 3- and 8-years-old participated. In all families, CPS allowed the children to remain in the family home while the family received services. Families were randomly assigned to receive either Project Support or services as usual, which were provided by CPS or CPS-contracted service providers. To evaluate intervention effects, a multimethod, multi-informant assessment strategy was used that included data from mothers' reports, direct observation of parents' behavior, and review of CPS records for re-referrals for child maltreatment. Families who received Project Support services showed greater decreases than families who received services as usual in the following areas: mothers' perceived inability to manage childrearing responsibilities, mothers' reports of harsh parenting, and observations of ineffective parenting practices. Only 5.9% of families in the Project Support condition had a subsequent referral to CPS for child maltreatment, compared with 27.7% of families in the comparison condition. The results suggest that Project Support may be a promising intervention for reducing child maltreatment among families in which it has occurred. (c) 2010 APA, all rights reserved.
The effect of material hardship on child protective service involvement.
Yang, Mi-Youn
2015-03-01
This study employs four waves of survey data on 1,135 families from the Illinois Families Study, a longitudinal panel study of Temporary Assistance for Needy Families in Illinois. This study explores the following issues within this low-income population: (1) whether material hardships are associated with child protective services (CPS) investigations, (2) whether the effect of material hardship on CPS differs by the type of child maltreatment investigated, and (3) whether psychological distress mediates the association between material hardship and CPS involvement. Results from pooled and fixed effects logistic regressions suggest that caregivers who experience material hardship are more likely to become involved in CPS. In general, investigated neglect reports are responsive to particular types of hardship such as housing and food, while investigated physical abuse reports are responsive to levels of hardship regardless of specific types. The association between material hardship and CPS involvement is not fully explained by depressive symptoms or parenting stress. The study results suggest that in order to prevent child maltreatment, it may be necessary to address a family's unmet material needs through economic support interventions. Copyright © 2014 Elsevier Ltd. All rights reserved.
Sunday, Suzanne; Labruna, Victor; Kaplan, Sandra; Pelcovitz, David; Newman, Jennifer; Salzinger, Suzanne
2008-01-01
To examine the relationship between physical abuse of adolescents and parenting by mothers and fathers and whether the association differs by gender. Subjects were adolescents, 51 girls and 45 boys, documented by Child Protective Services (CPS) as physically abused during adolescence. Comparison subjects were non-abused adolescents, 47 girls and 48 boys, from the same suburban communities. Subjects completed the following: Family Adaptability and Cohesion Evaluation Scale, Parental Bonding Instrument, modified Conflict Tactics Scale (assessing physical abuse/punishment by each parent). Although CPS generally cited fathers as the abuse perpetrators, abused boys and girls often reported experiencing physical maltreatment from both parents. Not surprisingly, comparison subjects rated parents more positively than abused subjects. For both groups, mothers were perceived as more caring and less controlling, were reported to have closer relationships with their adolescents, and were less likely to use abuse/harsh punishment than were fathers. Differences between the adolescents' perceptions of mothers and fathers were more pronounced for abused than for comparison subjects. Boys' and girls' perceptions of parenting were generally similar except that girls, especially the abused girls, reported feeling less close to fathers. Abused girls also viewed mothers as less caring than the other groups viewed mothers. Abused girls were also less likely than abused boys to perceive that either parent, but particularly fathers, had provided them with an optimum style of parenting. Adolescents who experienced relatively mild physical abuse reported dysfunctional family relationships, which may place them at risk of poor adult outcomes. Adolescents' reports suggest that CPS reports may underestimate physical maltreatment by mothers.
Expanding Combat Power Through Military Cyberpower Theory
2015-04-02
systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to
The new car following model considering vehicle dynamics influence and numerical simulation
NASA Astrophysics Data System (ADS)
Sun, Dihua; Liu, Hui; Zhang, Geng; Zhao, Min
2015-12-01
In this paper, the car following model is investigated by considering the vehicle dynamics in a cyber physical view. In fact, that driving is a typical cyber physical process which couples the cyber aspect of the vehicles' information and driving decision tightly with the dynamics and physics of the vehicles and traffic environment. However, the influence from the physical (vehicle) view was been ignored in the previous car following models. In order to describe the car following behavior more reasonably in real traffic, a new car following model by considering vehicle dynamics (for short, D-CFM) is proposed. In this paper, we take the full velocity difference (FVD) car following model as a case. The stability condition is given on the base of the control theory. The analytical method and numerical simulation results show that the new models can describe the evolution of traffic congestion. The simulations also show vehicles with a more actual acceleration of starting process than early models.
Emerging interdisciplinary fields in the coming intelligence/convergence era
NASA Astrophysics Data System (ADS)
Noor, Ahmed K.
2012-09-01
Dramatic advances are in the horizon resulting from rapid pace of development of several technologies, including, computing, communication, mobile, robotic, and interactive technologies. These advances, along with the trend towards convergence of traditional engineering disciplines with physical, life and other science disciplines will result in the development of new interdisciplinary fields, as well as in new paradigms for engineering practice in the coming intelligence/convergence era (post-information age). The interdisciplinary fields include Cyber Engineering, Living Systems Engineering, Biomechatronics/Robotics Engineering, Knowledge Engineering, Emergent/Complexity Engineering, and Multiscale Systems engineering. The paper identifies some of the characteristics of the intelligence/convergence era, gives broad definition of convergence, describes some of the emerging interdisciplinary fields, and lists some of the academic and other organizations working in these disciplines. The need is described for establishing a Hierarchical Cyber-Physical Ecosystem for facilitating interdisciplinary collaborations, and accelerating development of skilled workforce in the new fields. The major components of the ecosystem are listed. The new interdisciplinary fields will yield critical advances in engineering practice, and help in addressing future challenges in broad array of sectors, from manufacturing to energy, transportation, climate, and healthcare. They will also enable building large future complex adaptive systems-of-systems, such as intelligent multimodal transportation systems, optimized multi-energy systems, intelligent disaster prevention systems, and smart cities.
Implementation experiences of NASTRAN on CDC CYBER 74 SCOPE 3.4 operating system
NASA Technical Reports Server (NTRS)
Go, J. C.; Hill, R. G.
1973-01-01
The implementation of the NASTRAN system on the CDC CYBER 74 SCOPE 3.4 Operating System is described. The flexibility of the NASTRAN system made it possible to accomplish the change with no major problems. Various sizes of benchmark and test problems, ranging from two hours to less than one minute CP time were run on the CDC CYBER SCOPE 3.3, Univac EXEC-8, and CDC CYBER SCOPE 3.4. The NASTRAN installation deck is provided.
Golsteijn, R H J; Bolman, C; Volders, E; Peels, D A; de Vries, H; Lechner, L
2017-06-26
Cancer and cancer treatment coincide with substantial negative physical, psychological and psychosocial problems. Physical activity (PA) can positively affect the negative effects of cancer and cancer treatment and thereby increase quality of life in CPS. Nevertheless, only a minority of CPS meet PA guidelines. We developed the OncoActive (OncoActief in Dutch) intervention: a computer-tailored PA program to stimulate PA in prostate and colorectal CPS, because to our knowledge there are only a few PA interventions for these specific cancer types in the Netherlands METHODS: The OncoActive intervention was developed through systematic adaptation of a proven effective, evidence-based, computer-tailored PA intervention for adults over fifty, called Active Plus. The Intervention Mapping (IM) protocol was used to guide the systematic adaptation. A literature study and interviews with prostate and colorectal CPS and health care professionals revealed that both general and cancer-specific PA determinants are important and should be addressed. Change objectives, theoretical methods and applications and the actual program content were adapted to address the specific needs, beliefs and cancer-related issues of prostate and colorectal CPS. Intervention participants received tailored PA advice three times, on internet and with printed materials, and a pedometer to set goals to improve PA. Pre- and pilot tests showed that the intervention was highly appreciated (target group) and regarded safe and feasible (healthcare professionals). The effectiveness of the intervention is being evaluated in a randomized controlled trial (RCT) (n = 428), consisting of an intervention group and a usual care waiting-list control group, with follow-up measurements at three, six and twelve months. Participants are recruited from seventeen hospitals and with posters, flyers and calls in several media. Using the Intervention Mapping protocol resulted in a systematically adapted, theory and evidence-based intervention providing tailored PA advice to prostate and colorectal CPS. If the intervention turns out to be effective in increasing PA, as evaluated in a RCT, possibilities for nationwide implementation and extension to other cancer types will be explored. The study is registered in the Dutch Trial Register (NTR4296) on November 23rd 2013 and can be accessed at http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=4296 .
Employing U.S. Information Operations Against Hybrid Warfare Threats
2013-03-01
Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations
Liu, Q-H; Fu, Z-G; Zhou, J-L; Lu, T; Liu, T; Shan, L; Liu, Y; Bai, L
2012-01-01
This prospective, randomized study compared the effectiveness of the cable pin system (CPS) versus tension band wiring (TBW) for olecranon fracture fixation. Patients with acute transverse or slight oblique olecranon fractures were randomly divided into two groups: one fixed by CPS and the other by TBW. Clinical outcome data were collected and analysed following a mean duration of 21 months. The mean ± SD fracture healing time was significantly shorter in the CPS group (n = 30; 9.73 ± 2.02 weeks) compared with the TBW group (n = 32; 11.13 ± 2.21 weeks). One patient in the CPS group and seven patients in the TBW group experienced postoperative complications; this difference was statistically significant. The mean ± SD Mayo Elbow Performance Score in the CPS group was significantly higher (88.67 ± 6.42) than that in the TBW group (80.78 ± 11.99). Logistic regression analysis showed an association between fixation method and fracture healing time, complications and elbow function. Internal fixation by CPS is an effective method for olecranon fracture and is associated with a shorter healing time, fewer complications and better function than TBW.
Patent medicine vendors, community pharmacists and STI management in Abuja, Nigeria.
Okonkwo, A D; Okonkwo, U P
2010-09-01
Increasingly, literature indicates that Patent Medicine Vendors (PMVs) and Community Pharmacists (CPs) provide sexual reproductive health services and products to their young patrons. This study explored the validity of literature claims, principally from CPs and PMVs perspective in Abuja, Nigeria. Participants were recruited with convenience sampling based on their willingness to participate in the study and our judgement of their professional competence. They were administered a semi-structured questionnaire, which was modelled after McCracken's long interview. We empirically assessed the validity of CPs and PMVs opinions with an exit interview of seven consenting patrons. Interviews were audio taped, transcribed verbatim and subjected to iterative thematic analysis. Participants' accounts and our observations indicate that PMVs and CPs serve young people's sexual reproductive healthcare needs in Abuja. CPs and PMVs provide young people with a seamless and non-judgemental access to contraceptives, sexual health advice and post-sexual risk exposure care. The study corroborates literature claims that CPs and PMVs provide sexual reproductive health advice, services and products to young people. However, participants contend that the current pharmacy practice laws in Nigeria constrain the scope and quality of services that young unmarried people require. Because it is unlikely that Nigeria will reinvigorate her primary healthcare system soon, we call for the formal co-option of CPs and PMVs into the sexual reproductive health management system to standardize and improve services.
Cyber Threat Assessment of Uplink and Commanding System for Mission Operation
NASA Technical Reports Server (NTRS)
Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant
2014-01-01
Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.
Child protection services and parents with intellectual and developmental disabilities.
LaLiberte, Traci; Piescher, Kristine; Mickelson, Nicole; Lee, Mi Hwa
2017-05-01
Information about parents with intellectual and developmental disabilities (IDD) in the child protection system (CPS) continues to evolve. This study examined characteristics, experiences and representation of parents with IDD across three CPS decision points, as compared to parents with other disabilities and parents without disabilities in the United States. The sample consisted of 303,039 individuals: 2,081 were individuals identified as parents in a CPS investigation; 1,101 had children in out-of-home care (OHC); and 308 experienced termination of parental rights (TPR). Descriptive statistics, chi-square analysis, disparity indices and logistic regression were employed. Parents with IDD were significantly more likely than parents without disabilities (but not significantly more likely than parents with other types of disabilities) to experience disproportionately representation. Parents with IDD are generally over-represented within CPS; however, this representation is dependent upon the comparison group utilized and other risk factors. CPS system-level changes are necessary. © 2016 John Wiley & Sons Ltd.
Modeling Cyber Physical War Gaming
2017-08-07
and benefits of the cyber war game vary depending on the goals of the organization. These goals may include identifying hidden vulnerabilities...example. This is a generalized case of our game -theoretic framework described in Section 2.1. Although the defender costs are not dependent on the...
An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample
Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C.; Stuart, Gregory L.
2015-01-01
Objective To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. Method College students in a dating relationship (N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Results Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2–31%. Men and women did not differ in their victimization by cyber abuse. Conclusions Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem. PMID:27014498
Wang, Yang; Wang, Enmin; Pan, Li; Dai, Jiazhong; Zhang, Nan; Wang, Xin; Liu, Xiaoxia; Mei, Guanghai; Sheng, Xiaofang
2014-09-01
Bevacizumab blocks the effects of vascular endothelial growth factor in leakage-prone capillaries and has been suggested as a new treatment for cerebral radiation edema and necrosis. CyberKnife is a new, frameless stereotactic radiosurgery system. This work investigated the safety and efficacy of CyberKnife followed by early bevacizumab treatment for brain metastasis with extensive cerebral edema. The eligibility criteria of the patients selected for radiosurgery followed by early use of adjuvant bevacizumab treatment were: (1) brain tumors from metastasis with one solitary brain lesion and symptomatic extensive cerebral edema; (2) >18 years of age; (3) the patient refused surgery due to the physical conditions and the risk of surgery; (4) no contraindications for bevacizumab. (5) bevacizumab was applied for a minimum of 2 injections and a maximum of 6 injections with a 2-week interval between treatments, beginning within 2 weeks of the CyberKnife therapy; (6) Karnofsky performance status (KPS) ≥30. Tumor size and edema were monitored by magnetic resonance imaging (MRI). Dexamethasone dosage, KPS, adverse event occurrence and associated clinical outcomes were also recorded. Eight patients were accrued for this new treatment. Radiation dose ranged from 20 to 33 Gy in one to five sessions, prescribed to the 61-71 % isodose line. Bevacizumab therapy was administered 3-10 days after completion of CyberKnife treatment for a minimum of two cycles (5 mg/kg, at 2-week intervals). MRI revealed average reductions of 55.8 % (post-gadolinium) and 63.4 % (T2/FLAIR). Seven patients showed significant clinical neurological improvements. Dexamethasone was reduced in all patients, with five successfully discontinuing dexamethasone treatment 4 weeks after bevacizumab initiation. Hypertension, a bevacizumab-related adverse event, occurred in one patient. After 3-8 months, all patients studied were alive and primary brain metastases were under control, 2 developed new brain metastases and underwent salvage CyberKnife treatment. Recurrent edema and emerging radiation necrosis were not observed. CyberKnife radiosurgery followed by early use of bevacizumab is promising and appears safe for treatment of brain metastases with extensive cerebral edema.
Allen, Jonathan P; Neely, Melody N
2011-11-01
The ability of a pathogen to metabolically adapt to the local environment for optimal expression of virulence determinants is a continued area of research. Orthologs of the Streptococcus iniae LysR family regulator CpsY have been shown to regulate methionine biosynthesis and uptake pathways but appear to influence expression of several virulence genes as well. An S. iniae mutant with an in-frame deletion of cpsY (ΔcpsY mutant) is highly attenuated in a zebrafish infection model. The ΔcpsY mutant displays a methionine-independent growth defect in serum, which differs from the methionine-dependent defect observed for orthologous mutants of Streptococcus mutans and Streptococcus agalactiae. On the contrary, the ΔcpsY mutant can grow in excess of the wild type (WT) when supplemented with proteose peptone, suggesting an inability to properly regulate growth. CpsY is critical for protection of S. iniae from clearance by neutrophils in whole blood but is dispensable for intracellular survival in macrophages. Susceptibility of the ΔcpsY mutant to killing in whole blood is not due to a growth defect, because inhibition of neutrophil phagocytosis rescues the mutant to WT levels. Thus, CpsY appears to have a pleiotropic regulatory role for S. iniae, integrating metabolism and virulence. Furthermore, S. iniae provides a unique model to investigate the paradigm of CpsY-dependent regulation during systemic streptococcal infection.
Allen, Jonathan P.; Neely, Melody N.
2011-01-01
The ability of a pathogen to metabolically adapt to the local environment for optimal expression of virulence determinants is a continued area of research. Orthologs of the Streptococcus iniae LysR family regulator CpsY have been shown to regulate methionine biosynthesis and uptake pathways but appear to influence expression of several virulence genes as well. An S. iniae mutant with an in-frame deletion of cpsY (ΔcpsY mutant) is highly attenuated in a zebrafish infection model. The ΔcpsY mutant displays a methionine-independent growth defect in serum, which differs from the methionine-dependent defect observed for orthologous mutants of Streptococcus mutans and Streptococcus agalactiae. On the contrary, the ΔcpsY mutant can grow in excess of the wild type (WT) when supplemented with proteose peptone, suggesting an inability to properly regulate growth. CpsY is critical for protection of S. iniae from clearance by neutrophils in whole blood but is dispensable for intracellular survival in macrophages. Susceptibility of the ΔcpsY mutant to killing in whole blood is not due to a growth defect, because inhibition of neutrophil phagocytosis rescues the mutant to WT levels. Thus, CpsY appears to have a pleiotropic regulatory role for S. iniae, integrating metabolism and virulence. Furthermore, S. iniae provides a unique model to investigate the paradigm of CpsY-dependent regulation during systemic streptococcal infection. PMID:21911465
Bayne, Jay S
2008-06-01
In support of a generalization of systems theory, this paper introduces a new approach in modeling complex distributed systems. It offers an analytic framework for describing the behavior of interactive cyberphysical systems (CPSs), which are networked stationary or mobile information systems responsible for the real-time governance of physical processes whose behaviors unfold in cyberspace. The framework is predicated on a cyberspace-time reference model comprising three spatial dimensions plus time. The spatial domains include geospatial, infospatial, and sociospatial references, the latter describing relationships among sovereign enterprises (rational agents) that choose voluntarily to organize and interoperate for individual and mutual benefit through geospatial (physical) and infospatial (logical) transactions. Of particular relevance to CPSs are notions of timeliness and value, particularly as they relate to the real-time governance of physical processes and engagements with other cooperating CPS. Our overarching interest, as with celestial mechanics, is in the formation and evolution of clusters of cyberspatial objects and the federated systems they form.
2010-04-01
for decoupled parallel development Ref: Barry Boehm 12 Impacts of Technological Changes in the Cyber Environment on Software/Systems Engineering... Pressman , R.S., Software Engineering: A Practitioner’s Approach, 13 Impacts of Technological Changes in the Cyber Environment on Software/Systems
77 FR 29616 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
.... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...
Toward a theoretical framework for trustworthy cyber sensing
NASA Astrophysics Data System (ADS)
Xu, Shouhuai
2010-04-01
Cyberspace is an indispensable part of the economy and society, but has been "polluted" with many compromised computers that can be abused to launch further attacks against the others. Since it is likely that there always are compromised computers, it is important to be aware of the (dynamic) cyber security-related situation, which is however challenging because cyberspace is an extremely large-scale complex system. Our project aims to investigate a theoretical framework for trustworthy cyber sensing. With the perspective of treating cyberspace as a large-scale complex system, the core question we aim to address is: What would be a competent theoretical (mathematical and algorithmic) framework for designing, analyzing, deploying, managing, and adapting cyber sensor systems so as to provide trustworthy information or input to the higher layer of cyber situation-awareness management, even in the presence of sophisticated malicious attacks against the cyber sensor systems?
Minimum State Awareness for Resilient Control Systems Under Cyber-Attack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kisner, Roger; Fugate, David L; McIntyre, Timothy J
2012-01-01
State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assumemore » state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.« less
NASA Technical Reports Server (NTRS)
Hanna, Stephen G.; Jones, David L.; Creech, Stephen D.; Lawrence, Thomas D.
2012-01-01
In support of the National Aeronautics and Space Administration's (NASA) Human Exploration and Operations Mission Directorate (HEOMD), the Space Launch System (SLS) is being designed for safe, affordable, and sustainable human and scientific exploration missions beyond Earth's or-bit (BEO). The SLS Team is tasked with developing a system capable of safely and repeatedly lofting a new fleet of spaceflight vehicles beyond Earth orbit. The Cryogenic Propulsion Stage (CPS) is a key enabler for evolving the SLS capability for BEO missions. This paper reports on the methodology and initial recommendations relative to the CPS, giving a brief retrospective of early studies on this promising propulsion hardware. This paper provides an overview of the requirements development and CPS configuration in support of NASA's multiple Design Reference Missions (DRMs).
Predictors of Workplace Bullying and Cyber-Bullying in New Zealand
Gardner, Dianne; O’Driscoll, Michael; Cooper-Thomas, Helena D.; Roche, Maree; Bentley, Tim; Catley, Bevan; Teo, Stephen T. T.; Trenberth, Linda
2016-01-01
Background: The negative effects of in-person workplace bullying (WB) are well established. Less is known about cyber-bullying (CB), in which negative behaviours are mediated by technology. Drawing on the conservation of resources theory, the current research examined how individual and organisational factors were related to WB and CB at two time points three months apart. Methods: Data were collected by means of an online self-report survey. Eight hundred and twenty-six respondents (58% female, 42% male) provided data at both time points. Results: One hundred and twenty-three (15%) of participants had been bullied and 23 (2.8%) of participants had been cyber-bullied within the last six months. Women reported more WB, but not more CB, than men. Worse physical health, higher strain, more destructive leadership, more team conflict and less effective organisational strategies were associated with more WB. Managerial employees experienced more CB than non-managerial employees. Poor physical health, less organisational support and less effective organisational strategies were associated with more CB. Conclusion: Rates of CB were lower than those of WB, and very few participants reported experiencing CB without also experiencing WB. Both forms of bullying were associated with poorer work environments, indicating that, where bullying is occurring, the focus should be on organisational systems and processes. PMID:27128929
Predictors of Workplace Bullying and Cyber-Bullying in New Zealand.
Gardner, Dianne; O'Driscoll, Michael; Cooper-Thomas, Helena D; Roche, Maree; Bentley, Tim; Catley, Bevan; Teo, Stephen T T; Trenberth, Linda
2016-04-27
The negative effects of in-person workplace bullying (WB) are well established. Less is known about cyber-bullying (CB), in which negative behaviours are mediated by technology. Drawing on the conservation of resources theory, the current research examined how individual and organisational factors were related to WB and CB at two time points three months apart. Data were collected by means of an online self-report survey. Eight hundred and twenty-six respondents (58% female, 42% male) provided data at both time points. One hundred and twenty-three (15%) of participants had been bullied and 23 (2.8%) of participants had been cyber-bullied within the last six months. Women reported more WB, but not more CB, than men. Worse physical health, higher strain, more destructive leadership, more team conflict and less effective organisational strategies were associated with more WB. Managerial employees experienced more CB than non-managerial employees. Poor physical health, less organisational support and less effective organisational strategies were associated with more CB. Rates of CB were lower than those of WB, and very few participants reported experiencing CB without also experiencing WB. Both forms of bullying were associated with poorer work environments, indicating that, where bullying is occurring, the focus should be on organisational systems and processes.
ERIC Educational Resources Information Center
Jankov, Pavlyn; Caref, Carol
2017-01-01
During the period of 1981 to 2015, the total population of Black students in CPS plummeted from close to 240,000, 60% of all CPS students, to 156,000 or 39% of CPS. This paper documents how despite their decreasing numbers and percentage in the system, the vast majority of Black students remained isolated in predominantly low-income Black schools…
Stuxnet, Schmitt Analysis, and the Cyber Use-of-Force Debate
2012-01-01
demonstration during exercise Bold Alligator 2012 U . S . N av y (J os hu a J. W ah l) 46 JFQ / issue 67, 4 th quarter 2012 ndupress .ndu.edu...language; and Article 51’ s “armed attack ” threshold for self-defense actions. 18 Schmitt, “Computer Network Attack and the Use of Force,” 920. 19...sponsored cyber coercion. More importantly, the prospect of cyber attacks causing physical damage was largely theoretical.4 Beginning Stuxnet, Schmitt
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.
A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.
Interval forecasting of cyber-attacks on industrial control systems
NASA Astrophysics Data System (ADS)
Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.
2018-03-01
At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.
Disruptive Ideas for Power Grid Security and Resilience With DER
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Erfan
This presentation by Erfan Ibrahim was prepared for NREL's 2017 Cybersecurity and Reslience Workshop on distributed energy resource (DER) best practices. The presentation provides an overview of NREL's Cyber-Physical Systems Security and Resilience R&D Center, the Center's approach to cybersecurity, and disruptive ideas for power grid security and resilience with DER.
Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid
2017-01-13
Tracking people's behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people's access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people's access behaviors can be correctly tracked within a one-second delay.
Wu, Zhenyu; Guo, Yang; Lin, Wenfang; Yu, Shuyang; Ji, Yang
2018-04-05
Predictive maintenance plays an important role in modern Cyber-Physical Systems (CPSs) and data-driven methods have been a worthwhile direction for Prognostics Health Management (PHM). However, two main challenges have significant influences on the traditional fault diagnostic models: one is that extracting hand-crafted features from multi-dimensional sensors with internal dependencies depends too much on expertise knowledge; the other is that imbalance pervasively exists among faulty and normal samples. As deep learning models have proved to be good methods for automatic feature extraction, the objective of this paper is to study an optimized deep learning model for imbalanced fault diagnosis for CPSs. Thus, this paper proposes a weighted Long Recurrent Convolutional LSTM model with sampling policy (wLRCL-D) to deal with these challenges. The model consists of 2-layer CNNs, 2-layer inner LSTMs and 2-Layer outer LSTMs, with under-sampling policy and weighted cost-sensitive loss function. Experiments are conducted on PHM 2015 challenge datasets, and the results show that wLRCL-D outperforms other baseline methods.
Jia, Yunjian; Zhou, Zhenyu; Chen, Fei; Duan, Peng; Guo, Zhen; Mumtaz, Shahid
2017-01-01
Tracking people’s behaviors is a main category of cyber physical social sensing (CPSS)-related people-centric applications. Most tracking methods utilize camera networks or sensors built into mobile devices such as global positioning system (GPS) and Bluetooth. In this article, we propose a non-intrusive wireless fidelity (Wi-Fi)-based tracking method. To show the feasibility, we target tracking people’s access behaviors in Wi-Fi networks, which has drawn a lot of interest from the academy and industry recently. Existing methods used for acquiring access traces either provide very limited visibility into media access control (MAC)-level transmission dynamics or sometimes are inflexible and costly. In this article, we present a passive CPSS system operating in a non-intrusive, flexible, and simplified manner to overcome above limitations. We have implemented the prototype on the off-the-shelf personal computer, and performed real-world deployment experiments. The experimental results show that the method is feasible, and people’s access behaviors can be correctly tracked within a one-second delay. PMID:28098772
Guo, Yang; Lin, Wenfang; Yu, Shuyang; Ji, Yang
2018-01-01
Predictive maintenance plays an important role in modern Cyber-Physical Systems (CPSs) and data-driven methods have been a worthwhile direction for Prognostics Health Management (PHM). However, two main challenges have significant influences on the traditional fault diagnostic models: one is that extracting hand-crafted features from multi-dimensional sensors with internal dependencies depends too much on expertise knowledge; the other is that imbalance pervasively exists among faulty and normal samples. As deep learning models have proved to be good methods for automatic feature extraction, the objective of this paper is to study an optimized deep learning model for imbalanced fault diagnosis for CPSs. Thus, this paper proposes a weighted Long Recurrent Convolutional LSTM model with sampling policy (wLRCL-D) to deal with these challenges. The model consists of 2-layer CNNs, 2-layer inner LSTMs and 2-Layer outer LSTMs, with under-sampling policy and weighted cost-sensitive loss function. Experiments are conducted on PHM 2015 challenge datasets, and the results show that wLRCL-D outperforms other baseline methods. PMID:29621131
Vidal, Sarah; Prince, Dana; Connell, Christian M.; Caron, Colleen M.; Kaufman, Joy S.; Tebes, Jacob K.
2017-01-01
This study prospectively examines the transition from the child welfare system into the juvenile justice system among 10,850 maltreated children and adolescents and explores how patterns of risks, including severity and chronicity of maltreatment, adverse family environment, and social risk factors, affect service systems transition. Almost three percent of maltreated children and adolescents had their first juvenile justice adjudication within an average of approximately six years of their initial child protective services investigation (CPS). Social risk factors, including a child’s age at index CPS investigation (older), gender (boys), and race/ethnicity (Black and Hispanic vs. White) significantly predicted the risk of transition into the juvenile justice system. Recurrence of maltreatment and experiencing at least one incident of neglect over the course of the study period also increased the risk of transition into the juvenile justice system. However, subtypes of maltreatment, including physical, sexual, and other types of abuse did not significantly predict the risk of juvenile justice system transition. Finally, family environment characterized by poverty also significantly increased the risk of juvenile justice system transition. These findings have important implications for developing and tailoring services for maltreated children, particularly those at-risk for transitioning into the juvenile justice system. PMID:27886518
Vidal, Sarah; Prince, Dana; Connell, Christian M; Caron, Colleen M; Kaufman, Joy S; Tebes, Jacob K
2017-01-01
This study prospectively examines the transition from the child welfare system into the juvenile justice system among 10,850 maltreated children and adolescents and explores how patterns of risks, including severity and chronicity of maltreatment, adverse family environment, and social risk factors, affect service systems transition. Almost three percent of maltreated children and adolescents had their first juvenile justice adjudication within an average of approximately six years of their initial child protective services investigation (CPS). Social risk factors, including a child's age at index CPS investigation (older), gender (boys), and race/ethnicity (Black and Hispanic) significantly predicted the risk of transition into the juvenile justice system. Recurrence of maltreatment and experiencing at least one incident of neglect over the course of the study period also increased the risk of transition into the juvenile justice system. However, subtypes of maltreatment, including physical, sexual, and other types of abuse did not significantly predict the risk of juvenile justice system transition. Finally, family environment characterized by poverty also significantly increased the risk of juvenile justice system transition. These findings have important implications for developing and tailoring services for maltreated children, particularly those at-risk for transitioning into the juvenile justice system. Copyright © 2016 Elsevier Ltd. All rights reserved.
Defense strategies for cloud computing multi-site server infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S.; Ma, Chris Y. T.; He, Fei
We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, andmore » also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.« less
Ma, Julie; Grogan-Kaylor, Andrew; Klein, Sacha
2018-06-01
Children exposed to negative neighborhood conditions and parental spanking are at higher risk of experiencing maltreatment. We conducted prospective analyses of secondary data to determine the effects of neighborhood collective efficacy and parental spanking on household Child Protective Services (CPS) involvement, and whether spanking mediates the relationship between neighborhood collective efficacy and CPS involvement. The sample (N = 2,267) was drawn from the Fragile Families and Child Wellbeing Study (FFCWS), a stratified random sample of 4,789 births between 1998-2000 in 20 large U.S. cities. Logistic regression models were employed to test the effects of neighborhood collective efficacy and spanking at child age 3 on mother's report of CPS contact during the subsequent two years. The product-of-coefficient approach was used to test the mediation hypothesis. One aspect of neighborhood collective efficacy (i.e., Social Cohesion/Trust) is associated with lower odds of CPS involvement (OR = .80, 95% CI 0.670-0.951) after controlling for Informal Social Control, parental spanking, and the covariates. Parental spanking predicts increased odds of CPS involvement during the next two years (OR = 1.38, 95% CI 1.001-1.898), net of neighborhood collective efficacy and the covariates. The mediation hypothesis is not supported. Promoting both cohesive and trusting relationships between neighbors and non-physical discipline practices is likely to reduce the incidence of household CPS involvement. Copyright © 2018 Elsevier Ltd. All rights reserved.
Afifi, Tracie O; McTavish, Jill; Turner, Sarah; MacMillan, Harriet L; Wathen, C Nadine
2018-05-01
Despite being a primary response to child abuse, it is currently unknown whether contact with child protection services (CPS) does more good than harm. The aim of the current study was to examine whether contact with CPS is associated with improved mental health outcomes among adult respondents who reported experiencing child abuse, after adjusting for sociodemographic factors and abuse severity. The data were drawn from the 2012 Canadian Community Health Survey-Mental Health (CCHS-2012), which used a multistage stratified cluster design (household-level response rate = 79.8%). Included in this study were individuals aged 18 years and older living in the 10 Canadian provinces (N = 23,395). Child abuse included physical abuse, sexual abuse, and exposure to intimate partner violence (IPV). Mental health outcomes included lifetime mental disorders, lifetime and past year suicidal ideation, plans, and attempts, and current psychological well-being and functioning and distress. All models were adjusted for sociodemographic factors and severity of child abuse. For the majority of outcomes, there were no statistically significant differences between adults with a child abuse history who had CPS contact compared to those without CPS contact. However, those with CPS contact were more likely to report lifetime suicide attempts. These findings suggest that CPS contact is not associated with improved mental health outcomes. Implications are discussed. Copyright © 2018 The Author(s). Published by Elsevier Ltd.. All rights reserved.
Cyber dating abuse: prevalence, context, and relationship with offline dating aggression.
Borrajo, E; Gámez-Guadix, M; Calvete, E
2015-04-01
The use of information and communication technologies (ICT) as tools to intimidate, harass, and control the partner has been, so far, little studied in the literature. The aim of this study was to determine the extension and sex differences of victimization of cyber dating abuse, as well as the context in which it occurs, and its relationship with offline psychological and physical aggressions. The sample consisted of 433 college students ages 18 to 30 years. The results showed that over 50% of the participants had been victims of some type of cyber dating abuse in the last six months. The most common behavior was the use of ICT to control the partner. Also, victims of cyber dating abuse were victimized repeatedly, an average of 23 times in the last six months. The data also showed that cyber dating abuse appear usually in a context of jealousy. Finally, the results revealed a significant relationship between cyber dating abuse and offline psychological dating aggressions. Limitations and future lines of research are discussed.
Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.
Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less
Space and Cyber: Shared Challenges, Shared Opportunities
2011-11-15
adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue
75 FR 35508 - Draft Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...
Tian, Qing-xian; Hai, Yong; Du, Xin-ru; Xu, Zi-yu; Lu, Tie; Shan, Lei; Liu, Yang; Zhou, Jun-lin
2015-12-01
To compare the outcome of tension-band wiring (TBW) with the cable pin system (CPS) for transverse fractures of the patella. Randomized prospective study. Academic Level I trauma center. From February 2008 to December 2011, 73 consecutive patients with transverse fractures of the patella were prospectively enrolled in this study. The patients were randomly divided into 2 groups: one group was treated using the CPS, and the other group was treated using the modified TBW. The clinical outcome assessment included analyses of the radiographic images, the modified Hospital for Special Surgery scoring system, and complications. The follow-up time ranged from 12 to 29 months. All fractures healed, with a union rate of 100%. The fracture healing time was significantly shorter in the CPS group (8.51 ± 2.59 weeks, n = 34) compared with the TBW group (11.79 ± 3.04 weeks, n = 39). Postoperative complications in the CPS and TBW groups were observed in 1 and 9 patients, respectively, a difference that was statistically significant. The mean Hospital for Special Surgery score for the CPS group (90.53 ± 5.19 points) was significantly higher than that for the TBW group (81.36 ± 12.71 points). The CPS is a viable option for transverse fractures of the patella and is associated with a shorter healing time, fewer complications, and better function than TBW. Therapeutic Level I. See Instructions for Authors for a complete description of levels of evidence.
Programmable Logic Controller Modification Attacks for use in Detection Analysis
2014-03-27
and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the
Defense Strategies for Asymmetric Networked Systems with Discrete Components.
Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun
2018-05-03
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.
Defense Strategies for Asymmetric Networked Systems with Discrete Components
Rao, Nageswara S. V.; Ma, Chris Y. T.; Hausken, Kjell; He, Fei; Yau, David K. Y.
2018-01-01
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. PMID:29751588
Telemetry Tracking and Control Through Commercial LEO Satellites
NASA Technical Reports Server (NTRS)
Streich, Ronald C.; Morgan, Dwayne R.; Bull, Barton B.; Grant, Charles E.; Powers, Edward I. (Technical Monitor)
2001-01-01
Personnel from the Goddard Space Flight Center Wallops Flight Facility (GSFC/WFF in Virginia have successfully tested commercial LEO communications satellites for sounding rocket, balloon and aircraft flight TT&C. The Flight Modern became a GSFC/WFF Advanced Range Technology Initiative (ARTI) in an effort to streamline TT&C capability to the user community at low cost. Ground tests of the Flight Modem verified duplex communications quality of service and measured transmission latencies. These tests were completed last year and results reported in the John Hopkins University (JHU) Applied Physics Laboratory (APL) 4th International Symposium on Reducing Spacecraft Costs for Ground Systems and Operations. The second phase of the Flight Modem baseline test program was a demonstration of the ruggedized version of the WFF Flight Modem flown on a sounding rocket launched it the Swedish rocket range (Esrangc) near Kiruna, Sweden, with results contained in this paper. Aircraft flight tests have been and continue to be conducted. Flights of opportunity are being actively pursued with other centers, ranges and users at universities. The WFF Flight Modem contains a CPS receiver to provide vehicle position for tracking and vehicle recovery. The system architecture, which integrates antennas, CPS receiver, commercial satellite packet data modem and a single board computer with custom software, is described. Small satellite use of the WFF Flight Modem is also being investigated, The Flight Modem provides an independent vehicle position source for Range Safety applications. The LEO communication system contains a coarse position location system, which is compared to GPS ace acy. This comparison allows users, to determine the need for a CPS receiver in addition to the satellite packet data modem for their application.
Establishing a Cyber Warrior Force
2004-09-01
Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically
The Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce
2016-06-01
Breakdown of the 17D community as of 31 March 2014. (Reproduced from 17D Officer Assignment Team, Cyberspace Operations “Spread the Word” briefing, 9– 11 ...surety 3D0X4 Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport 3D1X3 Radio frequency transport 3D1X4 Spectrum operations 3D1X5 Radar...Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport systems 3D1X3 Radio frequency transmissionsystems FORCE DEVELOPMENT │ 123 Table 8
Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations
NASA Technical Reports Server (NTRS)
Melson, N. D.; Keller, J. D.
1983-01-01
Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.
Autonomous execution of the Precision Immobilization Technique
NASA Astrophysics Data System (ADS)
Mascareñas, David D. L.; Stull, Christopher J.; Farrar, Charles R.
2017-03-01
Over the course of the last decade great advances have been made in autonomously driving cars. The technology has advanced to the point that driverless car technology is currently being tested on publicly accessed roadways. The introduction of these technologies onto publicly accessed roadways not only raises questions of safety, but also security. Autonomously driving cars are inherently cyber-physical systems and as such will have novel security vulnerabilities that couple both the cyber aspects of the vehicle including the on-board computing and any network data it makes use of, with the physical nature of the vehicle including its sensors, actuators, and the vehicle chassis. Widespread implementation of driverless car technology will require that both the cyber, as well as physical security concerns surrounding these vehicles are addressed. In this work, we specifically developed a control policy to autonomously execute the Precision Immobilization Technique, a.k.a. the PIT maneuver. The PIT maneuver was originally developed by law enforcement to end high-speed vehicular pursuits in a quasi-safe manner. However, there is still a risk of damage/roll-over to both the vehicle executing the PIT maneuver as well as to the vehicle subject to the PIT maneuver. In law enforcement applications, it would be preferable to execute the PIT maneuver using an autonomous vehicle, thus removing the danger to law-enforcement officers. Furthermore, it is entirely possible that unscrupulous individuals could inject code into an autonomously-driving car to use the PIT maneuver to immobilize other vehicles while maintaining anonymity. For these reasons it is useful to know how the PIT maneuver can be implemented on an autonomous car. In this work a simple control policy based on velocity pursuit was developed to autonomously execute the PIT maneuver using only a vision and range measurements that are both commonly collected by contemporary driverless cars. The ability of this control policy to execute the PIT maneuver was demonstrated both in simulation and experimentally. The results of this work can help inform the design of autonomous car with regards to ensuring their cyber-physical security.
2014-01-01
Background Obese youth are at increased risk for peer victimization, which may heighten their risk of psychosocial problems and physical activity avoidance, and lower the effectiveness of professional and lifestyle weight-loss initiatives. Little is known about obese adolescents’ risk for victimization from cyber-bullying and how this relates to psychosocial functioning and healthy lifestyle barriers. The purpose of the study was to assess traditional and cyber-victimization among adolescents with severe obesity and its relation to psychosocial distress and barriers to healthy lifestyles. Methods A sample of 102 obese adolescents (mean age = 15.32 ±1.71) in residential treatment was matched with 102 normal-weight youngsters from the Health Behavior in School-aged Children (HBSC) study (mean age = 15.30 ±1.73). Results Adolescents with obesity were significantly more often cyber-victimized than normal-weight peers. Obese youth victimized by traditional bullying experienced lower quality of life, lower motivation for physical activity and higher avoidance and emotional coping towards healthy lifestyles than those non-victimized. Obese cyber-victims experienced significantly higher suicidal ideation. Conclusions Traditional and cyber-victimization may hinder treatment effectiveness and healthy lifestyle change in adolescents with obesity. Health professionals should pro-actively address peer victimization and psychosocial functioning during multidisciplinary obesity treatment. Schools could contribute to a better physical and psychosocial health of obese youth by implementing multi-behavioral health-promotion programs. PMID:24593118
Van Ouytsel, Joris; Torres, Elizabeth; Choi, Hye Jeong; Ponnet, Koen; Walrave, Michel; Temple, Jeff R
2017-04-01
Dating violence is an important public health concern and is considered to be a form of school violence. While digital technologies have enabled perpetrators of dating violence to target their victims online (cyber dating abuse), little is known about how this form of perpetration relates to specific adolescent risk behaviors. This brief research report focuses on the associations between substance use, sexual behaviors, deviant behaviors, self-reported health, and cyber dating abuse perpetration. Participants included 705 ethnically diverse adolescents ( n = 408; 57.9% female) in Southeast Texas. Having had sexual intercourse or using alcohol or drugs before having sex was significantly linked with cyber dating abuse perpetration, as was poor physical health, and substance use. Consistent with limited research, we found a link between cyber dating abuse and engagement in bullying behaviors. The discussion section includes suggestions for school nurse practice and further research.
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
Recommended Practice: Creating Cyber Forensics Plans for Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eric Cornelius; Mark Fabro
Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are notmore » comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.« less
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2014 CFR
2014-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2013 CFR
2013-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2012 CFR
2012-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
ERIC Educational Resources Information Center
Lee, June; Yoon, Seo Young; Lee, Chung Hyun
2013-01-01
The purposes of the study are to investigate CHLS (Cyber Home Learning System) in online video conferencing environment in primary school level and to explore the students' responses on CHLS-VC (Cyber Home Learning System through Video Conferencing) in order to explore the possibility of using CHLS-VC as a supportive online learning system. The…
77 FR 33206 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-05
... Reliability Standard CIP- 006--Cyber Security--Physical Security of Critical Cyber Assets. Filed Date: 5/23/12... Company, LLC. Description: Certificate of Concurrence to be effective 7/12/2012. Filed Date: 5/24/12.... Comments Due: 5 p.m. ET 6/14/12. Docket Numbers: ER12-1845-000. Applicants: AEP Texas North Company...
A Study on Run Time Assurance for Complex Cyber Physical Systems
2013-04-18
safety verification approach was applied to synchronization of distributed local clocks of the nodes on a CAN bus by Jiang et al. [36]. The class of...mode of interaction between the instrumented system and the checker, we distin- guish between synchronous and asynchronous monitoring. In synchronous ...occurred. Synchronous monitoring may deliver a higher degree of assurance than the asynchronous one, because it can block a dangerous action. However
Liu, Yanchi; Wang, Xue; Liu, Youda; Cui, Sujin
2016-06-27
Power quality analysis issues, especially the measurement of harmonic and interharmonic in cyber-physical energy systems, are addressed in this paper. As new situations are introduced to the power system, the impact of electric vehicles, distributed generation and renewable energy has introduced extra demands to distributed sensors, waveform-level information and power quality data analytics. Harmonics and interharmonics, as the most significant disturbances, require carefully designed detection methods for an accurate measurement of electric loads whose information is crucial to subsequent analyzing and control. This paper gives a detailed description of the power quality analysis framework in networked environment and presents a fast and resolution-enhanced method for harmonic and interharmonic measurement. The proposed method first extracts harmonic and interharmonic components efficiently using the single-channel version of Robust Independent Component Analysis (RobustICA), then estimates the high-resolution frequency from three discrete Fourier transform (DFT) samples with little additional computation, and finally computes the amplitudes and phases with the adaptive linear neuron network. The experiments show that the proposed method is time-efficient and leads to a better accuracy of the simulated and experimental signals in the presence of noise and fundamental frequency deviation, thus providing a deeper insight into the (inter)harmonic sources or even the whole system.
Liu, Yanchi; Wang, Xue; Liu, Youda; Cui, Sujin
2016-01-01
Power quality analysis issues, especially the measurement of harmonic and interharmonic in cyber-physical energy systems, are addressed in this paper. As new situations are introduced to the power system, the impact of electric vehicles, distributed generation and renewable energy has introduced extra demands to distributed sensors, waveform-level information and power quality data analytics. Harmonics and interharmonics, as the most significant disturbances, require carefully designed detection methods for an accurate measurement of electric loads whose information is crucial to subsequent analyzing and control. This paper gives a detailed description of the power quality analysis framework in networked environment and presents a fast and resolution-enhanced method for harmonic and interharmonic measurement. The proposed method first extracts harmonic and interharmonic components efficiently using the single-channel version of Robust Independent Component Analysis (RobustICA), then estimates the high-resolution frequency from three discrete Fourier transform (DFT) samples with little additional computation, and finally computes the amplitudes and phases with the adaptive linear neuron network. The experiments show that the proposed method is time-efficient and leads to a better accuracy of the simulated and experimental signals in the presence of noise and fundamental frequency deviation, thus providing a deeper insight into the (inter)harmonic sources or even the whole system. PMID:27355946
Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks
Vollmer, Todd; Manic, Milos
2014-05-01
A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore » established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less
On the Safety of Machine Learning: Cyber-Physical Systems, Decision Sciences, and Data Products.
Varshney, Kush R; Alemzadeh, Homa
2017-09-01
Machine learning algorithms increasingly influence our decisions and interact with us in all parts of our daily lives. Therefore, just as we consider the safety of power plants, highways, and a variety of other engineered socio-technical systems, we must also take into account the safety of systems involving machine learning. Heretofore, the definition of safety has not been formalized in a machine learning context. In this article, we do so by defining machine learning safety in terms of risk, epistemic uncertainty, and the harm incurred by unwanted outcomes. We then use this definition to examine safety in all sorts of applications in cyber-physical systems, decision sciences, and data products. We find that the foundational principle of modern statistical machine learning, empirical risk minimization, is not always a sufficient objective. We discuss how four different categories of strategies for achieving safety in engineering, including inherently safe design, safety reserves, safe fail, and procedural safeguards can be mapped to a machine learning context. We then discuss example techniques that can be adopted in each category, such as considering interpretability and causality of predictive models, objective functions beyond expected prediction accuracy, human involvement for labeling difficult or rare examples, and user experience design of software and open data.
ERIC Educational Resources Information Center
Termos, Mohamad Hani
2013-01-01
The Classroom Performance System (CPS) is an instructional technology that increases student performance and promotes active learning. This study assessed the effect of the CPS on student participation, attendance, and achievement in multicultural college-level anatomy and physiology classes, where students' first spoken language is not English.…
Prevention and the Child Protection System
ERIC Educational Resources Information Center
Waldfogel, Jane
2009-01-01
The nation's child protection system (CPS) has historically focused on preventing maltreatment in high-risk families, whose children have already been maltreated. But, as Jane Waldfogel explains, it has also begun developing prevention procedures for children at lower risk--those who are referred to CPS but whose cases do not meet the criteria for…
ERIC Educational Resources Information Center
Sunday, Sunday; Labruna, Victor; Kaplan, Sandra; Pelcovitz, David; Newman, Jennifer; Salzinger, Suzanne
2008-01-01
Objective: To examine the relationship between physical abuse of adolescents and parenting by mothers and fathers and whether the association differs by gender. Methods: Subjects were adolescents, 51 girls and 45 boys, documented by Child Protective Services (CPS) as physically abused during adolescence. Comparison subjects were non-abused…
13 CFR 107.50 - Definition of terms.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., electric transmission systems, storage systems, and cyber security. (2) Installation and/or inspection... distribution systems, electric transmission systems, or grid cyber security. (3) Auditing or consulting...
13 CFR 107.50 - Definition of terms.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., electric transmission systems, storage systems, and cyber security. (2) Installation and/or inspection... distribution systems, electric transmission systems, or grid cyber security. (3) Auditing or consulting...
Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems
2017-05-24
Functional Modeling Compiler (SCCT) FM Compiler and Key Performance Indicators (KPI) May 2018 Pending. Model Management Backbone (SCCT) MMB Demonstration...implement the agent- based distributed runtime. - KPIs for single/multicore controllers and temporal/spatial domains. - Integration of the model management ...Distributed Runtime (UCI) Not started. Model Management Backbone (SCCT) Not started. Siemens Corporation Corporate Technology Unrestricted
Engineering High Assurance Distributed Cyber Physical Systems
2015-01-15
decisions: number of interacting agents and co-dependent decisions made in real-time without causing interference . To engineer a high assurance DART...environment specification, architecture definition, domain-specific languages, design patterns, code - generation, analysis, test-generation, and simulation...include synchronization between the models and source code , debugging at the model level, expression of the design intent, and quality of service
2016-08-10
enable JCS managers to detect advanced cyber attacks, mitigate the effects of those attacks, and recover their networks following an attack. It also... managers of ICS networks to Detect, Mitigate, and Recover from nation-state-level cyber attacks (strategic, deliberate, well-trained, and funded...Successful Detection of cyber anomalies is best achieved when IT and ICS managers remain in close coordination. The Integrity Checks Table
Amaddeo, Francesco; Burti, Lorenzo; Ruggeri, Mirella; Tansella, Michele
2009-01-01
The South-Verona community psychiatric service (CPS) was implemented in 1978, according to Law 180, by the Department of Psychiatry of the University of Verona. Since then this CPS provides prompt, comprehensive and coherent answers to patients' needs, psychological and social, as well as practical, while trying to decrease and control symptoms. Special emphasis is given to integrating different interventions, such as medication, rehabilitation, family support, and social work. The South-Verona experience was from the beginning associated with a long-term research project of monitoring and evaluating the new system of care. The research team has grown and expanded over the years and presently includes the following research units: a) environmental, clinical and genetic determinants of the outcome of mental disorders; b) psychiatric register, economics and geography of mental health; c) clinical psychopharmacology and drug epidemiology; d) brain imaging and neuropsychology; e) clinical psychology and communication in medicine; and f) physical comorbidity and health promotion in psychiatric patients. This paper summarises the main results of the coordinated, long-term evaluative studies conducted so far.
78 FR 79411 - Announcement of Competition Under the America COMPETES Act
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... announces the Cyber Grand Challenge (CGC), a prize competition under 15 U.S.C. 3719, the America COMPETES... cyber defense systems. The CGC seeks to engender a new generation of autonomous cyber defense... experts. FOR FURTHER INFORMATION CONTACT: All questions regarding the competition may be sent to Cyber...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-07
... the Bulk-Power System to comply with specific requirements to safeguard critical cyber assets.\\2\\ These standards help protect the nation's Bulk-Power System against potential disruptions from cyber... recordkeeping requirements. Specifically, CIP- 008-1 requires responsible entities to report cyber security...
An efficient start-up circuitry for de-energized ultra-low power energy harvesting systems
NASA Astrophysics Data System (ADS)
Hörmann, Leander B.; Berger, Achim; Salzburger, Lukas; Priller, Peter; Springer, Andreas
2015-05-01
Cyber-physical systems often include small wireless devices to measure physical quantities or control a technical process. These devices need a self-sufficient power supply because no wired infrastructure is available. Their operational time can be enhanced by energy harvesting systems. However, the convertible power is often limited and discontinuous which requires the need of an energy storage unit. If this unit (and thus the whole system) is de-energized, the start-up process may take a significant amount of time because of an inefficient energy harvesting process. Therefore, this paper presents a system which enables a safe and fast start-up from the de-energized state.
Cyber entertainment system using an immersive networked virtual environment
NASA Astrophysics Data System (ADS)
Ihara, Masayuki; Honda, Shinkuro; Kobayashi, Minoru; Ishibashi, Satoshi
2002-05-01
Authors are examining a cyber entertainment system that applies IPT (Immersive Projection Technology) displays to the entertainment field. This system enables users who are in remote locations to communicate with each other so that they feel as if they are together. Moreover, the system enables those users to experience a high degree of presence, this is due to provision of stereoscopic vision as well as a haptic interface and stereo sound. This paper introduces this system from the viewpoint of space sharing across the network and elucidates its operation using the theme of golf. The system is developed by integrating avatar control, an I/O device, communication links, virtual interaction, mixed reality, and physical simulations. Pairs of these environments are connected across the network. This allows the two players to experience competition. An avatar of each player is displayed by the other player's IPT display in the remote location and is driven by only two magnetic sensors. That is, in the proposed system, users don't need to wear any data suit with a lot of sensors and they are able to play golf without any encumbrance.
Waste reduction possibilities for manufacturing systems in the industry 4.0
NASA Astrophysics Data System (ADS)
Tamás, P.; Illés, B.; Dobos, P.
2016-11-01
The industry 4.0 creates some new possibilities for the manufacturing companies’ waste reduction for example by appearance of the cyber physical systems and the big data concept and spreading the „Internet of things (IoT)”. This paper presents in details the fourth industrial revolutions’ more important achievements and tools. In addition there will be also numerous new research directions in connection with the waste reduction possibilities of the manufacturing systems outlined.
Application of a VLSI vector quantization processor to real-time speech coding
NASA Technical Reports Server (NTRS)
Davidson, G.; Gersho, A.
1986-01-01
Attention is given to a working vector quantization processor for speech coding that is based on a first-generation VLSI chip which efficiently performs the pattern-matching operation needed for the codebook search process (CPS). Using this chip, the CPS architecture has been successfully incorporated into a compact, single-board Vector PCM implementation operating at 7-18 kbits/sec. A real time Adaptive Vector Predictive Coder system using the CPS has also been implemented.
NASA Astrophysics Data System (ADS)
Termos, Mohamad Hani
2011-12-01
The Classroom Performance System (CPS) is an instructional technology tool that increases student performance and addresses different learning styles. Instructional technologies are used to promote active learning; however, student embarrassment issue in a multicultural setting is not addressed. This study assessed the effect of the CPS on student participation, attendance, and achievement in multicultural college-level anatomy and physiology classes at South Texas College, where the first spoken language is not English. Quantitative method and quasi-experimental design were employed and comparative statistic methods and pre-post tests were used to collect the data. Participants were college students and sections of study were selected by convenient sampling. Participation was 100% during most of the lectures held and participation rate did not strike above 68% in control group. Attendance was significantly higher in CPS sections than the control group as shown by t-tests. Experimental sections had a higher increase in the pre-post test scores and student averages on lecture exams increased at a higher rate as compared to the control group. Therefore, the CPS increased student participation, attendance, and achievement in multicultural anatomy and physiology classes. The CPS can be studied in other settings where the first spoken language is English or in other programs, such as special education programs. Additionally, other variables can be studied and other methodologies can be employed.
Houde, Mathieu; Gottschalk, Marcelo; Gagnon, Fleur; Van Calsteren, Marie-Rose; Segura, Mariela
2012-02-01
Streptococcus suis type 2 is a major swine pathogen and a zoonotic agent, causing meningitis in both swine and humans. S. suis infects the host through the respiratory route, reaches the bloodstream, and persists until breaching into the central nervous system. The capsular polysaccharide (CPS) of S. suis type 2 is considered a key virulence factor of the bacteria. Though CPS allows S. suis to adhere to the membrane of cells of the immune system, it provides protection against phagocytosis. In fact, nonencapsulated mutants are easily internalized and killed by macrophages and dendritic cells. The objective of this work was to study the molecular mechanisms by which the CPS of S. suis prevents phagocytosis. By using latex beads covalently linked with purified CPS, it was shown that CPS itself was sufficient to inhibit entry of both latex beads and bystander fluorescent beads into macrophages. Upon contact with macrophages, encapsulated S. suis was shown to destabilize lipid microdomains at the cell surface, to block nitric oxide (NO) production during infection, and to prevent lactosylceramide accumulation at the phagocytic cup during infection. In contrast, the nonencapsulated mutant was easily internalized via lipid rafts, in a filipin-sensitive manner, leading to lactosylceramide recruitment and strong NO production. This is the first report to identify a role for CPS in lipid microdomain stability and to recognize an interaction between S. suis and lactosylceramide in phagocytes.
Problem-Solving Phase Transitions During Team Collaboration.
Wiltshire, Travis J; Butner, Jonathan E; Fiore, Stephen M
2018-01-01
Multiple theories of problem-solving hypothesize that there are distinct qualitative phases exhibited during effective problem-solving. However, limited research has attempted to identify when transitions between phases occur. We integrate theory on collaborative problem-solving (CPS) with dynamical systems theory suggesting that when a system is undergoing a phase transition it should exhibit a peak in entropy and that entropy levels should also relate to team performance. Communications from 40 teams that collaborated on a complex problem were coded for occurrence of problem-solving processes. We applied a sliding window entropy technique to each team's communications and specified criteria for (a) identifying data points that qualify as peaks and (b) determining which peaks were robust. We used multilevel modeling, and provide a qualitative example, to evaluate whether phases exhibit distinct distributions of communication processes. We also tested whether there was a relationship between entropy values at transition points and CPS performance. We found that a proportion of entropy peaks was robust and that the relative occurrence of communication codes varied significantly across phases. Peaks in entropy thus corresponded to qualitative shifts in teams' CPS communications, providing empirical evidence that teams exhibit phase transitions during CPS. Also, lower average levels of entropy at the phase transition points predicted better CPS performance. We specify future directions to improve understanding of phase transitions during CPS, and collaborative cognition, more broadly. Copyright © 2017 Cognitive Science Society, Inc.
Roy, David; Takamatsu, Daisuke; Okura, Masatoshi; Goyette-Desjardins, Guillaume; Van Calsteren, Marie-Rose; Dumesnil, Audrey; Gottschalk, Marcelo; Segura, Mariela
2018-01-01
The capsular polysaccharide (CPS) represents a key virulence factor for most encapsulated streptococci. Streptococcus suis and Group B Streptococcus (GBS) are both well-encapsulated pathogens of clinical importance in veterinary and/or human medicine and responsible for invasive systemic diseases. S. suis and GBS are the only Gram-positive bacteria which express a sialylated CPS at their surface. An important difference between these two sialylated CPSs is the linkage between the side-chain terminal galactose and sialic acid, being α-2,6 for S. suis but α-2,3 for GBS. It is still unclear how sialic acid may affect CPS production and, consequently, the pathogenesis of the disease caused by these two bacterial pathogens. Here, we investigated the role of sialic acid and the putative effect of sialic acid linkage modification in CPS synthesis using inter-species allelic exchange mutagenesis. To this aim, a new molecular biogenetic approach to express CPS with modified sialic acid linkage was developed. We showed that sialic acid (and its α-2,6 linkage) is crucial for S. suis CPS synthesis, whereas for GBS, CPS synthesis may occur in presence of an α-2,6 sialyltransferase or in absence of sialic acid moiety. To evaluate the effect of the CPS composition/structure on sialyltransferase activity, two distinct capsular serotypes within each bacterial species were compared (S. suis serotypes 2 and 14 and GBS serotypes III and V). It was demonstrated that the observed differences in sialyltransferase activity and specificity between S. suis and GBS were serotype unrestricted. This is the first time that a study investigates the interspecies exchange of capsular sialyltransferase genes in Gram-positive bacteria. The obtained mutants represent novel tools that could be used to further investigate the immunomodulatory properties of sialylated CPSs. Finally, in spite of common CPS structural characteristics and similarities in the cps loci, sialic acid exerts differential control of CPS expression by S. suis and GBS. PMID:29666608
Patterns of Adolescent Bullying Behaviors: Physical, Verbal, Exclusion, Rumor, and Cyber
Wang, Jing; Iannotti, Ronald J.; Luk, Jeremy W.
2012-01-01
Patterns of engagement in cyber bullying and four types of traditional bullying were examined using latent class analysis (LCA). Demographic differences and externalizing problems were evaluated across latent class membership. Data were obtained from the 2005–2006 Health Behavior in School-aged Survey and the analytic sample included 7,508 U.S. adolescents in grades 6 through 10. LCA models were tested on physical bullying, verbal bullying, social exclusion, spreading rumors, and cyber bullying behaviors. Three latent classes were identified for each gender: All-Types Bullies (10.5% for boys and 4.0% for girls), Verbal/Social Bullies (29.3% for boys and 29.4% for girls), and a Non-Involved class (60.2% for boys and 66.6% for girls). Boys were more likely to be All-Types Bullies than girls. The prevalence rates of All-Types and Verbal/Social Bullies peaked during grades 6 to 8 and grades 7 & 8, respectively. Pairwise comparisons across the three latent classes on externalizing problems were conducted. Overall, the All-Types Bullies were at highest risk of using substances and carrying weapons, the Non-Involved were at lowest risk, and the Verbal/Social Bullies were in the middle. Results also suggest that most cyber bullies belong to a group of highly aggressive adolescents who conduct all types of bullying. This finding does not only improve our understanding of the relation between cyber bullying and traditional bullying, but it also suggests that prevention and intervention efforts could target cyber bullies as a high-risk group for elevated externalizing problems. PMID:22710019
Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)
2012-05-04
relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to
NASA Technical Reports Server (NTRS)
Kratochvil, D.; Bowyer, J.; Bhushan, C.; Steinnagel, K.; Kaushal, D.; Al-Kinani, G.
1983-01-01
Development of a forecast of the total domestic telecommunications demand, identification of that portion of the telecommunications demand suitable for transmission by satellite systems, identification of that portion of the satellite market addressable by CPS systems, identification of that portion of the satellite market addressable by Ka-band CPS system, and postulation of a Ka-band CPS network on a nationwide and local level were achieved. The approach employed included the use of a variety of forecasting models, a parametric cost model, a market distribution model and a network optimization model. Forecasts were developed for: 1980, 1990, 2000; voice, data and video services; terrestrial and satellite delivery modes; and C, Ku and Ka-bands.
NASA Technical Reports Server (NTRS)
Hornstein, Rhoda S.; Willoughby, John K.; Gardner, Jo A.; Shinkle, Gerald L.
1993-01-01
In 1992, NASA made the decision to evolve a Consolidated Planning System (CPS) by adding the Space Transportation System (STS) requirements to the Space Station Freedom (SSF) planning software. This paper describes this evolutionary process, which began with a series of six-month design-build-test cycles, using a domain-independent architecture and a set of developmental tools known as the Advanced Scheduling Environment. It is shown that, during these tests, the CPS could be used at multiple organizational levels of planning and for integrating schedules from geographically distributed (including international) planning environments. The potential for using the CPS for other planning and scheduling tasks in the SSF program is being currently examined.
NASA Astrophysics Data System (ADS)
Kratochvil, D.; Bowyer, J.; Bhushan, C.; Steinnagel, K.; Kaushal, D.; Al-Kinani, G.
1983-08-01
Development of a forecast of the total domestic telecommunications demand, identification of that portion of the telecommunications demand suitable for transmission by satellite systems, identification of that portion of the satellite market addressable by CPS systems, identification of that portion of the satellite market addressable by Ka-band CPS system, and postulation of a Ka-band CPS network on a nationwide and local level were achieved. The approach employed included the use of a variety of forecasting models, a parametric cost model, a market distribution model and a network optimization model. Forecasts were developed for: 1980, 1990, 2000; voice, data and video services; terrestrial and satellite delivery modes; and C, Ku and Ka-bands.
ERIC Educational Resources Information Center
Dempsey, Allison G.; Sulkowski, Michael L.; Nichols, Rebecca; Storch, Eric A.
2009-01-01
The increasing use of cyberspace as a social networking forum creates a new medium for youth to become victims of peer aggression. This study used factor analysis techniques to confirm whether survey questions about frequency of cyber victimization formed a distinct latent construct from questions about relational and overt victimization…
Patterns of Adolescent Bullying Behaviors: Physical, Verbal, Exclusion, Rumor, and Cyber
ERIC Educational Resources Information Center
Wang, Jing; Iannotti, Ronald J.; Luk, Jeremy W.
2012-01-01
Patterns of engagement in cyber bullying and four types of traditional bullying were examined using latent class analysis (LCA). Demographic differences and externalizing problems were evaluated across latent class membership. Data were obtained from the 2005-2006 Health Behavior in School-aged Survey and the analytic sample included 7,508 U.S.…
Cyber Intelligence Threat Prioritization
2014-10-01
platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk...intelligence • The acquisition and analysis of information to identify, track, and predict cyber capabilities, intentions, and activities to offer courses of...access can significantly aid in identifying the risk to employees. Physical and Network-Based Access Position Abnormal Activity Infrastructure
NASA Astrophysics Data System (ADS)
Majumdar, Suman; Mellema, Garrelt; Datta, Kanan K.; Jensen, Hannes; Choudhury, T. Roy; Bharadwaj, Somnath; Friedrich, Martina M.
2014-10-01
We present a detailed comparison of three different simulations of the epoch of reionization (EoR). The radiative transfer simulation (C2-RAY) among them is our benchmark. Radiative transfer codes can produce realistic results, but are computationally expensive. We compare it with two seminumerical techniques: one using the same haloes as C2-RAY as its sources (Sem-Num), and one using a conditional Press-Schechter scheme (CPS+GS). These are vastly more computationally efficient than C2-RAY, but use more simplistic physical assumptions. We evaluate these simulations in terms of their ability to reproduce the history and morphology of reionization. We find that both Sem-Num and CPS+GS can produce an ionization history and morphology that is very close to C2-RAY, with Sem-Num performing slightly better compared to CPS+GS. We also study different redshift-space observables of the 21-cm signal from EoR: the variance, power spectrum and its various angular multipole moments. We find that both seminumerical models perform reasonably well in predicting these observables at length scales relevant for present and future experiments. However, Sem-Num performs slightly better than CPS+GS in producing the reionization history, which is necessary for interpreting the future observations. The CPS+GS scheme, however, has the advantage that it is not restricted by the mass resolution of the dark matter density field.
Optoelectronic instrumentation enhancement using data mining feedback for a 3D measurement system
NASA Astrophysics Data System (ADS)
Flores-Fuentes, Wendy; Sergiyenko, Oleg; Gonzalez-Navarro, Félix F.; Rivas-López, Moisés; Hernandez-Balbuena, Daniel; Rodríguez-Quiñonez, Julio C.; Tyrsa, Vera; Lindner, Lars
2016-12-01
3D measurement by a cyber-physical system based on optoelectronic scanning instrumentation has been enhanced by outliers and regression data mining feedback. The prototype has applications in (1) industrial manufacturing systems that include: robotic machinery, embedded vision, and motion control, (2) health care systems for measurement scanning, and (3) infrastructure by providing structural health monitoring. This paper presents new research performed in data processing of a 3D measurement vision sensing database. Outliers from multivariate data have been detected and removal to improve artificial intelligence regression algorithm results. Physical measurement error regression data has been used for 3D measurements error correction. Concluding, that the joint of physical phenomena, measurement and computation is an effectiveness action for feedback loops in the control of industrial, medical and civil tasks.
Developing information-space Confidence Building Measures (CBMs) between India and Pakistan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yamin, Tughral
The Internet has changed the world in ways hitherto unknown. The international financial system, air, land and maritime transport systems are all digitally linked. Similarly most militaries are fully or partially networked. This has not only sped up the decision making processes at all levels, it has also rendered these systems vulnerable to cyber-attacks. Cyber-warfare is now recognized as the most potent form of non-kinetic war fighting. In order to prevent large scale network-attacks, cyber-powers are simultaneously spending a lot of time, money and effort to erect redundant cyber-defenses and enhancing their offensive cyber capabilities. Difficulties in creating a stablemore » environment in information-space stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. This paper discusses a range of Confidence Building Measures that can be created between India and Pakistan in information-space to control malicious cyber behavior and avert an inadvertent war.« less
Calzas, Cynthia; Taillardet, Morgan; Fourati, Insaf Salem; Roy, David; Gottschalk, Marcelo; Soudeyns, Hugo; Defrance, Thierry; Segura, Mariela
2017-01-01
Streptococcus suis and group B Streptococcus (GBS) are encapsulated streptococci causing septicemia and meningitis. Antibodies (Abs) against capsular polysaccharides (CPSs) have a crucial protective role, but the structure/composition of the CPS, including the presence of sialic acid, may interfere with the generation of anti-CPS Ab responses. We investigated the features of the CPS-specific Ab response directed against S. suis serotypes 2 and 14 and GBS serotypes III and V after infection or immunization with purified native or desialylated CPSs in mice. Whereas S. suis-infected mice developed a very low/undetectable CPS-specific IgM response, significant anti-CPS IgM titers were measured in GBS-infected animals (especially for type III GBS). No isotype switching was detected in S. suis- or GBS-infected mice. While the expression of sialic acid was essential for the immunogenicity of purified GBS type III CPS, this sugar was not responsible for the inability of purified S. suis types 2, 14 and GBS type V CPSs to induce a specific Ab response. Thus, other biochemical criteria unrelated to the presence of sialic acid may be responsible for the inaptitude of the host immune system to mount an effective response against certain S. suis and GBS CPS types. PMID:28425925
Congenital portosystemic shunts associated with liver tumours.
Pupulim, L F; Vullierme, M-P; Paradis, V; Valla, D; Terraz, S; Vilgrain, V
2013-07-01
To evaluate the diagnosis and presentation of liver tumours in patients with congenital portosystemic shunts (CPS). Eight patients were diagnosed in Hôpital Beaujon as having CPS. All patients underwent Doppler ultrasound, computed tomography (CT), magnetic resonance imaging (MRI), and histological examination of liver tumours. CPS were classified according to anatomy and the amount of portal flow deviated to the systemic circulation as: total, subtotal, or partial. Liver tumours were diagnosed by needle core biopsy (n = 5) or surgery (n = 3). Clinical follow-up was available in all patients but one (mean follow-up 36 months; range 1-5 years). Six patients had total CPS, one patient had a subtotal CPS, and the last had a partial CPS. All patients presented with multiple liver nodules (range four to >15). The tumours were characterized as focal nodular hyperplasia (FNH; n = 4), FNH with hepatocellular adenoma (n = 2), and regenerative nodular hyperplasia (n = 2). In four of seven patients (57%) that had follow-up, tumours showed enlargement or new lesions appeared. In this series of CPS patients, tumours were all benign, multiple, and of hepatocellular origin, and different tumours were present simultaneously in two patients. Tumour enlargement or new nodules were common during follow-up. Copyright © 2013 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.
Temporal Causal Diagrams for Diagnosing Failures in Cyber Physical Systems
2014-10-02
11 P Open Close C Close none St Close Table 3. Transition Information for Distance Relay’s behavioral model. Rows 1-7 deal with the anomaly detection ... PROGNOSTICS AND HEALTH MANAGEMENT SOCIETY 2014 238 ANNUAL CONFERENCE OF THE PROGNOSTICS AND HEALTH MANAGEMENT SOCIETY 2014 fall into the Zone settings of...OF THE PROGNOSTICS AND HEALTH MANAGEMENT SOCIETY 2014 239 ANNUAL CONFERENCE OF THE PROGNOSTICS AND HEALTH MANAGEMENT SOCIETY 2014 event systems has
Addressing Modeling Challenges in Cyber-Physical Systems
2011-03-04
A. Lee and Eleftherios Matsikoudis. The semantics of dataflow with firing. In Grard Huet, Gordon Plotkin, Jean - Jacques Lévy, and Yves Bertot...Computer-Aided Design of Integrated Circuits and Systems, 20(3), 2001. [12] Luca P. Carloni, Roberto Passerone, Alessandro Pinto , and Alberto Sangiovanni...gst/fullpage.html?res= 9504EFDA1738F933A2575AC0A9679C8B63. 20 [15] Abhijit Davare, Douglas Densmore, Trevor Meyerowitz, Alessandro Pinto , Alberto
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jim Alves-Foss
2011-08-01
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less
Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield
NASA Astrophysics Data System (ADS)
Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel
2012-06-01
While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.
Addressing Human Factors Gaps in Cyber Defense
2016-09-23
Factors Gaps in Cyber Defense 5a. CONTRACT NUMBER FA8650-14-D-6501-0009 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Alex... Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...currently available work often focuses solely on technological aspects of cyber , acknowledging the human in passing, if at all. In recent years, the
DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT
2016-08-01
AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program
Maximizing Information Diffusion in the Cyber-physical Integrated Network †
Lu, Hongliang; Lv, Shaohe; Jiao, Xianlong; Wang, Xiaodong; Liu, Juan
2015-01-01
Nowadays, our living environment has been embedded with smart objects, such as smart sensors, smart watches and smart phones. They make cyberspace and physical space integrated by their abundant abilities of sensing, communication and computation, forming a cyber-physical integrated network. In order to maximize information diffusion in such a network, a group of objects are selected as the forwarding points. To optimize the selection, a minimum connected dominating set (CDS) strategy is adopted. However, existing approaches focus on minimizing the size of the CDS, neglecting an important factor: the weight of links. In this paper, we propose a distributed maximizing the probability of information diffusion (DMPID) algorithm in the cyber-physical integrated network. Unlike previous approaches that only consider the size of CDS selection, DMPID also considers the information spread probability that depends on the weight of links. To weaken the effects of excessively-weighted links, we also present an optimization strategy that can properly balance the two factors. The results of extensive simulation show that DMPID can nearly double the information diffusion probability, while keeping a reasonable size of selection with low overhead in different distributed networks. PMID:26569254
ERIC Educational Resources Information Center
Xiang, Qiao
2014-01-01
As wireless cyber-physical systems (WCPS) are increasingly being deployed in mission-critical applications, it becomes imperative that we consider application QoS requirements in in-network processing (INP). In this dissertation, we explore the potentials of two INP methods, packet packing and network coding, on improving network performance while…
Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li
2018-06-01
State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.
A Methodology for the Design of Application-Specific Cyber-Physical Social Sensing Co-Simulators.
Sánchez, Borja Bordel; Alcarria, Ramón; Sánchez-Picot, Álvaro; Sánchez-de-Rivera, Diego
2017-09-22
Cyber-Physical Social Sensing (CPSS) is a new trend in the context of pervasive sensing. In these new systems, various domains coexist in time, evolve together and influence each other. Thus, application-specific tools are necessary for specifying and validating designs and simulating systems. However, nowadays, different tools are employed to simulate each domain independently. Mainly, the cause of the lack of co-simulation instruments to simulate all domains together is the extreme difficulty of combining and synchronizing various tools. In order to reduce that difficulty, an adequate architecture for the final co-simulator must be selected. Therefore, in this paper the authors investigate and propose a methodology for the design of CPSS co-simulation tools. The paper describes the four steps that software architects should follow in order to design the most adequate co-simulator for a certain application, considering the final users' needs and requirements and various additional factors such as the development team's experience. Moreover, the first practical use case of the proposed methodology is provided. An experimental validation is also included in order to evaluate the performing of the proposed co-simulator and to determine the correctness of the proposal.
Self-Propulsion of a Flapping Airfoil Using Cyber-Physical Fluid Dynamics
NASA Astrophysics Data System (ADS)
Young, Jay; Asselin, Daniel; Williamson, C. H. K.
2017-11-01
The fluid dynamics of biologically-inspired flapping propulsion provides a fertile testing ground for the field of unsteady aerodynamics, serving as important groundwork for the design and development of underwater vehicles and micro air vehicles (MAVs). These technologies can provide low cost, compact, and maneuverable means for terrain mapping, search and rescue operations, and reconnaissance. However, most laboratory experiments and simulations have been conducted using tethered airfoils with an imposed freestream velocity, which does not necessarily reflect the conditions under which an airfoil employed as a propulsor would operate. Using a closed-loop force-feedback control system, defined as Cyber-Physical Fluid Dynamics, or CPFD (Mackowski & Williamson 2011, 2015, & 2016), we allow a flapping airfoil to fly forward freely, achieving an equilibrium velocity at which thrust and drag are balanced. We study a combination of actively and passively controlled pitching and heaving dynamics in order to find motions that minimize the energy expended per distance traveled by the propulsion system. This work was supported by the National Science Foundation and the Air Force Office of Scientific Research Grant No. FA9550-15-1-0243, monitored by Dr. Douglas Smith.
A Methodology for the Design of Application-Specific Cyber-Physical Social Sensing Co-Simulators
Sánchez-Picot, Álvaro
2017-01-01
Cyber-Physical Social Sensing (CPSS) is a new trend in the context of pervasive sensing. In these new systems, various domains coexist in time, evolve together and influence each other. Thus, application-specific tools are necessary for specifying and validating designs and simulating systems. However, nowadays, different tools are employed to simulate each domain independently. Mainly, the cause of the lack of co-simulation instruments to simulate all domains together is the extreme difficulty of combining and synchronizing various tools. In order to reduce that difficulty, an adequate architecture for the final co-simulator must be selected. Therefore, in this paper the authors investigate and propose a methodology for the design of CPSS co-simulation tools. The paper describes the four steps that software architects should follow in order to design the most adequate co-simulator for a certain application, considering the final users’ needs and requirements and various additional factors such as the development team’s experience. Moreover, the first practical use case of the proposed methodology is provided. An experimental validation is also included in order to evaluate the performing of the proposed co-simulator and to determine the correctness of the proposal. PMID:28937610
Emerging Security Mechanisms for Medical Cyber Physical Systems.
Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K
2016-01-01
The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.
2015-09-28
release. Rotary encoder Brushless servo motor Wind tunnel bottom wall Stainless steel shaft Shaft coupling Wind tunnel top wall Titanium flat plate...illustrating the flat plate mounted to a virtual spring-damper system in the wind tunnel test section. 2 DISTRIBUTION A: Distribution approved for...non-dimensional ratios. For example the non-dimensional stiffness, k∗ = 2k/(ρU2∞c 2h), can be kept constant even if the wind speed, U∞, chord, c, and
Criminal investigations in child protective services cases: an empirical analysis.
Cross, Theodore P; Chuang, Emmeline; Helton, Jesse J; Lux, Emily A
2015-05-01
This study analyzed the frequency and correlates of criminal investigation of child maltreatment in cases investigated by child protective service (CPS), using national probability data from the National Survey of Child and Adolescent Well-Being. Criminal investigations were conducted in slightly more than 25% of cases. Communities varied substantially in percentage criminally investigated. Sexual abuse was the most frequent type of maltreatment criminally investigated followed by physical abuse. Logistic regression results indicated that criminal investigations were more likely when caseworkers perceived greater harm and more evidence; when CPS conducted an investigation rather than an assessment; when a parent or a legal guardian reported the maltreatment; and when cases were located in communities in which CPS and police had a memorandum of understanding (MOU) governing coordination. Most variation between communities in criminal investigation remained unexplained. The findings suggest the potential of MOUs for communities wanting to increase criminal investigation. © The Author(s) 2014.
Conducting Polymers in the Fields of Energy, Environmental Remediation, and Chemical-Chiral Sensors.
Ibanez, Jorge G; Rincón, Marina E; Gutierrez-Granados, Silvia; Chahma, M'hamed; Jaramillo-Quintero, Oscar A; Frontana-Uribe, Bernardo A
2018-05-09
Conducting polymers (CPs), thanks to their unique properties, structures made on-demand, new composite mixtures, and possibility of deposit on a surface by chemical, physical, or electrochemical methodologies, have shown in the last years a renaissance and have been widely used in important fields of chemistry and materials science. Due to the extent of the literature on CPs, this review, after a concise introduction about the interrelationship between electrochemistry and conducting polymers, is focused exclusively on the following applications: energy (energy storage devices and solar cells), use in environmental remediation (anion and cation trapping, electrocatalytic reduction/oxidation of pollutants on CP based electrodes, and adsorption of pollutants) and finally electroanalysis as chemical sensors in solution, gas phase, and chiral molecules. This review is expected to be comprehensive, authoritative, and useful to the chemical community interested in CPs and their applications.
A new chest pain strategy in Thunder Bay.
Mutrie, D
1999-04-01
Thunder Bay Regional Hospital (TBRH) developed a chest pain strategy (CPS) to support its emergency physicians in making the difficult clinical decisions required to properly evaluate and manage ED "chest pain" patients. This strategy was developed to ensure excellent patient care in a setting of diminished inpatient bed availability and increasing ED congestion. It focuses on rapid risk stratification, using history, electrocardiogram, physical examination and 3 new point-of-care cardiac markers: myoglobin, CK-MB mass, and cardiac troponin I. Following the introduction of the CPS in 1997, TBRH realized significant ($500 000/yr) institutional resource savings through a 60% decrease in the admission rate of non-myocardial infarction, non-unstable angina chest pain patients, a 30% decrease in ED chest pain evaluation time, and improved ED availability of monitored stretchers. The CPS has allowed TBRH to simultaneously decrease costs and improve patient care.
Cyber Security for Lighting Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Fact sheet discusses cyber threats unique to lighting control systems in buildings and helps facility managers identify the types of lighting control systems that could introduce cybersecurity risks. Download the fact sheet.
CyberPetri at CDX 2016: Real-time Network Situation Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.
CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.
Power Projection in the Digital Age: The Only Winning Move is to Play
2017-12-21
and compromise or corrupt sensitive information. Without a corresponding cybersecurity focus to complement our developing physical capabilities...industry, and academia to participate in a series of cyber- security roundtables. These experts included heads of cybersecurity firms, Chief...cyber-degraded environments. These cybersecurity roundtables are now biannual events, designed to continuously expand the Command’s perspective and
Providing patient care in community pharmacies in Australia.
Benrimoj, Shalom I; Roberts, Alison S
2005-11-01
To describe Australia's community pharmacy network in the context of the health system and outline the provision of services. The 5000 community pharmacies form a key component of the healthcare system for Australians, for whom health expenditures represent 9% of the Gross Domestic Product. A typical community pharmacy dispenses 880 prescriptions per week. Pharmacists are key partners in the Government's National Medicines Policy and contribute to its objectives through the provision of cognitive pharmaceutical services (CPS). The Third Community Pharmacy Agreement included funding for CPS including medication review and the provision of written drug information. Funding is also provided for a quality assurance platform with which the majority of pharmacies are accredited. Fifteen million dollars (Australian) have been allocated to research in community pharmacy, which has focused on achieving quality use of medicines (QUM), as well as developing new CPS and facilitating change. Elements of the Agreements have taken into account QUM principles and are now significant drivers of practice change. Although accounting for 10% of remuneration for community pharmacy, the provision of CPS represents a significant shift in focus to view pharmacy as a service provider. Delivery of CPS through the community pharmacy network provides sustainability for primary health care due to improvement in quality presumably associated with a reduction in healthcare costs. Australian pharmacy practice is moving strongly in the direction of CPS provision; however, change does not occur easily. The development of a change management strategy is underway to improve the uptake of professional and business opportunities in community pharmacy.
Houde, Mathieu; Gottschalk, Marcelo; Gagnon, Fleur; Van Calsteren, Marie-Rose
2012-01-01
Streptococcus suis type 2 is a major swine pathogen and a zoonotic agent, causing meningitis in both swine and humans. S. suis infects the host through the respiratory route, reaches the bloodstream, and persists until breaching into the central nervous system. The capsular polysaccharide (CPS) of S. suis type 2 is considered a key virulence factor of the bacteria. Though CPS allows S. suis to adhere to the membrane of cells of the immune system, it provides protection against phagocytosis. In fact, nonencapsulated mutants are easily internalized and killed by macrophages and dendritic cells. The objective of this work was to study the molecular mechanisms by which the CPS of S. suis prevents phagocytosis. By using latex beads covalently linked with purified CPS, it was shown that CPS itself was sufficient to inhibit entry of both latex beads and bystander fluorescent beads into macrophages. Upon contact with macrophages, encapsulated S. suis was shown to destabilize lipid microdomains at the cell surface, to block nitric oxide (NO) production during infection, and to prevent lactosylceramide accumulation at the phagocytic cup during infection. In contrast, the nonencapsulated mutant was easily internalized via lipid rafts, in a filipin-sensitive manner, leading to lactosylceramide recruitment and strong NO production. This is the first report to identify a role for CPS in lipid microdomain stability and to recognize an interaction between S. suis and lactosylceramide in phagocytes. PMID:22124659
A ``Cyber Wind Facility'' for HPC Wind Turbine Field Experiments
NASA Astrophysics Data System (ADS)
Brasseur, James; Paterson, Eric; Schmitz, Sven; Campbell, Robert; Vijayakumar, Ganesh; Lavely, Adam; Jayaraman, Balaji; Nandi, Tarak; Jha, Pankaj; Dunbar, Alex; Motta-Mena, Javier; Craven, Brent; Haupt, Sue
2013-03-01
The Penn State ``Cyber Wind Facility'' (CWF) is a high-fidelity multi-scale high performance computing (HPC) environment in which ``cyber field experiments'' are designed and ``cyber data'' collected from wind turbines operating within the atmospheric boundary layer (ABL) environment. Conceptually the ``facility'' is akin to a high-tech wind tunnel with controlled physical environment, but unlike a wind tunnel it replicates commercial-scale wind turbines operating in the field and forced by true atmospheric turbulence with controlled stability state. The CWF is created from state-of-the-art high-accuracy technology geometry and grid design and numerical methods, and with high-resolution simulation strategies that blend unsteady RANS near the surface with high fidelity large-eddy simulation (LES) in separated boundary layer, blade and rotor wake regions, embedded within high-resolution LES of the ABL. CWF experiments complement physical field facility experiments that can capture wider ranges of meteorological events, but with minimal control over the environment and with very small numbers of sensors at low spatial resolution. I shall report on the first CWF experiments aimed at dynamical interactions between ABL turbulence and space-time wind turbine loadings. Supported by DOE and NSF.
Marganski, Alison; Melander, Lisa
2018-04-01
This study explores the extent of cyber aggression victimization in intimate relationships and its co-occurrence with in-person experiences of psychological, physical, and sexual partner violence. Data were collected from 540 college students who reported being in a dating relationship in the past 12 months. Participants were asked to complete an online questionnaire that included measures assessing intimate partner victimization experiences in differing social contexts (through socially interactive technology and in face-to-face encounters). Findings indicated that intimate partner cyber aggression victimization is not uncommon, as nearly three quarters of respondents reported having experienced some form of it in the past year. Multivariate analyses also indicate that such aggression may be part of a larger violence nexus given its relation to in-person psychological, physical, and sexual partner violence victimization experiences. In light of these findings, it is recommended that longitudinal research encompassing multiple violence victimization experiences in varying social contexts is completed to determine whether online experiences foreshadow offline ones and, if so, consider interaction effects on outcomes as well as potential intervention strategies to reduce harm associated with such negative experiences.
NASA Astrophysics Data System (ADS)
Chen, Dong; Sun, Dihua; Zhao, Min; Zhou, Tong; Cheng, Senlin
2018-07-01
In fact, driving process is a typical cyber physical process which couples tightly the cyber factor of traffic information with the physical components of the vehicles. Meanwhile, the drivers have situation awareness in driving process, which is not only ascribed to the current traffic states, but also extrapolates the changing trend. In this paper, an extended car-following model is proposed to account for drivers' situation awareness. The stability criterion of the proposed model is derived via linear stability analysis. The results show that the stable region of proposed model will be enlarged on the phase diagram compared with previous models. By employing the reductive perturbation method, the modified Korteweg de Vries (mKdV) equation is obtained. The kink-antikink soliton of mKdV equation reveals theoretically the evolution of traffic jams. Numerical simulations are conducted to verify the analytical results. Two typical traffic Scenarios are investigated. The simulation results demonstrate that drivers' situation awareness plays a key role in traffic flow oscillations and the congestion transition.
Providing security assurance in line with national DBT assumptions
NASA Astrophysics Data System (ADS)
Bajramovic, Edita; Gupta, Deeksha
2017-01-01
As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.
No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent
NASA Astrophysics Data System (ADS)
Zaghloul, A. R. M.; Zaghloul, Y. A.
2014-06-01
We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)