scholarly journals Cybonto: Towards Human Cognitive Digital Twins for Cybersecurity

Author(s):  
Tam Nguyen

Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response to the expanding ever-more-complex threat landscape, Digital Twins (DTs) and particularly Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple knowledge domains. Simulated results may offer insights into adversaries' behaviors and tactics, resulting in better proactive cyber-defense strategies. For the first time, this paper solidifies the vision of DTs and HDTs for cybersecurity via the Cybonto conceptual framework proposal. The paper also contributes the Cybonto ontology, formally documenting 108 constructs and thousands of cognitive-related paths based on 20 time-tested psychology theories. Finally, the paper applied 20 network centrality algorithms in analyzing the 108 constructs. The identified top 10 constructs call for extensions of current digital cognitive architectures in preparation for the DT future.

2021 ◽  
Author(s):  
Tam ngoc Nguyen

Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Digital Twins (DTs) and particularly Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple knowledge domains. Simulated results offer insights into adversaries' behaviors and tactics, resulting in better proactive cyber-defense strategies. For the first time, this paper solidifies the vision of DTs and HDTs for cybersecurity via the Cybonto conceptual framework proposal. The paper also contributes the Cybonto ontology to guide the developments of such HDTs. In particular, the ontology formally documented 108 constructs and thousands of cognitive-related paths based on 20 time-tested psychology theories. Finally, the paper applied 20 network centrality algorithms in ranking the constructs by their cognitive influences. The top 10 constructs call for extensions of current digital cognitive architectures such as: explicitly implementing more refined structures of Long-term Memory and Perception, putting a stronger focus on influential non-cognitive constructs such as Arousal, and creating new capabilities for simulating, reasoning about, and selecting circumstances.


2021 ◽  
Author(s):  
Tam Nguyen

UNSTRUCTURED Cyber defense is reactive and slow. On average, the time-to-remedy is hundreds of times larger than the time-to-compromise. In response, Digital Twins (DTs) and particularly Human Digital Twins (HDTs) offer the capability of running massive simulations across multiple knowledge domains. Simulated results offer insights into adversaries' behaviors and tactics, resulting in better proactive cyber-defense strategies. For the first time, this paper solidifies the vision of DTs and HDTs for cybersecurity via the Cybonto conceptual framework proposal. The paper also contributes the Cybonto ontology to guide the developments of such HDTs. In particular, the ontology formally documented 108 constructs and thousands of cognitive-related paths based on 20 time-tested psychology theories. Finally, the paper applied 20 network centrality algorithms in ranking the constructs by their cognitive influences. The top 10 constructs call for extensions of current digital cognitive architectures such as: explicitly implementing more refined structures of Long-term Memory and Perception, putting a stronger focus on influential non-cognitive constructs such as Arousal, and creating new capabilities for simulating, reasoning about, and selecting circumstances.


Author(s):  
A.I. Bochkarev ◽  

The article describes the anti-value concept of gluttony in the humorous discourse of English-language stand-up and situation comedies. The main humorous characteristics of this concept are identified and analyzed. An axiological approach is used for constructing a humorous conceptual framework, because humor is one of the most important tools for forming values and anti-values of a certain culture. The ridiculed characteristics of gluttony are divided into the following two groups: those of process and result. The main characteristics of the process include improper eating of edible items and eating of inedible items. Improper eating of edible items is usually ridiculed through eating excessive amounts of food, eating food under inappropriate conditions, eating incompatible items. Eating of inedible items is mostly ridiculed through eating life-threatening objects, eating something unfit to eat, and eating excrements or other human waste products. The main ridiculed characteristics of the result include gaining excess weight, addiction to a certain food, illness/death of a person. This work also performs a detailed analysis of the anti-value concept of gluttony for the first time. The main linguistic means of representing the anti-value concept of gluttony in stand-up comedies and sitcoms are revealed. This article makes a significant contribution to constructing an axiological humorous framework of the concept, because gluttony is one of the basic anti-values in humorous discourse.


Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


Author(s):  
David Edward Jones ◽  
Chris Snider ◽  
Lee Kent ◽  
Ben Hicks

ABSTRACTWhile extensive modelling - both physical and virtual - is imperative to develop right-first-time products, the parallel use of virtual and physical models gives rise to two interrelated issues: the lack of revision control for physical prototypes; and the need for designers to manually inspect, measure, and interpret modifications to either virtual or physical models, for subsequent update of the other. The Digital Twin paradigm addresses similar problems later in the product life-cycle, and while these digital twins, or the “twinning” process, have shown significant value, there is little work to date on their implementation in the earlier design stages. With large prospective benefits in increased product understanding, performance, and reduced design cycle time and cost, this paper explores the concept of using the Digital Twin in early design, including an introduction to digital twinning, examination of opportunities for and challenges of their implementation, a presentation of the structure of Early Stage Twins, and evaluation via two implementation cases.


2012 ◽  
Vol 1 (1) ◽  
pp. 90-97
Author(s):  
Naicong Li

To help synthesize and systematically organize the information, knowledge and resources for spatial decision support (SDS), and to help researchers and practitioners engaged in an actual planning process find relevant information and resources for solving their specific planning problems, the SDS Consortium and University of Redlands have developed a conceptual framework for SDS and a collection of SDS resources, hosted on the SDS Knowledge Portal. The conceptual framework includes a set of defined, inter-connected concepts pertaining to planning and spatial decision support, such as planning and decision problem types, application domains, knowledge domains and planning process including phases and steps. This conceptual framework is further used to organize a representative set of SDS resources, such as planning process workflows, methods, tools and models, data sources, case studies, literature, and so forth. The SDS Knowledge Portal facilitates learning of SDS and accessing SDS resources, promotes semantic clarity by adopting a common vocabulary for the user community, and promotes interoperability among SDS resources by using a standard set of concepts to define and classify these resources.


mBio ◽  
2021 ◽  
Author(s):  
Liselot Dewachter ◽  
Celien Bollen ◽  
Dorien Wilmaerts ◽  
Elen Louwagie ◽  
Pauline Herpels ◽  
...  

While persistence and the viable but nonculturable (VBNC) state are currently investigated in isolation, our results strongly indicate that these phenotypes represent different stages of the same dormancy program and that they should therefore be studied within the same conceptual framework. Moreover, we show here for the first time that the dynamics of protein aggregation perfectly match the onset and further development of bacterial dormancy and that different dormant phenotypes are linked to different stages of protein aggregation.


2019 ◽  
Vol 19 (1) ◽  
pp. 66
Author(s):  
Péter Máté Erdősi

Az elektronikus aláírás (electronic signature) fogalmát a jog definiálta elsőként. A fogalom konzisztens elterjedését nem segíti, hogy értelmezése számos átalakuláson ment keresztül, használata során keverednek a digitális aláírás (digital signature), az azonosítás (identification), a hitelesítés (authentication) és a feljogosítás (authorization), valamint a bizalom (trust, reliance), hitelesség, szavahihetőség (trustworthiness) fogalmak. Az elektronikus aláírásnak számos aspektusa jelent meg a jogalkotási és a jogalkalmazási területeken, például használható fokozott biztonságú elektronikus aláírás (advanced electronic signature) vagy minősített elektronikus aláírás (qualified electronic signature) a normál elektronikus aláírásokon túl. A fogalomrendszer bonyolultsága szintén nem kedvez a tömeges használatnak, azonban a fogalmak és követelmények ismerete nélkül nehezen eldönthető kérdés bizonyos esetekben, hogy használható-e az adott szolgáltatás teljes bizonyító erejű magánokirat vagy közokirat létrehozására vagy sem. A tanulmány az elektronikus aláíráshoz kapcsolódó fogalmak kialakulásának historikus vizsgálatát tűzte ki célul, amely révén átfogó kép alakítható ki a napjainkban használatos fogalmak jelentéséről és értelmezéséről. Ez a digitális világban alapvető fontosságúnak tűnik. --- The Emergence and Evolution of the Conceptual Framework of Electronic Signatures The concept of the electronic signature was used for the first time by legislators. Consistent use of this concept is not helped by the fact that its interpretation has undergone many changes. Related words – digital signature, identification, authentication, authorization, trust, reliance and trustworthiness – are used interchangeably. Many aspects of the electronic signature have appeared in legislation (especially in creating and applying laws), for instance; advanced and qualified signatures may be used in addition to normal signatures. The complexity of this concept is not helped by the wide usage of electronic signatures; however, without knowing concepts and legal consequences, it is hard to decide whether a given service can be used for creating public or private documents with full probative force or not. It is argued that knowing concepts and legal effects of electronic signatures seems to be essential in the digital world. Keywords: electronic signature, digital signature, full probative force, conceptual framework


Sign in / Sign up

Export Citation Format

Share Document