Javascript must be enabled to continue!
DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS
View through CrossRef
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to “chaos” in ensuring the security of modern technologies and systems. So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken. The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours. At the same time, security contours of continuous business processes are considered. This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.
National Technical University Kharkiv Polytechnic Institute
Title: DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS
Description:
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies.
As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration.
The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration.
The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to “chaos” in ensuring the security of modern technologies and systems.
So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken.
The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours.
At the same time, security contours of continuous business processes are considered.
This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.
Related Results
Hu similarity coefficient: a clinically oriented metric to evaluate contour accuracy in radiation therapy
Hu similarity coefficient: a clinically oriented metric to evaluate contour accuracy in radiation therapy
AbstractTo propose a clinically oriented quantitative metric, Hu similarity coefficient (HSC), to evaluate contour quality, gauge the performance of auto contouring methods, and ai...
HU Coefficient: A Clinically Oriented Metric to Evaluate Contour Accuracy in Radiation Therapy
HU Coefficient: A Clinically Oriented Metric to Evaluate Contour Accuracy in Radiation Therapy
Abstract
Purpose
To propose a clinically oriented quantitative metric, the HU coefficient, to evaluate contour quality, gauge the performance of auto contouring methods, a...
Verification of Cyberphysical Systems
Verification of Cyberphysical Systems
The value of verification of cyberphysical systems depends on the relationship between the state of the software and the state of the physical system. This relationship can be comp...
Study on the technique of cross-coupling contour compensation for CNC machine tool's self-adjusting gain coefficient p utilizing dual-axis linkage
Study on the technique of cross-coupling contour compensation for CNC machine tool's self-adjusting gain coefficient p utilizing dual-axis linkage
Abstract
This article explores the challenges of operating high-precision CNC machine tools for dual axis machining, including coordinate axis parameter compensation mismat...
Cross-Coupled Contouring Control of Multi-DOF Robotic Manipulator
Cross-Coupled Contouring Control of Multi-DOF Robotic Manipulator
Reduction of contour error is a very important issue for high precise contour tracking applications, and many control systems were proposed to deal with contour tracking problems f...
Cross-Coupled Contouring Control of Multi-DOF Robotic Manipulator
Cross-Coupled Contouring Control of Multi-DOF Robotic Manipulator
Reduction of contour error is a very important issue for high precise contour tracking applications, and many control systems were proposed to deal with contour tracking problems f...
Socio-Hydrogeology: uncovering the hidden connections within the Human-Groundwater Cycle
Socio-Hydrogeology: uncovering the hidden connections within the Human-Groundwater Cycle
<p>Socio-hydrogeology has been recently proposed as a new approach in the field of human-water research, focusing on the assessment of the reciprocity between people ...
Autonomous Cyberphysical System of Controlled Treatment and Water Composition Control
Autonomous Cyberphysical System of Controlled Treatment and Water Composition Control
An autonomous cyberphysical adaptive system of controlled purification and control of water composition has been considered. Theoretical analysis and experimental studies of the fu...

