Search results for "Computer security"

showing 10 items of 433 documents

Brauer’s Height Zero Conjecture for principal blocks

2021

Abstract We prove the other half of Brauer’s Height Zero Conjecture in the case of principal blocks.

CombinatoricsConjectureApplied MathematicsGeneral Mathematics010102 general mathematics0103 physical sciencesPrincipal (computer security)Zero (complex analysis)010307 mathematical physics0101 mathematics01 natural sciencesMathematicsJournal für die reine und angewandte Mathematik (Crelles Journal)
researchProduct

Implementación y uso clínico de la radioterapia adaptativa. Informe del grupo de trabajo de radioterapia adaptativa de la Sociedad Española de Física…

2021

La radioterapia adaptativa (Adaptive Radiation Therapy, ART) se puede definir como la modificación del plan de tratamiento administrado a un paciente durante el curso de la radioterapia para tener en cuenta los cambios en la anatomía.
 La aplicación de ART supone un cambio en el proceso radioterápico que implica el uso de numerosos recursos adicionales, no estando implementada de forma general. Así, aun tratándose de una idea introducida hace más de 20 años, todavía a fecha de hoy son objeto de estudio muchos de los aspectos que definen la ART: la decisión de proceder a la nueva planificación del tratamiento, el momento óptimo para adaptar el plan, el umbral dosimétrico o anatómico que…

Commercial softwareComputer sciencebusiness.industryProcess (engineering)Principal (computer security)Ocean EngineeringIdentification (information)SoftwareKey (cryptography)Safety Risk Reliability and QualitySoftware engineeringbusinessRadiation treatment planningAdaptation (computer science)Revista de Física Médica
researchProduct

Linking Disaster Risk Reduction and Healthcare in Locations with Limited Accessibility: Challenges and Opportunities of Participatory Research

2020

Disaster risk reduction and healthcare support each other, including the mitigation of further harm after illness or injury. These connections are particularly relevant in locations which have permanent or temporary limited accessibility. In these circumstances, people are required to be self-sufficient in providing emergency and long-term healthcare with limited resources. Planning and preparing to mitigate further harm after illness or injury from disasters (disaster risk reduction) must include people living and working in locations with limited accessibility, meaning that participatory research can be used. The challenges and opportunities of enacting participatory research in such cont…

Community-Based Participatory ResearchDisaster risk reductionHealth Toxicology and MutagenesisQualitative evidence0211 other engineering and technologieslcsh:MedicineParticipatory action researchDisaster Planning02 engineering and technologydisaster risk reductionArticleDisasters03 medical and health sciences0302 clinical medicineHealth careHumans030212 general & internal medicineResearch question021110 strategic defence & security studiesRisk Managementbusiness.industrylcsh:RPrincipal (computer security)Public Health Environmental and Occupational HealthhealthcarePublic relationslimited accessibilityHarmVDP::Medisinske Fag: 700::Helsefag: 800participatory researchbusinessDelivery of Health CareMeaning (linguistics)International Journal of Environmental Research and Public Health
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Communication and security in communicating things networks

2020

International audience

Computer Networks and CommunicationsHardware and ArchitectureComputer science0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing[INFO]Computer Science [cs]02 engineering and technologyComputer securitycomputer.software_genrecomputerSoftwareComputingMilieux_MISCELLANEOUS
researchProduct

Recent advances on security and privacy in intelligent transportation systems (ITSs)

2019

Computer Networks and CommunicationsHardware and ArchitectureComputer scienceComputer securitycomputer.software_genrecomputerIntelligent transportation systemSoftwareAd Hoc Networks
researchProduct

A Novel Priority-Based Ambulance-to-Traffic Light Communication for Delay Reduction in Emergency Rescue Operations

2019

Rescue operations are very critical and sensitive. Only one-second delay could make a serious difference between life and death. Therefore, the delay in rescue operations must be reduced as much as possible. The siren signal can be used to warn other vehicles nearby the ambulance. However, it has no impact on the traffic lights, which is normally a main cause of delay in rescue operations. For this reason, many ambulances get stuck and experience long delay at the intersections, which should not happen by any means. To enhance the rescue operations, this paper proposes a novel Priority-based Ambulance-to-Traffic Light Communication (PATCom). PATCom allows information exchanging between traf…

Computer science020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEmergency rescuelaw.inventionReduction (complexity)Traffic signal0203 mechanical engineeringlawOn demand0202 electrical engineering electronic engineering information engineeringEvaluation resultStop timeSiren (alarm)Intelligent transportation systemcomputer2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

Encriptación óptica empleando llaves Weierstrass-Mandelbrot

2013

[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…

Computer scienceCiencias FísicasÓptica y FotónicaData securityLlaveData lossEncryptionComputer securitycomputer.software_genrelcsh:Education (General)Doble máscaraDouble-masked//purl.org/becyt/ford/1 [https]FractalEncoding (memory)Encriptación ópticaOptical cryptographyCiencias ExactasÓpticaclaves o llavesbusiness.industryFunction (mathematics)//purl.org/becyt/ford/1.3 [https]encriptaciónOptical encryptionoptical cryptography fractal key double-maskedFractal keybusinesslcsh:L7-991FractalAlgorithmcomputerCIENCIAS NATURALES Y EXACTAScriptografíaencriptación óptica fractal llave doble máscara
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct