Search results for "Computer security"

showing 10 items of 433 documents

Development of a Taekwondo Combat Model Based on Markov Analysis

2019

The purpose of the present study was to examine male and female Olympic taekwondo competitors' movement patterns according to their tactical actions by applying a Markov processes analysis. To perform this study, 11,474 actions by male competitors and 12,980 actions by female competitors were compiled and analyzed. The results yielded 32 significant sequences among male competitors and 30 among female competitors. Male competitors demonstrated 11 sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive action. Female competitors demonstrated nine sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive move.…

Frequency of occurrenceVDP::Medisinske Fag: 700::Idrettsmedisinske fag: 850::Treningslære: 851combat sportslcsh:BF1-990Markov processComputer securitycomputer.software_genre050105 experimental psychologyCompetition (economics)03 medical and health sciencessymbols.namesake0302 clinical medicinePsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchMartial artsMarkov chainprobabilistic models05 social sciencesCompetitor analysisCounterattacklcsh:Psychologymartial artsstatisticssymbolstactical patternsPsychologyRelevant informationcomputer030217 neurology & neurosurgery
researchProduct

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

Constructive Dynamic Program Slicing Research

2010

Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the theory of slicing. However, slicing is still not widely applied in software industry. Therefore, there is a need to survey and characterize the conducted research and to analyze what problems hinder progress. This paper answers to that need by providing a survey of constructive dynamic program slicing research focusing on publication series with high visibility. The survey identified 12 dynamic slicers related to which 12 aspects were studied. The analysis revealed many issues which can be seen both as concerns and…

General Computer ScienceComputer sciencebusiness.industryScientific progressmedia_common.quotation_subjectComputer securitycomputer.software_genreData scienceSlicingConstructiveVisualizationScarcitySoftwareEmpirical researchProgram slicingbusinesscomputermedia_commonInternational Journal of Advancements in Computing Technology
researchProduct

A framework for behavior-based detection of user substitution in a mobile context

2007

Personal mobile devices, such as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by unintended persons may result in severe security breaches concerning private or corporate data and services. Organizations develop their security policy and employ preventive techniques to combat unauthorized use. Current solutions, however, are still breakable and there is a strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define the measures to be monitored. In this paper, a structured conceptual framework for mobile-user substitution detection is proposed.…

General Computer ScienceComputer sciencemedia_common.quotation_subjectUser modelingSubstitution (logic)Computer user satisfactionIntrusion detection systemComputer securitycomputer.software_genreSecurity policyUser interface designHuman–computer interactionPersonalityLawcomputerMobile devicemedia_commonComputers & Security
researchProduct

Managing information security risks during new technology adoption

2012

Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil co…

General Computer Sciencedelaybusiness.industryinformation security managementVDP::Technology: 500::Information and communication technology: 550Context (language use)Information securityIntegrated operationsComputer securitycomputer.software_genreProblem managementreactive investmentInformation security managementRisk analysis (engineering)Information and Communications Technologyproactive investmentsystem dynamicsintegrated operationsbusinessLawcomputerRisk managementVulnerability (computing)Computers & Security
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Foliations making a constant angle with principal directions on ellipsoids

2015

General MathematicsMathematical analysisPrincipal (computer security)GeometryEllipsoidConstant angleMathematicsAnnales Polonici Mathematici
researchProduct

Bounded Seed-AGI

2014

Four principal features of autonomous control systems are left both unaddressed and unaddressable by present-day engineering methodologies: (1) The ability to operate effectively in environments that are only partially known at design time; (2) A level of generality that allows a system to re-assess and re-define the fulfillment of its mission in light of unexpected constraints or other unforeseen changes in the environment; (3) The ability to operate effectively in environments of significant complexity; and (4) The ability to degrade gracefully—how it can continue striving to achieve its main goals when resources become scarce, or in light of other expected or unexpected constraining fact…

GeneralityWork (electrical)Computer scienceArtificial general intelligenceBlueprintbusiness.industryBounded functionPrincipal (computer security)Control (management)Dynamic priority schedulingSoftware engineeringbusinessSelf programming AGI
researchProduct

Construction of a webgis tool based on a gis semiautomated processing for the localization of p2g plants in sicily (Italy)

2021

The recent diffusion of RES (Renewable Energy Sources), considering the electric energy produced by photovoltaic and wind plants, brought to light the problem of the unpredictable nature of wind and solar energy. P2G (Power to Gas) implementation seems to be the right solution, transforming curtailed energy in hydrogen. The choice of the settlement of P2G plants is linked to many factors like the distances between the gas grid and the settlement of RES plants, the transportation networks, the energy production, and population distribution. In light of this, the implementation of a Multi-Criteria Analysis (MCA) into a Geographic Information System (GIS) processing represents a good strategy …

Geographic information systemComputer scienceGeography Planning and DevelopmentPopulationcomputer.software_genreAsset (computer security)WebGISRelational database management systemEarth and Planetary Sciences (miscellaneous)P2GComputers in Earth ScienceseducationRDBMSeducation.field_of_studyGeography (General)Databasebusiness.industryPhotovoltaic systemMCAHydrogen technologiesGridRenewable energyRESG1-922businesscomputer
researchProduct

Bio-Eco-Analysis for Risk Factors using GIS Software

2013

Agriculture is a business sector ideally suited for the application of Geographic Information Systems (GIS) because it is natural resource based, requires the movement, distribution, and/or utilization of large quantities of products, goods, and services, and is increasingly required to record details of its business operations from the field to the marketplace. Nearly all agricultural data has some form of spatial component, and a GIS allows you to visualize information that might otherwise be difficult to interpret. Environment has a major impact on agriculture. In this paper we presented how GIS software can be used to analyze risk factors that influence agricultural production naturally…

Geographic information systemPublic participation GISComputer Networks and Communicationsbusiness.industryComputer scienceEnvironmental resource managementBusiness operationsComputer securitycomputer.software_genreNatural resourceComputer Science ApplicationsGIS and public healthComputational Theory and MathematicsEnterprise GISAgricultural productivitybusinessAM/FM/GIScomputerInternational Journal of Computers Communications & Control
researchProduct