The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
[Background] Security risk assessment methods in industry mostly use a tabular notation to represent the assessment results whilst academic works advocate graphical methods. Experiments with MSc students showed that the tabular notation is better than an iconic graphical notation for the comprehension of security risks. [Aim] We investigate whether the availability of textual labels and terse UML-style...
Industry is continuously moving towards the employment and exploitation of semantic technologies due to diverse enterprise needs, such as cross-domain interoperability, system modeling, categorization of information, model validation and data reasoning. Therefore, the research community presents new semantic-based approaches for implementing industrial systems that are more flexible, self-descriptive,...
All over the world, objects are increasingly connected in networks such as the Industrial Internet of Things. Interconnections, intercommunications and interactions are driving the development of an entirely new whole in the form of the Industrial Internet of Things. Communication and interaction are the norm both for separate components, such as cyber-physical systems, and for the functioning of...
Quality can be a very elusive concept that can be approached from a number of perspectives dependent on once take and interest. Evidence that relates software process to quality is often anecdotal or, when data is presented, it is to some extent contradictory or clashes with opposite evidence coming from different samples. Also, the influence of quality on software architecture is mostly described...
Conflicts between non-functional requirements (NFRs) mean that achieving one requirement can impact another one. This can happen if a particular procedure (called "operationalizing softgoal" in the literature) favors the first characteristic but creates difficulty for the second one. Currently, the conflict identification uses catalogs to indicate conflicting NFRs. They focus on NFRs that...
The purpose of this paper is to develop a framework to use Assurance Case methodology for Industrial IoT systems (IIoT). To achieve a general goal we discuss the three following issues. Firstly, a brief analysis of state-of-the-art researches and resources in area of Assurance Case is done. Secondly, we discuss specific components for IIoT Assurance Case with focus on Security Assurance. Thirdly,...
Wireless communication technologies such as WiFi, ZigBee, or Bluetooth often suffer from interference due to many devices using the same, unregulated frequency spectrum. Also, wireless coverage can be insufficient in certain areas of a building. At the same time, eavesdropping a wireless communication outside a building might be easy due to the extended communication range of particular technologies...
Studies in the field of transport security are aimed more at finding new technical and technological solutions directly related to transport and the development of transport infrastructure. The authors of the work decided to look at the process of ensuring transport safety on a different plane-creating a model for assessing the processes presented at the territorial level. The assessment provides...
In this talk, I'll argue that we need to change our way of thinking drastically and Europe needs to catch up urgently those in the world who have already started to do their homework outside Europe in order to preserve employment and the standard of living in Europe. We have already missed the absolute leadership in the nano-electronics world. It is in the hands of US and Far East owned/based companies...
With the current trend of introducing networking capabilities into traditional industries, Cyber-Physical Production Systems (CPPS) are increasingly targeted by cyber-attacks. Especially with the progression of introducing the industry 4.0 paradigm to sectors that until now worked with strictly sealed environments, new attack surfaces are brought to the attention of cyber-criminals that already possess...
Industrie 4.0 offers a new vision for the factories of the future. In these factories of the future safety will be critical. Functional safety addresses confidence that a piece of equipment will carry out its safety functionality when required to do so. It is an active form of safety in contrast to other forms of safety. Integrated circuits are fundamental in the implementation of functional safety...
In order to solve the problem of China's auto industry control right caused by the introduction of foreign capital, based on defining China's auto industry capital structure security, in this paper we construct China's auto industry capital structure security index system containing 6 indexes, identify the index warning limit and index positive management method and finally use the principal component...
The ideology carried by audio-visual product has a strong influence and guidance function. This paper starts from make a basic overview on audio-visual product industry ideology's security, construct the evaluation system of audio-visual product industry security, analyze the current situation and existing problems of audio-visual product industry ideology's security in China, and puts forward an...
Based on the financial security index calculated in the method of principal component analysis, this paper applies the model of BP neural network to test the result and then puts forward the early warning of Chinese financial security position in the future. In addition, the article gives some following suggestions for the early warning of financial risks: we shall reform the current financial regulation...
In this paper, we construct the financial risk early warning model based on BP neural network, make an empirical analysis of the data between January 2004 and October 2015, proves the reliability of the model prediction results through the training and test of the financial risk early warning model and finally put forward the following suggestions for preventing China's financial risks under the new...
In context of Industry 4.0 Augmented Reality (AR) is frequently mentioned as the upcoming interface technology for human-machine communication and collaboration. Many prototypes have already arisen in both the consumer market and in the industrial sector. According to numerous experts it will take only few years until AR will reach the maturity level to be deployed in productive applications. Especially...
Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is...
Internet Finance promote the innovation and development of financial field, at the same time, it also has its own risks, such as system security risk, capital security risk, higher liquidity risk, market selection risk, monetary policy risk. So the internet financial supervision is very necessary, regulators should pay attention to the risk characteristics of the Internet financial regulation, establish...
Internet of ETC is a problem that current technology development and users needs to be solved urgently. Furthermore, the risk of Internet access to traditional industry is the main direction currently being explored and studied across all trades. This paper will propose a set of Internet service security system.
The digital transformation of industrial production is driven by the advance of Cyber-Physical Production Systems (CPPS) within which raw materials, machines and operations are interconnected to form a sophisticated network. Making such systems self-adaptable is a priority concern for the future implementation of Industry 4.0 application scenarios. In this position paper, we design a meta-model and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.