Counter-terrorism in cyber-physical spaces: Best practices and
technologies from the state of the art
- URL: http://arxiv.org/abs/2311.17012v1
- Date: Tue, 28 Nov 2023 18:06:30 GMT
- Title: Counter-terrorism in cyber-physical spaces: Best practices and
technologies from the state of the art
- Authors: Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo
Mecella, WillemJan Van Den Heuvel
- Abstract summary: The demand for protection and security of physical spaces and urban areas increased with the escalation of terroristic attacks in recent years.
We envision with the proposed cyber-physical systems and spaces, a city that would indeed become a smarter urbanistic object, proactively providing alerts and being protective against any threat.
- Score: 3.072386223958412
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Context: The demand for protection and security of physical spaces and urban
areas increased with the escalation of terroristic attacks in recent years. We
envision with the proposed cyber-physical systems and spaces, a city that would
indeed become a smarter urbanistic object, proactively providing alerts and
being protective against any threat. Objectives: This survey intend to provide
a systematic multivocal literature survey comprised of an updated,
comprehensive and timely overview of state of the art in counter-terrorism
cyber-physical systems, hence aimed at the protection of cyber-physical spaces.
Hence, provide guidelines to law enforcement agencies and practitioners
providing a description of technologies and best practices for the protection
of public spaces. Methods: We analyzed 112 papers collected from different
online sources, both from the academic field and from websites and blogs
ranging from 2004 till mid-2022. Results: a) There is no one single
bullet-proof solution available for the protection of public spaces. b) From
our analysis we found three major active fields for the protection of public
spaces: Information Technologies, Architectural approaches, Organizational
field. c) While the academic suggest best practices and methodologies for the
protection of urban areas, the market did not provide any type of
implementation of such suggested approaches, which shows a lack of
fertilization between academia and industry. Conclusion: The overall analysis
has led us to state that there is no one single solution available, conversely,
multiple methods and techniques can be put in place to guarantee safety and
security in public spaces. The techniques range from architectural design to
rethink the design of public spaces keeping security into account in
continuity, to emerging technologies such as AI and predictive surveillance.
Related papers
- Leveraging Digital Twin Technologies for Public Space Protection and Vulnerability Assessment [1.6556140382577318]
A Digital Twin-as-a-Security-Service (DTS) architecture is introduced for holistically enhancing the protection of public spaces.
The proposed framework combines a Digital Twin (DT) conceptualization with additional cutting-edge technologies, including Internet of Things (IoT), cloud computing, Big Data analytics and AI.
Overall, the architecture exhibits increased potential in handling complex, hybrid and combined threats over large, critical and popular soft-targets.
arXiv Detail & Related papers (2024-08-30T09:27:12Z) - Safeguarding Large Language Models: A Survey [20.854570045229917]
"Safeguards" or "guardrails" have become imperative to ensure the ethical use of Large Language Models (LLMs) within prescribed boundaries.
This article provides a systematic literature review on the current status of this critical mechanism.
It discusses its major challenges and how it can be enhanced into a comprehensive mechanism dealing with ethical issues in various contexts.
arXiv Detail & Related papers (2024-06-03T19:27:46Z) - Advancements In Crowd-Monitoring System: A Comprehensive Analysis of
Systematic Approaches and Automation Algorithms: State-of-The-Art [0.0]
Crowd monitoring systems depend on a bifurcated approach, encompassing vision-based and non-vision-based technologies.
This paper endeavors to present an in-depth analysis of the recent incorporation of artificial intelligence (AI) algorithms and models into automated systems.
arXiv Detail & Related papers (2023-08-07T20:50:48Z) - Emerging Technology and Policy Co-Design Considerations for the Safe and
Transparent Use of Small Unmanned Aerial Systems [55.60330679737718]
The rapid technological growth observed in the sUAS sector has left gaps in policies and regulations to provide for a safe and trusted environment in which to operate these devices.
From human factors to autonomy, we recommend a series of steps that can be taken by partners in the academic, commercial, and government sectors to reduce policy gaps introduced in the wake of the growth of the sUAS industry.
arXiv Detail & Related papers (2022-12-06T07:17:46Z) - Adversarial Patch Attacks and Defences in Vision-Based Tasks: A Survey [1.0323063834827415]
Adversarial attacks in deep learning models, especially for safety-critical systems, are gaining more and more attention in recent years, due to the lack of trust in the security and robustness of AI models.
Yet the more primitive adversarial attacks might be physically infeasible or require some resources that are hard to access like the training data, which motivated the emergence of patch attacks.
In this survey, we provide a comprehensive overview to cover existing techniques of adversarial patch attacks, aiming to help interested researchers quickly catch up with the progress in this field.
arXiv Detail & Related papers (2022-06-16T17:06:47Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Privacy and Robustness in Federated Learning: Attacks and Defenses [74.62641494122988]
We conduct the first comprehensive survey on this topic.
Through a concise introduction to the concept of FL, and a unique taxonomy covering: 1) threat models; 2) poisoning attacks and defenses against robustness; 3) inference attacks and defenses against privacy, we provide an accessible review of this important topic.
arXiv Detail & Related papers (2020-12-07T12:11:45Z) - Trustworthy AI Inference Systems: An Industry Research View [58.000323504158054]
We provide an industry research view for approaching the design, deployment, and operation of trustworthy AI inference systems.
We highlight opportunities and challenges in AI systems using trusted execution environments.
We outline areas of further development that require the global collective attention of industry, academia, and government researchers.
arXiv Detail & Related papers (2020-08-10T23:05:55Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.