Search results for "Computer security"

showing 10 items of 433 documents

Security in Mobile Wireless Sensor Networks – A Survey

2011

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

Wi-Fi arrayComputer sciencebusiness.industryWireless networkWireless WANComputer securitycomputer.software_genreKey distribution in wireless sensor networksWireless site surveymobile Wireless Sensor Network security Wireless Sensor NetworkNetwork Access ControlVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile wireless sensor networkElectrical and Electronic EngineeringbusinesscomputerWireless sensor networkComputer networkJournal of Communications
researchProduct

EL SISTEMA DE PROTECCIÓN AL MENOR EN ESPAÑA:

2019


 La legislación recientemente aprobada a nivel nacional en materia de protección a la infancia y la adolescencia requiere, desde el punto de vista socioeducativo, analizar tanto sus principales aportaciones y novedades como, también y sobre todo, las exigencias a las que los profesionales de dicho ámbito hemos de dar respuesta. El análisis documental de dichos textos, así como de la literatura científica al respecto, nos ha permitido detectar que, sin duda, son numerosos los retos que se dibujan en el horizonte y diversas las posibilidades que se plantean. Es amplio y largo el camino que queda por recorrer si realmente pretendemos contribuir al bienestar de los menores y adolescentes …

Work (electrical)Point (typography)Political scienceWelfare economicsPrincipal (computer security)LegislationScientific literatureEdetania. Estudios y propuestas socioeducativas
researchProduct

Introducing History of Mathematics Education Through Its Actors: Peter Treutlein’s Intuitive Geometry

2018

This paper deals with the questions why and how to introduce into teacher education the history of teaching practices and educational reforms. In particular, we are interested in the developments of curricular school geometry during the 19th century and the reforms at the beginning of the last century in Germany. The life and work of Peter Treutlein—a contemporary of Felix Klein—and a conceptual reformist of geometry instruction, schoolbook author, committed teacher and school principal with educational experience of many years opens to us many opportunities to link present teaching practices in Geometry to its traditions, some of which we will discuss.

Work (electrical)Principal (computer security)History of mathematicsGeometrySociologyTeacher education
researchProduct

CREATING A POSITIVE WORKING ENVIRONMENT FOR TEACHERS

2018

The purpose of the research paper is to study a positive working environment importance for teachers work satisfaction and the role of principal in improving working conditions. Whereas teacher profession is subject to different changes and reforms it makes the whole profession and teacher well-being an important subject to discuss.The research paper includes analysis of the theoretical material about physical environment as well as psychological (also called microclimate). Empirical part is based on teacher’s survey – 97 teachers from different schools in Riga were involved. The statements of survey have partially adopted from Teaching and Learning International Study TALIS 2013. The main …

Work (electrical)Principal (computer security)Mathematics educationSubject (philosophy)Job satisfactionPsychologyResearch taskWork environmentWorking environmentmicroclimate; principal; TALIS 2013; teacher work satisfactionSOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference
researchProduct

Honeypot utilization for analyzing cyber attacks

2016

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

World Wide WebEngineeringHoneypotSoftwarebusiness.industryPseudoserverEffective methodInformation securitybusinessComputer securitycomputer.software_genrecomputerHackerProccedings of the 10th European Conference on Software Architecture Workshops
researchProduct

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct

Automatic Timeline Construction and Analysis For Computer Forensics Purposes

2014

International audience; To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore, it becomes more and more necessary to develop automatic tools to help or even replace investigators in some parts of the investigation. This paper introduces a multi-layered architecture designed to assist the investigative team in the extraction of information left in…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]Computer science[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Digital forensicsEvent ReconstructionOntology (information science)Computer securitycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Task (project management)[INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY]Timeline AnalysisCrime scene[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]Event reconstructionOntologyTimelineComputer forensics16. Peace & justiceData science[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH][ INFO.INFO-CY ] Computer Science [cs]/Computers and Society [cs.CY]Digital Forensics[INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]computerCognitive load
researchProduct

Towards human exploration of space: the THESEUS review series on cardiovascular, respiratory, and renal research priorities

2016

International audience; The THESEUS project (Towards Human Exploration of Space: aEUropean Strategy) was initiated within the seventh FrameworkProgramme by the European Commission. This project aimed toprovide a cross-cutting, life science-based roadmap for Europe’sstrategy towards human exploration of space, especially for deepspace missions and its relevance to applications on Earth. Toaddress these challenges, relevance of space research on thecardiovascular system, the lungs and kidneys, was discussed in anexpert group and its principal conclusions will be presented in thisarticle.

[SDE] Environmental SciencesEngineeringPhysics and Astronomy (miscellaneous)MathematicsofComputing_GENERALMedicine (miscellaneous)astronauts[SDV.MHEP.PSR]Life Sciences [q-bio]/Human health and pathology/Pulmonology and respiratory tractSpace exploration[ SDE ] Environmental SciencesDeep space missionsInformationSystems_GENERAL0302 clinical medicineblood-pressure[ SHS.INFO ] Humanities and Social Sciences/Library and information sciencesEuropean commissionSpace researchComputingMilieux_MISCELLANEOUSexercise[ SDV.MHEP.PHY ] Life Sciences [q-bio]/Human health and pathology/Tissues and Organs [q-bio.TO][ SDV.MHEP.CSC ] Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular systemAgricultural and Biological Sciences (miscellaneous)Expert groupcentral venous-pressureEditorial[SDE]Environmental SciencesEngineering ethics[ SDV.MHEP.HEG ] Life Sciences [q-bio]/Human health and pathology/Hépatology and GastroenterologyMaterials Science (miscellaneous)[SHS.INFO]Humanities and Social Sciences/Library and information sciencesBiochemistry Genetics and Molecular Biology (miscellaneous)GeneralLiterature_MISCELLANEOUS03 medical and health sciences[SDV.MHEP.CSC]Life Sciences [q-bio]/Human health and pathology/Cardiology and cardiovascular system[SDV.MHEP.PHY]Life Sciences [q-bio]/Human health and pathology/Tissues and Organs [q-bio.TO]long-duration spaceflightRelevance (information retrieval)heart-rateSimulationbusiness.industryPrincipal (computer security)[SDV.MHEP.HEG]Life Sciences [q-bio]/Human health and pathology/Hépatology and Gastroenterology030229 sport sciencesmicrogravity13. Climate actionSpace and Planetary Sciencestationfoot forcesorthostatic intolerancebusiness030217 neurology & neurosurgery[ SDV.MHEP.PSR ] Life Sciences [q-bio]/Human health and pathology/Pulmonology and respiratory tract
researchProduct