Journal paper

file

Visible to the public OODA Loops in Cyberspace: A New Cyber-Defense Model

Colonel John Boyd's Observe/Orient/Decide/Act Loop ("OODA loop") is a widely adopted decision-making analytical framework.

We combine the OODA loop with the NSA Methodology for Adversary Obstruction to create a new cyber-defense model.

file

Visible to the public Differentially Private Average Consensus: Obstructions, Trade-Offs, and Optimal Algorithm Design

This paper studies the multi-agent average consensus problem under the requirement of differential privacy of the agents' initial states against an adversary that has access to all the messages. We first establish that a differentially private consensus algorithm cannot guarantee convergence of the agents' states to the exact average in distribution, which in turn implies the same impossibility for other stronger notions of convergence.

event

Visible to the public  The Fourth International Conference On Digital Enterprise and Information Systems
Jul 19, 2017 9:00 am - Jul 20, 2017 5:00 pm UTC

You are invited to participate in The Fourth International Conference On Digital Enterprise and Information Systems (DEIS2017) that will be held in Jakarta, Indonesia, on July 19 - 20, 2017. The event will be held over two days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

forum

Visible to the public CfP: The Cyber-Physical Systems journal invites you to submit your research

Dear readers,

Please find below a general call for papers to the Cyber Physical Systems journal. I'd be delighted to answer any questions or queries that you may have and look forward reading your research.

With best wishes,

Mr Richard Goodman

file

Visible to the public A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer.

file

Visible to the public The Healthtech Declaration

Healthcare technology--sometimes called "healthtech" or "healthsec"--is enmeshed with security and privacy via usability, performance, and cost-effectiveness issues. It is multidisciplinary, distributed, and complex--nd it also involves many competing stakeholders and interests.

file

Visible to the public arch2015spec.bib

file

Visible to the public Supporting Heterogeneity in Cyber-Physical Systems Architectures

Abstract: Cyber-physical systems (CPS) are heterogeneous, because they tightly couple computation, communication and control along with physical dynamics, which are traditionally considered separately. Without a comprehensive modeling formalism, model-based development of CPS involves using a multitude of models in a variety of formalisms that capture various aspects of the system design, such as software design, networking design, physical models, and protocol design.

file

Visible to the public Causal Entropic Forces _ Alex Wissner-Gross

Recent advances in fields ranging from cosmology to computer science have hinted at a possible deep connection between intelligence and entropy maximization, but no formal physical relationship between them has yet been established. Here, we explicitly propose a first step toward such a relationship in the form of a causal generalization of entropic forces that we find can cause two defining behaviors of the human ''cognitive niche''--tool use and social cooperation--to spontaneously emerge in simple physical systems.