Search results for "Computer security"

showing 10 items of 433 documents

Cyber-Physical Systems for Smart Water Networks: A Review

2021

Author's accepted manuscript. There is a growing demand to equip Smart Water Networks (SWN) with advanced sensing and computation capabilities in order to detect anomalies and apply autonomous event-triggered control. Cyber-Physical Systems (CPSs) have emerged as an important research area capable of intelligently sensing the state of SWN and reacting autonomously in scenarios of unexpected crisis development. Through computational algorithms, CPSs can integrate physical components of SWN, such as sensors and actuators, and provide technological frameworks for data analytics, pertinent decision making, and control. The development of CPSs in SWN requires the collaboration of diverse scienti…

VDP::Teknologi: 500Computer scienceCyber-physical systemSmart waterElectrical and Electronic EngineeringComputer securitycomputer.software_genreInstrumentationcomputer
researchProduct

Human security: an analytical tool for disaster perception research

2015

Purpose – The purpose of this paper is to examine the possible benefits arising from the application of the human security concept to analysing the disaster impacts. Design/methodology/approach – A three-piece human security analytical tool is synthesized by combining the discoveries in human security studies over the last two decades with the perspective of disaster studies focusing on the resilience and securitabilities of the affected societies. To illustrate the merit of the proposed analytical framework a specifically tailored social survey is used to measure the resilience of Ogre’s (Latvia) society after it faces major floods in 2013. It foresees that community’s resilience is inver…

Value (ethics)GovernmentHealth (social science)Food securitymedia_common.quotation_subjectPublic Health Environmental and Occupational HealthManagement Monitoring Policy and LawComputer securitycomputer.software_genreHazardResilience (organizational)Risk analysis (engineering)OriginalityNatural hazardBusinesscomputerHuman securitymedia_commonDisaster Prevention and Management
researchProduct

On the evolution of e-Government: The user imperative

2003

Published version of a chapter published in Lecture Notes in Computer Science, 2739, 139-143. Also available from the publisher at: http://dx.doi.org/10.1007/10929179_25 This paper focuses the need for more research on user involvement and the investigation of stakeholders in e-Government initiatives. An investigation of existing work revealed a lack of research on those topics. As e-Government evolves and users mature, the value of their input can increase. The paper discusses the need and potential benefits of this approach. Finally, we suggest that existing stakeholder theory is investigated for adaptation into e-Government settings in order to map the complex body of interrelated stakeh…

Value (ethics)Process managementE-GovernmentComputer scienceUser involvementCivil serviceComputer securitycomputer.software_genreWork (electrical)Order (exchange)VDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Adaptation (computer science)Stakeholder theorycomputer
researchProduct

Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks

2010

Vehicular Ad Hoc Networks (VANETs) is an emerging type of information networks in urban areas. A lot of research has been done in the area of increasing the vehicle awareness by disseminating collision and congestion warnings, and parking place availability information. In this paper we propose a novel idea and framework for dissemination of location based information, called digital maps, which are useful not only directly for the drivers and vehicle onboard navigation systems, but also external entities, such as tourists, environmental scientists, emergency services, advertisement companies. Centralized authority defines cooperative knowledge collection tasks and disseminates orders in th…

Vehicular ad hoc networkDigital mappingbusiness.industryWireless ad hoc networkComputer scienceMobile ad hoc networkComputer securitycomputer.software_genreCollisionSystems architectureLocation based informationbusinesscomputerDisseminationComputer network
researchProduct

How to prevent cyber-attacks in inter-vehicle communication network?

2015

In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.

Vehicular ad hoc networkNetwork securitybusiness.industryComputer scienceMechanism (biology)Computer securitycomputer.software_genreTelecommunications networkSecure communicationOverhead (computing)False positive ratebusinesscomputerGame theoryComputer network2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS)
researchProduct

A Crisis Management Serious Game for Responding Extreme Weather Event

2017

Managing crisis with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to the table-top exercise. This paper presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such way that the player should deal with limited resources, and elevated event pressure over time to manage. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and involvement of test…

Video game developmentComputer sciencebusiness.industryEvent (computing)05 social sciencesEnvironmental resource managementComputingMilieux_PERSONALCOMPUTING02 engineering and technologyCrisis managementComputer securitycomputer.software_genreScrumExtreme weatherWork (electrical)Action (philosophy)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0501 psychology and cognitive sciencesbusinesscomputer050107 human factorsDesk
researchProduct

Identifying critical incidents in naturalistic driving data: experiences from a promoting real life observation for gaining understanding of road use…

2013

The methodology of naturalistic driving observation aspires to observe the driver and his environment while driving in natural driving settings. It is of great importance in research on road safety as this method of observing road users eliminates the disadvantages of traditional methods like simulator studies or interviews. However, it produces vast such amounts of data and challenges data reduction and data analysis. Therefore automatic methods for filtering critical incidents based on thresholds for numerical data are often applied to select the data to be analysed. This study reports a small-scale field trial in Valencia, Spain, which was conducted within the promoting real life observa…

Video recordingEngineeringbusiness.industryMechanical EngineeringContrast (statistics)TransportationComputer securitycomputer.software_genreData scienceData qualityField trialScale (social sciences)Naturalistic drivingbusinessLawcomputerGeneral Environmental ScienceData reductionRoad userIET Intelligent Transport Systems
researchProduct

Human Trafficking: The Viscous Link Between Vulnerability and Proximity Violence

2020

The definition of “human trafficking”, adopted by the United Nations Protocol, clearly describes how the international community has outlined the concepts of victim and perpetrator. Despite the definitive effort made by this Protocol, the present chapter seeks to throw light on the fuzzy area existing within the rapport between vulnerability and proximity violence which makes the consensual exploitation of the victim by the trafficker possible as well as making it difficult to outline its contours in the courtrooms.

VulnerabilityInternational communityHuman traffickingContext (language use)SociologyLink (knot theory)Computer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

The Myths of and Solutions for Android OS Controlled and Secure Environment

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"&gt…

Web serverEngineeringbusiness.industryMobile computingBring your own devicecomputer.software_genreComputer securityEncryptionWorld Wide WebServerMalwareWeb contentAndroid (operating system)businesscomputerAndroid; mobile computing; security; BYOD; smartphones; ICTEnvironment. Technology. Resources.
researchProduct

Expected principal stress directions under multiaxial random loading. Part I: theoretical aspects of the weight function method

1999

As has been observed experimentally by many authors, the position of the fatigue fracture plane appears to strongly depend on the directions of the principal stresses or strains. In Part I of the present work the expected principal stress directions under multiaxial random loading are theoretically obtained by averaging the instantaneous values of the three Euler angles through some suitable weight functions which are assumed to take into account the main factors influencing fatigue behaviour. Then, in Part II, it is examined how such theoretical principal directions determined by applying the proposed procedure are correlated to the position of the experimental fracture plane for some fati…

Weight functionMaterials scienceContinuum mechanicsbusiness.industryMechanical EngineeringMathematical analysisPrincipal (computer security)Work (physics)Fracture mechanicsStructural engineeringStrength of materialsIndustrial and Manufacturing EngineeringEuler anglessymbols.namesakeMechanics of MaterialsPosition (vector)Modeling and SimulationsymbolsGeneral Materials SciencebusinessInternational Journal of Fatigue
researchProduct