Search results for "BERT"

showing 10 items of 1789 documents

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment

2023

Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and su…

cybersecuritytestbed security operations centerkyberturvallisuusoperational technologygovernance modelteollisuusyritykset
researchProduct

Protecting the besieged cyber fortress : Russia’s response to cyber threats

2019

The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can be information-psychological (i.e., when the adversary tries to influence a person’s mind) or information-technical (i.e., when the object of influence is the information infrastructure). The information infrastructure of the RF is a combination of information systems, websites, and communication networks located in the territory of the RF, or those used as part of international treaties signed by the RF. A cyber threat is an illegal penetration or threat of penetration by…

cyberspacecyber threatVenäjäkyberavaruusComputingMilieux_LEGALASPECTSOFCOMPUTINGinfrastruktuuritcyber defensekyberturvallisuusverkkohyökkäyksetRussiaturvallisuuspolitiikka
researchProduct

cybertherapy meets facebook, blogger and second life: an italian experience

2009

Our project is based on the study of Cybertherapy in the international sphere (USA, Northern Europe) and on the application of this discipline to the Italian psychiatric and psychological reality. CyberTherapy can be used as an "aim", referring to it as real and proper therapy, which lives on personalized paths created by a qualified staff, conceived as ludic, for recreational, psycoterapic, and educational purpose. Moreover, Cybertherapy can be used as a "mean" (and in this way we want to propose it) with the aim of making the user, who feels a psychiatric or a psychological uneasiness, to become closer to qualified staff; a considerable advantage of this discipline is to reduce to a minim…

cybertherapy blog
researchProduct

Między geologią, poetyką i etyką : "Kolorowe kamienie" Adalberta Stiftera

2013

cykl nowelistycznygeologyAdalbert Stifterstonebiedermeiergeologianovel collectionkamień
researchProduct

Kilka uwag o historii klasztoru w Opolu-Czarnowąsach

2020

This article consists of two chapters. The first one presents an outline of the history of the convent in Czarnowąsy and objects of historical value situated therein. In the second chapter, the author mentions several issues related to the convent (which used to belong to the Norbertines) that still offer open fields for studies: the historical value of the short story “Uparte mniszki” by Zofia Kossak; Paweł Szotarewicz’s dedication to Baltazar Gerbert, the architect of the so-called House of Nuns; and the hypothetical visit of the then 29-year-old King Frederick the Great to this “House of God”.

czarnowąsymedia_common.quotation_subjectlcsh:LawArt historycongregation of the sisters of saint hedwigCzarnowąsy; Norbertines; Congregation of The Sisters of Saint Hedwig; Zofia Kossak; Charles Ferdinand Vasa; Frederick The GreatArtlcsh:Political institutions and public administration (General)charles ferdinand vasanorbertineszofia kossakSituatedlcsh:JF20-2112Value (mathematics)frederick the greatlcsh:Kmedia_commonOpolskie Studia Administracyjno-Prawne
researchProduct

La videovigilancia pública en el futuro código procesal penal: su impacto en los derechos fundamentales y libertades públicas de la persona

2014

La videovigilancia pública es una medida prevista en el futuro Código Procesal Penal español. Se pretende en éste trabajo analizar si está justificada la afectación de ciertos derechos y libertades de la persona a favor de la prevención del delito y la seguridad ciudadana a través de la misma; igualmente, si cumple los requisitos de proporcionalidad, idoneidad e indispensabilidad de nuestro sistema penal español tal y como está regulada; y finalmente si la videovigilancia pública contribuye efectivamente a prevenir la acción delictiva o no.

código procesal penallibertades públicasderechos fundamentalesvideovigilanciaUNESCO::CIENCIAS JURÍDICAS Y DERECHOvideocámaras
researchProduct

Videovigilados

2014

La videovigilancia a través de cámaras y webcams es una práctica muy extendida tanto en entornos privados como públicos, siendo sobre todo en éstos últimos en los que se produce una notable injerencia en nuestros derechos y libertades amparados por la Constitución Española.

código procesal penallibertades públicasderechos fundamentalesvideovigilanciaUNESCO::CIENCIAS JURÍDICAS Y DERECHOvideocámaras
researchProduct

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct