Search results for "Computer Security"

showing 10 items of 433 documents

Deficiencias epistemológicas en la enseñanza habitual de los conceptos de campo y potencial eléctrico

1997

This article intends to analyse up to what extent the scarce learning produced when introducing the basic concepts on electrostatics is due to deficiencies and inadequacies in its routine teaching. So, on the one hand, we analyse what have been the principal epistemological leaps forward in the making of electricity as a science. On the other hand, we analyse Physics books and the teachers’ opinions.

Corrent elèctricaElectricitatCàrregaPrincipal (computer security)ElectrocinèticaCosmologia newtonianaPotencial elèctricTeoria elèctricaCosmologia cartesianaLEAPSEducationEpistemologyEnseñanza de las Ciencias. Revista de investigación y experiencias didácticas
researchProduct

Cost Reduction in Irrigation Networks by an Efficient Use of Pressure Reducing Valves

1992

The cost effective design of hydraulic networks has been traditionally studied from the point of view of the relationship between hydraulic variables and economic parameters, with piping being the main element studied. The reason is clear: the piping is by far the most costly item of a projected network. However it is not usual to find an explicit consideration of the influence that pipe thickness has on the cost of the network because of the added difficulty that this aspect poses to formulating the problem of optimization. In irrigation networks, which are typically branched, it is advisable to place Pressure Reducing Valves (PRV’s) to fulfil three main goals: 1) to control the flow rate …

Cost reductionDynamic programmingHydraulic headPipingComputer sciencePrincipal (computer security)Dynamic pressureReduction (mathematics)SizingReliability engineering
researchProduct

Transactions in Mobile Electronic Commerce

2000

With the development of global networking, invention of WWW, and proliferation of Internet-enabled computer hardware and software into homes and pockets, a huge customer base has been created for electronic commerce. It is rapidly expanding in USA and Europe and Japan are following the trend. So far, the development of E-commerce has happened in a rather unregulated way especially in USA, whereas in Europe the European Commission has been developing a regulatory basis mainly in form of directives. Currently (12/1999) they have not yet all been accepted and a major restructuring of the regulatory framework has also been planned. Another technological development is the rapid growth of mobile…

Credit cardAtomicityCustomer baseTransactional leadershipTransaction processingMobile computingInformation systemBusinessComputer securitycomputer.software_genrecomputerAuthentication (law)
researchProduct

Non-naturalistic Neuroethics for Moral Neuroeducation

2019

The aim of this chapter is to examine a series of key approaches towards identifying an appropriate neuroethics for moral neuroeducation. I begin by highlighting the shortcomings of neuroeducation models that side-line ethical issues. Neuroscience has contributed decisively to the knowledge of the brain mechanisms involved in teaching and learning processes. However, often only one form of learning, that based on instrumental subjects (mathematical calculation or reading), is taken into account. Undoubtedly, neuroeducational advances in this area have been very beneficial, but by focusing on education in strictly instrumental terms, the principles and ethical values that should structure ed…

Critical consciousnessEducational neurosciencemedia_common.quotation_subjectReading (process)Principal (computer security)Set (psychology)NeuroethicsPsychologyDemocracyNaturalismmedia_commonEpistemology
researchProduct

Introduction to Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack

2013

Critical security studiesCloud computing securityKnowledge managementCertified Information Security Managerbusiness.industryStandard of Good PracticeInformation securityComputer securitycomputer.software_genreSecurity information and event managementInformation security managementSecurity managementBusinesscomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

Analyzing Large-Scale Crowd Simulations for Building Evacuation

2010

Animated virtual crowds have been used last years for analyzing human factors in scenarios where masses of people gather. A typical example is building evacuation in case of fire. Scalability still remains as an open issue for these multiagent systems applications. In this paper, we use a scalable architecture to simulate a large-scale version of a virtual crowd in a building evacuation. From the social point of view, the results provided by the large-scale version of the crowd add new and crucial information about the agents behavior, emphasizing the need for a small amount of trained leaders in order to save lives. From the system point of view, the results show that the trend of avatars …

CrowdsPoint (typography)Computer scienceOrder (business)ComputationMulti-agent systemScalabilityClientCrowd simulationComputer securitycomputer.software_genreData sciencecomputer
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

Phenomena in the Cyber World

2015

This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.

CybercrimeRisk modelCyberwarfareComputer scienceCyberterrorismPerspective (graphical)Network-centric warfareComputer securitycomputer.software_genrecomputerComputingMilieux_MISCELLANEOUSInformation warfareCritical infrastructure
researchProduct

The Modern Strategies in the Cyber Warfare

2018

As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should addre…

CyberwarfareComputer scienceCognitive computingComputerApplications_COMPUTERSINOTHERSYSTEMSDeterrence theorySpace (commercial competition)Computer securitycomputer.software_genreBattlespaceCyberspacecomputerInformation warfareUse of force
researchProduct

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

2017

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…

DNS tunneling detectionSIMPLE (military communications protocol)business.industryComputer scienceDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreDomain (software engineering)protokollat0202 electrical engineering electronic engineering information engineeringAPT020201 artificial intelligence & image processingThe Internetcovert channels detectiontietoturvabusinesscomputerProtocol (object-oriented programming)
researchProduct