Search results for " security"

showing 10 items of 1419 documents

Image-Evoked Affect and its Impact on Eeg-Based Biometrics

2019

Electroencephalography (EEG) signals provide a representation of the brain’s activity patterns and have been recently exploited for user identification and authentication due to their uniqueness and their robustness to interception and artificial replication. Nevertheless, such signals are commonly affected by the individual’s emotional state. In this work, we examine the use of images as stimulus for acquiring EEG signals and study whether the use of images that evoke similar emotional responses leads to higher identification accuracy compared to images that evoke different emotional responses. Results show that identification accuracy increases when the system is trained with EEG recordin…

021110 strategic defence & security studiesmedicine.diagnostic_testBiometricsComputer scienceSpeech recognition0211 other engineering and technologies02 engineering and technologyElectroencephalographyStimulus (physiology)Statistical classification0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingMel-frequency cepstrum2019 IEEE International Conference on Image Processing (ICIP)
researchProduct

ES1D: A Deep Network for EEG-Based Subject Identification

2017

Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…

021110 strategic defence & security studiesmedicine.diagnostic_testbusiness.industryComputer scienceDeep learningFeature extractionSIGNAL (programming language)0211 other engineering and technologiesSpectral densityPattern recognition02 engineering and technologyElectroencephalographyConvolutional neural networkConvolutionIdentification (information)0202 electrical engineering electronic engineering information engineeringmedicine020201 artificial intelligence & image processingArtificial intelligencebusiness2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)
researchProduct

2018

Physical fitness is crucial to warfighters' performance in the battlefield. Previous studies have shown negative changes in their hormonal and neuromuscular responses induced by military field training (MFT). The purpose of this study was to investigate the changes in hormonal and immunological values and body composition during a prolonged MFT and to find out how warfighters' physical condition influences these changes. Conscripts (n = 49, age 20 ± 1 years, height 179 ± 9 cm, body mass 73.8 ± 7.8 kg, fat 12.6 ± 3.7% and BMI 23 kg/m²) were measured before, during, after MFT, and after a 4-day recovery period. Serum insulin-like growth factor-1 (IGF-1), tumor necrosis factor alpha (TNF-α), i…

021110 strategic defence & security studiesmedicine.medical_specialtybiologyPhysiologybusiness.industryLeptinPhysical fitness0211 other engineering and technologies030229 sport sciences02 engineering and technologyIsometric exercisePhysical strengthField trainingTrunk03 medical and health sciences0302 clinical medicineEndocrinologyPhysiology (medical)Internal medicinemedicinebiology.proteinCreatine kinasebusinessHormonePhysiological Reports
researchProduct

Towards a Security Competence of Software Developers

2020

Software growth has been explosive as people depend heavily on software on daily basis. Software development is a human-intensive effort, and developers' competence in software security is essential for secure software development. In addition, ubiquitous computing provides an added complexity to software security. Studies have treated security competences of software developers as a subsidiary of security engineers' competence instead of software engineers' competence, limiting the full knowledge of the security competences of software developers. This presents a crucial challenge for developers, educators, and users to maintain developers' competences in security. As a first step in pushi…

021110 strategic defence & security studiesohjelmistokehittäjätKnowledge managementbusiness.industryComputer scienceohjelmistotuotanto0211 other engineering and technologies020207 software engineering02 engineering and technologySoftwarekompetenssi0202 electrical engineering electronic engineering information engineeringammattitaitotietoturvaohjelmistokehitysbusinessCompetence (human resources)
researchProduct

Finding Software Bugs in Embedded Devices

2021

AbstractThe goal of this chapter is to introduce the reader to the domain of bug discovery in embedded systems which are at the core of the Internet of Things. Embedded software has a number of particularities which makes it slightly different to general purpose software. In particular, embedded devices are more exposed to software attacks but have lower defense levels and are often left unattended. At the same time, analyzing their security is more difficult because they are very “opaque”, while the execution of custom and embedded software is often entangled with the hardware and peripherals. These differences have an impact on our ability to find software bugs in such systems. This chapt…

021110 strategic defence & security studiessulautettu tietotekniikkaComputer sciencebusiness.industryembedded devices0211 other engineering and technologies020207 software engineering02 engineering and technologysecurityField (computer science)Domain (software engineering)Embedded softwareSoftwareSoftware bugohjelmointivirheetSoftware deploymentEmbedded systemsoftware bugs0202 electrical engineering electronic engineering information engineeringtietoturvabusinessInternet of ThingsGeneral purpose software
researchProduct

From “Mano Dura” to “Enfrentamiento Directo”: swings of public policies in El Salvador

2019

RESUMEN Introduccion: El presente trabajo analiza las cuatro principales politicas publicas de seguridad contra las pandillas en El Salvador: Mano Dura (2003-2004), Super Mano Dura (2004-2009), Tregua entre pandillas (2012-2014) y Enfrentamiento Directo (2014-2019). El objetivo es identificar la influencia de estas politicas sobre la violencia. Materiales y Metodos: Se trata de una investigacion cualitativa apoyada en 12 entrevistas y el relato de vida con las que se explora la responsabilidad gubernamental frente al problema de la violencia en El Salvador. El trabajo de campo se efectuo durante 7 meses, entre septiembre de 2016 y marzo de 2017. El tratamiento de la informacion se efectuo m…

021110 strategic defence & security studiesviolenciaSociology and Political SciencePublic policy05 social sciences0211 other engineering and technologiesseguridad públicaPharmaceutical Sciencepandillas02 engineering and technology0506 political scienceHM401-1281Política públicaPolitical science (General)gangsviolenceComplementary and alternative medicinepolíticas públicas050602 political science & public administrationEl SalvadorPharmacology (medical)Sociology (General)public safetyViolència políticaJA1-92
researchProduct

Outlook from the soil perspective of urban expansion and food security

2021

The use of soil as support for built-up areas represents only one of its several functions. Farmlands at the fringe of conurbations have more chance of being converted into built-up areas due to the favourable topography and the accessibility to existing infrastructure, being in the vicinity of urban areas. We analysed the global land-take during the period 2000–2014. The data are based on a global dataset describing the spatial evolution of human settlements using the Global Human Settlement Layer, which was derived from Landsat images collected in 1975, 1990, 2000 and 2014. Although the global land-take represents roughly 0.1% of the global terrestrial Earth, it affects 1% of the naturall…

0301 basic medicineBuilt-up areaGlobal human settlement layer03 medical and health sciences0302 clinical medicineHuman settlementlcsh:Social sciences (General)lcsh:Science (General)ProductivitySoil productivity indexMultidisciplinaryFood securitybusiness.industrySettlement (structural)Environmental resource managementUrban expansionSettore AGR/02 - Agronomia E Coltivazioni ErbaceeLand take030104 developmental biologyGeographySettore AGR/14 - PedologiaSoil waterPeriod (geology)lcsh:H1-99Settore M-GGR/01 - GeografiabusinessScale (map)030217 neurology & neurosurgeryResearch Articlelcsh:Q1-390Heliyon
researchProduct

SpCLUST: Towards a fast and reliable clustering for potentially divergent biological sequences

2019

International audience; This paper presents SpCLUST, a new C++ package that takes a list of sequences as input, aligns them with MUSCLE, computes their similarity matrix in parallel and then performs the clustering. SpCLUST extends a previously released software by integrating additional scoring matrices which enables it to cover the clustering of amino-acid sequences. The similarity matrix is now computed in parallel according to the master/slave distributed architecture, using MPI. Performance analysis, realized on two real datasets of 100 nucleotide sequences and 1049 amino-acids ones, show that the resulting library substantially outperforms the original Python package. The proposed pac…

0301 basic medicineComputer science[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]Health Informatics[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0302 clinical medicineSoftware[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Cluster AnalysisHumansCluster analysis[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]computer.programming_languagebusiness.industry[INFO.INFO-IU] Computer Science [cs]/Ubiquitous ComputingSimilarity matrixPattern recognitionDNAGenomicsSequence Analysis DNAPython (programming language)Mixture model[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationSpectral clusteringComputer Science Applications030104 developmental biologyComputingMethodologies_PATTERNRECOGNITION[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationArtificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputerAlgorithmsSoftware030217 neurology & neurosurgery
researchProduct

Stopping injection attacks with code and structured data

2018

Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed

0301 basic medicineExploitComputer scienceCross-site scriptingCryptographyComputer securitycomputer.software_genreSQL injection03 medical and health sciences0302 clinical medicineSoftwareSQL injectionCode (cryptography)Cryptographic hash functionProof-carrying codeproof-carrying codetietoturvaSQLbusiness.industryXSS030104 developmental biologyinjection030220 oncology & carcinogenesiscryptographic hashbusinesscomputer
researchProduct

Global emergence of the widespread Pseudomonas aeruginosa ST235 clone

2018

Abstract Objectives Despite the non-clonal epidemic population structure of Pseudomonas aeruginosa , several multi-locus sequence types are distributed worldwide and are frequently associated with epidemics where multidrug resistance confounds treatment. ST235 is the most prevalent of these widespread clones. In this study we aimed to understand the origin of ST235 and the molecular basis for its success. Methods The genomes of 79 P. aeruginosa ST235 isolates collected worldwide over a 27-year period were examined. A phylogenetic network was built, using a Bayesian approach to find the Most Recent Common Ancestor, and we identified antibiotic resistance determinants and ST235-specific genes…

0301 basic medicineMost recent common ancestorClone (cell biology)[ SDV.MP.BAC ] Life Sciences [q-bio]/Microbiology and Parasitology/Bacteriologymedicine.disease_causeGlobal HealthGenome[ SDV.MP ] Life Sciences [q-bio]/Microbiology and ParasitologyPrevalenceCluster Analysis[ SDV.BIBS ] Life Sciences [q-bio]/Quantitative Methods [q-bio.QM]High-risk clonesPhylogenyComputingMilieux_MISCELLANEOUSMolecular EpidemiologyGeneral Medicine3. Good healthInfectious Diseases[SDV.MP]Life Sciences [q-bio]/Microbiology and Parasitology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ SDV.BBM.GTP ] Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]Pseudomonas aeruginosaEfflux[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]FluoroquinolonesMicrobiology (medical)Genotype030106 microbiologyEpidemic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]BiologyBacterial resistanceMicrobiology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Antibiotic resistanceDrug Resistance BacterialmedicinePseudomonas InfectionsGenePseudomonas aeruginosaPathogenInternational clones[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationMultiple drug resistanceGenes Bacterial[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Multilocus Sequence Typing
researchProduct