Search results for "NETWORK"

showing 10 items of 7718 documents

Building Resilience Through Effective Disaster Management

2017

Existing literature argues that taking a holistic approach to disaster management is important for organizations in building resilience. Theoretical underpinnings to achieve a holistic understanding, however, is lacking. This article applies the notion of an ecosystem as a holistic lens to understand complex disaster management. The paper reports two case studies from Japan and Nepal to illustrate how an ecosystem works during a disaster. The theoretical framework of information ecology is used in analyzing the cases. Based on the findings, the study shows three interconnected mechanisms that can build resilience of an ecosystem in a disaster management context, namely (1) coevolution, (2) …

021110 strategic defence & security studiesKnowledge managementEmergency managementbusiness.industry05 social sciencesPerspective (graphical)0211 other engineering and technologies02 engineering and technologyInformation ecology0502 economics and businessSociologybusinessResilience (network)Environmental planningComputingMilieux_MISCELLANEOUS050203 business & managementInternational Journal of Information Systems for Crisis Response and Management
researchProduct

A New Intelligent Technique of Constructing Optimal Airline Seat Protection Levels for Multiple Nested Fare Classes of Single-Leg Flights

2019

A new, rigorous formulation of the optimization problem of airline seat protection levels for multiple nested fare classes is presented. A number of results useful for practical application are obtained. A numerical example is given.

021110 strategic defence & security studiesMathematical optimizationOptimization problemComputer science0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringComputerApplications_COMPUTERSINOTHERSYSTEMS020201 artificial intelligence & image processingComputer Science::Social and Information Networks02 engineering and technologyComputer Science::Computers and Society2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct

Kick Detection and Influx Size Estimation during Offshore Drilling Operations using Deep Learning

2019

An uncontrolled or unobserved influx or kick during drilling has the potential to induce a well blowout, one of the most harmful incidences during drilling both in regards to economic and environmental cost. Since kicks during drilling are serious risks, it is important to improve kick and loss detection performance and capabilities and to develop automatic flux detection methodology. There are clear patterns during a influx incident. However, due to complex processes and sparse instrumentation it is difficult to predict the behaviour of kicks or losses based on sensor data combined with physical models alone. Emerging technologies within Deep Learning are however quite adapt at picking up …

021110 strategic defence & security studiesgeographygeography.geographical_feature_categoryArtificial neural networkComputer sciencebusiness.industryDeep learning0211 other engineering and technologiesDrilling0102 computer and information sciences02 engineering and technology01 natural sciencesWellboreVDP::Teknologi: 500Drilling machines010201 computation theory & mathematicsInstrumentation (computer programming)Artificial intelligencebusinessOffshore drillingMarine engineeringWater well2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA)
researchProduct

ES1D: A Deep Network for EEG-Based Subject Identification

2017

Security systems are starting to meet new technologies and new machine learning techniques, and a variety of methods to identify individuals from physiological signals have been developed. In this paper, we present ESID, a deep learning approach to identify subjects from electroencephalogram (EEG) signals captured by using a low cost device. The system consists of a Convolutional Neural Network (CNN), which is fed with the power spectral density of different EEG recordings belonging to different individuals. The network is trained for a period of one million iterations, in order to learn features related to local patterns in the spectral domain of the original signal. The performance of the…

021110 strategic defence & security studiesmedicine.diagnostic_testbusiness.industryComputer scienceDeep learningFeature extractionSIGNAL (programming language)0211 other engineering and technologiesSpectral densityPattern recognition02 engineering and technologyElectroencephalographyConvolutional neural networkConvolutionIdentification (information)0202 electrical engineering electronic engineering information engineeringmedicine020201 artificial intelligence & image processingArtificial intelligencebusiness2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)
researchProduct

Modelli di parenting multipli e benessere interpersonale. Una rassegna teorica sull’evoluzione del sistema motivazionale diadico verso il network del…

2016

Models of multiple parenting and interpersonal wellbeing. A theoretical review on the evolution of the dyadic motivational system toward the network of care A theoretical analysis on the evolution of the dyadic parenting model toward the multiple attachment perspective is presented. In particular, looking beyond the monotropic perspective (Bowlby, 1969), a theoretical framework about the integration model as a support of the elasticity of the Internal Working Models is highlighted. Based on these studies, the continuity in the quality of the attachment representations would remain in function also of the changes inside the care environment, in its aspects of risk and protection as well as o…

03 medical and health sciences0302 clinical medicineHealth (social science)05 social sciencesSettore M-PSI/07 - Psicologia Dinamicanetwork of care multiple attachments parenting integration interpersonal wellbeing0501 psychology and cognitive sciences030217 neurology & neurosurgery050105 experimental psychologyApplied Psychology
researchProduct

Recent advances of the multipactor RF breakdown in RF satellite microwave passive devices

2016

The main goal of this work is the review of the recent advances in the study of the multipactor RF breakdown phenomenon in RF satellite microwave passive devices for space telecommunication applications developed in the Val Space Consortium. In this work several topics related with the multipactor phenomenon will be discussed.

03 medical and health sciences0302 clinical medicineMaterials scienceNuclear magnetic resonance0202 electrical engineering electronic engineering information engineering020206 networking & telecommunicationsSatellite02 engineering and technologyRadio frequencyEngineering physics030217 neurology & neurosurgeryMicrowaveBreakdown phenomenon2016 Progress in Electromagnetic Research Symposium (PIERS)
researchProduct

Gender, Coping, and Mental Health: a Bayesian Network Model Analysis

2016

We examined the relationships among gender, coping, and mental health in terms of probabilities. We selected a sample of university students (N = 131) aged between 18 and 32 years, and used the GHQ-28 and COPE instruments for analysis. The Bayesian network model that we constructed showed higher probabilities of symptoms of mental health problems for emotion-focused coping than for problem-focused coping. No differences were found regarding gender. This suggests that the use of problem-focused coping is more recommendable for both male and female university students, and it may also provide some benefits in terms of treatment of symptoms of mental health problems. However, to further verify…

03 medical and health sciencesCoping (psychology)0302 clinical medicineSocial Psychology05 social sciencesBayesian network0501 psychology and cognitive sciencesPsychologyMental health030217 neurology & neurosurgery050105 experimental psychologyClinical psychologySocial Behavior and Personality: an international journal
researchProduct