Cloud-enabled prognosis for manufacturing

R Gao, L Wang, R Teti, D Dornfeld, S Kumara, M Mori… - CIRP annals, 2015 - Elsevier
Advanced manufacturing depends on the timely acquisition, distribution, and utilization of
information from machines and processes across spatial boundaries. These activities can …

An evolutionary game-theoretic framework for cyber-threat information sharing

D Tosh, S Sengupta, C Kamhoua… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
The initiative to protect against future cyber crimes requires a collaborative effort from all
types of agencies spanning industry, academia, federal institutions, and military agencies …

Reference ontology for cybersecurity operational information

T Takahashi, Y Kadobayashi - The Computer Journal, 2015 - ieeexplore.ieee.org
As our cyber society develops and expands, the importance of cybersecurity operations is
growing in response to cybersecurity threats coming from beyond national borders. Efficient …

Cyber-investment and cyber-information exchange decision modeling

DK Tosh, M Molloy, S Sengupta… - 2015 IEEE 17th …, 2015 - ieeexplore.ieee.org
Inefficiency of addressing cybersecurity problems can be settled by the corporations if they
work in a collaborative manner, exchanging security information with each other. However …

Game theoretic modeling to enforce security information sharing among firms

DK Tosh, S Sengupta, S Mukhopadhyay… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
Robust CYBersecurity information EXchange (CYBEX) infrastructure is envisioned to protect
the firms from future cyber attacks via collaborative threat intelligence sharing, which might …

[PDF][PDF] A structural design for a pan-European early warning system for critical infrastructures.

H Kaufmann, R Hutter, F Skopik… - Elektrotech …, 2015 - cess-net.eu
The protection of critical infrastructures increasingly demands solutions across
interdependent infrastructures all over Europe supporting incident detection and …

[PDF][PDF] Mitigating risks arising from false-flag and no-flag cyber attacks

M Pihelgas - CCD COE, NATO, Tallinn, 2015 - ccdcoe.org
Difficulty of attribution is one of the main challenges for nations in reducing the overall
insecurity coming from cyberspace and addressing specific malicious actors. Lack of …

Strategic Cyber Intelligence: An Examination of Practices across Industry, Government, and Military

C Uthoff - Current and Emerging Trends in Cyber Operations …, 2015 - Springer
Over the past decade, despite advances in cyber defense technology, there has been a
growth in the sophistication and persistence of cyber attacks and online nefarious activity …

[PDF][PDF] Cloud-Enabled Prognosis for Manufacturing

P Model, C Monitoring - tsapps.nist.gov
Prognosis refers to forecasting the likely outcome of a situation, and typically involves two
inherently related steps. First, analytical models are established to summarize the historical …

Ein Architektur-Entwurf für ein europaweites Frühwarnsystem für kritische Infrastrukturen

H Kaufmann, R Hutter, F Skopik, M Mantere - e & i Elektrotechnik und …, 2015 - Springer
The protection of critical infrastructures increasingly demands solutions across
interdependent infrastructures all over Europe supporting incident detection and …