Search results for " security"
showing 10 items of 1419 documents
Image-Evoked Affect and its Impact on Eeg-Based Biometrics
2019
Electroencephalography (EEG) signals provide a representation of the brain’s activity patterns and have been recently exploited for user identification and authentication due to their uniqueness and their robustness to interception and artificial replication. Nevertheless, such signals are commonly affected by the individual’s emotional state. In this work, we examine the use of images as stimulus for acquiring EEG signals and study whether the use of images that evoke similar emotional responses leads to higher identification accuracy compared to images that evoke different emotional responses. Results show that identification accuracy increases when the system is trained with EEG recordin…
ES1D: A Deep Network for EEG-Based Subject Identification
2017
Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…
2018
Physical fitness is crucial to warfighters' performance in the battlefield. Previous studies have shown negative changes in their hormonal and neuromuscular responses induced by military field training (MFT). The purpose of this study was to investigate the changes in hormonal and immunological values and body composition during a prolonged MFT and to find out how warfighters' physical condition influences these changes. Conscripts (n = 49, age 20 ± 1 years, height 179 ± 9 cm, body mass 73.8 ± 7.8 kg, fat 12.6 ± 3.7% and BMI 23 kg/m²) were measured before, during, after MFT, and after a 4-day recovery period. Serum insulin-like growth factor-1 (IGF-1), tumor necrosis factor alpha (TNF-α), i…
Towards a Security Competence of Software Developers
2020
Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…
Finding Software Bugs in Embedded Devices
2021
AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…
From “Mano Dura” to “Enfrentamiento Directo”: swings of public policies in El Salvador
2019
RESUMEN Introduccion: El presente trabajo analiza las cuatro principales politicas publicas de seguridad contra las pandillas en El Salvador: Mano Dura (2003-2004), Super Mano Dura (2004-2009), Tregua entre pandillas (2012-2014) y Enfrentamiento Directo (2014-2019). El objetivo es identificar la influencia de estas politicas sobre la violencia. Materiales y Metodos: Se trata de una investigacion cualitativa apoyada en 12 entrevistas y el relato de vida con las que se explora la responsabilidad gubernamental frente al problema de la violencia en El Salvador. El trabajo de campo se efectuo durante 7 meses, entre septiembre de 2016 y marzo de 2017. El tratamiento de la informacion se efectuo m…
Outlook from the soil perspective of urban expansion and food security
2021
The use of soil as support for built-up areas represents only one of its several functions. Farmlands at the fringe of conurbations have more chance of being converted into built-up areas due to the favourable topography and the accessibility to existing infrastructure, being in the vicinity of urban areas. We analysed the global land-take during the period 2000–2014. The data are based on a global dataset describing the spatial evolution of human settlements using the Global Human Settlement Layer, which was derived from Landsat images collected in 1975, 1990, 2000 and 2014. Although the global land-take represents roughly 0.1% of the global terrestrial Earth, it affects 1% of the naturall…
SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences
2019
International audience; This paper presents SpCLUST, a new C++ package that takes a list of sequences as input, aligns them with MUSCLE, computes their similarity matrix in parallel and then performs the clustering. SpCLUST extends a previously released software by integrating additional scoring matrices which enables it to cover the clustering of amino-acid sequences. The similarity matrix is now computed in parallel according to the master/slave distributed architecture, using MPI. Performance analysis, realized on two real datasets of 100 nucleotide sequences and 1049 amino-acids ones, show that the resulting library substantially outperforms the original Python package. The proposed pac…
Stopping injection attacks with code and structured data
2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed
Global emergence of the widespread Pseudomonas aeruginosa ST235 clone
2018
Abstract Objectives Despite the non-clonal epidemic population structure of Pseudomonas aeruginosa , several multi-locus sequence types are distributed worldwide and are frequently associated with epidemics where multidrug resistance confounds treatment. ST235 is the most prevalent of these widespread clones. In this study we aimed to understand the origin of ST235 and the molecular basis for its success. Methods The genomes of 79 P. aeruginosa ST235 isolates collected worldwide over a 27-year period were examined. A phylogenetic network was built, using a Bayesian approach to find the Most Recent Common Ancestor, and we identified antibiotic resistance determinants and ST235-specific genes…