Search results for " vulnerability"

showing 10 items of 138 documents

Pattern recognition based authentication in mobile and wireless systems

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Securing Assets with RFID

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct

El Dret a la Ciutat des de l'exclusió residencial: l'evolució dels barris vulnerables de la Comunitat Valenciana

2019

El derecho a la ciudad fue un concepto empleado por primera vez por Lefebvre (1968) entendido como aquel derecho de la ciudadanía a constituir ciudades que respondan a las necesidades humanas. De este modo, las necesidades de una ciudad no son más que la manifestación expresa de las necesidades colectivas de sus residentes reflejadas en el espacio urbano y comunitario (Caravantes, 2018). A las necesidades colectivas cabe sumársele las necesidades específicas de las personas que forman parte activa e integrante de las ciudades. La concentración de tales necesidades, así como de fenómenos vinculados al ámbito residencial conllevan a la “acumulación de clases desfavorecidas en las ciudades” (S…

Valencian regionPobresa -- País Valencià:Urbanisme [Àrees temàtiques de la UPC]Vulnerabilitat urbanaDerecho a la ciudadUrban vulnerabilityVulnerable neighborhoodsVulnerabilidad urbanaComunitat ValencianaPoverty -- Spain -- Valencia (Province)Dret a la ciutatBarrios vulnerablesRight to the cityBarris vulnerablesSociology Urban -- Spain -- Valencia (Province)Comunidad ValencianaSociologia urbana -- País ValenciàXIII CTV 2019 Proceedings: XIII International Conference on Virtual Cityand Territory: “Challenges and paradigms of the contemporary city”: UPC, Barcelona, October 2-4, 2019
researchProduct

Silent say, saying effective and discourse mask

2021

In communication, every speaker must choose meticulously the aptness in the word, the gesture, the smile, the look or even the silence. The being-speaker hides and beyond protects himself behind his discursive mask which provides him with a linguistic security. While many disciplines - social psychology, psychoanalysis and philosophy – have seized the notion of the mask in their frame of reference, this concept still remains absent today in the language sciences. However, the game of masks substitution is fundamental in language activity. This game is so usual that we do not even notice it anymore, except in situations where we are explicitly asked to make an effort to adapt to the rule of …

Vulnérabilité linguistiqueL'être-LocuteurIdentityLinguistic silenceLinguistic securityIdentitéSilence linguistiqueLinguistic vulnerabilityThe being-SpeakerMasque discursifDiscursive maskSécurité linguistique[SHS.LANGUE] Humanities and Social Sciences/Linguistics
researchProduct

Analyse spatiale de l’évolution du risque de gel sur la vigne en Bourgogne-Franche-Comté

2019

The warming undergone by the global climate does not necessarily entail a decrease in frost risk in agriculture/viticulture. Since both plant and climate are likely to evolve under changing environmental conditions, plant vulnerability and the meteorological phenomenon (frost) should be considered jointly when assessing the evolution of frost risk. This study aims at documenting the spatial and temporal frost risk changes in the winegrowing subregions of Bourgogne-Franche-Comté. The period between budburst and the last spring frost occurrence date has been considered as the most vulnerable for grapevines. We considered a plant as being stressed by a frost event when the temperature drops be…

[SDE] Environmental Sciences[SDV.SA.AGRO] Life Sciences [q-bio]/Agricultural sciences/Agronomychangement climatiqueplant vulnerabilityvulnérabilité de la plante[SDV]Life Sciences [q-bio]frost riskrisque de gel[SDV.SA.AGRO]Life Sciences [q-bio]/Agricultural sciences/Agronomyviticulture[SDV] Life Sciences [q-bio][SDU.STU.CL] Sciences of the Universe [physics]/Earth Sciences/Climatologyclimate change[SDU.STU.CL]Sciences of the Universe [physics]/Earth Sciences/Climatology[SDE]Environmental Sciences[SDV.BV]Life Sciences [q-bio]/Vegetal Biology[SDV.BV] Life Sciences [q-bio]/Vegetal Biology
researchProduct

Experimental cerebral ischemia in rats increases myocardial vulnerability to ischemia-reperfusion injury ex vivo

2016

IF 15.064 Fait partie de la session : "Myocardial ischaemia reperfusion injury: a proof of concept?"Presenter: A Meloux (Dijon,FR)http://congress365.escardio.org/Session/18961#.WIszi33sbBw; International audience

[SDV.MHEP.CSC]Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular systemMyocardial vulnerability[ SDV.MHEP.CSC ] Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular systemCerebral ischemia[SDV.MHEP.CSC] Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular system
researchProduct