ETSI

Available (246)

Showing 145 - 156 per page



Securing Artificial Intelligence (SAI); Mitigation Strategy Report

The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases

ETSI GR SAI 005 V1.1.1 (2021-03)

Terrestrial Trunked Radio (TETRA);Testing specification; Part 1: Radio

Methods for testing whether TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment achieve the performance specified in ETSI EN 300 392-2 [1]. Specific test methods for DMO equipment are recommended in annex F of the present document. The purpose of these specifications is to provide a sufficient quality of radio transmission and reception for equipment operating in a TETRA system and to minimize harmful interference to other equipment. The present document is applicable to TETRA systems operating at radio frequencies in the range of 137 MHz to 1 GHz. Versions V3.3.1 [i.5] and earlier of the present document specified the methods used for type testing. The minimum technical characteristics of TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment and radio test methods to be used for providing presumption of conformity, are now specified in ETSI EN 303 758

ETSI TS 100 394-1 V4.1.1

Context Information Management (CIM); NGSI-LD Testing Framework: Test Template

The Testing Framework (document format) specifies a testing framework defining a methodology for the development of the test strategies, test systems and resulting test specifications. The present document identifies the implementation under test (scope of the testing), the format for the test specification, the test architecture, the points of control and observation, the naming conventions (e.g. for test case ID and test case grouping ID), etc. It also provides the Implementation Conformance Statement which is basically a checklist for a client-owner so they know what parts of the specification will be tested and if any is optional. The ICS will be published as a separate GS.

ETSI GS CIM 016 V1.1.1

ETSI GR MEC 035 V3.1.1 (2021-06)Multi-access Edge Computing (MEC); Study on Inter-MEC systems and MEC-Cloud systems coordination

The document studies the applicability of MEC specifications to inter-MEC systems and MEC-Cloud systems coordination that supports e.g. application instance relocation, synchronization and similar functionalities. Another subject of this study is the enablement and/or enhancement of functionalities for application lifecycle management by third parties (e.g. application developers).

ETSI GR MEC 035 V3.1.1 (2021-06)

Securing Artificial Intelligence (SAI);Mitigation Strategy Report

The present document summarizes and analyses existing and potential mitigation against threats for AI-based systems as discussed in ETSI GR SAI 004 [i.1]. The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases.

ETSI GR SAI 005 V1.1.1

Securing Artificial Intelligence (SAI);Problem Statement

The present document describes the problem of securing AI-based systems and solutions, with a focus on machine learning, and the challenges relating to confidentiality, integrity and availability at each stage of the machine learning lifecycle. It also describes some of the broader challenges of AI systems including bias, ethics and explainability. A number of different attack vectors are described, as well as several real-world use cases and attacks.

ETSI GR SAI 004 V1.1.1