Search results for "Computer security"
showing 10 items of 433 documents
Graphical Workflow System for Modification Calling by Machine Learning of Reverse Transcription Signatures
2019
Modification mapping from cDNA data has become a tremendously important approach in epitranscriptomics. So-called reverse transcription signatures in cDNA contain information on the position and nature of their causative RNA modifications. Data mining of, e.g. Illumina-based high-throughput sequencing data, is therefore fast growing in importance, and the field is still lacking effective tools. Here we present a versatile user-friendly graphical workflow system for modification calling based on machine learning. The workflow commences with a principal module for trimming, mapping, and postprocessing. The latter includes a quantification of mismatch and arrest rates with single-nucleotide re…
Transport engineering and reduction in crime: the Medellín case
2016
This study analyses the impact of the aerial cable car public transport system, locally known as Metrocable, in Medellín (Colombia), on the reduction in crime. As part of the municipal policies of social urbanism, Metrocable has contributed to the social integration of the population in the outlying neighbourhoods, which has increased safety in Medellín. This case is clearly of great interest from the point of view of Criminal Sciences, demonstrating how crime can be combated by using tools beyond ius puniendi. DOI: http://dx.doi.org/10.4995/CIT2016.2016.3434
The Sociology of Nazism
1994
In a previous paper, we tested a number of critical hypotheses derived from the three principal explanations of the sociology of Nazism. Our major finding was that the mass society, lower middle-class party of protest, and political confessionalism theses are empirically flawed. In this article, we apply an interest-based theory to the sociology of blue-collar Nazism. Using a sample of 15,006 workers who joined the Nazi Party between 1925 and 1932, we test the validity of our interest-based theory. The data demonstrate significant support for an interest-based account of Nazi Party working-class joining.
COVID-19 Contact Tracing and Data Protection Can Go Together
2020
We discuss the implementation of app-based contact tracing to control the coronavirus disease (COVID-19) pandemic and discuss its data protection and user acceptability aspects.
Brauer correspondent blocks with one simple module
2019
One of the main problems in representation theory is to understand the exact relationship between Brauer corresponding blocks of finite groups. The case where the local correspondent has a unique simple module seems key. We characterize this situation for the principal p-blocks where p is odd.
Powers and Fundamental Rights in Cyber Security
2015
Protection of privacy and confidential communications are crucial fundamental rights in cyber security. The protection of privacy and confidential communications are twofold in the meaning that active security steps in communications may require interference with confidential communications. The detection and profiling of potential threats may raise suspects on innocent participants of communications. The NCSC-FI inside the Communications Authority has the initial task and powers to monitor the cyber security. The bill for the Code of Information Society introduces new obligations for information security and preparation for emergency situations. If new powers will be granted to authorities…
Combining Benford's Law and machine learning to detect money laundering. An actual Spanish court case.
2017
Abstract Objectives This paper is based on the analysis of the database of operations from a macro-case on money laundering orchestrated between a core company and a group of its suppliers, 26 of which had already been identified by the police as fraudulent companies. In the face of a well-founded suspicion that more companies have perpetrated criminal acts and in order to make better use of what are very limited police resources, we aim to construct a tool to detect money laundering criminals. Methods We combine Benford’s Law and machine learning algorithms (logistic regression, decision trees, neural networks, and random forests) to find patterns of money laundering criminals in the conte…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Effectance and control as determinants of video game enjoyment
2007
This article explores video game enjoyment originated by games' key characteristic, interactivity. An online experiment (N = 500) tested experiences of effectance (perceived influence on the game world) and of being in control as mechanisms that link interactivity to enjoyment. A video game was manipulated to either allow normal play, reduce perceived effectance, or reduce perceived control. Enjoyment ratings suggest that effectance is an important factor in video game enjoyment but that the relationship between control of the game situation and enjoyment is more complex. © 2007 Mary Ann Liebert, Inc.
Testing the validity of the International Atomic Energy Agency (IAEA) safety culture model
2012
This paper takes the first steps to empirically validate the widely used model of safety culture of the International Atomic Energy Agency (IAEA), composed of five dimensions, further specified by 37 attributes. To do so, three independent and complementary studies are presented. First, 290 students serve to collect evidence about the face validity of the model. Second, 48 experts in organizational behavior judge its content validity. And third, 468 workers in a Spanish nuclear power plant help to reveal how closely the theoretical five-dimensional model can be replicated. Our findings suggest that several attributes of the model may not be related to their corresponding dimensions. Accordi…