Search results for "Computer security"
showing 10 items of 433 documents
Development of a Taekwondo Combat Model Based on Markov Analysis
2019
The purpose of the present study was to examine male and female Olympic taekwondo competitors' movement patterns according to their tactical actions by applying a Markov processes analysis. To perform this study, 11,474 actions by male competitors and 12,980 actions by female competitors were compiled and analyzed. The results yielded 32 significant sequences among male competitors and 30 among female competitors. Male competitors demonstrated 11 sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive action. Female competitors demonstrated nine sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive move.…
A “Best Current Practice” for 3GPP-based cellular system security
2014
This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…
Constructive Dynamic Program Slicing Research
2010
Program slicing is a promising technique for providing automated support for various important software engineering activities. There exists hundreds of scientific studies on the theory of slicing. However, slicing is still not widely applied in software industry. Therefore, there is a need to survey and characterize the conducted research and to analyze what problems hinder progress. This paper answers to that need by providing a survey of constructive dynamic program slicing research focusing on publication series with high visibility. The survey identified 12 dynamic slicers related to which 12 aspects were studied. The analysis revealed many issues which can be seen both as concerns and…
A framework for behavior-based detection of user substitution in a mobile context
2007
Personal mobile devices, such as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by unintended persons may result in severe security breaches concerning private or corporate data and services. Organizations develop their security policy and employ preventive techniques to combat unauthorized use. Current solutions, however, are still breakable and there is a strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define the measures to be monitored. In this paper, a structured conceptual framework for mobile-user substitution detection is proposed.…
Managing information security risks during new technology adoption
2012
Author's version of an article in the journal: Computers and Security. Also available from the publisher at: http://dx.doi.org/10.1016/j.cose.2012.09.001 In the present study, we draw on previous system dynamics research on operational transition and change of vulnerability to investigate the role of incident response capability in controlling the severity of incidents during the adoption of new technology. Toward this end, we build a system dynamics model using the Norwegian Oil and Gas Industry as the context. The Norwegian Oil and Gas Industry has started to adopt new information communication technology to connect its offshore platforms, onshore control centers, and suppliers. In oil co…
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…
Foliations making a constant angle with principal directions on ellipsoids
2015
Bounded Seed-AGI
2014
Four principal features of autonomous control systems are left both unaddressed and unaddressable by present-day engineering methodologies: (1) The ability to operate effectively in environments that are only partially known at design time; (2) A level of generality that allows a system to re-assess and re-define the fulfillment of its mission in light of unexpected constraints or other unforeseen changes in the environment; (3) The ability to operate effectively in environments of significant complexity; and (4) The ability to degrade gracefully—how it can continue striving to achieve its main goals when resources become scarce, or in light of other expected or unexpected constraining fact…
Construction of a webgis tool based on a gis semiautomated processing for the localization of p2g plants in sicily (Italy)
2021
The recent diffusion of RES (Renewable Energy Sources), considering the electric energy produced by photovoltaic and wind plants, brought to light the problem of the unpredictable nature of wind and solar energy. P2G (Power to Gas) implementation seems to be the right solution, transforming curtailed energy in hydrogen. The choice of the settlement of P2G plants is linked to many factors like the distances between the gas grid and the settlement of RES plants, the transportation networks, the energy production, and population distribution. In light of this, the implementation of a Multi-Criteria Analysis (MCA) into a Geographic Information System (GIS) processing represents a good strategy …
Bio-Eco-Analysis for Risk Factors using GIS Software
2013
Agriculture is a business sector ideally suited for the application of Geographic Information Systems (GIS) because it is natural resource based, requires the movement, distribution, and/or utilization of large quantities of products, goods, and services, and is increasingly required to record details of its business operations from the field to the marketplace. Nearly all agricultural data has some form of spatial component, and a GIS allows you to visualize information that might otherwise be difficult to interpret. Environment has a major impact on agriculture. In this paper we presented how GIS software can be used to analyze risk factors that influence agricultural production naturally…