Search results for "Computer security"

showing 10 items of 433 documents

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

2014

[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…

Agent-based modelSoftware_OPERATINGSYSTEMSArticle SubjectApplied Mathematicslcsh:MathematicsComputer securitycomputer.software_genrelcsh:QA1-939ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAndroid malwareMalwareAndroid (operating system)MATEMATICA APLICADAcomputerAnalysisMathematics
researchProduct

Relative principal congruences in congruence-modular quasivarieties

1998

The problem of definability of relative principal congruences in relatively congruence modular (RCM) quasivarieties is investigated. The RCM quasivarieties are characterized in terms of parameterized families of finite sets of pairs of terms which define relative principal congruences.

Algebra and Number TheoryMathematics::General Mathematicsbusiness.industryMathematics::Number TheoryMathematics::Rings and AlgebrasPrincipal (computer security)Mathematics::General TopologyParameterized complexityModular designCongruence relationAlgebraMathematics::LogicCongruence (manifolds)Algebra over a fieldbusinessFinite setMathematicsAlgebra Universalis
researchProduct

Using ‘Ambient Intelligence’ for Compensating Intellectual Difficulties of People with Severe Learning Difficulties and/or Autistic Spectrum Disorders

2004

This paper describes a set of services and software created so that what is called ‘ambient intelligence’ would compensate for the ‘intellectual difficulties’ that people from this collective have. Existing concepts and standards of ambient intelligence are strongly reinforced through the use of the exact current user’s position as a key factor to calculate how the ‘digital home’ or any ‘digital environment’ behaves at every moment. This will be obtained using both Wi-Fi personal locators (embedded in necklaces or bracelets) and Wi-Fi communication from the PDA. This mix, together with individual capabilities and preferences, makes the development of a wide range of services possible when c…

Ambient intelligenceComputer sciencebusiness.industrymedicine.diseaseComputer securitycomputer.software_genreHigh-functioning autismUser assistanceSoftwareHuman–computer interactionFactor (programming language)medicineKey (cryptography)User interfaceSet (psychology)businesscomputercomputer.programming_language
researchProduct

The Studio: Reflections and Issues Arising

1999

An advanced Telematic Studio was built at the University of Jyvaskyla to combine the latest technologies for local and distributed work and/or meetings. The objectives were to combine leading edge technologies with ethnographic design principles derived from CSCW and HCI to support a broad range of activities. We informed the design by studies of similar facilities on other sites. The Studio is popular, and it is easy to give glowing accounts of its use. Nevertheless, over three years a significant number of problems have arisen with both technologies and uses. Some of these are local. Others may be generalisable to any ‘cooperative building’. For example: problems with videoconferencing; i…

Architectural engineeringWorkstationbusiness.industryComputer scienceDesign elements and principlescomputer.software_genreComputer securitylaw.inventionVideoconferencingWork (electrical)lawComputer-supported cooperative workEthnographySystems designTelematicsbusinesscomputerStudio
researchProduct

AHBIM for Wooden Built Heritage Conservation

2019

The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…

Architectural engineeringbusiness.industryComputer scienceConservationAsset (computer security)Built heritageParametric designParametric designBIM Built heritage Parametric design Conservation Facility managementFacility managementBuilding information modelingArchitectural heritageTransmission (telecommunications)BIMSettore ICAR/17 - DisegnoBuilt heritageFacility managementbusinessMobile device
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

A simulation of disagreement for control of rational cheating in peer review

2013

Understanding the peer review process could help research and shed light on the mechanisms that underlie crowdsourcing. In this paper, we present an agent-based model of peer review built on three entities - the paper, the scientist and the conference. The system is implemented on a BDI platform (Jason) that allows to define a rich model of scoring, evaluating and selecting papers for conferences. Then, we propose a programme committee update mechanism based on disagreement control that is able to remove reviewers applying a strategy aimed to prevent papers better than their own to be accepted (rational cheating). We analyze a homogeneous scenario, where all conferences aim to the same leve…

Artificial social systems peer review agent-based simulation trust reliability and reputationComputer scienceMechanism (biology)business.industryCheatingmedia_common.quotation_subjectControl (management)Mechanism basedArtificial social systemsComputer securitycomputer.software_genreCrowdsourcingData sciencePeer reviewWorld Wide Webtrust reliability and reputationControl and Systems EngineeringHomogeneouspeer reviewQuality (business)businessPsychologycomputeragent-based simulationmedia_common
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Disadvantaged by Disability: Examining the Accessibility of Cyber Security

2021

Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…

AuthenticationComputer sciencebusiness.industrymedia_common.quotation_subjectFace (sociological concept)UsabilityContext (language use)Computer securitycomputer.software_genreDisadvantagedbusinessDigital divideFunction (engineering)computerQuestionnaire studymedia_common
researchProduct