Socio-Technical Security Modelling: Analysis of State-of-the-Art,
Application, and Maturity in Critical Industrial Infrastructure
Environments/Domains
- URL: http://arxiv.org/abs/2305.05108v1
- Date: Tue, 9 May 2023 00:34:12 GMT
- Title: Socio-Technical Security Modelling: Analysis of State-of-the-Art,
Application, and Maturity in Critical Industrial Infrastructure
Environments/Domains
- Authors: Uchenna D Ani, Jeremy M Watson, Nilufer Tuptuk, Steve Hailes, Aslam
Jawar
- Abstract summary: This study explores the state-of-the-art, application, and maturity of socio-technical security models for industries and sectors dependent on CI.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: This study explores the state-of-the-art, application, and maturity of
socio-technical security models for industries and sectors dependent on CI and
investigates the gap between academic research and industry practices
concerning the modelling of both the social and technical aspects of security.
Systematic study and critical analysis of literature show that a steady and
growing on socio-technical security M&S approaches is emerging, possibly
prompted by the growing recognition that digital systems and workplaces do not
only comprise technologies, but also social (human) and sometimes physical
elements.
Related papers
- Ontology Embedding: A Survey of Methods, Applications and Resources [54.3453925775069]
Ontologies are widely used for representing domain knowledge and meta data.
One straightforward solution is to integrate statistical analysis and machine learning.
Numerous papers have been published on embedding, but a lack of systematic reviews hinders researchers from gaining a comprehensive understanding of this field.
arXiv Detail & Related papers (2024-06-16T14:49:19Z) - Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia [4.4037442949276455]
Recent research advances in Artificial Intelligence (AI) have yielded promising results for automated software vulnerability management.
The industry remains very cautious and selective about integrating AI-based techniques into their security vulnerability management workflow.
We propose a set of future directions to help better understand industry expectations, improve the practical usability of AI-based security vulnerability research, and drive a synergistic relationship between industry and academia.
arXiv Detail & Related papers (2024-05-03T19:00:50Z) - Leveraging Traceability to Integrate Safety Analysis Artifacts into the
Software Development Process [51.42800587382228]
Safety assurance cases (SACs) can be challenging to maintain during system evolution.
We propose a solution that leverages software traceability to connect relevant system artifacts to safety analysis models.
We elicit design rationales for system changes to help safety stakeholders analyze the impact of system changes on safety.
arXiv Detail & Related papers (2023-07-14T16:03:27Z) - Emerging Technology and Policy Co-Design Considerations for the Safe and
Transparent Use of Small Unmanned Aerial Systems [55.60330679737718]
The rapid technological growth observed in the sUAS sector has left gaps in policies and regulations to provide for a safe and trusted environment in which to operate these devices.
From human factors to autonomy, we recommend a series of steps that can be taken by partners in the academic, commercial, and government sectors to reduce policy gaps introduced in the wake of the growth of the sUAS industry.
arXiv Detail & Related papers (2022-12-06T07:17:46Z) - Security and Safety Aspects of AI in Industry Applications [0.0]
We summarise issues in the domains of safety and security in machine learning that will affect industry sectors in the next five to ten years.
Reports of underlying problems in both safety and security related domains, for instance adversarial attacks have unsettled early adopters.
The problem for real-world applicability lies in being able to assess the risk of applying these technologies.
arXiv Detail & Related papers (2022-07-16T16:41:00Z) - Detecting Emerging Technologies and their Evolution using Deep Learning
and Weak Signal Analysis [0.0]
We present a multi-layer quantitative approach able to identify future signs from scientific publications on hypersonics.
The proposed framework can help strategic planners and domain experts better identify and monitor emerging technology trends.
arXiv Detail & Related papers (2022-05-11T12:50:43Z) - Holistic Adversarial Robustness of Deep Learning Models [91.34155889052786]
Adversarial robustness studies the worst-case performance of a machine learning model to ensure safety and reliability.
This paper provides a comprehensive overview of research topics and foundational principles of research methods for adversarial robustness of deep learning models.
arXiv Detail & Related papers (2022-02-15T05:30:27Z) - Human-Robot Collaboration and Machine Learning: A Systematic Review of
Recent Research [69.48907856390834]
Human-robot collaboration (HRC) is the approach that explores the interaction between a human and a robot.
This paper proposes a thorough literature review of the use of machine learning techniques in the context of HRC.
arXiv Detail & Related papers (2021-10-14T15:14:33Z) - Trustworthy AI and Robotics and the Implications for the AEC Industry: A
Systematic Literature Review and Future Potentials [0.0]
The study focuses on trust in AI and robotics (AIR) applications in the architecture, engineering, and construction (AEC) industry.
The connections of the identified dimensions to the existing and potential AEC applications are determined and discussed.
Finally, major future directions on trustworthy AI and robotics in AEC research and practice are outlined.
arXiv Detail & Related papers (2021-09-27T22:33:56Z) - Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper [50.25428141435537]
Artificial Intelligence for IT Operations (AIOps) is an emerging interdisciplinary field arising in the intersection between machine learning, big data, streaming analytics, and the management of IT operations.
Main aim of the AIOPS workshop is to bring together researchers from both academia and industry to present their experiences, results, and work in progress in this field.
arXiv Detail & Related papers (2021-01-15T10:43:10Z) - Model for Techno-Economic Assessment of Access Technologies. Doctoral
Dissertation for PhD, Telecommunications Engineering (EECS) [0.0]
This dissertation shows State of the Art of techno-economic modeling for access network technologies.
The author defines and develops a Universal Techno-Economic Model called UTEM.
arXiv Detail & Related papers (2020-07-27T15:21:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.