Search results for "SECURITY"

showing 10 items of 1693 documents

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

The impact on disaster governance of the intersection of environmental hazards, border conflict and disaster responses in Ladakh, India

2018

Abstract The Indian border region of Ladakh, in Jammu and Kashmir State, has a sensitive Himalayan ecosystem and has experienced natural hazards and disasters of varying scales over the decades. Ladakh is also situated on a fault-line of multiple tensions, including ongoing border disagreements and intermittent conflict with China and Pakistan. The Indian army has thus become a permanent fixture in the region. This paper examines the implications of the intersection of these environmental and security factors for disaster governance in the region. Using Social Domains theory, the paper argues first, that a hazard-centred paradigm of ‘universal’ disaster science emerges from the colonial per…

021110 strategic defence & security studiesCivil societyeducation.field_of_studyNational security010504 meteorology & atmospheric sciencesDisaster risk reductionEmergency managementbusiness.industryCorporate governancePopulation0211 other engineering and technologiesPoison controlGeology02 engineering and technologyBuilding and ConstructionGeotechnical Engineering and Engineering Geology01 natural sciencesEconomyPolitical scienceNatural hazardbusinesseducationSafety Research0105 earth and related environmental sciencesInternational Journal of Disaster Risk Reduction
researchProduct

The Challenge of Coexistence in Socially Vulnerable Schools

2017

Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…

021110 strategic defence & security studiesClass (computer programming)business.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies050301 education02 engineering and technologyPublic relationsPeer supportPhase (combat)DemocracyConvivència escolarReading (process)General Materials ScienceQuality (business)SociologyMarketingbusiness0503 educationmedia_commonProcedia - Social and Behavioral Sciences
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks

2018

While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…

021110 strategic defence & security studiesComputer scienceNode (networking)Reliability (computer networking)Distributed computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor node0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Trust management (information system)Electrical and Electronic EngineeringSubjective logicInstrumentationWireless sensor networkIEEE Sensors Journal
researchProduct

Strategies of Identification of a Base-Isolated Hospital Building by Coupled Quasi-Static and Snap-Back Tests

2020

In this paper, the description of a series of quasi-static pushing tests and dynamic snap-back tests is proposed, involving the base-isolated emergency building of the Palermo university hospital. The base isolation system is characterized by a set of double-curved friction pendulum isolators placed on the top of the columns of the underground level, characteristics that cannot be found in the experimental studies available in the literature. The aim of the work was to investigate the static and dynamic properties of the building in question and comparing the in-situ results with the characteristics assigned during the design process and to assess the level of agreement. Static lateral push…

021110 strategic defence & security studiesComputer sciencebusiness.industry0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionStructural engineeringGeotechnical Engineering and Engineering GeologyUniversity hospitalBase (topology)0201 civil engineeringSettore ICAR/09 - Tecnica Delle CostruzioniSettore ING-IND/31 - ElettrotecnicaSnap backIdentification (information)friction friction pendulum bearing full-scale experimental tests in-situ testing seismic isolation snap-back testSeismic isolationbusinessQuasistatic processCivil and Structural EngineeringJournal of Earthquake Engineering
researchProduct

A Mechanical Approach for Evaluating the Distribution of Confinement Pressure in FRP-Wrapped Rectangular Columns

2019

In recent decades, fiber reinforced polymer (FRP) wrapping has become a common technique to retrofit reinforced concrete (RC) columns. Numerous research works have sought to verify analytically and experimentally its effectiveness in terms of enhancement of axial load bearing capacity and ductility. These studies highlighted that in the case of sharp-cornered sections, the maximum allowable confinement pressure is limited by premature failure at corners and, consequently, stress in the FRP, as well as the distribution of the confinement pressure, is not uniform. The prediction of this phenomenon is not straightforward, and existing theoretical studies propose complex numerical simulations, …

021110 strategic defence & security studiesCorner radiusMaterials scienceFiber reinforced polymer (FRP) wrappingDistribution (number theory)business.industryMechanical Engineering0211 other engineering and technologies02 engineering and technologyStructural engineeringFibre-reinforced plasticReinforced concreteConfinement pressureBrittle failureMechanics of Materials021105 building & constructionbusinessCorner radiu
researchProduct