[图书][B] Artificial intelligence safety and security

RV Yampolskiy - 2018 - books.google.com
The history of robotics and artificial intelligence in many ways is also the history of
humanity's attempts to control such technologies. From the Golem of Prague to the military …

Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

[HTML][HTML] A critical analysis of the industrial device scanners' potentials, risks, and preventives

M Borhani, GS Gaba, J Basaez, I Avgouleas… - Journal of Industrial …, 2024 - Elsevier
Industrial device scanners allow anyone to scan devices on private networks and the
Internet. They were intended as network security tools, but they are commonly exploited as …

[PDF][PDF] Cyber wargaming: Finding, designing, and playing wargames for cyber security education

A Haggman - 2019 - core.ac.uk
This thesis investigates, and contributes to, the use of wargaming in cyber security
education. Wargaming has a rich history of pedagogic use, but little work exists that …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive Monitoring

ATAL Ghazo, R Kumar - IEEE Transactions on Systems, Man …, 2024 - ieeexplore.ieee.org
Supervisory control and data acquisition (SCADA) and industrial control systems (ICSs) are
designed to operate for extended periods of time and can withstand extreme conditions …

Disjunctive scenarios of catastrophic AI risk

K Sotala - Artificial intelligence safety and security, 2018 - taylorfrancis.com
Artificial intelligence (AI) safety work requires an understanding of what could cause AI to
become unsafe. This chapter seeks to provide a broad look at the various ways in which the …

ICS/SCADA device recognition: A hybrid communication-patterns and passive-fingerprinting approach

AT Al Ghazo, R Kumar - 2019 IFIP/IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA)
systems are the backbones for monitoring and supervising factories, power grids, water …

Analyzing Internet-connected industrial equipment

A Hansson, M Khodari, A Gurtov - … International Conference on …, 2018 - ieeexplore.ieee.org
The search engine Shodan crawls the Internet to collect banners from Internet connected
devices. When making this information publicly available, anyone can search and find these …

Policing the cyber-physical space

A Leppänen, T Kiravuo, S Kajantie - The police journal, 2016 - journals.sagepub.com
In this paper we study how the cyber-physical space of a small nation is policed. Our
qualitative study is based on content analysis of expert interviews. We found that the country …