Search results for " security"
showing 10 items of 1419 documents
Safety regulations : implications of the new risk perspectives
2016
Abstract The current safety regulations for industrial activities are to a large extent functionally oriented and risk-based (informed), expressing what to achieve rather than the means and solutions needed. They are founded on a probability-based perspective on risk, with the use of risk assessment, risk acceptance criteria and tolerability limits. In recent years several risk researchers have argued for the adoption of some new types of risk perspectives which highlight uncertainties rather than probabilities in the way risk is defined, the point being to better reflect the knowledge, and lack of knowledge, dimension of risk. The Norwegian Petroleum Safety Authority has recently implement…
Metakaolin geopolymer characterization and application for ammonium removal from model solutions and landfill leachate
2016
Abstract Geopolymers are aluminosilicate compounds that are amorphous analogues of zeolites, and thus possess similar cation-exchange properties. Geopolymers have been successfully applied to remove toxic metals and organic dyes from aqueous solutions. In this study, geopolymer was synthesized from metakaolin and applied to remove ammonium (NH 4 + ) from model solutions and landfill leachate. Geopolymerization increased the ammonium removal capacity, surface area and average pore width and changed the chemical structure of metakaolin. The maximum NH 4 + removal capacity of the geopolymer was 21.07 mg g − 1 which was 46% higher than the capacity of the reference clinoptilolite–heulandite zeo…
Kinetic, isotherm and thermodynamic studies of the adsorption of methylene blue dye onto agro-based cellulosic materials
2015
AbstractThe purpose of this work is to establish the optimal experimental conditions for the removal of methylene blue (MB-as model basic dye) from aqueous solution by adsorption onto four agro-based materials, namely, cedar sawdust, pine sawdust, wheat straw, and Provence cane Arundo donax. Results show that an increase in acidity or ionic strength of the medium has generally a negative effect on the discoloration yield. From the data of pH effect, there is no need to change the initial pH of the MB solution to be treated. Equilibrium was reached after 20−30 min of agitation when cedar sawdust, pine sawdust, and Provence cane are used as adsorbents. However, in the case of wheat straw, an …
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot
2020
Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.
On the Influence of Affect in EEG-Based Subject Identification
2021
Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…
Cybersecurity in Europe
2021
Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
The impact on disaster governance of the intersection of environmental hazards, border conflict and disaster responses in Ladakh, India
2018
Abstract The Indian border region of Ladakh, in Jammu and Kashmir State, has a sensitive Himalayan ecosystem and has experienced natural hazards and disasters of varying scales over the decades. Ladakh is also situated on a fault-line of multiple tensions, including ongoing border disagreements and intermittent conflict with China and Pakistan. The Indian army has thus become a permanent fixture in the region. This paper examines the implications of the intersection of these environmental and security factors for disaster governance in the region. Using Social Domains theory, the paper argues first, that a hazard-centred paradigm of ‘universal’ disaster science emerges from the colonial per…
The Challenge of Coexistence in Socially Vulnerable Schools
2017
Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…