The document summarizes an experiment using software agents to validate the N2C2M2 theory of network-enabled operations. The experiment involved running 135 simulations of 5 different C2 approaches (command and control approaches) using different combinations of agent archetypes. The results showed that more network-enabled C2 approaches achieved higher levels of shared information, shared awareness, and self-synchronization. More network-enabled approaches also performed better in terms of effectiveness and efficiency, with Coordinated, Collaborative and Edge approaches showing the highest scores overall. The agents behaved better than observed human subjects and did not differentiate performance based on assigned roles.
Plataforma web y metodología para el desarrollo de sistemas sensibles al cont...damarcant
This document describes a web platform and methodology for developing context-aware systems through collaboration between programmers and domain experts. It proposes a Situation-Driven Development methodology with 5 stages to guide the collaborative process. It also presents the Context Cloud platform, which was designed based on literature requirements to support automatic context management, reasoning, location detection, end-user development and visualization. An evaluation showed the methodology and platform facilitated involvement of domain experts and allowed situations to be configured without programmer intervention. The contributions enable context-aware system development by both technical and non-technical users.
Curso OCR - 07 - novos modelos e abordagens de C2Marco Manso
O documento discute novos modelos e abordagens de comando e controle (C2) no contexto das operações centradas em rede. Apresenta o modelo de maturidade de C2 da NATO, que define cinco níveis de capacidade operacional associados a cinco abordagens de C2. Também introduz o framework N2C2M2, que relaciona a abordagem de C2 com o desempenho da força, e discute a importância da experimentação para validar estes modelos teóricos.
EU-RESPOND was presented for the EDA EURIdea consisting of the use of robots for CBRNE and IED neutralisation events.
Presentation by Marco Manso - RINICOM at the 6th December 2013 in Athens, Greece.
Planta de procesamiento de jugos a base de frutales amazonicosmilu14
El documento propone crear una planta de procesamiento de jugos a partir de frutas amazónicas como el arazá, la cocona, el copoazu y la uva caimarona. La planta requeriría maquinaria para despulpar, envasar, destilar y mezclar los jugos. Esto generaría empleo, fortalecería la agricultura local y permitiría exportar nuevos productos basados en las frutas de la región.
The document discusses research priorities for security technologies in Horizon 2020. It describes the work of IMG-S, a group of 119 organizations from 24 European countries that aims to identify security research needs and gaps. The document outlines IMG-S's view on key research areas, including adaptive wide-area surveillance, citizen participation in security monitoring, improving situation awareness sharing between organizations, and developing critical technologies like secure vehicle communications and next-generation communications for first responders. It also discusses specific technical challenges within areas like border surveillance, underwater security, and large heterogeneous sensor networks.
Rinicom is a privately owned, profitable company incorporated in 2002 that specializes in wireless communications and digital TV technologies. They have a range of products including the Rinicom R1000 transmitter, RiniLink handheld receiver, PodNode wireless mesh network, and Rinicom RapidNet integrated wireless surveillance system. Rinicom has a strong research team and partnerships with universities and major customers in industries like emergency response, military, and biometrics.
IMG-S is an open forum of over 100 entities from 24 countries that brings together experts from industry, SMEs, research organizations and academia to address European and global security needs. It has 6 technical areas and 1 cross-technical group that provide consensus views on research priorities. It also has a Synthesis and Coordination Group that develops a holistic security research view and identifies priorities for Horizon 2020. This position paper results from 188 research topics suggested by IMG-S members across 14 strategic areas such as cyber security, border management, critical infrastructure protection, and standardization/interoperability.
This document summarizes a paper on the role of social media in crisis situations. It begins by defining key terms like crisis and social media. It then reviews several past crises like Hurricane Katrina and the Haiti earthquake, highlighting lessons learned about how social media was used when traditional communication systems failed. These include using SMS texting, citizen journalism on sites like Twitter and blogs, and crowdsourcing maps and relief coordination through platforms like Ushahidi. The document stresses the importance of social media in filling information voids and aiding response when infrastructure is damaged.
Plataforma web y metodología para el desarrollo de sistemas sensibles al cont...damarcant
This document describes a web platform and methodology for developing context-aware systems through collaboration between programmers and domain experts. It proposes a Situation-Driven Development methodology with 5 stages to guide the collaborative process. It also presents the Context Cloud platform, which was designed based on literature requirements to support automatic context management, reasoning, location detection, end-user development and visualization. An evaluation showed the methodology and platform facilitated involvement of domain experts and allowed situations to be configured without programmer intervention. The contributions enable context-aware system development by both technical and non-technical users.
Curso OCR - 07 - novos modelos e abordagens de C2Marco Manso
O documento discute novos modelos e abordagens de comando e controle (C2) no contexto das operações centradas em rede. Apresenta o modelo de maturidade de C2 da NATO, que define cinco níveis de capacidade operacional associados a cinco abordagens de C2. Também introduz o framework N2C2M2, que relaciona a abordagem de C2 com o desempenho da força, e discute a importância da experimentação para validar estes modelos teóricos.
EU-RESPOND was presented for the EDA EURIdea consisting of the use of robots for CBRNE and IED neutralisation events.
Presentation by Marco Manso - RINICOM at the 6th December 2013 in Athens, Greece.
Planta de procesamiento de jugos a base de frutales amazonicosmilu14
El documento propone crear una planta de procesamiento de jugos a partir de frutas amazónicas como el arazá, la cocona, el copoazu y la uva caimarona. La planta requeriría maquinaria para despulpar, envasar, destilar y mezclar los jugos. Esto generaría empleo, fortalecería la agricultura local y permitiría exportar nuevos productos basados en las frutas de la región.
The document discusses research priorities for security technologies in Horizon 2020. It describes the work of IMG-S, a group of 119 organizations from 24 European countries that aims to identify security research needs and gaps. The document outlines IMG-S's view on key research areas, including adaptive wide-area surveillance, citizen participation in security monitoring, improving situation awareness sharing between organizations, and developing critical technologies like secure vehicle communications and next-generation communications for first responders. It also discusses specific technical challenges within areas like border surveillance, underwater security, and large heterogeneous sensor networks.
Rinicom is a privately owned, profitable company incorporated in 2002 that specializes in wireless communications and digital TV technologies. They have a range of products including the Rinicom R1000 transmitter, RiniLink handheld receiver, PodNode wireless mesh network, and Rinicom RapidNet integrated wireless surveillance system. Rinicom has a strong research team and partnerships with universities and major customers in industries like emergency response, military, and biometrics.
IMG-S is an open forum of over 100 entities from 24 countries that brings together experts from industry, SMEs, research organizations and academia to address European and global security needs. It has 6 technical areas and 1 cross-technical group that provide consensus views on research priorities. It also has a Synthesis and Coordination Group that develops a holistic security research view and identifies priorities for Horizon 2020. This position paper results from 188 research topics suggested by IMG-S members across 14 strategic areas such as cyber security, border management, critical infrastructure protection, and standardization/interoperability.
This document summarizes a paper on the role of social media in crisis situations. It begins by defining key terms like crisis and social media. It then reviews several past crises like Hurricane Katrina and the Haiti earthquake, highlighting lessons learned about how social media was used when traditional communication systems failed. These include using SMS texting, citizen journalism on sites like Twitter and blogs, and crowdsourcing maps and relief coordination through platforms like Ushahidi. The document stresses the importance of social media in filling information voids and aiding response when infrastructure is damaged.
The document discusses experiments conducted to operationalize and improve command and control (C2) agility. The experiments aimed to determine if the theoretical foundations for improving C2 agility could be applied in practice. The experiments used an online platform called ELICIT to simulate different C2 approaches and measure their agility. The results of the experiments provided lessons for improving C2 agility in real-world operations.
This is the Second webinar about a Megatris Comp ‘s IoT design method Here&Now.
The method has the scope to design contextual, liquid, intelligent and connected applications. This means to design software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
National cybersecurity capacity building framework for countries in a transit...Mohamed Ben Naseir
National Cybersecurity Capacity Building Framework for Countries in a Transitional Phase
Topics: Business Modeling and Business Process Management; Maturity Models for EA Artefacts and Processes; Models and Frameworks
In Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS, 841-849, 2020.
Michael Goldsmith and I presented an overview of cybersecurity capacity building and current research findings for delegates from across the Commonwealth nations. The first section of slides introduces the Global Cyber Security Capacity Centre (GCSCC), and the second part presents a comparative analysis of the status and impact of capacity building.
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
This presentation was given by Prof Michael Goldsmith and Dr Patricia Esteve-González, both from the Global Cyber Security Capacity Centre (GCSCC), University of Oxford, at the 2020 Global Cybersecurity Capacity Building Conference in Melbourne, 18 February 2020.
The presentation includes:
- Mission, purpose and impact of the GCSCC
- Lessons learned from implementing the Cybersecurity Capacity Maturity Model for Nations (CMM) around the world
- The shaping and impacts of cybersecurity capacity: What is the status of cybersecurity capacity building? What factors are shaping capacity building within nations? What are the implications of capacity building for nations?
Towards Effective Device-Aware Federated LearningAntonio Ferrara
With the wealth of information produced by social networks, smartphones, medical or financial applications, speculations have been raised about the sensitivity of such data in terms of users’ personal privacy and data security. To address the above issues, Federated Learning (FL) has been recently proposed as a means to leave data and computational resources distributed over a large number of nodes (clients) where a central coordinating server aggregates only locally computed updates without knowing the original data. In this work, we extend the FL framework by pushing forward the state the art in the field on several dimensions: (i) unlike the original FedAvg approach relying solely on single criteria (i.e., local dataset size), a suite of domain- and client-specific criteria constitute the basis to compute each local client’s contribution, (ii) the multi-criteria contribution of each device is computed in a prioritized fashion by leveraging a priority-aware aggregation operator used in the field of information retrieval, and (iii) a mechanism is proposed for online-adjustment of the aggregation operator parameters via a local search strategy with backtracking. Extensive experiments on a publicly available dataset indicate the merits of the proposed approach compared to standard FedAvg baseline.
A service oriented architecture (SOA) organizes software into business services that are network accessible and executable. Key characteristics include quality of service specifications, discoverable services and data catalogs, and use of industry standards. A SOA breaks up monolithic systems into reusable components called services that can be more easily maintained and replaced. Implementing a SOA requires organizing infrastructure, data, security, computing, communication, and application services to maximize reuse across the enterprise.
A presentation to the 2019 meeting of the Global Forum on Cyber Expertise (GFCE) in Addis Ababa, October 2019, entitled 'The Shaping and Impacts of Cyber Security Capacity'. The slides are updated since the conference to reflect revised multivariate path analyses.
This document summarizes a final year project submitted by Hritesh Saha and Sana Khursheed for developing a social networking application called "Social Like Networking". The project involved designing, implementing, and testing various phases including designing a user interface, implementing backend functionality using ASP.NET and SQL Server, and testing the application. Key aspects of the social networking system such as user profiles, messaging, media sharing, searching, and centrality measures are discussed at a high level.
The document discusses career progression and development at Ticketmaster. It introduces a competency model to map skills and roles across the software development lifecycle. The model is based on the IEEE Software Engineering Competency Model framework and includes technical, professional, and behavioral skill levels. Career mapping helps individuals understand where they are, where they want to go, and the steps needed to get there with support from available resources.
Radical open innovation requires systems thinking and problem solving methods. It involves collaboration across diverse partners to solve complex problems accelerated by technological, economic, and environmental changes. Systems thinking views problems holistically rather than through generalizations and can help address unintended consequences and design effective policies for managing systems. Key tools for systems thinking include causal loop diagrams, stock and flow models, and identifying archetypes to predict system behaviors and assess how proposed changes may impact the system over time. Simulation is also essential to validate if changes will lead to sustainable outcomes.
The document discusses federated simulations and interoperability standards. It describes federated simulations as involving multiple simulations operating together through a common set of standards to form a larger simulation. The High Level Architecture (HLA) is discussed as a key interoperability standard, along with the Distributed Simulation Engineering and Execution Process (DSEEP) as a recommended practice for developing distributed simulations.
Finding interesting patterns in data can lead to uncovering new knowledge. New patterns that haven’t occurred before can signify events of interest. Depending on context, these can be called novelties, anomalies, outliers or events. Whatever they are called, they are interesting because they tell a story different from the norm. In this talk, we will call them anomalies. Two diverse applications of anomaly detection are detecting fraudulent credit card transactions and identifying astronomical anomalies such as solar flares.
However, there are many challenges in anomaly detection including high false positive rates and low predictive accuracy. Ensemble learning is a way of combining many algorithms or models to obtain better predictive performance. Anomaly detection is generally an unsupervised task, that is, we do not train models using labelled data. Constructing an unsupervised anomaly detection ensemble is challenging because we do not know the labels. In this talk we discuss two topics in anomaly detection. First, we introduce an anomaly detection ensemble using Item Response Theory (IRT) – a class of models used in educational psychometrics. Using IRT we construct an ensemble that can downplay noisy, non-discriminatory methods and accentuate sharper methods.
Then we explore anomaly detection in computer network security. With cyber incidents and data breaches becoming increasingly common, we have seen a massive increase in computer network attacks over the years. Anomaly detection methods, even though used to detect suspicious behaviour, are criticized for high false positive rates. In addition, computer networks produce a large amount of complex data. We go through the end-to-end process of detecting anomalies in this scenario and show how we can minimize false positives and visualise anomalies developing over time.
IRJET- Machine Learning Processing for Intrusion DetectionIRJET Journal
This document evaluates different machine learning algorithms for network intrusion detection using the KDD dataset. It analyzes the accuracy of logistic regression, naive bayes, support vector machine, K-nearest neighbor, and decision tree classifiers based on their confusion matrices and receiver operating characteristic curves. The results show that the decision tree algorithm achieved the highest accuracy rate of 99.83% on the KDD dataset for intrusion detection.
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial EmulationScott Sutherland
This presentation provides an overview off common adversarial emulation approaches along with attack and detection trends. It should be interesting to penetration testers and professionals in security operations roles.
A Personalized Software Assistant Framework To Achieve User GoalsPradeep K. Venkatesh
The document proposes a personalized software assistant framework to help users achieve their goals. It extracts behavioral patterns from IoT device usage data to understand user behavior. The framework interacts with users through dialog to better understand goals and recommends relevant services. It was tested on 12 users across two domains and found to outperform baselines in recommending questions, with user contexts being the most important learning feature. Users agreed the framework was helpful in achieving goals and finding personalized services efficiently.
The Next Generation of Security Operations Centre (SOC)PECB
The document discusses the key aspects of building a next generation Security Operations Centre (SOC). It emphasizes that skilled people, well-defined processes, and integrating new technologies are critical. Specifically, it recommends adopting automation and analytics to analyze large datasets, integrating threat intelligence from multiple sources, and establishing red and blue teams to continuously test defenses. The goal of a next generation SOC is to use predictive analysis of vast security data to improve threat detection, response, and the overall security posture of an organization.
Correlation Analysis Modeling Use Case - IBM Power Systems Gautam Siwach
Do the people having good financial standing ,higher education level, a steady job corresponds to commit fewer crime, and Does the uneducated, or poor people commit more crime?
Data Source : From the Communities and Crime Un-normalized Data Set
Website : http://archive.ics.uci.edu/ml/machine-learning-databases/00211/CommViolPredUnnormalizedData.txt
Total Observations : 2215
Total Variables : 147
The RISEN-CSI-Trends presents results of the H2020 Action.
It was part of the Security Research Event (SRE) at the 24th October in Brussels.
RISEN has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 883116.
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...Marco Manso
We present the Real-tIme on-site forenSic tracE qualificatioN (RISEN) project, an innovate concept in forensic investigations in the context of CSI of sites affected by a chemical or biological attack. Coordinated by ENEA, RISEN will develop a set of network- enabled real-time contactless sensors for handling traces on site and accurate 3D recreation mechanisms of the entire crime scene, providing an immersive environment for investigators to evaluate hypotheses and conduct highly detailed investigations. The RISEN concept will allow forensics investigators and judicial authorities, to gather high quality information from a vast list of visible and invisible traces (localisation, identification/classification, interpretation and labelling) from a crime scene through standardised reports and a secure way, also speeding- up the forensic investigation process.
The RISEN project started in July 2020 and has a duration of 4 years.
The document discusses experiments conducted to operationalize and improve command and control (C2) agility. The experiments aimed to determine if the theoretical foundations for improving C2 agility could be applied in practice. The experiments used an online platform called ELICIT to simulate different C2 approaches and measure their agility. The results of the experiments provided lessons for improving C2 agility in real-world operations.
This is the Second webinar about a Megatris Comp ‘s IoT design method Here&Now.
The method has the scope to design contextual, liquid, intelligent and connected applications. This means to design software with a level of new cognitive artificial intelligence able to deploy applications that have a level of understanding depending on context; it learns from events and have some level of autonomy with respect to routine activities.
National cybersecurity capacity building framework for countries in a transit...Mohamed Ben Naseir
National Cybersecurity Capacity Building Framework for Countries in a Transitional Phase
Topics: Business Modeling and Business Process Management; Maturity Models for EA Artefacts and Processes; Models and Frameworks
In Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS, 841-849, 2020.
Michael Goldsmith and I presented an overview of cybersecurity capacity building and current research findings for delegates from across the Commonwealth nations. The first section of slides introduces the Global Cyber Security Capacity Centre (GCSCC), and the second part presents a comparative analysis of the status and impact of capacity building.
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Carolin Weisser
This presentation was given by Prof Michael Goldsmith and Dr Patricia Esteve-González, both from the Global Cyber Security Capacity Centre (GCSCC), University of Oxford, at the 2020 Global Cybersecurity Capacity Building Conference in Melbourne, 18 February 2020.
The presentation includes:
- Mission, purpose and impact of the GCSCC
- Lessons learned from implementing the Cybersecurity Capacity Maturity Model for Nations (CMM) around the world
- The shaping and impacts of cybersecurity capacity: What is the status of cybersecurity capacity building? What factors are shaping capacity building within nations? What are the implications of capacity building for nations?
Towards Effective Device-Aware Federated LearningAntonio Ferrara
With the wealth of information produced by social networks, smartphones, medical or financial applications, speculations have been raised about the sensitivity of such data in terms of users’ personal privacy and data security. To address the above issues, Federated Learning (FL) has been recently proposed as a means to leave data and computational resources distributed over a large number of nodes (clients) where a central coordinating server aggregates only locally computed updates without knowing the original data. In this work, we extend the FL framework by pushing forward the state the art in the field on several dimensions: (i) unlike the original FedAvg approach relying solely on single criteria (i.e., local dataset size), a suite of domain- and client-specific criteria constitute the basis to compute each local client’s contribution, (ii) the multi-criteria contribution of each device is computed in a prioritized fashion by leveraging a priority-aware aggregation operator used in the field of information retrieval, and (iii) a mechanism is proposed for online-adjustment of the aggregation operator parameters via a local search strategy with backtracking. Extensive experiments on a publicly available dataset indicate the merits of the proposed approach compared to standard FedAvg baseline.
A service oriented architecture (SOA) organizes software into business services that are network accessible and executable. Key characteristics include quality of service specifications, discoverable services and data catalogs, and use of industry standards. A SOA breaks up monolithic systems into reusable components called services that can be more easily maintained and replaced. Implementing a SOA requires organizing infrastructure, data, security, computing, communication, and application services to maximize reuse across the enterprise.
A presentation to the 2019 meeting of the Global Forum on Cyber Expertise (GFCE) in Addis Ababa, October 2019, entitled 'The Shaping and Impacts of Cyber Security Capacity'. The slides are updated since the conference to reflect revised multivariate path analyses.
This document summarizes a final year project submitted by Hritesh Saha and Sana Khursheed for developing a social networking application called "Social Like Networking". The project involved designing, implementing, and testing various phases including designing a user interface, implementing backend functionality using ASP.NET and SQL Server, and testing the application. Key aspects of the social networking system such as user profiles, messaging, media sharing, searching, and centrality measures are discussed at a high level.
The document discusses career progression and development at Ticketmaster. It introduces a competency model to map skills and roles across the software development lifecycle. The model is based on the IEEE Software Engineering Competency Model framework and includes technical, professional, and behavioral skill levels. Career mapping helps individuals understand where they are, where they want to go, and the steps needed to get there with support from available resources.
Radical open innovation requires systems thinking and problem solving methods. It involves collaboration across diverse partners to solve complex problems accelerated by technological, economic, and environmental changes. Systems thinking views problems holistically rather than through generalizations and can help address unintended consequences and design effective policies for managing systems. Key tools for systems thinking include causal loop diagrams, stock and flow models, and identifying archetypes to predict system behaviors and assess how proposed changes may impact the system over time. Simulation is also essential to validate if changes will lead to sustainable outcomes.
The document discusses federated simulations and interoperability standards. It describes federated simulations as involving multiple simulations operating together through a common set of standards to form a larger simulation. The High Level Architecture (HLA) is discussed as a key interoperability standard, along with the Distributed Simulation Engineering and Execution Process (DSEEP) as a recommended practice for developing distributed simulations.
Finding interesting patterns in data can lead to uncovering new knowledge. New patterns that haven’t occurred before can signify events of interest. Depending on context, these can be called novelties, anomalies, outliers or events. Whatever they are called, they are interesting because they tell a story different from the norm. In this talk, we will call them anomalies. Two diverse applications of anomaly detection are detecting fraudulent credit card transactions and identifying astronomical anomalies such as solar flares.
However, there are many challenges in anomaly detection including high false positive rates and low predictive accuracy. Ensemble learning is a way of combining many algorithms or models to obtain better predictive performance. Anomaly detection is generally an unsupervised task, that is, we do not train models using labelled data. Constructing an unsupervised anomaly detection ensemble is challenging because we do not know the labels. In this talk we discuss two topics in anomaly detection. First, we introduce an anomaly detection ensemble using Item Response Theory (IRT) – a class of models used in educational psychometrics. Using IRT we construct an ensemble that can downplay noisy, non-discriminatory methods and accentuate sharper methods.
Then we explore anomaly detection in computer network security. With cyber incidents and data breaches becoming increasingly common, we have seen a massive increase in computer network attacks over the years. Anomaly detection methods, even though used to detect suspicious behaviour, are criticized for high false positive rates. In addition, computer networks produce a large amount of complex data. We go through the end-to-end process of detecting anomalies in this scenario and show how we can minimize false positives and visualise anomalies developing over time.
IRJET- Machine Learning Processing for Intrusion DetectionIRJET Journal
This document evaluates different machine learning algorithms for network intrusion detection using the KDD dataset. It analyzes the accuracy of logistic regression, naive bayes, support vector machine, K-nearest neighbor, and decision tree classifiers based on their confusion matrices and receiver operating characteristic curves. The results show that the decision tree algorithm achieved the highest accuracy rate of 99.83% on the KDD dataset for intrusion detection.
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial EmulationScott Sutherland
This presentation provides an overview off common adversarial emulation approaches along with attack and detection trends. It should be interesting to penetration testers and professionals in security operations roles.
A Personalized Software Assistant Framework To Achieve User GoalsPradeep K. Venkatesh
The document proposes a personalized software assistant framework to help users achieve their goals. It extracts behavioral patterns from IoT device usage data to understand user behavior. The framework interacts with users through dialog to better understand goals and recommends relevant services. It was tested on 12 users across two domains and found to outperform baselines in recommending questions, with user contexts being the most important learning feature. Users agreed the framework was helpful in achieving goals and finding personalized services efficiently.
The Next Generation of Security Operations Centre (SOC)PECB
The document discusses the key aspects of building a next generation Security Operations Centre (SOC). It emphasizes that skilled people, well-defined processes, and integrating new technologies are critical. Specifically, it recommends adopting automation and analytics to analyze large datasets, integrating threat intelligence from multiple sources, and establishing red and blue teams to continuously test defenses. The goal of a next generation SOC is to use predictive analysis of vast security data to improve threat detection, response, and the overall security posture of an organization.
Correlation Analysis Modeling Use Case - IBM Power Systems Gautam Siwach
Do the people having good financial standing ,higher education level, a steady job corresponds to commit fewer crime, and Does the uneducated, or poor people commit more crime?
Data Source : From the Communities and Crime Un-normalized Data Set
Website : http://archive.ics.uci.edu/ml/machine-learning-databases/00211/CommViolPredUnnormalizedData.txt
Total Observations : 2215
Total Variables : 147
The RISEN-CSI-Trends presents results of the H2020 Action.
It was part of the Security Research Event (SRE) at the 24th October in Brussels.
RISEN has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 883116.
The RISEN Project – A Novel Concept for Real-time on-site Forensic Trace Qual...Marco Manso
We present the Real-tIme on-site forenSic tracE qualificatioN (RISEN) project, an innovate concept in forensic investigations in the context of CSI of sites affected by a chemical or biological attack. Coordinated by ENEA, RISEN will develop a set of network- enabled real-time contactless sensors for handling traces on site and accurate 3D recreation mechanisms of the entire crime scene, providing an immersive environment for investigators to evaluate hypotheses and conduct highly detailed investigations. The RISEN concept will allow forensics investigators and judicial authorities, to gather high quality information from a vast list of visible and invisible traces (localisation, identification/classification, interpretation and labelling) from a crime scene through standardised reports and a secure way, also speeding- up the forensic investigation process.
The RISEN project started in July 2020 and has a duration of 4 years.
The document discusses NEXES apps for citizens, which are being developed to improve emergency communication. The objectives are to ensure communication between citizens and emergency services, and create prototypes demonstrating next generation emergency services functionality. The apps will use standards like SIP and WebRTC for total conversation. An API is being developed to make the apps easy to build and will include features like sending location and medical data. Examples discussed include the myNEXES SIP app and NEXES WebRTC app. The goal is to create pan-European emergency apps that can be used across countries.
The document summarizes a workshop presentation on the NEXt generation Emergency Services (NEXES) project. The presentation covered several exercises using NEXES features like situational awareness tools, video calling, and medical instructions. Key advantages of the NEXES system highlighted were showing incident locations, enhancing situational awareness, improving response times, and aiding dispatcher-assisted CPR and resource planning. Upcoming events like the second edition of the NGES conference were also noted.
EMYNOS nExt generation eMergencY commuNicatiOnSMarco Manso
The document provides an overview of the EMYNOS project, which aims to develop a next generation emergency communications platform. The project is funded through the Horizon 2020 program and involves 11 partner organizations, including research institutions, network operators, and end users. It started in September 2015 and will run for 30 months until February 2018. The EMYNOS platform will address limitations of current emergency systems by being standardized, supporting new technologies like video and location data, and integrating social media. It will also aim to be accessible to people with disabilities.
Improved Capabilities at the Hands of PSAP Operators.Marco Manso
The document discusses the NEXES project which aims to improve emergency services capabilities. It describes current PSAP systems that rely on voice calls and have limited location data and language support. The NEXES system would exploit internet technologies to provide improved caller data, location updates, total conversation capabilities, and interoperability between PSAPs, emergency response organizations, and first responders using standards like SIP and CAP. This would allow PSAP operators to better assist citizens, especially those with disabilities, and coordinate emergency responses.
1) There are 80 million people in the European Union affected by disabilities to some degree, which is approximately 15% of the EU population.
2) As the population ages, disabilities are becoming more common. Increased mobility across Europe also means emergency apps need to work across borders to support travelers and migrants with disabilities.
3) Next generation emergency services need to be fully inclusive and accessible to support independent living and participation for all citizens, including those who may temporarily lose abilities like hearing or speech after accidents.
SensorSky was presented for the EDA EURIdea consisting on the use of unmanned aerial vehicles for sensing and observation in a military context.
Presentation by Marco Manso - RINICOM at the 6th December 2013 in Athens, Greece.
This document defines and measures the concepts of cognitive entropy and cognitive self-synchronization based on experiments conducted using the ELICIT experimentation platform. It finds that cognitive self-synchronization, measured as 1 minus the cognitive entropy, increases steadily as the command and control approach adopted transitions from conflicted to deconflicted to coordinated to collaborative to edge-based approaches. Higher levels of cognitive self-synchronization are also associated with greater effort by participants in terms of information sharing behaviors. The document concludes by proposing additional experiments and analyses to extend these findings.
The document discusses lessons learned from past crises regarding the role of social media and communications. It summarizes several major crises including the 2004 Indian Ocean tsunami, 2005 London bombings, Hurricane Katrina in 2005, 2007 Southern California wildfires, and the 2010 Haiti earthquake. Key lessons included the importance of social media and mobile communications in providing information when infrastructure is damaged, the need for interoperable emergency response communications systems, and challenges around misinformation or lack of authoritative information being addressed by citizen journalism on social media and blogs.
O documento discute como a segurança de sistemas, data mining e agentes inteligentes podem ser combinados para melhorar a detecção de intrusões. Especificamente, data mining pode ser usado para reduzir falsos positivos em alertas de intrusão, enquanto agentes inteligentes permitem monitoramento distribuído e tomada de decisão coordenada para lidar com ataques complexos.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
1. N2C2M2 Validation using abELICIT:
Design and Analysis of ELICIT runs using
software agents
17th ICCRTS: “Operationalizing C2 Agility”
Marco Manso
(marco@marcomanso.com)
SAS-085 Member
Paper
ID:
003
This work results was sponsored by a subcontract from Azigo, Inc.
via the Center for Edge Power of the Naval Postgraduate School.
2. Agenda
• Introduction and Background
• Formulation of the Experiments
• Analysis
• Conclusions
• Bibliography
3. Introduction
• Validation of the N2C2M2
NCW
Theory
C2
CRM
(SAS-‐050)
2006
2010
2012
2008
Theore8cal
Founda8ons
for
the
Analysis
of
ELICIT
Experiments
(Manso
and
Nunes
2008)
N2C2M2
Experimenta8on
and
Valida8on:
Understanding
Its
C2
Approaches
and
Implica8ons
(Manso
and
Manso
2010)
N2C2M2
(SAS-‐065)
Know
the
Network,
Knit
the
Network:
Applying
SNA
to
N2C2M2
Experiments
(Manso
and
Manso
2010)
2011
Defining
and
Measuring
Cogni8ve-‐Entropy
and
Cogni8ve
Self-‐Synchroniza8on
(Manso
and
Moffat
2011)
Valida0on
with
abELICIT
ELICIT
abELICIT
Human
Runs
4. Introduction
• Theory of NCW
– NCW Tenets
– NCW Value Chain
• C2 Conceptual Reference Model
– ASD-NII/OFT
– NATO SAS-050
• C2 Approach Space and its three key-dimensions:
Allocation of Decision Rights (ADR), Patterns of Interaction (PI) and
Distribution of Information (DI).
• NATO NEC C2 Maturity Model (SAS-065)
– Five C2 Approaches
6. Introduction
NATO NEC C2 Maturity Model hypothesises that
– the more network-enabled a C2 approach is
the more likely it is to develop shared
awareness and shared understanding
(SAS-065 2010, 69).
7. Introduction
ELICIT
Experimental Laboratory for
Investigating Collaboration, Information-sharing, and Trust
• CCRP sponsored the design and development of the
ELICIT platform to facilitate experimentation focused on
information, cognitive, and social domain phenomena
• ELICIT is a web-accessible experimentation environment
supported by software tools and instructions /
procedures
• abELICIT is an agent-based version of the ELICIT
platform
Original
slide
from
(Alberts
and
Manso
2012)
8. Introduction
ELICIT
• The goal of each set of participants is to build situational awareness and
identify the who, what, when, and where of a pending attack
– Factoids are periodically distributed to participants; each participant receives
a small subset of the available factoids
– No one is given sufficient information to solve without receiving information
from others
– Participants can share factoids directly with each other, post factoids to
websites, and by “keyword directed” queries
– Participants build awareness and shared awareness by gathering and
cognitively processing factoids
• The receiving, sharing, posting, and seeking of factoids and the nature
of the interactions between and among participants can be constrained
• Participants can be “organized” and motivated in any number of ways
• Various stresses can applied (e.g. communications delays and losses)
• Software-Agents are used instead of humans
Original
slide
from
(Alberts
and
Manso
2012)
9. Introduction
Past Research
• A first and preliminary experimentation stage using
two pre-existing models: Hierarchy and Edge (SAS-065 2010).
26 runs (human subjects).
Edge organizations were more effective, faster, shared more
information and were more efficient than Hierarchies.
• A second experimentation stage that recreated
the N2C2M2 five C2 approaches (Manso and B. Manso 2010).
18 runs (human subjects).
Edge reached the best scores in the Information and Cognitive
Domains, but it was surpassed by Collaborative in the Interactions
Domain and Measures of Merit (MoMs). Conflicted performed worst
in all assessed variables.
10. Formulation of the Experiments
• Hypotheses
[1] For a complex endeavor, more network-enabled C2 approaches are
more effective than less network-enabled C2 approaches.
[2] For a given level of effectiveness, more network-enabled C2
approaches are more efficient than less network-enabled C2 approaches.
More network-enabled C2 approaches exhibit increased/better levels of:
• [4] Shared Information;
• [5] Shared Awareness;
• [6] Self-Synchronization (at cognitive level);
Than: less network-enabled C2 approaches
[7] A minimum level of maturity is required to be effective in ELICIT.
11. Formulation of the Experiments
• Hypotheses (not covered)
[3] More network-enabled C2 approaches have more agility than less
network-enabled C2 approaches.
[8] Increasing the degree of difficulty in ELICIT requires organizations
to increase their network-enabled level to maintain effectiveness in
ELICIT.
These are covered in (Alberts and Manso 2012).
12. Formulation of the Experiments
• Model
Collective
Individual
Shared
Information
Quality of
Information
Shared
Awareness
Quality of
Awareness
Performance
(MoM)
Task
Difficulty
Measures of Merit
Network
Characteristics
& Performance
Q of Information
Sources
(fixed)
Individual
& Team
Characteristics
Controllable
In ELICIT
Collective C2
Approach
(ADR-C, PI-C, DI-C)
Q Infrastructure
(fixed)Other
Influencing Variables
Enablers / Inhibitors
Info Sharing &
Collaboration
Patterns of
Interaction
Distribution of
Information
Self-
Synchronization
Allocation
of Decision
Rights
ID attempt
14. Formulation of the Experiments
• Defining the Agents Parameters
Image
source:
Upton
et
al
2011
The
average
agent
-‐ 'average’
performance
(i.e.,
number
of
shares,
post,
pulls
and
iden8fica8ons
close
to
human
behavior)
-‐ sufficient
informa8on
processing
and
cogni8ve
capabili8es
-‐ This
agent
does
not
hoard
informa8on.
Low
performing
agent
High
performing
agent
15. Formulation of the Experiments
• Runs are conduced
– Per C2 Approach
– By combining different agent archetypes among the orgnization
roles (i.e., top-level, mid-level and bottom-level)
• Resulting in a total of 135 runs
C2 Approach Agent Type:
Top-Level
Agent Type:
Mid Level
Agent Type:
Bottom-Level
# Possible
Combinations*
Run
Number
Conflicted C2 1 Coord 4 TLs 12 TMs 27 1 .. 27
De-conflicted C2 1 Deconf 4 TLs 12 TMs 27 28 .. 54
Coordinated C2 1 CTC 4 TLs 12 TMs 27 55 .. 81
Collaborative C2 1 CF 4 TLs 12 TMs 27 82 .. 108
Edge C2 - - 17 TMs 27** 109 .. 135
TOTAL 135
*
Possible
agent
types
are:
(i)
baseline,
(ii)
low-‐performing
and
(iii)
high-‐performing
**
Use
same
combina8ons
of
agent
types
in
Edge
as
for
other
C2
approaches
16. Analysis
• Information Domain
C2
Approach
Number
Relevant Information Reached
(Avg: #facts | %)
Shared Information
Reached
Mean σ Mean σ
1 7.41 | 22% 0 0 0
2 8.29 | 25% 0 0 0
3 11.12 | 37% 0 4 0
4 33 | 100% 0 68 0
5 33 | 100% 0 68 0
OBS:
Shared
Informa8on
reached
maximum
value
is
68
30. Conclusions
• Overall Results
– More network-enabled C2 approaches achieve more:
• shared information,
• shared awareness and
• self-synchronization
– than less network-enabled C2 approaches
– On effectiveness and efficiency-time two clusters are
formed:
• Cluster 1 (high scores): COORDINATED, COLLABORATIVE
and EDGE
• Cluster 2 (low scores): CONFLICTED and DE-CONFLICTED
– On efficiency-effort three clusters are formed:
• Cluster 1 (high scores): COORDINATED
• Cluster 2 (med scores): COLLABORATIVE and EDGE
• Cluster 3 (low scores): CONFLICTED and DE-CONFLICTED
31. Conclusions
• Overall Results
– Agents behave better than humans
– Agents don’t differentiate according to role
– The key condition for success is having all information
available (not true for humans)
– Collaborative and Edge yield similar results with
agents (as opposed to human runs)
• Recommendations:
– Extend ELICIT (more dynamics, more uncertainty,
decision-making and actions)
– Further enlarge human-runs dataset
32. Acknowledgements
• This work was sponsored by a subcontract from Azigo, Inc. via the
Center for Edge Power of the Naval Postgraduate School
• The following people contributed decisively to its accomplishments,
namelly:
– Mary Ruddy, from Azigo, Inc. the contract manager and ELICIT specialist that provided
inexhaustible support from overseas and advice towards use and customization of the
abELICIT platform.
– Dr. Mark Nissen, Director of the Center for Edge Power at the Naval Postgraduate
School, for his institutional and financial support.
– SAS-065 ELICIT working team, namely, Dr. Jim Moffat, Dr. Lorraine Dodd, Dr. Reiner
Huber, Dr. Tor Langsaeter, Mss. Danielle Martin Wynn and Mr. Klaus Titze. Additionally
from SAS-065, to Dr. Henrik Friman and Dr. Paul Phister, for their constructive
feedback and recommendations.
– ELICIT EBR team, namely, Dr. Jimmie McEver and Mss. Danielle Martin Wynn.
– Members of the Portuguese Military Academy involved in the ELICIT work, specifically,
Col. Fernando Freire, LtCol. José Martins and LtCol. Paulo Nunes.
– Finally, to Dr. David Alberts (DoD CCRP) and Dr. Richard Hayes (EBR Inc.) for their
deep scrutiny, support and exigent contributions in the whole experimentation process
and ELICIT, and, more importantly, for their ubiquitous provision of inspiration and
‘food-for-thought’ in C2 science and experimentation via the CCRP.
33. N2C2M2 Validation using abELICIT:
Design and Analysis of ELICIT runs using
software agents
17th ICCRTS: “Operationalizing C2 Agility”
Marco Manso
(marco@marcomanso.com)
SAS-085 Member
Paper
ID:
003
This work results from a subcontract to Azigo, Inc.
via the Center for Edge Power of the Naval Postgraduate School.
Thank You for your attention !