Please use this identifier to cite or link to this item:
http://dx.doi.org/10.25673/118112
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tikhonov, Victor | - |
dc.contributor.author | Siemens, Eduard | - |
dc.contributor.author | Vasiliu, Yevhen | - |
dc.contributor.author | Sitnikov, Valery | - |
dc.contributor.author | Taher, Abdullah | - |
dc.contributor.author | Tykhonova, Olena | - |
dc.contributor.author | Shulakova, Kateryna | - |
dc.contributor.author | Tikhonov, Serhii | - |
dc.date.accessioned | 2025-02-10T09:23:16Z | - |
dc.date.available | 2025-02-10T09:23:16Z | - |
dc.date.issued | 2024-11-30 | - |
dc.identifier.uri | https://opendata.uni-halle.de//handle/1981185920/120071 | - |
dc.identifier.uri | http://dx.doi.org/10.25673/118112 | - |
dc.description.abstract | The article considers the issues of IoT systems and networks privacy. The complex researches on general system theory state of the art has been surveyed, as well as cybersecurity aspects of IoT technologies and models analyzed over the past decades with respect to the Industry 4.0 concept and industrial IoT architecture. A comprehensive decomposition formalism proposed on the base of M. Mesarowic system theory for presenting the complex cybersecurity object of study as a set of its parts. An original context-defined model of open systems interaction S-CDM has been constructed for cybersecurity issues study with the use of J. Neumann classification and A. Uemov system triad. The S-CDM model is shaped in 3-layer hierarchical graph. The first S-CDM layer displays the cybersecurity problem as a set of relations between the key players of information market resources, clients and agents. The second S-CDM layer adds the network technologies impact on the relations between the key market-players. The third S-CDM layer includes a “degree of trust” factor into the key market-player relationships. The introduced context-defined model enables to reduce the overall problem complexity of the IoT cybersecurity study to a number of less complex and easy-handled partial tasks. As an example, a particular local version of the S-CDM model is considered in the form of six independent tasks for AI-aided methods of cybersecurity provision. The results of the work intend to contribute general system researches in the sphere of network system modelling and IoT privacy. | - |
dc.format.extent | 1 Online-Ressource (10 Seiten) | - |
dc.language.iso | eng | - |
dc.rights.uri | https://creativecommons.org/licenses/by-sa/4.0/ | - |
dc.subject.ddc | DDC::6** Technik, Medizin, angewandte Wissenschaften::62* Ingenieurwissenschaften::621 Angewandte Physik | - |
dc.title | Context-Defined Model of Open Systems Interaction for IoT Cybersecurity Issues Study | - |
local.versionType | publishedVersion | - |
local.publisher.universityOrInstitution | Hochschule Anhalt | - |
local.openaccess | true | - |
dc.identifier.ppn | 1916570976 | - |
cbs.publication.displayform | 2024 | - |
local.bibliographicCitation.year | 2024 | - |
cbs.sru.importDate | 2025-02-10T09:22:19Z | - |
local.bibliographicCitation | Enthalten in Proceedings of the 12th International Conference on Applied Innovations in IT - Koethen, Germany : Edition Hochschule Anhalt, 2024 | - |
local.accessrights.dnb | free | - |
Appears in Collections: | International Conference on Applied Innovations in IT (ICAIIT) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
1-5-ICAIIT_2024_12(2).pdf | 1.1 MB | Adobe PDF | ![]() View/Open |