Статті в журналах з теми "Security orchestration and automation"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security orchestration and automation.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security orchestration and automation".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Tembhurne, Omprakash, Sonali Milmile, Ganesh R. Pathak, Atul O. Thakare, and Abhijeet Thakare. "An Orchestrator." International Journal of Open Source Software and Processes 13, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijossp.308792.

Повний текст джерела
Анотація:
A development of an orchestrator that manages multiusers and shared resources is extremely useful for automaton of jobs on the multiple machines. Many companies such as UiPath, Blue Prism, Automation Anywhere, etc. have their own orchestrator, but their orchestration services have some drawbacks (i.e., huge cost of yearly subscription, lack of user defined flexibility in architecture, and third-party security issues). The manuscript contains the design and analysis of orchestrator using open-source programming language and cloud platform (i.e., Python and OpenStack). The main focus of this paper is design and development of the orchestrator with shared resources and distribute environment management system that help to manage the multiuser, multi-machine environment in an efficient way. The overall examination delights that design and development of inhouse orchestrator application using open-source assets is not only useful in terms of colossal expense slicing, but also the development of free and flexible robotic process automation applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kinyua, Johnson, and Lawrence Awuah. "AI/ML in Security Orchestration, Automation and Response: Future Research Directions." Intelligent Automation & Soft Computing 28, no. 2 (2021): 527–45. http://dx.doi.org/10.32604/iasc.2021.016240.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Chara Eddine, Meftah Mohammed. "A Comparative Study of Formal Approaches for Web Service Oriented Architecture." Network and Communication Technologies 5, no. 2 (December 31, 2020): 15. http://dx.doi.org/10.5539/nct.v5n2p15.

Повний текст джерела
Анотація:
The security in web service oriented architecture (WSOA) development has become a critical need and goal. WSOA as service-oriented architecture (SOA) designs the software as services and uses the services as platforms. Web services orchestration describes how web services can interact with each other from an operational perspective. Many languages allow expression of executable processes to implementing web services orchestration. These languages are used to describe how the interactions between multiple services are coordinated to achieve a goal. However, the operational semantics of each of the structures of these languages is not formally defined and they have limitations regarding the reasoning and the verification of the web services compositions. Several studies and approaches have been proposed in this context, are devoted to the formalization of web services orchestrations and allow some verification of their behavior; these approaches are partial solutions to the problem of development of the safe composition. We explore the advantages and limitations of more than fourteen approaches and research work. We propose a model for comparison between works, studies, and approaches in this field. The proposed model adopts the concepts of the formalization and the automation of development processes.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Lee, Minkyung, Julian Jang-Jaccard та Jin Kwak. "Novel Architecture of Security Orchestration, Automation and Response in營nternet of Blended Environment". Computers, Materials & Continua 73, № 1 (2022): 199–223. http://dx.doi.org/10.32604/cmc.2022.028495.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chen, Shichao, and Mengchu Zhou. "Evolving Container to Unikernel for Edge Computing and Applications in Process Industry." Processes 9, no. 2 (February 14, 2021): 351. http://dx.doi.org/10.3390/pr9020351.

Повний текст джерела
Анотація:
Industry 4.0 promotes manufacturing and process industry towards digitalization and intellectualization. Edge computing can provide delay-sensitive services in industrial processes to realize intelligent production. Lightweight virtualization technology is one of the key elements of edge computing, which can implement resource management, orchestration, and isolation services without considering heterogenous hardware. It has revolutionized software development and deployment. The scope of this review paper is to present an in-depth analysis of two such technologies, Container and Unikernel, for edge computing. We discuss and compare their applicability in terms of migration, security, and orchestration for edge computing and industrial applications. We describe their performance indexes, evaluation methods and related findings. We then discuss their applications in industrial processes. To promote further research, we present some open issues and challenges to serve as a road map for both researchers and practitioners in the areas of Industry 4.0, industrial process automation, and advanced computing.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ohmori, Motoyuki. "On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System." Journal of Information Processing 27 (2019): 564–73. http://dx.doi.org/10.2197/ipsjjip.27.564.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.

Повний текст джерела
Анотація:
Whether you consider “IoT” as a real thing or a buzzword, there’s no doubt that connected devices, data analysis and automation are transforming industry. CERN is no exception: a network of LoRa-based radiation monitors has recently been deployed and there is a growing interest in the advantages connected devices could bring—to accelerator operations just as much as to building management. Connected devices bring risks as well as advantages, however, and the last thing any business needs is an unsafe, uncoordinated and unmanaged sensor environment. To support the deployment of the LoRa-based radiation sensors, CERN has established both a Low Power Wireless Area Network (LPWAN) to complement the existing wired and wireless networks and a service infrastructure to manage the provisioning, orchestration, data transfer, security and operation for connected devices.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.

Повний текст джерела
Анотація:
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability and oversight of its overall security. Several emerging technologies have restructured our approach to the security of cloud networks; one such approach is the zero-trust network architecture (ZTNA), where no entity is implicitly trusted in the network, regardless of its origin or scope of access. The network rewards trusted behaviour and proactively predicts threats based on its users’ behaviour. The zero-trust network architecture is still at a nascent stage, and there are many frameworks and models to follow. The primary focus of this survey is to compare the novel requirement-specific features used by state-of-the-art research models for zero-trust cloud networks. In this manner, the features are categorized across nine parameters into three main types: zero-trust-based cloud network models, frameworks and proofs-of-concept. ZTNA, when wholly realized, enables network administrators to tackle critical issues such as how to inhibit internal and external cyber threats, enhance the visibility of the network, automate the calculation of trust for network entities and orchestrate security for users. The paper further focuses on domain-specific issues plaguing modern cloud computing networks, which leverage choosing and implementing features necessary for future networks and incorporate intelligent security orchestration, automation and response. The paper also discusses challenges associated with cloud platforms and requirements for migrating to zero-trust architecture. Finally, possible future research directions are discussed, wherein new technologies can be incorporated into the ZTA to build robust trust-based enterprise networks deployed in the cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Goutam, Aradhana, Raj Kamal, and Maya Ingle. "Specification for security Orchestration." Procedia Engineering 38 (2012): 429–41. http://dx.doi.org/10.1016/j.proeng.2012.06.053.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Potter, Bruce. "Security automation." Network Security 2007, no. 9 (September 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Molina Zarca, Alejandro, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, and Antonio F. Skarmeta. "Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems." Sensors 20, no. 13 (June 27, 2020): 3622. http://dx.doi.org/10.3390/s20133622.

Повний текст джерела
Анотація:
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience. In this sense, adaptive and policy-based security frameworks for SDN/NFV-aware IoT systems can provide a remarkable added value for self-protection and self-healing, by orchestrating and enforcing dynamically security policies and associated Virtual Network Functions (VNF) or Virtual network Security Functions (VSF) according to the actual context. However, this security orchestration is subject to multiple possible inconsistencies between the policies to enforce, the already enforced management policies and the evolving status of the managed IoT system. In this regard, this paper presents a semantic-aware, zero-touch and policy-driven security orchestration framework for autonomic and conflict-less security orchestration in SDN/NFV-aware IoT scenarios while ensuring optimal allocation and Service Function Chaining (SFC) of VSF. The framework relies on Semantic technologies and considers the security policies and the evolving IoT system model to dynamically and formally detect any semantic conflict during the orchestration. In addition, our optimized SFC algorithm maximizes the QoS, security aspects and resources usage during VSF allocation. The orchestration security framework has been implemented and validated showing its feasibility and performance to detect the conflicts and optimally enforce the VSFs.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Papadakis-Vlachopapadopoulos, Konstantinos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini Eleni Tsiropoulou, Ioanna Roussaki, and Symeon Papavassiliou. "On Blockchain-Based Cross-Service Communication and Resource Orchestration on Edge Clouds." Informatics 8, no. 1 (February 26, 2021): 13. http://dx.doi.org/10.3390/informatics8010013.

Повний текст джерела
Анотація:
With the advent of 5G verticals and the Internet of Things paradigm, Edge Computing has emerged as the most dominant service delivery architecture, placing augmented computing resources in the proximity of end users. The resource orchestration of edge clouds relies on the concept of network slicing, which provides logically isolated computing and network resources. However, though there is significant progress on the automation of the resource orchestration within a single cloud or edge cloud datacenter, the orchestration of multi-domain infrastructure or multi-administrative domain is still an open challenge. Towards exploiting the network service marketplace at its full capacity, while being aligned with ETSI Network Function Virtualization architecture, this article proposes a novel Blockchain-based service orchestrator that leverages the automation capabilities of smart contracts to establish cross-service communication between network slices of different tenants. In particular, we introduce a multi-tier architecture of a Blockchain-based network marketplace, and design the lifecycle of the cross-service orchestration. For the evaluation of the proposed approach, we set up cross-service communication in an edge cloud and we demonstrate that the orchestration overhead is less than other cross-service solutions.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Klose, Anselm, Julius Lorenz, Lukas Bittorf, Katharina Stark, Mario Hoernicke, Andreas Stutz, Hannes Weinhold, et al. "Orchestration of modular plants." atp magazin 63, no. 9 (August 12, 2022): 68–77. http://dx.doi.org/10.17560/atp.v63i9.2599.

Повний текст джерела
Анотація:
In Modular Automation, the orchestration creates the link between process equipment assemblies (PEA) and processes towards operation. This paper presents a general methodology, so-called type-based orchestration, on how to design a fully functional modular process plant based on the module type package (MTP). In a number of discussion rounds, the steps were identified, generalized, and formulated as a method. Existing standards were applied to describe additional required information. The resulting phases and steps, as well as the practical application, have shown that a large part of the planning can be done using only the type-information of planned modules. The type-based orchestration is later completed with instance information. The methodology was tested against a modular distillation plant from the Technical University of Dortmund.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Qadeer, Arslan, Asad Waqar Malik, Anis Ur Rahman, Hamayun Mian Muhammad, and Arsalan Ahmad. "Virtual Infrastructure Orchestration For Cloud Service Deployment." Computer Journal 63, no. 2 (December 5, 2019): 295–307. http://dx.doi.org/10.1093/comjnl/bxz125.

Повний текст джерела
Анотація:
Abstract Cloud adoption has significantly increased using the infrastructure-as-a-service (IaaS) paradigm, in order to meet the growing demands of computing, storage and networking, in small as well as large enterprises. Different vendors provide their customized solutions for OpenStack deployment on bare metal or virtual infrastructure. Among these many available IaaS solutions, OpenStack stands out as being an agile and open-source platform. However, its deployment procedure is a time-taking and complex process with a learning curve. This paper addresses the lack of basic infrastructure automation in almost all of the OpenStack deployment projects. We propose a flexible framework to automate the process of infrastructure bring up for deployment of several OpenStack distributions, as well as resolving dependencies for a successful deployment. Our experimental results demonstrate the effectiveness of the proposed framework in terms of automation status and deployment time, that is, reducing the time spent in preparing a basic virtual infrastructure by four times, on average.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Highland, HaroldJoseph. "Office automation security." Computers & Security 6, no. 6 (December 1987): 452–57. http://dx.doi.org/10.1016/0167-4048(87)90023-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Stutz, Andreas, Alexander Fay, Mike Barth, and Mathias Maurmaier. "Orchestration vs. Choreography Functional Association for Future Automation Systems." IFAC-PapersOnLine 53, no. 2 (2020): 8268–75. http://dx.doi.org/10.1016/j.ifacol.2020.12.1961.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Pokhrel, Shiva Raj. "Software Defined Internet of Vehicles for Automation and Orchestration." IEEE Transactions on Intelligent Transportation Systems 22, no. 6 (June 2021): 3890–99. http://dx.doi.org/10.1109/tits.2021.3077363.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Wang, Shuyi, and Longxiang Yang. "Securing Dynamic Service Function Chain Orchestration in EC-IoT Using Federated Learning." Sensors 22, no. 23 (November 22, 2022): 9041. http://dx.doi.org/10.3390/s22239041.

Повний текст джерела
Анотація:
Dynamic service orchestration is becoming more and more necessary as IoT and edge computing technologies continue to advance due to the flexibility and diversity of services. With the surge in the number of edge devices and the increase in data volume of IoT scenarios, there are higher requirements for the transmission security of privacy information from each edge device and the processing efficiency of SFC orchestration. This paper proposes a kind of dynamic SFC orchestration security algorithm applicable to EC-IoT scenarios based on the federated learning framework, combined with a block coordinated descent approach and the quadratic penalty algorithm to achieve communication efficiency and data privacy protection. A deep reinforcement learning algorithm is used to simultaneously adapt the SFC orchestration method in order to dynamically observe environmental changes and decrease end-to-end delay. The experimental results show that compared with the existing dynamic SFC orchestration algorithms, the proposed algorithm can achieve better convergence and latency performance under the condition of privacy protection; the overall latency is reduced by about 33%, and the overall convergence speed is improved by about 9%, which not only achieves the security of data privacy protection of edge computing nodes, but also meets the requirements of dynamic SFC orchestration.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Slawomir Kuklinski, Lechoslaw Tomaszewski, Robert Kolakowski, Anne-Marie Bosneag, Ashima Chawla, Adlen Ksentini, Sabra Ben Saad, et al. "AI-driven predictive and scalable management and orchestration of network slices." ITU Journal on Future and Evolving Technologies 3, no. 3 (November 16, 2022): 570–88. http://dx.doi.org/10.52953/ipui5221.

Повний текст джерела
Анотація:
The future network slicing enabled mobile ecosystem is expected to support a wide set of heterogenous vertical services over a common infrastructure. The service robustness and their intrinsic requirements, together with the heterogeneity of mobile infrastructure and resources in both the technological and the spatial domain, significantly increase the complexity and create new challenges regarding network management and orchestration. High degree of automation, flexibility and programmability are becoming the fundamental architectural features to enable seamless support for the modern telco-based services. In this paper, we present a novel management and orchestration platform for network slices, which has been devised by the Horizon 2020 MonB5G project. The proposed framework is a highly scalable solution for network slicing management and orchestration that implements a distributed and programmable AI-driven management architecture. The cognitive capabilities are provided at different levels of management hierarchy by adopting necessary data abstractions. Moreover, the framework leverages intent-based operations to improve its modularity and genericity. The mentioned features enhance the management automation, making the architecture a significant step towards self-managed network slices.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Islam, Chadni, Muhammad Ali Babar, and Surya Nepal. "A Multi-Vocal Review of Security Orchestration." ACM Computing Surveys 52, no. 2 (May 31, 2019): 1–45. http://dx.doi.org/10.1145/3305268.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Hwang, J., K. Bai, M. Tacci, M. Vukovic, and N. Anerousis. "Automation and orchestration framework for large-scale enterprise cloud migration." IBM Journal of Research and Development 60, no. 2-3 (March 2016): 1:1–1:12. http://dx.doi.org/10.1147/jrd.2015.2511810.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Shemyakinskaya, Anastasia Sergeevna, and Igor Valerevich Nikiforov. "Hard drives monitoring automation approach for Kubernetes container orchestration system." Proceedings of the Institute for System Programming of the RAS 32, no. 2 (2020): 99–106. http://dx.doi.org/10.15514/ispras-2020-32(2)-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Williams, Adam D. "Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration." INSIGHT 25, no. 2 (June 2022): 44–48. http://dx.doi.org/10.1002/inst.12385.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Runde, Markus, Walter Speth, Thomas Steffen, and Christoph Thiell. "Automation Security Risk Assessment." atp edition 58 (January 1, 2016): 48. http://dx.doi.org/10.17560/atp.v58i01-02.551.

Повний текст джерела
Анотація:
Um Security-Schutzmaßnahmen für die Automatisierungstechnik sinnvoll zu implementieren, wird eine Entscheidungsgrundlage benötigt. Eine Risikoanalyse, die Werte erfasst und ermittelt, kann das leisten. Der Beitrag stellt praktische Herangehensweisen zur Durchführung von Risikoanalysen vor, die eine Auswahl von hinreichenden Schutzmaßnahmen erlaubt.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Kothiyal, Sonakshi. "Automation in Cyber-Security." International Journal for Research in Applied Science and Engineering Technology 7, no. 5 (May 31, 2019): 581–84. http://dx.doi.org/10.22214/ijraset.2019.5098.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Wong, Ken. "Security and Office Automation." EDPACS 15, no. 3 (September 1987): 5–11. http://dx.doi.org/10.1080/07366988709452219.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Wong, Ken. "Security and office automation." Computers & Security 7, no. 1 (February 1988): 106–7. http://dx.doi.org/10.1016/0167-4048(88)90548-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Sinde, Sai Priya, Bhavika Thakkalapally, Meghamala Ramidi, and Sowmya Veeramalla. "Continuous Integration and Deployment Automation in AWS Cloud Infrastructure." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 1305–9. http://dx.doi.org/10.22214/ijraset.2022.44106.

Повний текст джерела
Анотація:
Abstract-The primary objective of this project is to figure out how an application is automatically deployed. To automate the deployment, we'll require a container orchestration platform. Kubernetes is now a widely used container orchestration tool. Users can deploy, scale, and manage containerized applications thanks to Kubernetes' robustness. Continuous Integration and Continuous Delivery (CI/CD) of a project is required in modern development, and the focus is on developing and executing tests on every commit to ensure your test environment is constantly up-to-date. From the integration and testing phases through the delivery and deployment phases, CI/CD brings automation and continuous monitoring of programmers throughout their lifecycle. GitHub Actions is one of the CI/CD technology available in the market. By using GitHub as a source code management tool, it's best to use GitHub Actions as a continuous integration and delivery solution because it's supplied by GitHub. This does not require any setting or setup. As a result, incorporating these tools will speed up the deployment of an application. Keywords- GitHub Actions, Amazon Web Services, Continuous Integration and Continuous Deployment, Kubernetes, Workflows.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Radack, Shirley, and Rick Kuhn. "Managing Security: The Security Content Automation Protocol." IT Professional 13, no. 1 (January 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Moubayed, Abdallah, Abdallah Shami, and Anwer Al-Dulaimi. "On End-to-End Intelligent Automation of 6G Networks." Future Internet 14, no. 6 (May 29, 2022): 165. http://dx.doi.org/10.3390/fi14060165.

Повний текст джерела
Анотація:
The digital transformation of businesses and services is currently in full force, opening the world to a new set of unique challenges and opportunities. In this context, 6G promises to be the set of technologies, architectures, and paradigms that will promote the digital transformation and enable growth and sustainability by offering the means to interact and control the digital and virtual worlds that are decoupled from their physical location. One of the main challenges facing 6G networks is “end-to-end network automation”. This is because such networks have to deal with more complex infrastructure and a diverse set of heterogeneous services and fragmented use cases. Accordingly, this paper aims at envisioning the role of different enabling technologies towards end-to-end intelligent automated 6G networks. To this end, this paper first reviews the literature focusing on the orchestration and automation of next-generation networks by discussing in detail the challenges facing efficient and fully automated 6G networks. This includes automating both the operational and functional elements for 6G networks. Additionally, this paper defines some of the key technologies that will play a vital role in addressing the research gaps and tackling the aforementioned challenges. More specifically, it outlines how advanced data-driven paradigms such as reinforcement learning and federated learning can be incorporated into 6G networks for more dynamic, efficient, effective, and intelligent network automation and orchestration.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Li, Wei, Yuan Jiang, Xiaoliang Zhang, Fangfang Dang, Feng Gao, Haomin Wang, and Qi Fan. "Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning." Information 13, no. 2 (January 21, 2022): 53. http://dx.doi.org/10.3390/info13020053.

Повний текст джерела
Анотація:
Software-defined networking (SDN) and network function virtualization (NFV) make a network programmable, resulting in a more flexible and agile network. An important and promising application for these two technologies is network security, where they can dynamically chain virtual security functions (VSFs), such as firewalls, intrusion detection systems, and intrusion prevention systems, and thus inspect, monitor, or filter traffic flows in cloud data center networks. In view of the strict delay constraints of security services and the high failure probability of VSFs, we propose the use of a security service chain (SSC) orchestration algorithm that is latency aware with reliability assurance (LARA). This algorithm includes an SSC orchestration module and VSF backup module. We first use a reinforcement learning (RL) based Q-learning algorithm to achieve efficient SSC orchestration and try to reduce the end-to-end delay of services. Then, we measure the importance of the physical nodes carrying the VSF instance and backup VSF according to the node importance of VSF. Extensive simulation results indicate that the LARA algorithm is more effective in reducing delay and ensuring reliability compared with other algorithms.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Priyadharsini, S. "Home Automation and Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 28, 2017): 1174–79. http://dx.doi.org/10.22214/ijraset.2017.3215.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Kaur, Surinder, Rashmi Singh, Neha Khairwal, and Pratyk Jain. "HOME AUTOMATION AND SECURITY SYSTEM." Advanced Computational Intelligence: An International Journal (ACII) 3, no. 3 (July 30, 2016): 17–23. http://dx.doi.org/10.5121/acii.2016.3303.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Mathew, Alex. "Cybersecurity Infrastructure and Security Automation." Advanced Computing: An International Journal 10, no. 6 (November 30, 2019): 1–7. http://dx.doi.org/10.5121/acij.2019.10601.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Chien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (March 5, 2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.

Повний текст джерела
Анотація:
The objective of the home security detection and appliance control system is to protect occupants against events -- many of which are attributable to human error. We have developed a module based security system for home automation. The structure of the security system is divided into many modules. Each module in the home -- automation security system we develop has a wireless RF and a speech interface. They contain fire detection module, intruder detection module, environment detection module, gas detection module, (AC) power detection and diagnosis module, appliance control module and team robots. In the security detection module, we use multisensor fusion algorithms to decide an exact output. In the application control module, we use two-wire communication via wireless RF interface. These modules have event-condition voice alarms, and send the real-time status to the master controller. In the smart team robot system, we have designed many smart robots for the security system. We have designed a general user interface (GUI) for the intelligent security system. The user interface can supervise these modules and team robots via wireless RF interface, and use wireless Internet and mobile phone for remote supervision.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Granzer, Wolfgang, Fritz Praus, and Wolfgang Kastner. "Security in Building Automation Systems." IEEE Transactions on Industrial Electronics 57, no. 11 (November 2010): 3622–30. http://dx.doi.org/10.1109/tie.2009.2036033.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

G, SHYAMALA, Ronith Gowda, Sashikiran Gavanivari, Suvith K S, and Vishwamohan Narendra. "Home Automation Security Using Blockchain." International Journal of Computer Science and Engineering 7, no. 7 (July 25, 2020): 63–68. http://dx.doi.org/10.14445/23488387/ijcse-v7i7p111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Marsh, P. "Beyond control [automation system security]." Information Professional 2, no. 2 (April 1, 2005): 12–16. http://dx.doi.org/10.1049/inp:20050202.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Moradi, Niloofar, Alireza Shameli-Sendi, and Alireza Khajouei. "A Scalable Stateful Approach for Virtual Security Functions Orchestration." IEEE Transactions on Parallel and Distributed Systems 32, no. 6 (June 1, 2021): 1383–94. http://dx.doi.org/10.1109/tpds.2021.3049804.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Pierantoni, Gabriele, Tamas Kiss, Gabor Terstyanszky, James DesLauriers, Gregoire Gesmier, and Hai-Van Dang. "Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud." Journal of Grid Computing 18, no. 4 (June 15, 2020): 761–78. http://dx.doi.org/10.1007/s10723-020-09524-0.

Повний текст джерела
Анотація:
AbstractTypical cloud applications require high-level policy driven orchestration to achieve efficient resource utilisation and robust security to support different types of users and user scenarios. However, the efficient and secure utilisation of cloud resources to run applications is not trivial. Although there have been several efforts to support the coordinated deployment, and to a smaller extent the run-time orchestration of applications in the Cloud, no comprehensive solution has emerged until now that successfully leverages applications in an efficient, secure and seamless way. One of the major challenges is how to specify and manage Quality of Service (QoS) properties governing cloud applications. The solution to address these challenges could be a generic and pluggable framework that supports the optimal and secure deployment and run-time orchestration of applications in the Cloud. A specific aspect of such a cloud orchestration framework is the need to describe complex applications incorporating several services. These application descriptions must specify both the structure of the application and its QoS parameters, such as desired performance, economic viability and security. This paper proposes a cloud technology agnostic approach to application descriptions based on existing standards and describes how these application descriptions can be processed to manage applications in the Cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Valera, A., J. Gomez-Moreno, A. Sánchez, C. Ricolfe-Viala, R. Zotovic, and M. Vallés. "Industrial Robot Programming and UPnP Services Orchestration for the Automation of Factories." International Journal of Advanced Robotic Systems 9, no. 4 (January 2012): 123. http://dx.doi.org/10.5772/51373.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Šimek, Dalibor, and Roman Šperka. "How Robot/human Orchestration Can Help in an HR Department: A Case Study From a Pilot Implementation." Organizacija 52, no. 3 (August 1, 2019): 204–17. http://dx.doi.org/10.2478/orga-2019-0013.

Повний текст джерела
Анотація:
Abstract Background and Purpose: Motivation of this research is to explore the current trend in automating the business processes through software robots (Robotic Process Automation – RPA) and its managing within enterprise environment where most of the processes are executed by human workforce. As the RPA technology expands the demand for its coordinating grows as well. The possible solution to this challenge is shown in case study research in form of implementing orchestration platform to a concrete business process of onboarding in HR department of a multinational company. The aim of this paper is to explore the phases and activities of the pilot project implementation of Robotic Service Orchestration (RSO) in combination with RPA technology and to assess the potential benefits. Design/Methodology/Approach: Case study research approach was selected to explore the research phenomena, which is the implementation of RSO platform in combination with RPA technology and assessing incoming benefits. The case is formed with 2 companies – (1) multinational company with ongoing effort of automating onboarding process, (2) technology and consulting company delivering the automation solution. Data were collected through semi-structured interviews with respondents from two involved companies and by analysing internal documents. Results: The analysis of case provided in this paper revealed some key insights: (1) strategical position of RSO and tactical position of RPA towards the existing legacy systems, (2) need for increased focus on initial process modelling phase, (3) Application Programming Interface (API) integration is more viable solution for RPA, (4) the biggest benefit of RPA - its agility, (5) future potential of the RSO replacing the BPMS. Conclusions: First of all, there is a need of higher number of software robots adopted in a company before orchestration could pay off. On the other side, current Business Process Management Systems (BPMS) solutions don’t offer functionalities for managing human and software robots workforce altogether. RPA is expected to expand and without proper orchestration the effectivity will not grow constantly.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Badewi, Amgad, Essam Shehab, Jing Zeng, and Mostafa Mohamad. "ERP benefits capability framework: orchestration theory perspective." Business Process Management Journal 24, no. 1 (February 2, 2018): 266–94. http://dx.doi.org/10.1108/bpmj-11-2015-0162.

Повний текст джерела
Анотація:
Purpose The purpose of this paper is to answer two research questions: what are the ERP resources and organizational complementary resources (OCRs) required to achieve each group of benefits? And on the basis of its resources, when should an organization invest more in ERP resources and/or OCRs so that the potential value of its ERP is realised? Design/methodology/approach Studying 12 organizations in different countries and validating the results with 8 consultants. Findings ERP benefits realization capability framework is developed; it shows that each group of benefits requires ERP resources (classified into features, attached technologies and information technology department competences) and OCRs (classified into practices, attitudes, culture, skills and organizational characteristics) and that leaping ahead to gain innovation benefits before being mature enough in realising a firm’s planning and automation capabilities could be a waste of time and effort. Research limitations/implications It is qualitative study. It needs to be backed by quantitative studies to test the results. Practical implications Although the “P” in ERP stands for planning, many academics and practitioners still believe that ERP applies to automation only. This research spotlights that the ability to invest in ERP can increase the innovation and planning capabilities of the organization only if it is extended and grown at the right time and if it is supported by OCRs. It is not cost effective to push an organization to achieve all the benefits at the same time; rather, it is clear that an organization would not be able to enjoy a higher level of benefits until it achieves a significant number of lower-level benefits. Thus, investing in higher-level benefit assets directly after an ERP implementation, when there are no organizational capabilities available to use these assets, could be inefficient. Moreover, it could be stressful to users when they see plenty of new ERP resources without the ability to use them. Although it could be of slight benefit to introduce, for example, business intelligence to employees in the “stabilizing period” (Badewi et al., 2013), from the financial perspective, it is a waste of money since the benefits would not be realised as expected. Therefore, orchestrating ERP assets with the development of organizational capabilities is important for achieving the greatest effectiveness and efficiency of the resources available to the organization. This research can be used as a benchmark for designing the various blueprints required to achieve different groups of benefits from ERP investments. Originality/value This research addresses two novel questions: RQ1: what are the ERP resources and OCRs required to achieve the different kinds of ERP benefits? RQ2: when, and on what basis, should an organization deploy more resources to leverage the ERP business value?
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Hermosilla, Ana, Alejandro Molina Zarca, Jorge Bernal Bernabe, Jordi Ortiz, and Antonio Skarmeta. "Security Orchestration and Enforcement in NFV/SDN-Aware UAV Deployments." IEEE Access 8 (2020): 131779–95. http://dx.doi.org/10.1109/access.2020.3010209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Ben Said, Najah, and Ioana Cristescu. "End-to-end information flow security for web services orchestration." Science of Computer Programming 187 (February 2020): 102376. http://dx.doi.org/10.1016/j.scico.2019.102376.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Chen, Liang, Xiao Jun Zuo, and Yu Fei Wang. "Research on Information Security Test Bed and Evaluation Framework for Distribution Automation System." Applied Mechanics and Materials 737 (March 2015): 210–13. http://dx.doi.org/10.4028/www.scientific.net/amm.737.210.

Повний текст джерела
Анотація:
Analyzing the characters and abstracting the system model of the distribution automation system, information security test-bed of distribution automation is designed. Meanwhile, information security test and evaluation framework is proposed based on the lifecycle of distribution automation system. The evaluation activities and the testing methods are analyzed and key problems and solutions of information security evaluation and reinforcement requirements for distribution automation system are introduced. The work in this paper can effectively support the information security protection of distribution automation system, and can provide reference for other power industrial control systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Liu, Fang. "Social Security Research under Automation Control." Applied Mechanics and Materials 340 (July 2013): 621–25. http://dx.doi.org/10.4028/www.scientific.net/amm.340.621.

Повний текст джерела
Анотація:
The development of the modern welfare state is not isolated; their welfare policy implementation depends on the advanced economy, extensive coverage, the perfect system, the diversification and welfare system mandatory. Social network analysis is just take this dependence into account, and develop corresponding method to deal with the relationship between variables. This paper, based on the p* model analysis, takes Sweden and Finland, two typical Nordic welfare state, as the examples, and finds the differences in disease disability insurance, unemployment insurance and etc. To understand these differences is of great importance to think about whether to conduct the reform of the welfare state, and how to combine the concrete national conditions with the reform.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Singh, Er Dhananjali, Satyendra Kumar Singh, and Jitendra Kumar Yadav. "Home Automation and Security Using IOT." IJARCCE 8, no. 5 (May 30, 2019): 52–56. http://dx.doi.org/10.17148/ijarcce.2019.8512.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Kirubakaran, B., K. Baveena, M. Keerthana, and R. Ramya. "Automation Based StairBOT for Security Application." DJ Journal of Advances in Electronics and Communication Engineering 4, no. 2 (May 26, 2018): 17–21. http://dx.doi.org/10.18831/djece.org/2018021003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Treytl, Albert, Peter Palensky, and Thilo Sauter. "SECURITY CONSIDERATIONS FOR ENERGY AUTOMATION NETWORKS." IFAC Proceedings Volumes 38, no. 2 (2005): 158–65. http://dx.doi.org/10.3182/20051114-2-mx-3901.00023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії