Search results for "SECURITY"
showing 10 items of 1693 documents
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot
2020
Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.
On the Influence of Affect in EEG-Based Subject Identification
2021
Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…
Cybersecurity in Europe
2021
Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
The impact on disaster governance of the intersection of environmental hazards, border conflict and disaster responses in Ladakh, India
2018
Abstract The Indian border region of Ladakh, in Jammu and Kashmir State, has a sensitive Himalayan ecosystem and has experienced natural hazards and disasters of varying scales over the decades. Ladakh is also situated on a fault-line of multiple tensions, including ongoing border disagreements and intermittent conflict with China and Pakistan. The Indian army has thus become a permanent fixture in the region. This paper examines the implications of the intersection of these environmental and security factors for disaster governance in the region. Using Social Domains theory, the paper argues first, that a hazard-centred paradigm of ‘universal’ disaster science emerges from the colonial per…
The Challenge of Coexistence in Socially Vulnerable Schools
2017
Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…
Secure and efficient verification for data aggregation in wireless sensor networks
2017
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks
2018
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…
Strategies of Identification of a Base-Isolated Hospital Building by Coupled Quasi-Static and Snap-Back Tests
2020
In this paper, the description of a series of quasi-static pushing tests and dynamic snap-back tests is proposed, involving the base-isolated emergency building of the Palermo university hospital. The base isolation system is characterized by a set of double-curved friction pendulum isolators placed on the top of the columns of the underground level, characteristics that cannot be found in the experimental studies available in the literature. The aim of the work was to investigate the static and dynamic properties of the building in question and comparing the in-situ results with the characteristics assigned during the design process and to assess the level of agreement. Static lateral push…
A Mechanical Approach for Evaluating the Distribution of Confinement Pressure in FRP-Wrapped Rectangular Columns
2019
In recent decades, fiber reinforced polymer (FRP) wrapping has become a common technique to retrofit reinforced concrete (RC) columns. Numerous research works have sought to verify analytically and experimentally its effectiveness in terms of enhancement of axial load bearing capacity and ductility. These studies highlighted that in the case of sharp-cornered sections, the maximum allowable confinement pressure is limited by premature failure at corners and, consequently, stress in the FRP, as well as the distribution of the confinement pressure, is not uniform. The prediction of this phenomenon is not straightforward, and existing theoretical studies propose complex numerical simulations, …