Search results for " security"
showing 10 items of 1419 documents
Brauer correspondent blocks with one simple module
2019
One of the main problems in representation theory is to understand the exact relationship between Brauer corresponding blocks of finite groups. The case where the local correspondent has a unique simple module seems key. We characterize this situation for the principal p-blocks where p is odd.
Optical-data storage-readout technique based on fractal encrypting masks
2009
We propose the use of fractal structured diffractive masks as keys in secure storage-readout systems. A joint transform correlator based on a photorefractive crystal in the Fourier domain is implemented to perform encryption and decryption. We discuss the advantages of encrypting information using this kind of deterministic keys in comparison to conventional random phase masks. Preliminary experimental results are presented to demonstrate the effectiveness of the proposed system.
Three essays on actuarial social security theory
2015
Esta tesis se centra en dos de los instrumentos básicos para mejorar los sistemas de pensiones de reparto (PAYG pension systems): el balance actuarial (ABS) y las cuentas nocionales de aportación definida (NDC). Las investigaciones sobre dichos instrumentos consideran, en general, sólo la contingencia de jubilación. La tesis explora las posibilidades de generalizarlos añadiendo dos nuevas contingencias, la invalidez permanente (disability) y la dependencia (LTC). Los objetivos principales que esta tesis persigue son los siguientes: 1.- Desarrollar la base teórica necesaria para poder formular el balance de situación actuarial (ABS) tipo Suecia en un sistema de pensiones de reparto de presta…
LATIN AMERICA AND ABYA YALA IN TEACHING SPANISH HISTORY: THE "DISCOVERY", THE CONQUEST AND CONTROVERSIES OF THE BLACK LEGEND
2019
RESUMO O trabalho explicita as representações contemporâneas da História da América no ensino de História na Espanha. Explicita e problematiza as configurações textuais e iconográficas que pretendem ensinar uma história do “descobrimento”, da conquista e da colonização da América. Usou-se a metodologia da pesquisa bibliográfica e de campo, com técnica de fichamento e observações analíticas de obras historiográficas contemporâneas, livros didáticos e lugares de memória (museus e monumentos históricos). Em relação aos manuais didáticos, foram selecionados e analisados 18 livros de ensino de História editados por seis editoras no período de 2000 a 2015. Analisou-se a história do “descobrimento…
Knowledge Discovery from Network Logs
2015
Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. peerReviewed
Powers and Fundamental Rights in Cyber Security
2015
Protection of privacy and confidential communications are crucial fundamental rights in cyber security. The protection of privacy and confidential communications are twofold in the meaning that active security steps in communications may require interference with confidential communications. The detection and profiling of potential threats may raise suspects on innocent participants of communications. The NCSC-FI inside the Communications Authority has the initial task and powers to monitor the cyber security. The bill for the Code of Information Society introduces new obligations for information security and preparation for emergency situations. If new powers will be granted to authorities…
Combining Benford's Law and machine learning to detect money laundering. An actual Spanish court case.
2017
Abstract Objectives This paper is based on the analysis of the database of operations from a macro-case on money laundering orchestrated between a core company and a group of its suppliers, 26 of which had already been identified by the police as fraudulent companies. In the face of a well-founded suspicion that more companies have perpetrated criminal acts and in order to make better use of what are very limited police resources, we aim to construct a tool to detect money laundering criminals. Methods We combine Benford’s Law and machine learning algorithms (logistic regression, decision trees, neural networks, and random forests) to find patterns of money laundering criminals in the conte…
OHP-041 Formulary Decision-Making For Biosimilars: Considerations For Hospital Pharmacists
2013
Background It has been 6 years since the first biosimilar was approved for use in the European Union (EU). Given the likelihood that biosimilar monoclonal antibodies will be approved in Europe in the near future, it is timely to review the formulary selection criteria for biologicals and biosimilars. The European Medicines Agency (EMA) has issued guidelines that define the regulation of biosimilars in Europe and recommend approaches to establish biosimilarity. However, several questions regarding the assessment of biosimilars for formulary inclusion remain unanswered, including those related to manufacturing and drug supply. Purpose To aid hospital pharmacists in developing evaluation crite…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks
2018
International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …