Join the discussion and help to determine future directions for software technology in Europe.

The forum includes both open discussions and closed discussions visible only to group members. If you would like to join the closed Sustainability Special Interest Group, please contact us.

Up
0
Down
Posted in

Unbreakable Chains: How AI is Fortifying Cyber Resilience in Supply Chains

Conventional log monitoring solutions rely on manual rule-based analysis, whereas newer AI techniques utilize Natural Language Processing to model log streams and detect normal operating patterns. However, combining the benefits of these dynamic and static monitoring methods can create a powerful automated system capable of identifying anomalous situations and potential security risks without requiring human intervention. In this article we explore the potential benefits of integrating both novel and well-established techniques, in the context of an often conservative domain.

Up
0
Down
Posted in

Moving Target Defences

Moving Target Defense (MTD) is a cybersecurity approach that aims to increase the resilience of computer systems and networks by continuously changing the attack surface or defense profile. This approach involves dynamically changing the system's configuration, topology, or behavior to prevent attackers from gaining access, detecting vulnerabilities, or launching successful attacks. The objective of MTD is to make it more difficult and time-consuming for attackers to exploit system weaknesses, thereby reducing the chances of a successful attack.

Up
0
Down
Posted in

False Data Injection Attacks

False data injection attacks are a type of cyber attack that targets data systems and networks by introducing malicious or incorrect data into the system. This attack is a form of data poisoning that aims to compromise the integrity of data and can lead to serious consequences such as data loss, theft, and manipulation. False data injection attacks can be carried out in various ways and can target different types of systems, including industrial control systems, financial systems, and healthcare systems.

Up
+1
Down
Posted in

An introduction to automated Virtual Teaching Assistants and practical guidelines for building one

Virtual assistants have become increasingly popular over the past decade, and are now an integral part of our lives. From Apple’s Siri to Amazon’s Alexa and Google Assistant, the most popular digital assistants are generally voice-activated and can be employed for a variety of purposes, such as managing our calendars, starting playlists, and conducting online searches.

Up
0
Down
Posted in

Navigating the nexus of EU Policy, Digital Technologies, and Futures (S1/E2)

S1/E2: The General Data Protection Regulation of the European Union – It’s good to be a EU citizen

Up
0
Down
Posted in

Empowering Citizen Developers: The Future of No-Code/Low-Code Platforms

The most damaging phrase in the language is “It’s always been done this way.”

Grace Hopper

Up
+1
Down
Posted in

Watering the Future: How AI is Reshaping the Way We Manage Our Most Precious Resource

Water is a vital resource essential for life and indispensable for many industrial and agricultural activities, determining one of the UN/s sustainable development goals being a priority for most governments worldwide. Preceding the UN Congress on Water we discuss how the management of water resources has become a critical concern, and AI and business intelligence have emerged as powerful tools for improving water management.

Up
+1
Down
Posted in

Learning to Unlearn: The Importance of Machine Unlearning in the Age of Big Data

 

"The Time we learn what to unlearn is the time we grow up." - Bishmeet Singh

Most of the time, we think that big data is better data. This can be correct in some cases, but we all know the importance of quality data and how hard to obtain it. Even though we cleaned our data, the dataset could still contain inaccurate entries. As a result, they reduce the performance of our machine-learning models. This is an unwanted situation, but there could be worse.

Up
0
Down
Posted in

Navigating the nexus of EU Policy, Digital Technologies, and Futures

(S1/E1)

Why (and how) everyone and their neighbour in the Software Sector should be aware of European Union legislation

Up
0
Down
Posted in

Post Quantum Encryption

Quantum computers are a type of computing technology that uses quantum mechanics principles to perform computations. Unlike classical computers, which use binary digits (bits) to represent information as either 0 or 1, quantum computers use quantum bits (qubits) that can be in superposition, meaning they can represent both 0 and 1 at the same time. The development of a fully functional quantum computer is an active area of research, and while significant progress has been made, it is difficult to predict exactly when a working quantum computer will be available.

Up
0
Down
Posted in

Cyber-Security for Power Systems

Cybersecurity has become one of the most critical aspects of modern-day technology. With the increasing reliance on technology in power systems, cyber-attacks pose a significant risk to the reliability and security of the power grid. Cybersecurity threats have become more sophisticated and complex, leading to significant damages, including blackouts, financial losses, and theft of sensitive information. Therefore, there is a need to understand the cyber security concerns for power systems to develop effective measures to mitigate cyber-attacks.

Up
+1
Down
Posted in

Transforming education with ChatGPT and large language models

Artificial Intelligence (AI) has transformed many industries, and the possibilities of what it can achieve continue to expand.