Goto

Collaborating Authors

 critical infrastructure


A graph generation pipeline for critical infrastructures based on heuristics, images and depth data

Diessner, Mike, Tarant, Yannick

arXiv.org Artificial Intelligence

Virtual representations of physical critical infrastructures, such as water or energy plants, are used for simulations and digital twins to ensure resilience and continuity of their services. These models usually require 3D point clouds from laser scanners that are expensive to acquire and require specialist knowledge to use. In this article, we present a graph generation pipeline based on photogrammetry. The pipeline detects relevant objects and predicts their relation using RGB images and depth data generated by a stereo camera. This more cost-effective approach uses deep learning for object detection and instance segmentation of the objects, and employs user-defined heuristics or rules to infer their relations. Results of two hydraulic systems show that this strategy can produce graphs close to the ground truth while its flexibility allows the method to be tailored to specific applications and its transparency qualifies it to be used in the high stakes decision-making that is required for critical infrastructures.


Mysterious drones have been spotted at night at airports across Europe. How worried should we be?

BBC News

Mysterious drones have been spotted at night at airports across Europe. How worried should we be? First comes the warning, that disembodied voice over the tannoy: Your attention please. Please move to the shelter on the minus second floor. Then comes the mosquito-like whine of the incoming Russian drones, massing in their hundreds just above the clouds.


Incorporating AI Incident Reporting into Telecommunications Law and Policy: Insights from India

Agarwal, Avinash, Nene, Manisha J.

arXiv.org Artificial Intelligence

The integration of artificial intelligence (AI) into telecommunications infrastructure introduces novel risks, such as algorithmic bias and unpredictable system behavior, that fall outside the scope of traditional cybersecurity and data protection frameworks. This paper introduces a precise definition and a detailed typology of telecommunications AI incidents, establishing them as a distinct category of risk that extends beyond conventional cybersecurity and data protection breaches. It argues for their recognition as a distinct regulatory concern. Using India as a case study for jurisdictions that lack a horizontal AI law, the paper analyzes the country's key digital regulations. The analysis reveals that India's existing legal instruments, including the Telecommunications Act, 2023, the CERT-In Rules, and the Digital Personal Data Protection Act, 2023, focus on cybersecurity and data breaches, creating a significant regulatory gap for AI-specific operational incidents, such as performance degradation and algorithmic bias. The paper also examines structural barriers to disclosure and the limitations of existing AI incident repositories. Based on these findings, the paper proposes targeted policy recommendations centered on integrating AI incident reporting into India's existing telecom governance. Key proposals include mandating reporting for high-risk AI failures, designating an existing government body as a nodal agency to manage incident data, and developing standardized reporting frameworks. These recommendations aim to enhance regulatory clarity and strengthen long-term resilience, offering a pragmatic and replicable blueprint for other nations seeking to govern AI risks within their existing sectoral frameworks.


A Conceptual Framework for AI-based Decision Systems in Critical Infrastructures

Leyli-abadi, Milad, Bessa, Ricardo J., Viebahn, Jan, Boos, Daniel, Borst, Clark, Castagna, Alberto, Chavarriaga, Ricardo, Hassouna, Mohamed, Lemetayer, Bruno, Leto, Giulia, Marot, Antoine, Meddeb, Maroua, Meyer, Manuel, Schiaffonati, Viola, Schneider, Manuel, Waefler, Toni

arXiv.org Artificial Intelligence

Abstract-- The interaction between humans and AI in safety-critical systems presents a unique set of challenges that re main partially addressed by existing frameworks. These challen ges stem from the complex interplay of requirements for transparency, trust, and explainability, coupled with the neces sity for robust and safe decision-making. A framework that holistic ally integrates human and AI capabilities while addressing thes e concerns is notably required, bridging the critical gaps in designing, deploying, and maintaining safe and effective sys tems. This paper proposes a holistic conceptual framework for cri tical infrastructures by adopting an interdisciplinary approac h. It integrates traditionally distinct fields such as mathemati cs, decision theory, computer science, philosophy, psycholog y, and cognitive engineering and draws on specialized engineerin g domains, particularly energy, mobility, and aeronautics. Its flexibility is further demonstrated through a case study on power grid management. Artificial Intelligence (AI) is showing high potential to transform the management of critical infrastructures [1], tackling pressing challenges like climate change and the rising demand for energy and mobility systems while advancing strategic objectives such as energy transition and digi tal transformation. On the other hand, integrating AI in critic al sectors introduces significant challenges, many of which ar e already being addressed by emerging regulatory frameworks, such as the European Union AI Act. These frameworks emphasize the importance of safety, transparency, and adhe r-ence to ethical standards and principles to mitigate a wide range of risks, including technical, social, and environme ntal hazards associated with deploying AI in high-risk domains. Another key challenge lies in fostering effective human-AI collaboration.


Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection

Zaboli, Aydin, Hong, Junho

arXiv.org Artificial Intelligence

In digital substations, security events pose significant challenges to the sustained operation of power systems. To mitigate these challenges, the implementation of robust defense strategies is critically important. A thorough process of anomaly identification and detection in information and communication technology (ICT) frameworks is crucial to ensure secure and reliable communication and coordination between interconnected devices within digital substations. Hence, this paper addresses the critical cybersecurity challenges confronting IEC61850-based digital substations within modern smart grids, where the integration of advanced communication protocols, e.g., generic object-oriented substation event (GOOSE), has enhanced energy management and introduced significant vulnerabilities to cyberattacks. Focusing on the limitations of traditional anomaly detection systems (ADSs) in detecting threats, this research proposes a transformative approach by leveraging generative AI (GenAI) to develop robust ADSs. The primary contributions include the suggested advanced adversarial traffic mutation (AATM) technique to generate synthesized and balanced datasets for GOOSE messages, ensuring protocol compliance and enabling realistic zero-day attack pattern creation to address data scarcity. Then, the implementation of GenAI-based ADSs incorporating the task-oriented dialogue (ToD) processes has been explored for improved detection of attack patterns. Finally, a comparison of the GenAI-based ADS with machine learning (ML)-based ADSs has been implemented to showcase the outperformance of the GenAI-based frameworks considering the AATM-generated GOOSE datasets and standard/advanced performance evaluation metrics.


AI Security Map: Holistic Organization of AI Security Technologies and Impacts on Stakeholders

Kato, Hiroya, Kita, Kentaro, Hasegawa, Kento, Hidano, Seira

arXiv.org Artificial Intelligence

As the social implementation of AI has been steadily progressing, research and development related to AI security has also been increasing. However, existing studies have been limited to organizing related techniques, attacks, defenses, and risks in terms of specific domains or AI elements. Thus, it extremely difficult to understand the relationships among them and how negative impacts on stakeholders are brought about. In this paper, we argue that the knowledge, technologies, and social impacts related to AI security should be holistically organized to help understand relationships among them. To this end, we first develop an AI security map that holistically organizes interrelationships among elements related to AI security as well as negative impacts on information systems and stakeholders. This map consists of the two aspects, namely the information system aspect (ISA) and the external influence aspect (EIA). The elements that AI should fulfill within information systems are classified under the ISA. The EIA includes elements that affect stakeholders as a result of AI being attacked or misused. For each element, corresponding negative impacts are identified. By referring to the AI security map, one can understand the potential negative impacts, along with their causes and countermeasures. Additionally, our map helps clarify how the negative impacts on AI-based systems relate to those on stakeholders. We show some findings newly obtained by referring to our map. We also provide several recommendations and open problems to guide future AI security communities.


America's skies are wide open to national security threats, drone expert warns: 'We have no awareness'

FOX News

DroneUp CEO Tom Walker speaks with Fox News Digital about his Congressional testimony calling for a nationalized database of drone pilots and flights amid changing technology, while warning the country's airspace regulations are unprepared. As drone technology rapidly advances, industry experts are warning Congress about potential airspace lapses creating the next national security threat if left unregulated. In a U.S. House Homeland Security Subcommittee hearing held last week, drone industry experts testified about the looming threats to airspace safety posed by unmanned aircraft systems (UAS). "More than half of all near misses with commercial and general aviation are with drones," Tom Walker, CEO of DroneUp, told Fox News Digital. Drone experts are asking Congress for a centralized database to track flights and pilots in an attempt to fill gaps in airspace regulations.


EU steps up air defences for Ukraine and sanctions for Russia

Al Jazeera

Ukraine's European allies marshalled resources this week to provide the besieged country with air defences against drones and ballistic missiles. The European Union also announced an 18th round of sanctions designed to sever all remaining Russian energy imports, and proposed a fivefold increase in the common defence budget to boost EU defence research and procurement. European leaders convinced the United States to symbolically rejoin the 52-nation Ukraine Defence Contact Group coordinating defence donations, but not as a donor. It was the first such meeting attended by US Defense Secretary Pete Hegseth since February, when he told EU members that pushing Russia out of Ukraine's internationally recognised territory was unrealistic. As the ideological chasm between the EU and the US over Ukraine widened, Russia continued to pound Ukrainian defenders, making a few inroads.


Military AI Cyber Agents (MAICAs) Constitute a Global Threat to Critical Infrastructure

Dubber, Timothy, Lazar, Seth

arXiv.org Artificial Intelligence

This paper argues that autonomous AI cyber-weapons - Military-AI Cyber Agents (MAICAs) - create a credible pathway to catastrophic risk. It sets out the technical feasibility of MAICAs, explains why geopolitics and the nature of cyberspace make MAICAs a catastrophic risk, and proposes political, defensive-AI and analogue-resilience measures to blunt the threat.


Israel's drone strikes in Iran show why US must halt China's land grab here: experts

FOX News

State Armor founder and CEO Michael Lucci on CCP-linked researchers residing at American universities, national security threats from China and the need to block the subversion with legislation. National security and China experts are warning that Israel's attack on Iran is an example of why Beijing's efforts to purchase land and other assets within the United States need to be stopped immediately. After the initial attacks began on Friday, news reports began surfacing indicating that Israel had secretly built a drone base on Iranian soil that it used to launch its attacks. The operation was years in the making, one Israeli security official told the Jewish Chronicle, adding that weapons systems and soldiers had been smuggled into the country ahead of time. "Look at the ways Israel penetrated Iran for sabotage operations. Now look at the Chinese companies and assets permeating the US power grid (solar converters), local law enforcement (DJI drones), and social media (TikTok)," China policy expert Michael Sobolik wrote in a post on X. "The CCP is preparing to paralyze us in a crisis."