Replication-based Cyber Foraging and Automated Configuration Management
نویسندگان
چکیده
منابع مشابه
Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملTowards a Search-based Interactive Configuration of Cyber Physical System Product Lines
Product Line Engineering (PLE) is a technique to improve the quality and productivity of developing (via configuration) Cyber Physical Systems (CPSs). A CPS often contains many heterogeneous components with complex constraints relevant to product configuration in the context of PLE. Manual configuration is error-prone and has low productivity since managing and manipulating such constraints in ...
متن کاملMalware in the Future? Forecasting Analyst Detection of Cyber Events
Cyber attacks endanger physical, economic, social, and political security. We use a Bayesian state space model to forecast the number of future cyber attacks. Cyber attacks were defined as malware detected by cyber analysts over seven years using cyber events (i.e., reports of malware attacks supported by evidence) at a large Computer Security Service Provider (CSSP). This CSSP protects a varie...
متن کاملEnabling Cyber Foraging for Mobile Devices
This paper presents the LOCUSTS framework. The aim of the LOCUSTS project is to enable easy use of cyber foraging techniques when developing for small, resource-constrained devices. Cyber foraging, construed as “living off the land”, enables resource poor devices to offload tasks to nearby computing machinery, thereby enabling the small devices to 1) save energy and time, 2) take on tasks that ...
متن کاملA Context-Based Cyber Foraging Approach to Mobile Computing Empowerment
Nowadays mobile devices are very popular and users expect to run the same applications on mobile devices as on static computers. However, these devices often have lower performance than static computers that is due to the constraints imposed on mobile devices by weight, size, and mobility. Cyber foraging approaches have tried to ameliorate the lower performance of mobile devices by exploiting m...
متن کامل