Communications - Scientific Letters of the University of Zilina 2015, 17(1):111-115 | DOI: 10.26552/com.C.2015.1.111-115

Analytics for Protecting Critical Infrastructure

Adam Zagorecki1, Jozef Ristvej2, Krzysztof Klupa3
1 Cranfield University, Defence Academy of the United Kingdom, Senior Research Fellow, Shrivenham, United Kingdom
2 Department of Crisis Management, University of Zilina, Slovakia
3 Department of Security Sciences, the General Tadeusz Kosciuszko Military Academy of Land Forces, Wroclaw, Poland

In this paper we review the key trends related to application of information technology and, in particular, automated data analysis to the problem of protecting critical infrastructure. We focus on technologies that use automated data collection and analyses that can be exploited for improving security provision for critical infrastructure in the future. Of our particular interest are technologies that are at relatively early stage of adaptation and in our judgement have potential to significantly affect how the security is provided in the future, the technologies that support physical aspect of security. Then we discuss analytics in context of cyber-security with applications.

Keywords: critical infrastructure; analytics; data mining; cyber-security

Published: February 28, 2015  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Zagorecki, A., Ristvej, J., & Klupa, K. (2015). Analytics for Protecting Critical Infrastructure. Communications - Scientific Letters of the University of Zilina17(1), 111-115. doi: 10.26552/com.C.2015.1.111-115
Download citation

References

  1. EDWARDS, M.: Critical Infrastructure Protection, vol. 116 of NATO Science for Peace and Security Series - E: Human and Societal Dynamics, M. Edwards (ed.), IOS Press, 2014.
  2. LEWIS, T. G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. Wiley, May 2006, ISBN: 978-0-471-78628-3. Go to original source...
  3. KOHAVI, R., ROTHLEDER, N. J., SIMOUDIS, E.: Emerging Trends in Business Analytics. Communications of the ACM, 45 (8): 45-48, 2002. Go to original source...
  4. HAN, J., KAMBER, K., PEI, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann, 2006.
  5. SHANKAR, M., RAO, N., BATSELL, S.: Fusing Intrusion Data for Detection and Containment, Proc. of the 2003 IEEE conference on Military communications (MILCOM'03), vol. II, 2003. IEEE Computer Society, Washington, DC, 741-746.
  6. JAIN, A. K., ROSS, A., PANKANTI, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security, vol. 1, No. 2, June 2006, 125-143. Go to original source...
  7. Fotosearch, Security Alert by Brand X Pictures, 30.3.2008.
  8. KO, T.: A Survey on behavior Analysis in Video Surveillance for Homeland Security Applications, Applied Imagery Pattern Recognition Workshop, 2008. AIPR'08. 37th IEEE, pp. 1-8. IEEE, 2008. Go to original source...
  9. BASS, T.: Intrusion Detection Systems and Multi-sensor Data Fusion. Communications ACM, 43, 4, April 2000, 99-105. Go to original source...
  10. MILLER, R. A.: Cyber War Realities - What Lies Ahead, Intern. J. of Critical Infrastructure Protection, vol. 5, No. 2, July 2012, 84-85, ISSN 1874-5482. Go to original source...
  11. DI PIETRO, R., MANCINI, L. V.: Intrusion Detection Systems. Springer, 2008.
  12. HOLLA, K.: Dealing with Key Terms in Risk Analysis and Phenomenon of Uncertainty in this Process, Communications - Scientific Letters of the University of Zilina, vol. 9, No. 4, 2007, 59-61, ISSN 1335-4205. Go to original source...
  13. ZANICKA HOLLA, K., MORICOVA, V.: Human Factor Position in Rise and Demonstration of Accidents, Communications - Scientific Letters of the University of Zilina, vol. 13, No. 2, 49-52, 2011, ISSN 1335-4205. Go to original source...
  14. SIMAK, L.: Increasing the Security Level in the Slovak Republic, Communications - Scientific Letters of the University of Zilina, vol. 10, No. 2, 2008, 67-71. Go to original source...
  15. REHAK, D., SENOVSKY, P.: Preference Risk Assessment of Electric Power Critical Infrastructure, Chemical Engineering Transactions, vol. 36, 469-474, 2014, ISSN: 1974-9791.

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.