ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the ...ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed.展开更多
The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has dri...The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations.展开更多
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f...This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.展开更多
This study presents a systematic review of applications of artificial intelligence(abbreviated as AI)and blockchain in supply chain provenance traceability and legal forensics cover five sectors:integrated circuits(ab...This study presents a systematic review of applications of artificial intelligence(abbreviated as AI)and blockchain in supply chain provenance traceability and legal forensics cover five sectors:integrated circuits(abbreviated as ICs),pharmaceuticals,electric vehicles(abbreviated as EVs),drones(abbreviated as UAVs),and robotics—in response to rising trade tensions and geopolitical conflicts,which have heightened concerns over product origin fraud and information security.While previous literature often focuses on single-industry contexts or isolated technologies,this reviewcomprehensively surveys these sectors and categorizes 116 peer-reviewed studies by application domain,technical architecture,and functional objective.Special attention is given to traceability control mechanisms,data integrity,and the use of forensic technologies to detect origin fraud.The study further evaluates real-world implementations,including blockchain-enabled drug tracking systems,EV battery raw material traceability,and UAV authentication frameworks,demonstrating the practical value of these technologies.By identifying technological challenges and policy implications,this research provides a comprehensive foundation for future academic inquiry,industrial adoption,and regulatory development aimed at enhancing transparency,resilience,and trust in global supply chains.展开更多
在介绍智能电网的信息通信系统(information and communication system,ICS)业务需求的基础上,提出了支持中国特色智能化电网的ICS体系架构,给出了支持中国特色智能化电网的ICS标准体系结构。ICS体系架构涉及信息通信技术、ICS体系框架...在介绍智能电网的信息通信系统(information and communication system,ICS)业务需求的基础上,提出了支持中国特色智能化电网的ICS体系架构,给出了支持中国特色智能化电网的ICS标准体系结构。ICS体系架构涉及信息通信技术、ICS体系框架、ICS网络管理和ICS网络安全防护等方面内容。预期了支撑中国智能化电网的信息通信技术研究热点和ICS建设与示范工程。建议加强支持中国特色智能化电网ICS的网络管理、安全防护和技术标准体系建设工作。展开更多
文摘ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed.
文摘The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations.
基金funded by the Office of Gas and Electricity Markets(Ofgem)and supported by De Montfort University(DMU)and Nottingham Trent University(NTU),UK.
文摘This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.
文摘This study presents a systematic review of applications of artificial intelligence(abbreviated as AI)and blockchain in supply chain provenance traceability and legal forensics cover five sectors:integrated circuits(abbreviated as ICs),pharmaceuticals,electric vehicles(abbreviated as EVs),drones(abbreviated as UAVs),and robotics—in response to rising trade tensions and geopolitical conflicts,which have heightened concerns over product origin fraud and information security.While previous literature often focuses on single-industry contexts or isolated technologies,this reviewcomprehensively surveys these sectors and categorizes 116 peer-reviewed studies by application domain,technical architecture,and functional objective.Special attention is given to traceability control mechanisms,data integrity,and the use of forensic technologies to detect origin fraud.The study further evaluates real-world implementations,including blockchain-enabled drug tracking systems,EV battery raw material traceability,and UAV authentication frameworks,demonstrating the practical value of these technologies.By identifying technological challenges and policy implications,this research provides a comprehensive foundation for future academic inquiry,industrial adoption,and regulatory development aimed at enhancing transparency,resilience,and trust in global supply chains.
文摘在介绍智能电网的信息通信系统(information and communication system,ICS)业务需求的基础上,提出了支持中国特色智能化电网的ICS体系架构,给出了支持中国特色智能化电网的ICS标准体系结构。ICS体系架构涉及信息通信技术、ICS体系框架、ICS网络管理和ICS网络安全防护等方面内容。预期了支撑中国智能化电网的信息通信技术研究热点和ICS建设与示范工程。建议加强支持中国特色智能化电网ICS的网络管理、安全防护和技术标准体系建设工作。