Search results for "Computer security"
showing 10 items of 433 documents
Entry and espionage with noisy signals
2014
Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…
Modelling, simulation and characterization of a supercapacitor
2020
In the last decade, the issue of air pollution or the reduction of CO2 emissions has become of extreme interest both for civil society and then for the industrial and scientific research world. For this reason, the scientific research on automotive is called to answer with increasingly innovative solutions. One of the principal subjects are the storage and the utilization of the electric energy for electrical and hybrid vehicles. Nowadays, supercapacitors are getting more and more attention because of their characteristics that allow them to be a bridge between electrolytic capacitors and batteries in several application such as bust-mode energy delivery, regenerative breaks and so on. The …
Early detection of contamination and defect in foodstuffs by electronic nose: A review
2017
Abstract Electronic nose (e-nose) has emerged as a potential instrument in various areas of food safety assessment for rapid early detection of contamination and defect in food production chain. E-nose is an innovative measurement system designed for detecting and discriminating complex odors through mimicking the working mechanism and the principal building blocks of the mammalian olfactory system. This paper describes a literature update of the applications of the e-nose for ensuring health and safety in the food industry. Finally, its future trend, perspectives and challenging problem are also mentioned.
Disaster Prevention Integrated into Commonly Used Web Rendered Systems with GIS Capabilities
2014
The end of the 20th century brought a remarkable increase in the field of positioning techniques and communications, making them visible and available to the public, which led to an unprecedented interconnectivity. At the same time, disasters are part of our life. Regardless of their nature, measures can be taken, in order to prevent and mitigate their effects, by anticipative preparation or by avoiding the calamity area (if possible). To this end, this paper presents an integrated system, composed of a software component, a hardware component, and a decision-making human element, all having the declared role of diminishing or eliminating human and material losses.
Publish-subscribe smartphone sensing platform for the acute phase of a disaster: A framework for emergency management support
2014
The advanced sensors embedded in modern smartphones opens up for novel research opportunities, as for instance manifested in the field of mobile phone sensing. Most notable is perhaps research activities within human activity recognition and context-aware applications. Along a similar vein, the SmartRescue project targets monitoring of both hazard developments as well as tracking of people in a disaster, taking advantage of smartphone sensing, processing and communication capabilities. The goal is to help crisis managers and the public in early hazard detection, hazard prediction, and in the forming of risk minimizing evacuation plans when disaster strikes. In this paper we propose a novel …
How communities' perceptions of disasters influence disaster response: managing landslides on Mount Elgon, Uganda
2014
The aim of this paper is to assess the role of people's perception in disaster management. It is based on a study carried out along the slopes of Mount Elgon in Eastern Uganda. People living in the study area have experienced a number of landslides, but the landslide in 2010 had the most far-reaching effects on community livelihoods and resulted in a major setback to development efforts in the area. Experiences of landslides have enabled the local people to develop a number of interpretations of the causes and effects of the phenomena. The study revealed that community members did not share uniform perceptions. Whereas some members advanced technical or physical explanations for the 2010 di…
Ant colony optimisation for planning safe escape routes
2013
Published version of a chapter from the volume: Recent Trends in Applied Artificial Intelligence. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-38577-3_6 An emergency requiring evacuation is a chaotic event filled with uncertainties both for the people affected and rescuers. The evacuees are often left to themselves for navigation to the escape area. The chaotic situation increases when a predefined escape route is blocked by a hazard, and there is a need to re-think which escape route is safest. This paper addresses automatically finding the safest escape route in emergency situations in large buildings or ships with imperfect knowledge of the hazards. The proposed so…
Strategic cyber threat intelligence : Building the situational picture with emerging technologies
2020
In 2019, e-criminals adopted new tactics to demand enormous ransoms from large organizations by using ransomware, a phenomenon known as “big game hunting.” Big game hunting is an excellent example of a sophisticated and coordinated modern cyber-attack that has a significant impact on the target. Cyber threat intelligence (CTI) increases the possibilities to detect and prevent cyber-attacks and gives defenders more time to act. CTI is a combination of incident response and traditional intelligence. Intelligence modifies raw data into information for decision-making and action. CTI consists of strategic, operational, or tactical intelligence on cyber threats. Security event monitoring, event-…
RELATIONSHIP MARKETING ON THE INTERNET: BUILDING A LONG-TERM RELATIONSHIP WITH CUSTOMERS
2018
The purpose of the study is to find out the main approaches to the relationship marketing on the internet that could help companies to build a long-term relationship with their customers. Principal objectives are to find and analyse scientific literature on the topic; with statistical and empirical analysis to find out the main differences between relationship marketing in the traditional and internet dimension. The research methods of the paper are scientific literature theoretical analysis, statistical and empirical data analysis. The results of the research are both theoretical and practical. Using results companies will be able to share their customers seeing at what stage they are loca…