Skip to main content

Showing 1–3 of 3 results for author: Watson, J D M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10754  [pdf

    cs.ET cs.CY cs.HC eess.SY

    A Systematic Survey of the Gemini Principles for Digital Twin Ontologies

    Authors: James Michael Tooth, Nilufer Tuptuk, Jeremy Daniel McKendrick Watson

    Abstract: Ontologies are widely used for achieving interoperable Digital Twins (DTws), yet competing DTw definitions compound interoperability issues. Semantically linking these differing twins is feasible through ontologies and Cognitive Digital Twins (CDTws). However, it is often unclear how ontology use bolsters broader DTw advancements. This article presents a systematic survey following the PRISMA meth… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 35 pages + 4 page appendix, 8 figures

  2. arXiv:2208.07965  [pdf

    cs.CR

    Improving the Cybersecurity of Critical National Infrastructure using Modelling and Simulation

    Authors: Uchenna D Ani, Jeremy D McK Watson, Nilufer Tuptuk, Steve Hailes, Madeline Carr, Carsten Maple

    Abstract: The UK Critical National Infrastructure is critically dependent on digital technologies that provide communications, monitoring, control, and decision-support functionalities. Digital technologies are progressively enhancing efficiency, reliability, and availability of infrastructure, and enabling new benefits not previously available. These benefits can introduce vulnerabilities through the conne… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: 7 pages, 5 Figures, Policy Briefing

  3. arXiv:1904.01551  [pdf

    cs.CR cs.NI eess.SY

    A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape

    Authors: Uchenna D Ani, Jeremy D McK. Watson, Jason R. C. Nurse, Al Cook, Carsten Maple

    Abstract: As new technologies such as the Internet of Things (IoT) are integrated into Critical National Infrastructures (CNI), new cybersecurity threats emerge that require specific security solutions. Approaches used for analysis include the modelling and simulation of critical infrastructure systems using attributes, functionalities, operations, and behaviours to support various security analysis viewpoi… ▽ More

    Submitted 2 April, 2019; originally announced April 2019.

    Comments: PETRAS/IET Conference Living in the Internet of Things: Cybersecurity of the IoT 2019