Search results for: cyber defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 726

Search results for: cyber defense

456 The Molecular Analysis of Effect of Phytohormones and Spermidine on Tomato Growth under Biotic Stress

Authors: Rumana Keyani, Haleema Sadia, Asia Nosheen, Rabia Naz, Humaira Yasmin, Sidra Zahoor

Abstract:

Tomato is a significant crop of the world and is one of the staple foods of Pakistan. A vast number of plant pathogens from simple viruses to complex parasites cause diseases in tomatoes but fungal infection in our country is quite high. Sometimes the symptoms are too harsh destroying the crop altogether. Countries like our own with continuously increasing massive population and limited resources cannot afford such an economic loss. There is an array of morphological, genetic, biochemical and molecular processes involved in plant resistance mechanisms to biotic stress. The study of different metabolic pathways like Jasmonic acid (JA) pathways and most importantly signaling molecules like ROS/RNS and their redoxin enzymes i.e. TRX and NRX is crucial to disease management, contributing to healthy plant growth. So, improving tolerance in crop plants against biotic stresses is a dire need of our country and world as whole. In the current study, fungal pathogenic strains Alternaria solani and Rhizoctonia solani were used to inoculate tomatoes to check the defense responses of tomato plant against these pathogens at molecular as well as phenotypic level with jasmonic acid and spermidine pretreatment. All the growth parameters (root and shoot length, dry and weight root, shoot weight measured 7 days post-inoculation, exhibited that infection drastically declined the growth of the plant whereas jasmonic acid and spermidine assisted the plants to cope up with the infection. Thus, JA and Spermidine treatments maintained comparatively better growth factors. Antioxidant assays and expression analysis through real time quantitative PCR following time course experiment at 24, 48 and 72 hours intervals also exhibited that activation of JA defense genes and a polyamine Spermidine helps in mediating tomato responses against fungal infection when used alone but the two treatments combined mask the effect of each other.

Keywords: fungal infection, jasmonic acid defence, tomato, spermidine

Procedia PDF Downloads 122
455 Effect of Hypoxia on the Antimicrobial Activity of Corvina Drum (Cilus Gilberti) Epidermal Mucus

Authors: Belinda Vega, Claudio Alvarez, Héctor Flores, Marcia Oliva, Katherine Alveal, Teresa Toro, María José Tapia, Fanny Guzmán

Abstract:

With the increase in global temperatures and the decrease of oxygen (O2) concentration in the oceans, fish cultures are exposed to frequent fluctuations in dissolved O2 (DO) concentration that can cause chronic stress in the animals, altering the normal functioning of their immune system and making them vulnerable to infections, consequently increasing morbidity and mortality in the farms with economic losses. The mucosal organs (skin -and mucus-, gills, gut, and nasal mucosa) are the first line of defense of the fish against pathogens. Therefore, the objective of this study is to evaluate the effect of hypoxia on the antimicrobial activity of epidermal mucus from corvina drum (Cilus Gilberti), a native marine species with the potential for the diversification of aquaculture in Chile. To achieve this, the epidermal mucus of juveniles (~220g) kept under normoxia (7 mg/L DO) and hypoxia (2 mg/L DO) environmental conditions was collected after 6 weeks, as well as after 6 days of intraperitoneal inoculation with lipopolysaccharide from Vibrio anguillarum to induce an immune response in the fish. Total protein extracts of the mucus were used for bactericidal activity and lysozyme and peroxidase activity assays. Although the mucus from both experimental groups showed inhibitory effects on the bacterial growth of Vibrio anguillarum and Vibrio ordalli, this effect was more long-lasting in the normoxia group. We also observed a notable reduction in the presence of lysozyme in the mucus from fish exposed to hypoxia, with no differences in peroxidase content. Future proteomic studies of corvina mucus associated with the environmental conditions studied in this work will allow the isolation and identification of peptides with antimicrobial activity, those responsible for the results obtained. This will help establish strategies aimed at minimizing the impacts of hypoxia on the defense responses of corvina drum against potential pathogens. Funding: FONDECYT 3200440 and FONDECYT 1210056

Keywords: Cilus gilberti, mucus, antimicrobial activity, HYPOXIA

Procedia PDF Downloads 70
454 In Defense of Impersonal Obligatoriness

Authors: Peter B. M. Vranas

Abstract:

An important question in moral philosophy is whether whatever is obligatory (i.e., morally required) is personally obligatory, namely obligatory for someone. A positive answer is uncontested in the literature: for example, if it is obligatory for you to keep your promises, it seems that it is obligatory for you you keep your promises. By using conceptual analysis, this paper defends a negative answer: some things are impersonally obligatory, namely obligatory, but not obligatory for anyone. For example, if each of us has promised to vote and thus has an obligation to vote, then it is obligatory that we all vote, but it is not obligatory for anyone that we all vote (because, for example, what is obligatory for you is that you vote, not that we all vote). The paper concludes that there is an important concept of impersonal obligatoriness irreducible to personal obligatoriness.

Keywords: impersonal obligatoriness, ought to be, ought to do, personal obligatoriness

Procedia PDF Downloads 94
453 Password Cracking on Graphics Processing Unit Based Systems

Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik

Abstract:

Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.

Keywords: GPGPU, password cracking, secret key, user authentication

Procedia PDF Downloads 284
452 The Provisional National Defense Council cum National Democratic Congress Government and Tourism Development in Ghana: A Reflection

Authors: Yobo Opare-Addo

Abstract:

Ghana came under a military and democratic rule of the same leadership from 1981-2000. These were the Provisional National Defense Council (PNDC), a military government and a democratic government, the National Democratic Congress (NDC) both under the leadership of Flt. Lt. J.J. Rawlings. Meanwhile the year 1985 marked a turning point in the development of the tourism industry in Ghana. Interest in tourism among African governments and for that matter the ‘PNDC cum NDC Government’ (PNDC/NDC) arose because of adverse developments in intangible exports and a corresponding decline in commodity export earnings. The ‘PNDC/NDC Government’ undertook measures and policies to improve the tourism industry and at the same time embarked on export diversification to reap the foreign exchange that the industry could generate in Ghana. The objective of this paper is to examine the measures and policies of the PNDC/NDC to improve the tourism industry in order to reap the foreign exchange. It specifically interrogates the role of the government as an agent of tourism development, through its deliberate creation of a conducive environment for tourism to flourish, the involvement of the private sector both foreign and local and the provision of tourism facilities and infrastructure and how these factors impacted on the tourism industry in Ghana. In the final analysis it evaluates the degree of success of the PNDC/NDC Government in this arena of Ghana’s socio-cultural and economic development. Introduction The Provisional National Defense Council (PNDC), a military government under the leadership of Flt. Lt J.J. Rawlings overthrew a constitutionally elected government of People’s National Party in 1981. In 1992, the National Democratic Congress (NDC) won the general election conducted in December. Flt. Lt. J.J. Rawlings, the party’s leader became the President of the Fourth Republic from January 1993 to December 2000. It was refreshing to see Ghanaians embrace democracy with renewed energy, zeal, and enthusiasm. This paper takes a critical look at the efforts of the PNDC cum NDC Government (PNDC/NDC) to develop tourism in Ghana during the period from 1981-2000 Methodology: Qualitative method of research was adopted for the study. Data was collected from both primary and secondary sources, and analysis was done using descriptive analysis because descriptive analysis made it possible to describe or summarize the statistical data in the research. To gather data from primary sources, questionnaires, oral interviews, and semi-structured discussions were conducted. Respondents included public officials from Ghana Tourist Board, Ministry of Tourism, Hoteliers, restaurant operators and travel and tour operators in Accra. Secondary data sources included articles in journals, reports, magazines, bulletins, and books. The major findings included statistical data for tourism arrivals and receipts during the period and the status of the industry by the year 2000. Conclusion: The paper contributes to knowledge on political and historical aspects of tourism development in Ghana, which is almost non-existent, attitudes of the PNDC cum NDC government towards tourism development and the debates on the generation of foreign exchange to Ghana and third world countries.

Keywords: ghana, infrastructure, policies, privatization, tourism facilities

Procedia PDF Downloads 81
451 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 314
450 Unzipping the Stress Response Genes in Moringa oleifera Lam. through Transcriptomics

Authors: Vivian A. Panes, Raymond John S. Rebong, Miel Q. Diaz

Abstract:

Moringa oleifera Lam. is known mainly for its high nutritional value and medicinal properties contributing to its popular reputation as a 'miracle plant' in the tropical climates where it usually grows. The main objective of this study is to discover the genes and gene products involved in abiotic stress-induced activity that may impact the M. oleifera Lam. mature seeds as well as their corresponding functions. In this study, RNA-sequencing and de novo transcriptome assembly were performed using two assemblers, Trinity and Oases, which produced 177,417 and 120,818 contigs respectively. These transcripts were then subjected to various bioinformatics tools such as Blast2GO, UniProt, KEGG, and COG for gene annotation and the analysis of relevant metabolic pathways. Furthermore, FPKM analysis was performed to identify gene expression levels. The sequences were filtered according to the 'response to stress' GO term since this study dealt with stress response. Clustered Orthologous Groups (COG) showed that the highest frequencies of stress response gene functions were those of cytoskeleton which make up approximately 14% and 23% of stress-related sequences under Trinity and Oases respectively, recombination, repair and replication at 11% and 14% respectively, carbohydrate transport and metabolism at 23% and 9% respectively and defense mechanisms 16% and 12% respectively. KEGG pathway analysis determined the most abundant stress-response genes in the phenylpropanoid biosynthesis at counts of 187 and 166 pathways for Oases and Trinity respectively, purine metabolism at 123 and 230 pathways, and biosynthesis of antibiotics at 105 and 102. Unique and cumulative GO term counts revealed that majority of the stress response genes belonged to the category of cellular response to stress at cumulative counts of 1,487 to 2,187 for Oases and Trinity respectively, defense response at 754 and 1,255, and response to heat at 213 and 208, response to water deprivation at 229 and 228, and oxidative stress at 508 and 488. Lastly, FPKM was used to determine the levels of expression of each stress response gene. The most upregulated gene encodes for thiamine thiazole synthase chloroplastic-like enzyme which plays a significant role in DNA damage tolerance. Data analysis implies that M. oleifera stress response genes are directed towards the effects of climate change more than other stresses indicating the potential of M. oleifera for cultivation in harsh environments because it is resistant to climate change, pathogens, and foreign invaders.

Keywords: stress response, genes, Moringa oleifera, transcriptomics

Procedia PDF Downloads 143
449 Invisible Aircraft Using Plasma Display

Authors: C. Ramamoorthy, R. Ranga Raj

Abstract:

In olden days the Ramayana epic depicts the usage of invisible and fuel less aircraft named pushpavimana. The change of color in the reptile family chameleon paves way for the concept of color change phenomenon available in nature. In present scenario the aircrafts are visible so it is easily identified. So there are too many problems from the threatening. Research is still going on about this problem by using Liquid Crystal Display (LCD). Objective of this paper is to find much better to use the concept of invisible aircraft using plasma display through Couple Charged Device camera (CCD), which has a high resolution and can be used for many purposes like spying, defense, etc. Moreover it is cost wise cheap then, escaping the foe viewing.

Keywords: CCD camera, chameleon, invisible, plasma display

Procedia PDF Downloads 399
448 Oil and Proteins of Sardine (Sardina Pilchardus) Compared with Casein or Mixture of Vegetable Oils Improves Dyslipidemia and Reduces Inflammation and Oxidative Stress in Hypercholesterolemic and Obese Rats

Authors: Khelladi Hadj Mostefa, Krouf Djamil, Taleb-Dida Nawel

Abstract:

Background: Obesity results from a prolonged imbalance between energy intake and energy expenditure, as depending on basal metabolic rate. Oils and proteins from sea have important therapeutic (such as obesity and hypercholesterolemia) and antioxidant effects. Sardine are a widely consumed fish in the Mediterranean region. Its consumption provides humans with various nutrients such as oils (rich in omega 3 plyunsaturated fatty acids)) and proteins. Methods: Sardine oil (SO) and sardine proteins (SP) were extracted and purified. Mixture of vegetable oils (olive-walnut-sunflower) were prepared from oils produced in Algeria. Eighteen wistar rats are fed a high fat diet enriched with 1% cholesterol for 30 days to induce obesity and hypercholesterolemia. The rats are divided into 3 groups. The first group consumes 20% sardine protein combined with 5% sardine oil (38% SFA (saturated fatty acids), 31% MIFA (monounsaturated fatty acids) and 31% PIFA (polyunsaturated fatty acids)) (SPso). The second group consumes 20% sardine protein combined with 5% of a mixture of vegetable oils (VO) containing 13% SFA, 58% MIFA and 29% PIFA (PSvo), and the third group consuming 20% casein combined with 5% of the mixture of vegetable oils and serves as a semi-synthetic reference (CASvo). Body weights and glycaemia are measured weekly After 28 days of experimentation, the rats are sacrificed, the blood and the liver removed. Serum assays of total cholesterol (TC) and triglycerides (TG) were performed by enzymatic colorimetric methods. Evaluation of lipid peroxidation was performed by assaying thiobarbituric acid reactive species (TBARS) and hydroperoxides values. The protein oxidation was performed by assaying carbonyl derivatives values. Finally, evaluation of antioxidant defense is made by measuring the activity of antioxidant enzymes, the superoxide dismutase (SOD) and the catalase (CAT).Results: After 28 days, the body weight (BW) of the rats increased significantly in SPso and SPvo groups compared to CAS group, by +11% and 7%, respectively. Cholesterolemia (TC) increased significantly in the SPso and SPvo groups compared to the CAS group (P<0.01), while triglyceridemia (TG) decreased significantly in the SPso group compared to SPvo and CAS groups (P<0.01). Albumin (marker of inflammation) increased in the PSs group compared to SPvo and CAS groups by +35% and +13%, respectively. The serum TBARS levels are -40% lower in SPso group compared to SPvo group, and they are -80% and -76% lower in SPso compared to SPvo and CAS groups, respectively. The level of carbonyls derivatives in the serum and liver are significantly reduced in the SPso group compared to the SPvo and CAS groups. Superoxide dismutase (SOD) activity decreased in liver of SPso group compared to SPvo group (P<0.01). While that of CAT is increased in liver tissue of SPso group compared to SPvo group (P<0.01). Conclusion: Sardine oil combined with sardine protein has a hypotriglyceridemic effect, reduces body weight, attenuates inflammation and seems to protect against lipid peroxidation and protein oxidation and increases antioxidant defense in hypercholesterolemic and obese rats. This could be in favor of a protective effect against obesity and cardiovascular diseases.

Keywords: rat, obesity, hypercholesterolemia, sardine protein, sardine oil, vegetable oils mixture, lipid peroxidation, protein oxidation, antioxidant defense

Procedia PDF Downloads 60
447 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 27
446 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 355
445 A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students

Authors: Chia-Wen Wang, Patou Masika Musumari, Teeranee Techasrivichien, S. Pilar Suguimoto, Chang-Chuan Chan, Masako Ono-Kihara, Masahiro Kihara

Abstract:

Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination.

Keywords: cyberbullying, traditional bullying, social media, adolescents

Procedia PDF Downloads 338
444 Freedom, Thought, and the Will: A Philosophical Reconstruction of Muhammad Iqbal’s Conception of Human Agency

Authors: Anwar ul Haq

Abstract:

Muhammad Iqbal was arguably the most significant South Asian Islamic philosopher of the last two centuries. While he is the most revered philosopher of the region, particularly in Pakistan, he is probably the least studied philosopher outside the region. The paper offers a philosophical reconstruction of Iqbal’s view of human agency; it has three sections. Section 1 focuses on Iqbal’s starting point of reflection in practical philosophy (inspired by Kant): our consciousness of ourselves as free agents. The paper brings out Iqbal’s continuity with Kant but also his divergence, in particular his non-Kantian view that we possess a non-sensory intuition of ourselves as free personal causes. It also offer an argument on Iqbal’s behalf for this claim, which is meant as a defense against a Kantian objection to the possibility of intuition of freedom and a skeptic’s challenge to the possibility of freedom in general. Remaining part of the paper offers a reconstruction of Iqbal’s two preconditions of the possibility of free agency. Section 2 discusses the first precondition, namely, the unity of consciousness involved in thought (this is a precondition of agency whether or not it is free). The unity has two aspects, a quantitative (or numerical) aspect and a qualitative (or rational) one. Section 2 offers a defense of these two aspects of the unity of consciousness presupposed by agency by focusing, with Iqbal, on the case of inference.Section 3 discusses a second precondition of the possibility of free agency, that thought and will must be identical in a free agent. Iqbal offers this condition in relief against Bergson’s view. Bergson (on Iqbal’s reading of him) argues that freedom of the will is possible only if the will’s ends are entirely its own and are wholly undetermined by anything from without, not even by thought. Iqbal observes that Bergson’s position ends in an insurmountable dualism of will and thought. Bergson’s view, Iqbal argues in particular, rests on an untenable conception of what an end consists in. An end, correctly understood, is framed by a thinking faculty, the intellect, and not by an extra-rational faculty. The present section outlines Iqbal’s argument for this claim, which rests on the premise that ends possess a certain unity which is intrinsic to particular ends and holds together different ends, and this unity is none other than the quantitative and qualitative unity of a thinking consciousness but in its practical application. Having secured the rational origin of ends, Iqbal argues that a free will must be identical with thought, or else it will be determined from without and won’t be free on that account. Freedom of the self is not a freedom from thought but a freedom in thought: it involves the ability to live a thoughtful life.

Keywords: iqbal, freedom, will, self

Procedia PDF Downloads 66
443 An Assistive Robotic Arm for Defence and Rescue Application

Authors: J. Harrison Kurunathan, R. Jayaparvathy

Abstract:

"Assistive Robotics" is the field that deals with the study of robots that helps in human motion and also empowers human abilities by interfacing the robotic systems to be manipulated by human motion. The proposed model is a robotic arm that works as a haptic interface on the basis on accelerometers and DC motors that will function with respect to the movement of the human muscle. The proposed model would effectively work as a haptic interface that would reduce human effort in the field of defense and rescue. This can be used in very critical conditions like fire accidents to avoid causalities.

Keywords: accelerometers, haptic interface, servo motors, signal processing

Procedia PDF Downloads 390
442 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 386
441 An Approach of High Scalable Production Capacity by Adaption of the Concept 'Everything as a Service'

Authors: Johannes Atug, Stefan Braunreuther, Gunther Reinhart

Abstract:

Volatile markets, as well as increasing global competition in manufacturing, lead to a high demand of flexible and agile production systems. These advanced production systems in turn conduct to high capital expenditure along with high investment risks. Developments in production regarding digitalization and cyber-physical systems result to a merger of informational- and operational technology. The approach of this paper is to benefit from this merger and present a framework of a production network with scalable production capacity and low capital expenditure by adaptation of the IT concept 'everything as a service' into the production environment.

Keywords: digital manufacturing system, everything as a service, reconfigurable production, value network

Procedia PDF Downloads 340
440 Design of Experiment for Optimizing Immunoassay Microarray Printing

Authors: Alex J. Summers, Jasmine P. Devadhasan, Douglas Montgomery, Brittany Fischer, Jian Gu, Frederic Zenhausern

Abstract:

Immunoassays have been utilized for several applications, including the detection of pathogens. Our laboratory is in the development of a tier 1 biothreat panel utilizing Vertical Flow Assay (VFA) technology for simultaneous detection of pathogens and toxins. One method of manufacturing VFA membranes is with non-contact piezoelectric dispensing, which provides advantages, such as low-volume and rapid dispensing without compromising the structural integrity of antibody or substrate. Challenges of this processinclude premature discontinuation of dispensing and misaligned spotting. Preliminary data revealed the Yp 11C7 mAb (11C7)reagent to exhibit a large angle of failure during printing which may have contributed to variable printing outputs. A Design of Experiment (DOE) was executed using this reagent to investigate the effects of hydrostatic pressure and reagent concentration on microarray printing outputs. A Nano-plotter 2.1 (GeSIM, Germany) was used for printing antibody reagents ontonitrocellulose membrane sheets in a clean room environment. A spotting plan was executed using Spot-Front-End software to dispense volumes of 11C7 reagent (20-50 droplets; 1.5-5 mg/mL) in a 6-test spot array at 50 target membrane locations. Hydrostatic pressure was controlled by raising the Pressure Compensation Vessel (PCV) above or lowering it below our current working level. It was hypothesized that raising or lowering the PCV 6 inches would be sufficient to cause either liquid accumulation at the tip or discontinue droplet formation. After aspirating 11C7 reagent, we tested this hypothesis under stroboscope.75% of the effective raised PCV height and of our hypothesized lowered PCV height were used. Humidity (55%) was maintained using an Airwin BO-CT1 humidifier. The number and quality of membranes was assessed after staining printed membranes with dye. The droplet angle of failure was recorded before and after printing to determine a “stroboscope score” for each run. The DOE set was analyzed using JMP software. Hydrostatic pressure and reagent concentration had a significant effect on the number of membranes output. As hydrostatic pressure was increased by raising the PCV 3.75 inches or decreased by lowering the PCV -4.5 inches, membrane output decreased. However, with the hydrostatic pressure closest to equilibrium, our current working level, membrane output, reached the 50-membrane target. As the reagent concentration increased from 1.5 to 5 mg/mL, the membrane output also increased. Reagent concentration likely effected the number of membrane output due to the associated dispensing volume needed to saturate the membranes. However, only hydrostatic pressure had a significant effect on stroboscope score, which could be due to discontinuation of dispensing, and thus the stroboscope check could not find a droplet to record. Our JMP predictive model had a high degree of agreement with our observed results. The JMP model predicted that dispensing the highest concentration of 11C7 at our current PCV working level would yield the highest number of quality membranes, which correlated with our results. Acknowledgements: This work was supported by the Chemical Biological Technologies Directorate (Contract # HDTRA1-16-C-0026) and the Advanced Technology International (Contract # MCDC-18-04-09-002) from the Department of Defense Chemical and Biological Defense program through the Defense Threat Reduction Agency (DTRA).

Keywords: immunoassay, microarray, design of experiment, piezoelectric dispensing

Procedia PDF Downloads 176
439 Effects of Caprine Arthritis-Encephalitis Virus (CAEV) Infection on the Expression of Cathelicidin Genes in Goat Blood Leukocytes

Authors: Daria Reczynska, Justyna Jarczak, Michal Czopowicz, Danuta Sloniewska, Karina Horbanczuk, Wieslaw Jarmuz, Jaroslaw Kaba, Emilia Bagnicka

Abstract:

Since people, animals and plants are constantly exposed to pathogens they have developed very complex systems of defense. Among ca. 1000 antimicrobial peptides from different families so far identified, approximately 30 belonging to cathelicidin family can be found in mammals. Cathelicidins probably constitute the first line of defense because they can act at a physiological salt concentration which is present in healthy tissues. Moreover, the low salt concentration which is present in infected tissues inhibits their activity. In goat bactenecin 7.5 (BAC7.5), bactenecin 5 (BAC5), myeloid antimicrobial peptide 28 (MAP28), myeloid antimicrobial peptide 34 (MAP34 A and B), goat bactenecin3.4 (ChBac3.4) were identified. Caprine arthritis-encephalitis (CAE) caused by small ruminant lentivirus (SRLV) is economic problem. The main CAE symptoms are weight loss, arthritis, pneumonia and mastitis (significant elevation of the somatic cell count and deterioration of some technological parameters). The study was conducted on 24 dairy goats. The animals were divided into two groups: experimental (SRLV-infected) and control (non-infected). The blood samples were collected five times: on the 1st, 7th, 30th, 90th and 150thday of lactation. The levels of transcripts of BAC7.5, BAC5, MAP28 and MAP34 genes in blood leucocytes were measured using qPCR method. There were no differences in mRNA levels of studied genes between stages of lactation. The differences were observed in expressions of BAC5, MAP28 and MAP34 genes with lower levels in the experimental group. There was no difference in BAC7.5 expression between groups. The decreased levels of transcripts of cathelicidin genes in blood leucocytes of SRLV-infected goats may indicate the disturbances of homeostasis in organisms. It can be concluded that SRLV infection seems to inhibit expression of cathelicidin genes. The study was financed by a grant from the National Scientific Center No. UMO-2013/09/B/NZ/03514.

Keywords: goat, CAEV, cathelicidins, blood leukocytes, gene expression

Procedia PDF Downloads 275
438 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review

Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi

Abstract:

Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.

Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030

Procedia PDF Downloads 49
437 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 189
436 Physiological Insight into an Age Old Biocontrol Practice in Banana Cultivation

Authors: Susmita Goswami, Joyeeta Mitra, Indu Gaur, Neha Bhadauria, Shilpi Shilpi, Prabir K. Paul

Abstract:

'Malbhog’, an indigenous banana variety, much prized for its flavour and delicacy suffers production losses due to Fusarium oxysporum f.sp. cubense. The pathogen enters young plants through feeder roots causing wilting of plants ultimately leading to death of plants. The pathogen spreads rapidly to other plants in the field. In eastern part of India, this variety escapes the onslaught of the pathogen when either co-cultivated or rotated with Amorphophallus campanulatus (yam). The present study provides an insight into the physiological aspect of the biocontrol by yam. In vitro application of sterile aqueous extract of yam tuber (100gm/100ml distilled water and its 1:10 and 1:100 dilutions) were mixed with PDA media which was substantially inoculated with spores of Fusarium oxysporum f.sp. cubense. The extract could significantly reduce germination of pathogen spores. Banana variety susceptible to Fusarium sp was raised in soil rite under aseptic conditions. Spores of the pathogen (106 spores/ml) were inoculated into the soil rite. The plants were spread with aqueous extract of yam. The control plants were treated with sterilized distilled water. The activity of phenylalanine ammonia lyase (PAL), polyphenol oxidase (PPO) and peroxidase (POX) were estimated in leaves and roots at interval of 24 hours for 5 days after treatment. The incidence of wilt disease was recorded after two weeks. The results demonstrated that yam extract could induce significant activity of PAL, PPO and POX along with accumulation of phenols in both roots and leaves of banana plants. However, significantly high activity of enzymes and phenol accumulation was observed in roots. The disease incidence was significantly low in yam treated plants. The results clearly demonstrated the control of the pathogen due to induction of defense mechanism in the host by the extract. The observed control of the pathogen in the field could possibly be due to induction of such defense responses in host by exudates leached into the soil from yam tubers. Yam extract could be a potential source of environment-friendly biocide against Panama wilt of banana.

Keywords: Amorphophallus campanulatus, banana, Fusarium oxysporum f.sp. cubense, phenylalanine ammonia lyase (PAL), polyphenol oxidase (PPO), peroxidase (POX)

Procedia PDF Downloads 250
435 Augmented Reality Aplications for Armed Forces

Authors: Murat Sözen

Abstract:

It is not at all difficult to estimate which level today’s technology reaches considering that humankinds space-faring in early 1950s. Technology is a means to help achieve goals and people can produce systems on their physical and mental abilities. Needed and used as tools in all areas of life and became a necessity and dependency, technology, widely used in the military field. To be a revolutionary change in the military matters, opportunities offered by technology should be put into practice. Tech makes weapons, sensors, platforms and soldiers carrying them more effective. To increase this efficiency in the battlefield defense industry is seeking every advantage of technology. In this study, the applicability of existing and on-going augmented reality applications for Armed Forces will be evaluated.

Keywords: augmented reality, battlefield, military, virtual reality

Procedia PDF Downloads 261
434 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 502
433 The Impact of the Media in the Implementation of Qatar’s Foreign Policy on the Public Opinion of the People of the Middle East (2011-2023)

Authors: Negar Vkilbashi, Hassan Kabiri

Abstract:

Modern diplomacy, in its general form, refers to the people and not the governments, and diplomacy tactics are more addressed to the people than to the governments. Media diplomacy and cyber diplomacy are also one of the sub-branches of public diplomacy and, in fact, the role of media in the process of influencing public opinion and directing foreign policy. Mass media, including written, radio and television, theater, satellite, internet, and news agencies, transmit information and demands. What the Qatari government tried to implement in the countries of the region during the Arab Spring and after was through its important media, Al Jazeera. The embargo on Qatar began in 2017, when Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt imposed a land, sea, and air blockade against the country. The media tool constitutes the cornerstone of soft power in the field of foreign policy, which Qatari leaders have consistently resorted to over the past two decades. Undoubtedly, the role it played in covering the events of the Arab Spring has created geopolitical tensions. The United Arab Emirates and other neighboring countries sometimes criticize Al Jazeera for providing a platform for the Muslim Brotherhood, Hamas, and other Islamists to promote their ideology. In 2011, at the same time as the Arab Spring, Al Jazeera reached the peak of its popularity. Al Jazeera's live coverage of protests in Tunisia, Egypt, Yemen, Libya, and Syria helped create a unified narrative of the Arab Spring, with audiences tuning in every Friday to watch simultaneous protests across the Middle East. Al Jazeera operates in three groups: First, it is a powerful base in the hands of the government so that it can direct and influence Arab public opinion. Therefore, this network has been able to benefit from the unlimited financial support of the Qatar government to promote its desired policies and culture. Second, it has provided an attractive platform for politicians and scientific and intellectual elites, thus attracting their support and defense from the government and its rulers. Third, during the last years of Prince Hamad's reign, the Al Jazeera network formed a deterrent weapon to counter the media and political struggle campaigns. The importance of the research is that this network covers a wide range of people in the Middle East and, therefore, has a high influence on the decision-making of countries. On the other hand, Al Jazeera is influential as a tool of public diplomacy and soft power in Qatar's foreign policy, and by studying it, the results of its effectiveness in the past years can be examined. Using a qualitative method, this research analyzes the impact of the media on the implementation of Qatar's foreign policy on the public opinion of the people of the Middle East. Data collection has been done by the secondary method, that is, reading related books, magazine articles, newspaper reports and articles, and analytical reports of think tanks. The most important findings of the research are that Al Jazeera plays an important role in Qatar's foreign policy in Qatar's public diplomacy. So that, in 2011, 2017 and 2023, it played an important role in Qatar's foreign policy in various crises. Also, the people of Arab countries use Al-Jazeera as their first reference.

Keywords: Al Jazeera, Qatar, media, diplomacy

Procedia PDF Downloads 74
432 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 418
431 Creative Accounting as a Financial Numbers Game

Authors: Feddaoui Amina

Abstract:

Through this study we will try to shed light on the theoretical framework proposed for understanding creative accounting as a financial numbers game and one of the most important techniques of accounts manipulation, its main actors and its practices. We will discover the role of the modified Jones model (1995) in detecting creative accounting practices using discretionary accruals. Finally we will try to confirm the importance and the need to address this type of practices using corporate governance as a main control system and an important defense line to reduce these dangerous accounts manipulation.

Keywords: financial numbers game, creative accounting, modified Jones model, accounts manipulation

Procedia PDF Downloads 466
430 Effect of Dietary Organic Zinc Supplementation on Immunocompetance and Reproductive Performance in Rats

Authors: D. Nagalakshmi, S. Parashuramulu K. Sadasiva Rao, G. Aruna, L. Vikram

Abstract:

The zinc (Zn) is the second most abundant trace element in mammals and birds, forming structural component of over 300 enzymes, playing an important role in anti-oxidant defense, immune response and reproduction. Organic trace minerals are more readily absorbed from the digestive tract and more biologically available compared with its inorganic salt. Thus, the present study was undertaken on 60 adult female Sprague Dawley rats (275±2.04 g) for experimental duration of 12 weeks to investigate the effect of dietary Zn supplementation from various organic sources on immunity, reproduction, oxidative defense mechanism and blood biochemical profile. The rats were randomly allotted to 30 replicates (2 per replicate) which were in turn randomly allotted to 5 dietary treatments varying in Zn source i.e., one inorganic source (Zn carbonate) and 4 organic sources (Zn-proteinate, Zn-propionate, Zn-amino acid complex and Zn-methionine) so as to supply NRC recommended Zn concentration (12 ppm Zn). Supplementation of organic Zn had no effect on various haematological and serum biochemical constituents compared to inorganic Zn fed rats. The TBARS and protein carbonyls concentration in liver indicative of oxidative stress was comparable between various organic and inorganic groups. The glutathione reductase activity in haemolysate (P<0.05) and reduced glutathione concentration in liver (P<0.01) was higher when fed organic Zn and RBC catalase activity was higher (P<0.01) on Zn methionine compared to other organic sources tested and the inorganic source. The humoral immune response assessed as antibody titres against sheep RBC was higher (P<0.05) when fed organic sources of zinc compared to inorganic source. The cell mediated immune response expressed as delayed type hypersensitivity reaction was higher (P<0.05) in rats fed Zn propionate with no effect of other organic Zn sources. The serum progesterone concentration was higher (P<0.05) in rats fed organic Zn sources compared to inorganic zinc. The data on ovarian folliculogenesis indicated that organic Zn supplementation increased (P<0.05) the number of graafian follicles and corpus luteum with no effect on primary, secondary and tertiary follicle number. The study indicated that rats fed organic sources of Zn had higher antioxidant enzyme activities, immune response and serum progesterone concentration with higher number of mature follicles. Though the effect of feeding various organic sources were comparable, rats fed zinc methionine had higher antioxidant activity and cell mediated immune response was higher in rats on Zn propionate.

Keywords: organic zinc, immune, rats, reproductive

Procedia PDF Downloads 283
429 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 224
428 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 50
427 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 101