Search results for " security"

showing 10 items of 1419 documents

Safety regulations : implications of the new risk perspectives

2016

Abstract The current safety regulations for industrial activities are to a large extent functionally oriented and risk-based (informed), expressing what to achieve rather than the means and solutions needed. They are founded on a probability-based perspective on risk, with the use of risk assessment, risk acceptance criteria and tolerability limits. In recent years several risk researchers have argued for the adoption of some new types of risk perspectives which highlight uncertainties rather than probabilities in the way risk is defined, the point being to better reflect the knowledge, and lack of knowledge, dimension of risk. The Norwegian Petroleum Safety Authority has recently implement…

021110 strategic defence & security studiesActuarial scienceta214business.industry0211 other engineering and technologiesFood safety risk analysisregulation02 engineering and technologyrisk acceptance criteriaIndustrial and Manufacturing EngineeringIT risk managementrisk perspectivesIT riskIncentiveRisk analysis (engineering)Risk analysis (business)021105 building & constructionta5141risk acceptance a criteriaBusinessDimension (data warehouse)Safety Risk Reliability and QualityRisk assessmentta512Risk managementReliability Engineering and System Safety
researchProduct

Metakaolin geopolymer characterization and application for ammonium removal from model solutions and landfill leachate

2016

Abstract Geopolymers are aluminosilicate compounds that are amorphous analogues of zeolites, and thus possess similar cation-exchange properties. Geopolymers have been successfully applied to remove toxic metals and organic dyes from aqueous solutions. In this study, geopolymer was synthesized from metakaolin and applied to remove ammonium (NH 4 + ) from model solutions and landfill leachate. Geopolymerization increased the ammonium removal capacity, surface area and average pore width and changed the chemical structure of metakaolin. The maximum NH 4 + removal capacity of the geopolymer was 21.07 mg g − 1 which was 46% higher than the capacity of the reference clinoptilolite–heulandite zeo…

021110 strategic defence & security studiesAqueous solutionChemistry0211 other engineering and technologiesGeology02 engineering and technology010501 environmental sciences01 natural sciencesGeopolymerchemistry.chemical_compoundAdsorptionChemical engineeringGeochemistry and PetrologyAluminosilicateAmmoniumLeachateZeoliteMetakaolin0105 earth and related environmental sciencesApplied Clay Science
researchProduct

Kinetic, isotherm and thermodynamic studies of the adsorption of methylene blue dye onto agro-based cellulosic materials

2015

AbstractThe purpose of this work is to establish the optimal experimental conditions for the removal of methylene blue (MB-as model basic dye) from aqueous solution by adsorption onto four agro-based materials, namely, cedar sawdust, pine sawdust, wheat straw, and Provence cane Arundo donax. Results show that an increase in acidity or ionic strength of the medium has generally a negative effect on the discoloration yield. From the data of pH effect, there is no need to change the initial pH of the MB solution to be treated. Equilibrium was reached after 20−30 min of agitation when cedar sawdust, pine sawdust, and Provence cane are used as adsorbents. However, in the case of wheat straw, an …

021110 strategic defence & security studiesAqueous solutionChromatographyChemistry0211 other engineering and technologiesLangmuir adsorption modelOcean Engineering02 engineering and technologyStraw021001 nanoscience & nanotechnologyPollutionsymbols.namesakechemistry.chemical_compoundAdsorptionChemical engineeringIonic strengthvisual_artMass transfervisual_art.visual_art_mediumsymbolsSawdust0210 nano-technologyMethylene blueWater Science and TechnologyDesalination and Water Treatment
researchProduct

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

The impact on disaster governance of the intersection of environmental hazards, border conflict and disaster responses in Ladakh, India

2018

Abstract The Indian border region of Ladakh, in Jammu and Kashmir State, has a sensitive Himalayan ecosystem and has experienced natural hazards and disasters of varying scales over the decades. Ladakh is also situated on a fault-line of multiple tensions, including ongoing border disagreements and intermittent conflict with China and Pakistan. The Indian army has thus become a permanent fixture in the region. This paper examines the implications of the intersection of these environmental and security factors for disaster governance in the region. Using Social Domains theory, the paper argues first, that a hazard-centred paradigm of ‘universal’ disaster science emerges from the colonial per…

021110 strategic defence & security studiesCivil societyeducation.field_of_studyNational security010504 meteorology & atmospheric sciencesDisaster risk reductionEmergency managementbusiness.industryCorporate governancePopulation0211 other engineering and technologiesPoison controlGeology02 engineering and technologyBuilding and ConstructionGeotechnical Engineering and Engineering Geology01 natural sciencesEconomyPolitical scienceNatural hazardbusinesseducationSafety Research0105 earth and related environmental sciencesInternational Journal of Disaster Risk Reduction
researchProduct

The Challenge of Coexistence in Socially Vulnerable Schools

2017

Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…

021110 strategic defence & security studiesClass (computer programming)business.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies050301 education02 engineering and technologyPublic relationsPeer supportPhase (combat)DemocracyConvivència escolarReading (process)General Materials ScienceQuality (business)SociologyMarketingbusiness0503 educationmedia_commonProcedia - Social and Behavioral Sciences
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct