Search results for "Computer security"

showing 10 items of 433 documents

Entry and espionage with noisy signals

2014

Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…

Economics and Econometricsbusiness.industrymedia_common.quotation_subjectRadio jammingEspionagePublic relationsComputer securitycomputer.software_genreInformation asymmetryIndustrial espionageQuality (business)Deterrence theoryBusinessMonopolycomputerPrivate information retrievalFinancemedia_commonGames and Economic Behavior
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct

Modelling, simulation and characterization of a supercapacitor

2020

In the last decade, the issue of air pollution or the reduction of CO2 emissions has become of extreme interest both for civil society and then for the industrial and scientific research world. For this reason, the scientific research on automotive is called to answer with increasingly innovative solutions. One of the principal subjects are the storage and the utilization of the electric energy for electrical and hybrid vehicles. Nowadays, supercapacitors are getting more and more attention because of their characteristics that allow them to be a bridge between electrolytic capacitors and batteries in several application such as bust-mode energy delivery, regenerative breaks and so on. The …

Electrolytic capacitorSupercapacitorEngineeringbusiness.industrycharacterization energy storage parameters estimation supercapacitors020209 energy020208 electrical & electronic engineeringPrincipal (computer security)Automotive industry02 engineering and technologySettore ING-IND/32 - Convertitori Macchine E Azionamenti Elettrici7. Clean energyEnergy storageBridge (nautical)Characterization (materials science)Settore ING-IND/31 - ElettrotecnicaWork (electrical)13. Climate action0202 electrical engineering electronic engineering information engineeringSystems engineeringbusiness2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON)
researchProduct

Early detection of contamination and defect in foodstuffs by electronic nose: A review

2017

Abstract Electronic nose (e-nose) has emerged as a potential instrument in various areas of food safety assessment for rapid early detection of contamination and defect in food production chain. E-nose is an innovative measurement system designed for detecting and discriminating complex odors through mimicking the working mechanism and the principal building blocks of the mammalian olfactory system. This paper describes a literature update of the applications of the e-nose for ensuring health and safety in the food industry. Finally, its future trend, perspectives and challenging problem are also mentioned.

Electronic noseFood industrybusiness.industryComputer science010401 analytical chemistryPrincipal (computer security)Future trendEarly detection04 agricultural and veterinary sciencesContaminationFood safety040401 food science01 natural sciences0104 chemical sciencesAnalytical Chemistry0404 agricultural biotechnologyRisk analysis (engineering)otorhinolaryngologic diseasesFood processingbusinessSpectroscopyTrAC Trends in Analytical Chemistry
researchProduct

Disaster Prevention Integrated into Commonly Used Web Rendered Systems with GIS Capabilities

2014

The end of the 20th century brought a remarkable increase in the field of positioning techniques and communications, making them visible and available to the public, which led to an unprecedented interconnectivity. At the same time, disasters are part of our life. Regardless of their nature, measures can be taken, in order to prevent and mitigate their effects, by anticipative preparation or by avoiding the calamity area (if possible). To this end, this paper presents an integrated system, composed of a software component, a hardware component, and a decision-making human element, all having the declared role of diminishing or eliminating human and material losses.

Emergency managementComputer Networks and Communicationsbusiness.industryComputer scienceInterconnectivityComputer securitycomputer.software_genreField (computer science)Computer Science ApplicationsComputational Theory and MathematicsOrder (exchange)Component (UML)Component-based software engineeringbusinesscomputerInternational Journal of Computers Communications & Control
researchProduct

Publish-subscribe smartphone sensing platform for the acute phase of a disaster: A framework for emergency management support

2014

The advanced sensors embedded in modern smartphones opens up for novel research opportunities, as for instance manifested in the field of mobile phone sensing. Most notable is perhaps research activities within human activity recognition and context-aware applications. Along a similar vein, the SmartRescue project targets monitoring of both hazard developments as well as tracking of people in a disaster, taking advantage of smartphone sensing, processing and communication capabilities. The goal is to help crisis managers and the public in early hazard detection, hazard prediction, and in the forming of risk minimizing evacuation plans when disaster strikes. In this paper we propose a novel …

Emergency managementComputer sciencebusiness.industryProcess (engineering)Computer securitycomputer.software_genreData scienceHazardField (computer science)Activity recognitionIntelligent sensorProof of conceptMobile phonebusinesscomputer2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)
researchProduct

How communities' perceptions of disasters influence disaster response: managing landslides on Mount Elgon, Uganda

2014

The aim of this paper is to assess the role of people's perception in disaster management. It is based on a study carried out along the slopes of Mount Elgon in Eastern Uganda. People living in the study area have experienced a number of landslides, but the landslide in 2010 had the most far-reaching effects on community livelihoods and resulted in a major setback to development efforts in the area. Experiences of landslides have enabled the local people to develop a number of interpretations of the causes and effects of the phenomena. The study revealed that community members did not share uniform perceptions. Whereas some members advanced technical or physical explanations for the 2010 di…

Emergency managementbusiness.industryGeneral Social SciencesHuman factors and ergonomicsPoison controlDisaster PlanningLandslideComputer securitycomputer.software_genreLivelihoodSuicide preventionSetbackDisastersIntervention (law)GeographyResidence CharacteristicsHumansGeneral Earth and Planetary SciencesPerceptionUgandabusinesscomputerEnvironmental planningLandslidesDisasters
researchProduct

Ant colony optimisation for planning safe escape routes

2013

Published version of a chapter from the volume: Recent Trends in Applied Artificial Intelligence. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-38577-3_6 An emergency requiring evacuation is a chaotic event filled with uncertainties both for the people affected and rescuers. The evacuees are often left to themselves for navigation to the escape area. The chaotic situation increases when a predefined escape route is blocked by a hazard, and there is a need to re-think which escape route is safest. This paper addresses automatically finding the safest escape route in emergency situations in large buildings or ships with imperfect knowledge of the hazards. The proposed so…

Emergency personnelVDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Operations researchSmart phoneComputer scienceEvent (computing)VDP::Technology: 500::Information and communication technology: 550Ant colonyComputer securitycomputer.software_genreHazard (computer architecture)Emergency situationscomputerWireless sensor network
researchProduct

Strategic cyber threat intelligence : Building the situational picture with emerging technologies

2020

In 2019, e-criminals adopted new tactics to demand enormous ransoms from large organizations by using ransomware, a phenomenon known as “big game hunting.” Big game hunting is an excellent example of a sophisticated and coordinated modern cyber-attack that has a significant impact on the target. Cyber threat intelligence (CTI) increases the possibilities to detect and prevent cyber-attacks and gives defenders more time to act. CTI is a combination of incident response and traditional intelligence. Intelligence modifies raw data into information for decision-making and action. CTI consists of strategic, operational, or tactical intelligence on cyber threats. Security event monitoring, event-…

Emerging technologiesStrategic Cyber Threat IntelligencetekoälyComputer securitycomputer.software_genremachine learningkoneoppiminenArtificial IntelligencetiedusteluBusinessCyber threat intelligenceSituational ethicskyberturvallisuuscomputerverkkohyökkäykset
researchProduct

RELATIONSHIP MARKETING ON THE INTERNET: BUILDING A LONG-TERM RELATIONSHIP WITH CUSTOMERS

2018

The purpose of the study is to find out the main approaches to the relationship marketing on the internet that could help companies to build a long-term relationship with their customers. Principal objectives are to find and analyse scientific literature on the topic; with statistical and empirical analysis to find out the main differences between relationship marketing in the traditional and internet dimension. The research methods of the paper are scientific literature theoretical analysis, statistical and empirical data analysis. The results of the research are both theoretical and practical. Using results companies will be able to share their customers seeing at what stage they are loca…

Empirical databusiness.industry05 social sciencesPrincipal (computer security)02 engineering and technologyScientific literatureTerm (time)020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingThe InternetDimension (data warehouse)MarketingbusinessRelationship marketing10th International Scientific Conference “Business and Management 2018”
researchProduct