cyber-security research papers
RESEARCH PAPERS

cyber-security research papers




The myths and facts behind cyber security risks for industrial control systems
free download

ABSTRACT Process control and SCADA systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. Unfortunately, new research 

Distributed intrusion detection and attack containment for organizational cyber security
free download

ABSTRACT The sheer number and sophistication of cyber attacks are making our nation's critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of 

Course of Action Generation for Cyber Security Using Classical Planning.
free download

ABSTRACT We report on the results of applying classical planning techniques to the problem of analyzing computer network vulnerabilities. Specifically, we are concerned with the generation of Adversary Courses of Action, which are extended sequences of exploits 

Cyber security management and e-government
free download

With the rapid growth of Information Technology, organisations are taking extra precautions when it comes to protecting information. In the complex interconnected business world, the common practice of deploying company-wide security solutions (eg, anti-virus software 

Private sector cyber security investment strategies: An empirical analysis
free download

ABSTRACT Organizations typically use very robust analysis techniques to determine how best to spend resources in order to increase revenue and decrease costs or losses. However, few organizations attempt such analysis processes to determine the level and type of 

Literature review on smart grid cyber security
free download

ABSTRACT The current US electrical power grid is an out-of-date infrastructure, and the Smart Grid is an upgrade that will add many new functionalities to meet customers' new power requirements. Updating a system as complex as the electrical power grid has the potential 

Study of Security Attributes of Smart Grid Systems–Current Cyber Security Issues
free download

ABSTRACT This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing 

Smart grid cyber security strategy and requirements
free download

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the US economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, 

Lessons learned from cyber security assessments of SCADA and energy management systems
free download

ABSTRACT The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional 

Mixed-Initiative Cyber Security: Putting humans in the right loop
free download

ABSTRACT Organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Consequently, defensive actions and policy changes by one organization 

Guide for designing cyber security exercises
free download

ABSTRACT Cyber security exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task and requires the work of several people. This paper presents a number of steps and guidelines that should 

Control systems cyber security: Defense in depth strategies
free download

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance 

Analysis of Operations and Cyber Security Policies for a System of Cooperating Flexible Alternating Current Transmission System (FACTS) Devices
free download

ABSTRACT Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies 

Cyber Security as an Emergent Infrastructure.
free download

When I began studying computer security in late 1972 as a Ph. D. student at Purdue University, the field was in its infancy. There were few academics working in the area, no research conferences or journals devoted to the field, and no professional societies to join 

An approach to improving the physical and cyber security of a bulk power system with FACTS
free download

Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.  ? Means to modify the power flow through a

Cyber assessment methods for SCADA security
free download

 Staff Computer Security Researcher InformationCommunications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory  KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, AssessmentABSTRACT

A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making.
free download

ABSTRACT The threat to cyber security is real and growing. Organizations of all kinds must take protective measures, but effective resource allocation is difficult. This situation is due in part to uncertainty about the nature and severity of threats and vulnerabilities, as well as about 

Congress unknowingly undermines cyber-security
free download

Since 9/11, much public attention has focused on the tradeoff between security on the one hand and civil liberties and privacy on the other. We see this conflict every day when we read about the detainment of foreign nationals or the latest homeland security initiative 

Cyber-physical Systems Security-Challenges and Research Ideas
free download

 We argue that securing the emerging internetworked and information-rich CPSs is harder than securing typical distributed information systems because a number of cyber-security issues that have been addressed individually or in isolation within a subsystem come together in 

Cyber security of water SCADA systems:(I) analysis and experimentation of stealthy deception attacks
free download

ABSTRACT In this article, our aim is to perform security threat assessment of networked control systems (NCS) systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer), and a model-based 

Introduction to the special issue on cyber security and management
free download

Today's cyberspace is a powerful, virtual environment enabled by a pervasive global digital infrastructure. Even though it offers an ideal landscape for the conduct of commerce, science, education, communication, and government, cyberspace remains vulnerable to 

Experiences in Using Semantic Reasoners to Evaluate Security of Cyber Physical Systems
free download

Ontology, Semantic WebABSTRACT  We decided to apply SADL technology to cyber security issues for a Smart Grid system. 5. SEPARATION OF KNOWLEDGE DOMAINS 

CYBER SECURITY BEST POLICY PRACTICES FOR EDUCATIONAL LEADERS
free download

ABSTRACT The authors have researched many Educational Organizations across Maryland and Delaware and have developed and tested an instrument to measure cyber practices. The instrument allows district and building administrators to manage policies for cyber 

A cyber security risk assessment for the design of I&C Systems in nuclear power plants
free download

The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber 

Gender, Sustainability, Cyber Security, and Quality Improvement; EBusiness Management at a UAE Women's College
free download

ABSTRACT Multi-method ethnographic field research revealed women students' management efficacy as an important moderating factor. Study context was United Arab Emiratesbased, Fujairah Women's College, Higher Colleges of Technology; where female Emirati E- 

Small Business Cyber Security Survey 2012
free download

Executive Summary Most people would agree that both the rate of adoption of digital technologies and the pace of change within the digital industries are ever increasing. Consumers and businesses alike are presented with an ever changing landscape where 

Vulnerabilities and Countermeasures–A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
free download

ABSTRACT With the increased investment and deployment of embedded computing and communication technologies in the power system–the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to 

Federal Cyber Security R&D Program Thrusts
free download

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on 

Understanding Cyber Security Risk Preferences: A Case Study Analysis Inspired by Public Health Research
free download

Commercial, academic, and government individuals and groups from a variety of disciplines have tried, without full success, to address the problem of cyber security. A significant and growing part of the problem is the relative insecurity of individual Internet users-the threat 

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry
free download

AMI advanced metering infrastructure IP internet protocol IPSEC internet protocol security JSON JavaScript Object Notation NIST National Institute of StandardsTechnology PII personally identifiable information PKI public key infrastructure PMU phasor measurement 

What really matters in a security architecture? A new meta-model for systems and cyber security.
free download

The discipline of designing a security architecture is relatively immature and is generally lacking in foundational principles. Although there is a large and growing field of expert practitioners, they vary in approach and there is a tendency to over focus on security 

CYBER SECURITY AND THE GOVERNMENT
free download

ABSTRACT In this day of advanced technology and communication, more and more people are at risk of danger due to hackers and cyber security. Effort should be put forth by governments to protect their citizens from these dangers. Information is released regarding the United 

Cyber Security and Global Interdependence: What is Critical?.
free download

These linkages and dependencies raise important questions. By now it is a familiar refrain that security of the cyber layer is of great importance. But with dense interconnections it can be extremely difficult to identify the vulnerabilities–and therefore the connections, nodes or 

Cyber Security Provision and Knowledge Preservation from Theft and Mutilation of Govt. Divisional Public Library Kota by Using CCTV
free download

ABSTRACT Cyber Security Provision is mainly used by Govt. Divisional Public Library Kota to Monitor the Illegal User activity and to prevent the Theft and Mutilation or any damage by its Clientele. It provides us brief account of the Security measures available in Current 

Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
free download

ABSTRACT Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of 

Data fusion in cyber security: first order entity extraction from common cyber data
free download

ABSTRACT The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion 

Cyber Security Testing and Training Programs for Industrial Control Systems
free download

ABSTRACT Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today?s interconnected environment, this can present a 

Cyber Security in Smart Grid Substations
free download

ABSTRACT This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards 


FREE ENGINEERING RESEARCH PAPERS