Search results for "Format"

showing 10 items of 24643 documents

Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help

2016

International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…

021110 strategic defence & security studiesManagement sciencebusiness.industry020209 energy0211 other engineering and technologiesComplex systemModeling and simulation02 engineering and technologyDomain (software engineering)System dynamicsManagementModeling and simulationCritical infrastructuresIncentiveRisk analysis (engineering)0202 electrical engineering electronic engineering information engineeringInformation systemSecurity managementThe Internet[INFO]Computer Science [cs]BusinessPolicies
researchProduct

Terrorism communication : characteristics and emerging perspectives in the scientific literature 2002–2011

2013

This paper aims to clarify current knowledge on the contribution of communication to crisis management in the case of terrorism incidents. This is done by means of a systematic review of the scientific literature on terrorism communication over the last 10 years to identify the many challenges facing communication in such crises, and represents the first attempt of its kind. To date, within the literature on terrorism communication, much attention has been paid to chemical, biological, radiological or nuclear hazards. Terrorism crises are complex and challenging. Preparedness for such diverse low-probability high-impact crises can best be included in a wider educative approach. Terrorism cr…

021110 strategic defence & security studiesManagement sciencebusiness.industry05 social sciences0211 other engineering and technologieskriiisiviestintä050801 communication & media studies02 engineering and technologyScientific literatureCrisis managementterrorismManagement Monitoring Policy and LawPublic relations16. Peace & justicekriisiviestintäManagement Information Systems0508 media and communicationsterrorismiPreparednessPolitical scienceTerrorismbusinesscrisis communication
researchProduct

Intelligent Constructing Exact Tolerance Limits for Prediction of Future Outcomes Under Parametric Uncertainty

2021

The problem of constructing one-sided exact statistical tolerance limits on the kth order statistic in a future sample of m observations from a distribution of log-location-scale family on the basis of an observed sample from the same distribution is considered. The new technique proposed here emphasizes pivotal quantities relevant for obtaining tolerance factors and is applicable whenever the statistical problem is invariant under a group of transformations that acts transitively on the parameter space. The exact tolerance limits on order statistics associated with sampling from underlying distributions can be found easily and quickly making tables, simulation, Monte Carlo estimated percen…

021110 strategic defence & security studiesMathematical optimizationComputer science0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing02 engineering and technologyParametric statistics
researchProduct

A New Intelligent Technique of Constructing Optimal Airline Seat Protection Levels for Multiple Nested Fare Classes of Single-Leg Flights

2019

A new, rigorous formulation of the optimization problem of airline seat protection levels for multiple nested fare classes is presented. A number of results useful for practical application are obtained. A numerical example is given.

021110 strategic defence & security studiesMathematical optimizationOptimization problemComputer science0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringComputerApplications_COMPUTERSINOTHERSYSTEMS020201 artificial intelligence & image processingComputer Science::Social and Information Networks02 engineering and technologyComputer Science::Computers and Society2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)
researchProduct

Political interest furthers partisanship in England, Scotland, and Wales

2016

ABSTRACTAccording to much of the literature, partisanship in Britain exercises little independent influence on the vote but merely reflects voters’ prospective and retrospective evaluations of the parties’ performance with regard to their management of the economy, national security, and public services. In this view, partisanship comes close to Fiorina’s model of a “running tally” of political experiences. Similarly, Dalton’s notion of “cognitive mobilization” suggests that seeking out political information should undermine both the need for and the likelihood of party identification. Applying Mixed Markov Latent Class Analysis to the British Election Study Panel 1997–2000, we challenge th…

021110 strategic defence & security studiesNational securitySociology and Political Sciencebusiness.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies02 engineering and technologyLatent class model0506 political scienceIdentification (information)PoliticsPerceptionLawPolitical economy050602 political science & public administrationSociologybusinessmedia_commonJournal of Elections, Public Opinion and Parties
researchProduct

Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders

2017

Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…

021110 strategic defence & security studiesSituation awarenessEmergency managementcomputer.internet_protocolComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologyService-oriented architectureComputer securitycomputer.software_genreData scienceInformation model0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingWeb servicebusinesscomputerSemantic WebInformation exchangeData integration
researchProduct

Measuring the quality of humanitarian information products: Insights from the 2015 Nepal earthquake

2018

Information plays a critical role in humanitarian assistance. It has become a product that is shared for multiple purposes such as situational awareness, decision-making, coordination, reporting, and attracting funding. In the aftermath of sudden onset disasters, humanitarians are constrained with huge workload, time pressure, and uncertainties and thus, information products are often criticized with respect to quality issues. In this paper, we aim at developing an empirically grounded framework that can measure the quality of information products through accuracy, objectivity, completeness, and consistency. We validate the framework with the help of practitioners and apply it to the inform…

021110 strategic defence & security studiesSituation awarenessmedia_common.quotation_subjectCase studyFramework0211 other engineering and technologiesHumanitarian responseInformation qualityComputerApplications_COMPUTERSINOTHERSYSTEMSWorkload02 engineering and technologyTime pressureHumanitarian responseRisk analysis (engineering)2015 Nepal earthquake021105 building & constructionQuality (business)Product (category theory)BusinessInformation qualitymedia_commonSudden onset
researchProduct

Las normas ISO/IEC como mecanismos de responsabilidad proactiva en el Reglamento General de Protección de Datos

2021

El mercado de la certificación ha experimentado un auge sin precedentes tras la entrada en vigor y ulterior aplicación del RGPD. Ello obliga a poner de relieve la relevancia de estos mecanismos como elementos claves en la prevención de potenciales violaciones de la seguridad de los datos personales. En el presente trabajo examinamos cómo la naturaleza técnica de estos instrumentos ha cedido hacia su corregulación a los efectos de garantizar una adaptación efi ciente a los continuos cambios de una gran tipología de productos, servicios o sistemas. Pretende proporcionarse una panorámica holística sobre la práctica totalidad de estándares que afectan a las dimensiones de privacidad y protecció…

021110 strategic defence & security studiesSociology and Political Science0211 other engineering and technologiescertification mechanismsISO/IEC 27701RGPDK1-772002 engineering and technologyISO/IEC 27001Political science (General)Law in general. Comparative and uniform law. Jurisprudence020204 information systemsmecanismos de certificación0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)responsabilidad proactivaJA1-92Lawproactive responsibilityIDP. Revista de Internet Derecho y Política
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct