The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Di...The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which is perfectly enough for the court of law to use and make a judgment based on the comprehensiveness,authenticity and objectivity of the information obtained.Cybersecurity is of major concerned to the internet users worldwide due to the recent form of attacks,threat,viruses,intrusion among others going on every day among internet of things.However,it is noted that cybersecurity is based on confidentiality,integrity and validity of data.The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics and pave away for further research directions on the application of deep learning,computational intelligence,soft computing to cybersecurity and cyber forensics.展开更多
The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems...The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA). In the subsystems of eliminations of vulnerabilities and queues of unauthorized access considered as multichannel queueing systems with corresponding servers and queues, at random times there come requests to fix threats detected by the system. It is supposed that flows of requests demanding to eliminate threats coming to the mentioned subsystems of queueing systems are described with the Poisson distribution of probabilities, but processes of their elimination obey exponential law. For the system described above, there has been developed software realization of graphical interface which allows easily to change input parameters and observe graphical reflection of changes of the output indicators of the system.展开更多
As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seri...As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seriously challenge architecture study. In this paper, a service-oriented architecture of CPS was presented. Further, a two-way time synchronization algorithm for CPS service composition was put forward. And a formal method, for judging if actual CPS service meets space constraints, was suggested, which was based on space-π-calculus proposed. Finally, a case study was performed and CPS business process designed by the model and the proposed methods could run well. The application of research conclusion implies that it has rationality and feasibility.展开更多
文摘The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which is perfectly enough for the court of law to use and make a judgment based on the comprehensiveness,authenticity and objectivity of the information obtained.Cybersecurity is of major concerned to the internet users worldwide due to the recent form of attacks,threat,viruses,intrusion among others going on every day among internet of things.However,it is noted that cybersecurity is based on confidentiality,integrity and validity of data.The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics and pave away for further research directions on the application of deep learning,computational intelligence,soft computing to cybersecurity and cyber forensics.
文摘The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA). In the subsystems of eliminations of vulnerabilities and queues of unauthorized access considered as multichannel queueing systems with corresponding servers and queues, at random times there come requests to fix threats detected by the system. It is supposed that flows of requests demanding to eliminate threats coming to the mentioned subsystems of queueing systems are described with the Poisson distribution of probabilities, but processes of their elimination obey exponential law. For the system described above, there has been developed software realization of graphical interface which allows easily to change input parameters and observe graphical reflection of changes of the output indicators of the system.
基金National High-Tech Research and Development Programs of China( 863 Program) ( No. 2011AA010101,No. 2012AA062203) National Natural Science Foundation of China ( No. 61103069 ) Key Research Project of Shanghai Science and Technology Committee,China( No. 10dz1122600)
文摘As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seriously challenge architecture study. In this paper, a service-oriented architecture of CPS was presented. Further, a two-way time synchronization algorithm for CPS service composition was put forward. And a formal method, for judging if actual CPS service meets space constraints, was suggested, which was based on space-π-calculus proposed. Finally, a case study was performed and CPS business process designed by the model and the proposed methods could run well. The application of research conclusion implies that it has rationality and feasibility.