Search results for "Computer security"
showing 10 items of 433 documents
Cyber-Physical Systems for Smart Water Networks: A Review
2021
Author's accepted manuscript. There is a growing demand to equip Smart Water Networks (SWN) with advanced sensing and computation capabilities in order to detect anomalies and apply autonomous event-triggered control. Cyber-Physical Systems (CPSs) have emerged as an important research area capable of intelligently sensing the state of SWN and reacting autonomously in scenarios of unexpected crisis development. Through computational algorithms, CPSs can integrate physical components of SWN, such as sensors and actuators, and provide technological frameworks for data analytics, pertinent decision making, and control. The development of CPSs in SWN requires the collaboration of diverse scienti…
Human security: an analytical tool for disaster perception research
2015
Purpose – The purpose of this paper is to examine the possible benefits arising from the application of the human security concept to analysing the disaster impacts. Design/methodology/approach – A three-piece human security analytical tool is synthesized by combining the discoveries in human security studies over the last two decades with the perspective of disaster studies focusing on the resilience and securitabilities of the affected societies. To illustrate the merit of the proposed analytical framework a specifically tailored social survey is used to measure the resilience of Ogre’s (Latvia) society after it faces major floods in 2013. It foresees that community’s resilience is inver…
On the evolution of e-Government: The user imperative
2003
Published version of a chapter published in Lecture Notes in Computer Science, 2739, 139-143. Also available from the publisher at: http://dx.doi.org/10.1007/10929179_25 This paper focuses the need for more research on user involvement and the investigation of stakeholders in e-Government initiatives. An investigation of existing work revealed a lack of research on those topics. As e-Government evolves and users mature, the value of their input can increase. The paper discusses the need and potential benefits of this approach. Finally, we suggest that existing stakeholder theory is investigated for adaptation into e-Government settings in order to map the complex body of interrelated stakeh…
Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks
2010
Vehicular Ad Hoc Networks (VANETs) is an emerging type of information networks in urban areas. A lot of research has been done in the area of increasing the vehicle awareness by disseminating collision and congestion warnings, and parking place availability information. In this paper we propose a novel idea and framework for dissemination of location based information, called digital maps, which are useful not only directly for the drivers and vehicle onboard navigation systems, but also external entities, such as tourists, environmental scientists, emergency services, advertisement companies. Centralized authority defines cooperative knowledge collection tasks and disseminates orders in th…
How to prevent cyber-attacks in inter-vehicle communication network?
2015
In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.
A Crisis Management Serious Game for Responding Extreme Weather Event
2017
Managing crisis with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to the table-top exercise. This paper presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such way that the player should deal with limited resources, and elevated event pressure over time to manage. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and involvement of test…
Identifying critical incidents in naturalistic driving data: experiences from a promoting real life observation for gaining understanding of road use…
2013
The methodology of naturalistic driving observation aspires to observe the driver and his environment while driving in natural driving settings. It is of great importance in research on road safety as this method of observing road users eliminates the disadvantages of traditional methods like simulator studies or interviews. However, it produces vast such amounts of data and challenges data reduction and data analysis. Therefore automatic methods for filtering critical incidents based on thresholds for numerical data are often applied to select the data to be analysed. This study reports a small-scale field trial in Valencia, Spain, which was conducted within the promoting real life observa…
Human Trafficking: The Viscous Link Between Vulnerability and Proximity Violence
2020
The definition of “human trafficking”, adopted by the United Nations Protocol, clearly describes how the international community has outlined the concepts of victim and perpetrator. Despite the definitive effort made by this Protocol, the present chapter seeks to throw light on the fuzzy area existing within the rapport between vulnerability and proximity violence which makes the consensual exploitation of the victim by the trafficker possible as well as making it difficult to outline its contours in the courtrooms.
The Myths of and Solutions for Android OS Controlled and Secure Environment
2015
<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords">…
Expected principal stress directions under multiaxial random loading. Part I: theoretical aspects of the weight function method
1999
As has been observed experimentally by many authors, the position of the fatigue fracture plane appears to strongly depend on the directions of the principal stresses or strains. In Part I of the present work the expected principal stress directions under multiaxial random loading are theoretically obtained by averaging the instantaneous values of the three Euler angles through some suitable weight functions which are assumed to take into account the main factors influencing fatigue behaviour. Then, in Part II, it is examined how such theoretical principal directions determined by applying the proposed procedure are correlated to the position of the experimental fracture plane for some fati…