-
The end sum of surfaces
Authors:
Liam K. Axon,
Jack S. Calcut
Abstract:
End sum is a natural operation for combining two noncompact manifolds and has been used to construct various manifolds with interesting properties. The uniqueness of end sum has been well-studied in dimensions three and higher. We study end sum -- and the more general notion of adding a 1-handle at infinity -- for surfaces and prove uniqueness results. The result of adding a 1-handle at infinity t…
▽ More
End sum is a natural operation for combining two noncompact manifolds and has been used to construct various manifolds with interesting properties. The uniqueness of end sum has been well-studied in dimensions three and higher. We study end sum -- and the more general notion of adding a 1-handle at infinity -- for surfaces and prove uniqueness results. The result of adding a 1-handle at infinity to distinct ends of a surface with compact boundary is uniquely determined by the chosen ends and the orientability of the 1-handle. As a corollary, the end sum of two surfaces with compact boundary is uniquely determined by the chosen ends. Unlike uniqueness results in higher dimensions, which rely on isotopy uniqueness of rays, our results rely fundamentally on a classification of noncompact surfaces.
△ Less
Submitted 21 December, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI
Authors:
Louise Axon,
Dimitrios Panagiotakopoulos,
Samuel Ayo,
Carolina Sanchez-Hernandez,
Yan Zong,
Simon Brown,
Lei Zhang,
Michael Goldsmith,
Sadie Creese,
Weisi Guo
Abstract:
Air Traffic Management data systems today are inefficient and not scalable to enable future unmanned systems. Current data is fragmented, siloed, and not easily accessible. There is data conflict, misuse, and eroding levels of trust in provenance and accuracy. With increased autonomy in aviation, Artificially Intelligent (AI) enabled unmanned traffic management (UTM) will be more reliant on secure…
▽ More
Air Traffic Management data systems today are inefficient and not scalable to enable future unmanned systems. Current data is fragmented, siloed, and not easily accessible. There is data conflict, misuse, and eroding levels of trust in provenance and accuracy. With increased autonomy in aviation, Artificially Intelligent (AI) enabled unmanned traffic management (UTM) will be more reliant on secure data from diverse stakeholders. There is an urgent need to develop a secure network that has trustworthy data chains and works with the requirements generated by UTM. Here, we review existing research in 3 key interconnected areas: (1) blockchain development for secure data transfer between competing aviation stakeholders, (2) self-learning networking architectures that distribute consensus to achieve secure air traffic control, (3) explainable AI to build trust with human stakeholders and backpropagate requirements for blockchain and network optimisation. When connected together, this new digital ecosystem blueprint is tailored for safety critical UTM sectors. We motivate the readers with a case study, where a federated learning UTM uses real air traffic and weather data is secured and explained to human operators. This emerging area still requires significant research and development by the community to ensure it can enable future autonomous air mobility.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)
Authors:
Marwan Zeggari,
Renaud Lambiotte,
Aydin Abadi,
Louise Axon,
Mohamad Kassab
Abstract:
While online interactions and exchanges have grown exponentially over the past decade, most commercial infrastructures still operate through centralized protocols, and their success essentially depends on trust between different economic actors. Digital advances such as blockchain technology has led to a massive wave of \textit{Decentralized Ledger Technology} (\textit{DLT}) initiatives, protocols…
▽ More
While online interactions and exchanges have grown exponentially over the past decade, most commercial infrastructures still operate through centralized protocols, and their success essentially depends on trust between different economic actors. Digital advances such as blockchain technology has led to a massive wave of \textit{Decentralized Ledger Technology} (\textit{DLT}) initiatives, protocols and solutions. This advance makes it possible to implement trustless systems in the real world, which, combined with appropriate economic and participatory incentives, would foster the proper functioning and drive the adoption of a decentralized platform among different actors. This paper describes an alternative to current commercial structures and networks by introducing \textit{Lyzis Labs}, which is is an incentive-driven and democratic protocol designed to support a decentralized online marketplace, based on blockchain technology. The proposal, \textit{Lyzis Marketplace}, allows to connect two or more people in a decentralized and secure way without having to rely on a \textit{Trusted Third Party} (\textit{TTP}) in order to perform physical asset exchanges while mainly providing transparent and fully protected data storage. This approach can potentially lead to the creation of a permissionless, efficient, secure and transparent business environment where each user can gain purchasing and decision-making power by supporting the collective welfare while following their personal interests during their various interactions on the network.
△ Less
Submitted 5 November, 2022; v1 submitted 15 October, 2022;
originally announced October 2022.
-
The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes
Authors:
Jason R. C. Nurse,
Louise Axon,
Arnau Erola,
Ioannis Agrafiotis,
Michael Goldsmith,
Sadie Creese
Abstract:
Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its more procedural policy-related aspects. Th…
▽ More
Cyber insurance is a key component in risk management, intended to transfer risks and support business recovery in the event of a cyber incident. As cyber insurance is still a new concept in practice and research, there are many unanswered questions regarding the data and economic models that drive it, the coverage options and pricing of premiums, and its more procedural policy-related aspects. This paper aims to address some of these questions by focusing on the key types of data which are used by cyber-insurance practitioners, particularly for decision-making in the insurance underwriting and claim processes. We further explore practitioners' perceptions of the challenges they face in gathering and using data, and identify gaps where further data is required. We draw our conclusions from a qualitative study by conducting a focus group with a range of cyber-insurance professionals (including underwriters, actuaries, claims specialists, breach responders, and cyber operations specialists) and provide valuable contributions to existing knowledge. These insights include examples of key data types which contribute to the calculation of premiums and decisions on claims, the identification of challenges and gaps at various stages of data gathering, and initial perspectives on the development of a pre-competitive dataset for the cyber insurance industry. We believe an improved understanding of data gathering and usage in cyber insurance, and of the current challenges faced, can be invaluable for informing future research and practice.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Sonification in security operations centres: what do security practitioners think?
Authors:
Louise M. Axon,
Bushra Alahmadi,
Jason R. C. Nurse,
Michael Goldsmith,
Sadie Creese
Abstract:
In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could…
▽ More
In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which could aid practitioners multitasking in busy SOCs. The perspectives of security practitioners on incorporating sonification into their actual working environments have not yet been examined, however. The aim of this paper therefore is to address this gap by exploring attitudes to using sonification in SOCs. We report on the results of a study consisting of an online survey (N=20) and interviews (N=21) with security practitioners working in a range of different SOCs. Our contribution is a refined appreciation of the contexts in which sonification could aid in SOC working practice, and an understanding of the areas in which sonification may not be beneficial or may even be problematic.We also analyse the critical requirements for the design of sonification systems and their integration into the SOC setting. Our findings clarify insights into the potential benefits and challenges of introducing sonification to support work in this vital security-monitoring environment.
△ Less
Submitted 17 July, 2018;
originally announced July 2018.
-
Future Scenarios and Challenges for Security and Privacy
Authors:
Meredydd Williams,
Louise Axon,
Jason R. C. Nurse,
Sadie Creese
Abstract:
Over the past half-century, technology has evolved beyond our wildest dreams. However, while the benefits of technological growth are undeniable, the nascent Internet did not anticipate the online threats we routinely encounter and the harms which can result. As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security…
▽ More
Over the past half-century, technology has evolved beyond our wildest dreams. However, while the benefits of technological growth are undeniable, the nascent Internet did not anticipate the online threats we routinely encounter and the harms which can result. As our world becomes increasingly connected, it is critical we consider what implications current and future technologies have for security and privacy. We approach this challenge by surveying 30 predictions across industry, academia and international organisations to extract a number of common themes. Through this, we distill 10 emerging scenarios and reflect on the impact these might have on a range of stakeholders. Considering gaps in best practice and requirements for further research, we explore how security and privacy might evolve over the next decade. We find that existing guidelines both fail to consider the relationships between stakeholders and do not address the novel risks from wearable devices and insider threats. Our approach rigorously analyses emerging scenarios and suggests future improvements, of crucial importance as we look to pre-empt new technological threats.
△ Less
Submitted 16 July, 2018;
originally announced July 2018.