Search results for " vulnerability"
showing 10 items of 138 documents
Pattern recognition based authentication in mobile and wireless systems
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…
Securing Assets with RFID
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…
A roadmap towards improving managed security services from a privacy perspective
2014
Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…
El Dret a la Ciutat des de l'exclusió residencial: l'evolució dels barris vulnerables de la Comunitat Valenciana
2019
El derecho a la ciudad fue un concepto empleado por primera vez por Lefebvre (1968) entendido como aquel derecho de la ciudadanía a constituir ciudades que respondan a las necesidades humanas. De este modo, las necesidades de una ciudad no son más que la manifestación expresa de las necesidades colectivas de sus residentes reflejadas en el espacio urbano y comunitario (Caravantes, 2018). A las necesidades colectivas cabe sumársele las necesidades específicas de las personas que forman parte activa e integrante de las ciudades. La concentración de tales necesidades, así como de fenómenos vinculados al ámbito residencial conllevan a la “acumulación de clases desfavorecidas en las ciudades” (S…
Silent say, saying effective and discourse mask
2021
In communication, every speaker must choose meticulously the aptness in the word, the gesture, the smile, the look or even the silence. The being-speaker hides and beyond protects himself behind his discursive mask which provides him with a linguistic security. While many disciplines - social psychology, psychoanalysis and philosophy – have seized the notion of the mask in their frame of reference, this concept still remains absent today in the language sciences. However, the game of masks substitution is fundamental in language activity. This game is so usual that we do not even notice it anymore, except in situations where we are explicitly asked to make an effort to adapt to the rule of …
Analyse spatiale de l’évolution du risque de gel sur la vigne en Bourgogne-Franche-Comté
2019
The warming undergone by the global climate does not necessarily entail a decrease in frost risk in agriculture/viticulture. Since both plant and climate are likely to evolve under changing environmental conditions, plant vulnerability and the meteorological phenomenon (frost) should be considered jointly when assessing the evolution of frost risk. This study aims at documenting the spatial and temporal frost risk changes in the winegrowing subregions of Bourgogne-Franche-Comté. The period between budburst and the last spring frost occurrence date has been considered as the most vulnerable for grapevines. We considered a plant as being stressed by a frost event when the temperature drops be…
Experimental cerebral ischemia in rats increases myocardial vulnerability to ischemia-reperfusion injury ex vivo
2016
IF 15.064 Fait partie de la session : "Myocardial ischaemia reperfusion injury: a proof of concept?"Presenter: A Meloux (Dijon,FR)http://congress365.escardio.org/Session/18961#.WIszi33sbBw; International audience