Search results for "BERT"
showing 10 items of 1789 documents
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
2020
The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…
Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment
2023
Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…
Protecting the besieged cyber fortress : Russia’s response to cyber threats
2019
The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information-psychological (i.e., when the adversary tries to influence a person’s mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by…
cybertherapy meets facebook, blogger and second life: an italian experience
2009
Our project is based on the study of Cybertherapy in the international sphere (USA, Northern Europe) and on the application of this discipline to the Italian psychiatric and psychological reality. CyberTherapy can be used as an "aim", referring to it as real and proper therapy, which lives on personalized paths created by a qualified staff, conceived as ludic, for recreational, psycoterapic, and educational purpose. Moreover, Cybertherapy can be used as a "mean" (and in this way we want to propose it) with the aim of making the user, who feels a psychiatric or a psychological uneasiness, to become closer to qualified staff; a considerable advantage of this discipline is to reduce to a minim…
Między geologią, poetyką i etyką : "Kolorowe kamienie" Adalberta Stiftera
2013
Kilka uwag o historii klasztoru w Opolu-Czarnowąsach
2020
This article consists of two chapters. The first one presents an outline of the history of the convent in Czarnowąsy and objects of historical value situated therein. In the second chapter, the author mentions several issues related to the convent (which used to belong to the Norbertines) that still offer open fields for studies: the historical value of the short story “Uparte mniszki” by Zofia Kossak; Paweł Szotarewicz’s dedication to Baltazar Gerbert, the architect of the so-called House of Nuns; and the hypothetical visit of the then 29-year-old King Frederick the Great to this “House of God”.
La videovigilancia pública en el futuro código procesal penal: su impacto en los derechos fundamentales y libertades públicas de la persona
2014
La videovigilancia pública es una medida prevista en el futuro Código Procesal Penal español. Se pretende en éste trabajo analizar si está justificada la afectación de ciertos derechos y libertades de la persona a favor de la prevención del delito y la seguridad ciudadana a través de la misma; igualmente, si cumple los requisitos de proporcionalidad, idoneidad e indispensabilidad de nuestro sistema penal español tal y como está regulada; y finalmente si la videovigilancia pública contribuye efectivamente a prevenir la acción delictiva o no.
Videovigilados
2014
La videovigilancia a través de cámaras y webcams es una práctica muy extendida tanto en entornos privados como públicos, siendo sobre todo en éstos últimos en los que se produce una notable injerencia en nuestros derechos y libertades amparados por la Constitución Española.
On Attacking Future 5G Networks with Adversarial Examples : Survey
2022
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …