Show simple item record

dc.contributor.authorMoulos, V
dc.contributor.authorChatzikyriakos, G
dc.contributor.authorKassouras, V
dc.contributor.authorDoulamis, A
dc.contributor.authorDoulamis, N
dc.contributor.authorLeventakis, G
dc.contributor.authorFlorakis, T
dc.contributor.authorVarvarigou, T
dc.contributor.authorMitsokapas, E
dc.contributor.authorKioumourtzis, G
dc.contributor.authorKlirodetis, P
dc.contributor.authorPsychas, A
dc.contributor.authorMarinakis, A
dc.contributor.authorSfetsos, T
dc.contributor.authorKoniaris, A
dc.contributor.authorLiapis, D
dc.contributor.authorGatzioura, A
dc.date.accessioned2021-04-28T11:10:47Z
dc.date.available2021-04-28T11:10:47Z
dc.date.issued2018-12-01
dc.identifier.urihttps://qmro.qmul.ac.uk/xmlui/handle/123456789/71545
dc.description.abstractIn modern societies, the rampant growth of the Internet, both on the technological and social level, has created fertile ground for the emergence of new types of risk. On top of that, it enhances pre-existing threats by offering new means for accessing and exploiting Critical Infrastructures. As the kinds of potential threats evolve, the security, safety and resilience of these infrastructures must be updated accordingly, both at a prevention, as well as a real-time confrontation level. Our research approaches the security of these infrastructures with a focus on the data and utilization of every possible piece of information that derives from this ecosystem. Such a task is quite daunting, since the quantity of data that requires processing resides in the Big Dataspace. To address this, we introduce a new well-defined Information Life Cycle in order to properly model and optimise the way information flows through a modern security system. This life cycle covers all the possible stages, starting from the collection phase up until the exploitation of information intelligence. That ensures the efficiency of data processing and filtering while increasing both the veracity and validity of the final outcome. In addition, an agile Framework is introduced that is optimised to take full advantage of the Information Life Cycle. As a result, it exploits the generated knowledge taking the correct sequence of actions that will successfully address possible threats. This Framework leverages every possible data source that could provide vital information to Critical Infrastructures by performing analysis and data fusion being able to cope with data variety and variability. At the same time, it orchestrates the pre-existing processes and resources of these infrastructures. Through rigorous testing, it was found that response time against hazards was dramatically decreased. As a result, this Framework is an ideal candidate for strengthening and shielding the infrastructures’ resilience while improving management of the resources used.en_US
dc.publisherMDPIen_US
dc.relation.ispartofInventions
dc.rightsThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
dc.rightsAttribution 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/us/*
dc.titleA robust information life cycle management framework for securing and governing critical infrastructure systemsen_US
dc.typeArticleen_US
dc.rights.holder© 2018, The Author(s)
dc.identifier.doi10.3390/inventions3040071
pubs.issue4en_US
pubs.notesNot knownen_US
pubs.publication-statusPublisheden_US
pubs.volume3en_US
rioxxterms.funderDefault funderen_US
rioxxterms.identifier.projectDefault projecten_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Except where otherwise noted, this item's license is described as This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.