Search results for "Computer security"
showing 10 items of 433 documents
Security in Mobile Wireless Sensor Networks – A Survey
2011
Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…
EL SISTEMA DE PROTECCIÓN AL MENOR EN ESPAÑA:
2019

 La legislación recientemente aprobada a nivel nacional en materia de protección a la infancia y la adolescencia requiere, desde el punto de vista socioeducativo, analizar tanto sus principales aportaciones y novedades como, también y sobre todo, las exigencias a las que los profesionales de dicho ámbito hemos de dar respuesta. El análisis documental de dichos textos, así como de la literatura científica al respecto, nos ha permitido detectar que, sin duda, son numerosos los retos que se dibujan en el horizonte y diversas las posibilidades que se plantean. Es amplio y largo el camino que queda por recorrer si realmente pretendemos contribuir al bienestar de los menores y adolescentes …
Introducing History of Mathematics Education Through Its Actors: Peter Treutlein’s Intuitive Geometry
2018
This paper deals with the questions why and how to introduce into teacher education the history of teaching practices and educational reforms. In particular, we are interested in the developments of curricular school geometry during the 19th century and the reforms at the beginning of the last century in Germany. The life and work of Peter Treutlein—a contemporary of Felix Klein—and a conceptual reformist of geometry instruction, schoolbook author, committed teacher and school principal with educational experience of many years opens to us many opportunities to link present teaching practices in Geometry to its traditions, some of which we will discuss.
CREATING A POSITIVE WORKING ENVIRONMENT FOR TEACHERS
2018
The purpose of the research paper is to study a positive working environment importance for teachers work satisfaction and the role of principal in improving working conditions. Whereas teacher profession is subject to different changes and reforms it makes the whole profession and teacher well-being an important subject to discuss.The research paper includes analysis of the theoretical material about physical environment as well as psychological (also called microclimate). Empirical part is based on teacher’s survey – 97 teachers from different schools in Riga were involved. The statements of survey have partially adopted from Teaching and Learning International Study TALIS 2013. The main …
Honeypot utilization for analyzing cyber attacks
2016
Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Enforcing role based access control model with multimedia signatures.
2009
International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…
Automatic Timeline Construction and Analysis For Computer Forensics Purposes
2014
International audience; To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore, it becomes more and more necessary to develop automatic tools to help or even replace investigators in some parts of the investigation. This paper introduces a multi-layered architecture designed to assist the investigative team in the extraction of information left in…
Towards human exploration of space: the THESEUS review series on cardiovascular, respiratory, and renal research priorities
2016
International audience; The THESEUS project (Towards Human Exploration of Space: aEUropean Strategy) was initiated within the seventh FrameworkProgramme by the European Commission. This project aimed toprovide a cross-cutting, life science-based roadmap for Europe’sstrategy towards human exploration of space, especially for deepspace missions and its relevance to applications on Earth. Toaddress these challenges, relevance of space research on thecardiovascular system, the lungs and kidneys, was discussed in anexpert group and its principal conclusions will be presented in thisarticle.