Stanislav Abaimov
University of Rome Tor Vergata
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Stanislav Abaimov.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
The first € price and the £ and
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
price are net prices, subject to local VAT. Prices indicated with * include VAT for books; the €(D) includes 7% for Germany, the €(A) includes 10% for Austria. Prices indicated with ** include VAT for electronic products; 19% for Germany, 20% for Austria. All prices exclusive of carriage charges. Prices and other details are subject to change without notice. All errors and omissions excepted. M. Martellini, S. Abaimov, S. Gaycken, C. Wilson Information Security of Highly Critical Wireless Networks
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
Historically, technology advances and increase in productivity led to revolutionary societal changes and industrial development. The first industrial revolution created machines to replace hand work and invented steam engine to decrease hard labor. The ambitious engineer thought catalyzed the second industrial revolution, electrification increased the working hours and assembly lines enhanced mass production in the beginning of the twentieth century. While its second part witnessed a real breakthrough in computer engineering, and industrial automation spread exponentially taking over the manual controls; cyberspace ensured global digital communication, mobile connection, and e-commerce. Electronics and internet technologies created the thirst industrial revolution. The beginning of the XXI century is operating with such realities as Internet of Things, Robotics, Virtual Reality, Cyber Warfare, and Industry 4.0.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
Wireless networks are governed by a variety of regulations that are intended to cover safe operation of emergency communications and medical devices.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
To protect against “man-in-the-middle” attacks, wherein a hacker eavesdrops on messages between two or more nodes and relays or modifies messages so that the legitimate nodes are deceived into thinking they are talking directly to one another. To protect from such attacks, a successful information assurance strategy must make the mere reception of a signal useless to a would-be hacker.
Archive | 2017
Stanislav Abaimov; Maurizio Martellini
The wireless technologies, since their birth in 1890, have revolutionized our life style and provided freedom and liberty in remote data procession and management, both in civilian and military areas. After more than a century of evolution, wireless technology is adopted globally due to its advantages and ease of use in communication and data transfer, and wireless interconnectivity surrounds us on a daily basis, from wireless CCTV cameras to smartphones.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
The article highlights the strong relevance and crucial importance of cyber security defence and response capacities in CBRNeCy assets and management, including in ICS and SCADA systems. Based on the overview of the recent cyber security publications and available information on global cybercrime, it reviews types of cyber and cyber related physical attacks on CBRN Industrial Control Systems; classifies attack types and defence techniques by network layer of attack; analyses security testing approaches based on knowledge of the targeted system, and evaluates types of due protection. The proper combination of existing physical security measures and cyber security testing exercises is considered, by the authors, as one of the most efficient ways to ensure sufficient protection against increasing global cyber threats to CBRNeCy infrastructures. The paper deals also with the best security practises, and contains enumeration of the globally recognized testing techniques and methodologies required to design effective multi-disciplinary security measures, thus providing a substantial ground for their practical implementation in the areas of concern.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
Telemetry is the automatic transmission and measurement of data from remote sources by wire or radio or other means. It is also used to send commands, programs and receives monitoring information from these terminal locations. Supervisory Control and Data Acquisition (SCADA) systems use a combination of telemetry and data acquisition. SCADA is used for collecting information, transferring it to a central management site, carrying out any necessary data analysis and control operations, and then displaying the status information back onto the operator screens.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
Scanning of critical infrastructure networks is done for intelligence gathering for industrial espionage or for making preparations to direct a future cyberattack. Trend Micro officials reportedly have stated that, “We have observed increased interest in [scanning of] SCADA protocols …” for critical infrastructure and industrial systems.
Archive | 2017
Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken; Clay Wilson
Richard Clarke, former White House advisor on cybersecurity, has reportedly warned that there is evidence that China has been actively probing and hacking wireless networks that control the United States power grid. Clarke points out, “The only point to penetrating the grid’s controls is to counter American military superiority by threatening to damage the underpinning of the U.S. economy. Chinese military strategists have written about how in this way a nation like China could gain an equal footing with the militarily superior United States”.