Search results for "Security."

showing 10 items of 1645 documents

Knowledge Discovery from Network Logs

2015

Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. peerReviewed

Actionable knowledgeKnowledge extractionComputer scienceProcess (engineering)cyber securityComplex systemAnomaly detectionDynamic web pageBaseline (configuration management)kyberturvallisuusData scienceTerm (time)
researchProduct

Powers and Fundamental Rights in Cyber Security

2015

Protection of privacy and confidential communications are crucial fundamental rights in cyber security. The protection of privacy and confidential communications are twofold in the meaning that active security steps in communications may require interference with confidential communications. The detection and profiling of potential threats may raise suspects on innocent participants of communications. The NCSC-FI inside the Communications Authority has the initial task and powers to monitor the cyber security. The bill for the Code of Information Society introduces new obligations for information security and preparation for emergency situations. If new powers will be granted to authorities…

Active securityPolitical scienceAccountabilityFundamental rightsProfiling (information science)Information securityConfidential communicationsInformation societyComputer securitycomputer.software_genreEmergency situationscomputer
researchProduct

Combining Benford's Law and machine learning to detect money laundering. An actual Spanish court case.

2017

Abstract Objectives This paper is based on the analysis of the database of operations from a macro-case on money laundering orchestrated between a core company and a group of its suppliers, 26 of which had already been identified by the police as fraudulent companies. In the face of a well-founded suspicion that more companies have perpetrated criminal acts and in order to make better use of what are very limited police resources, we aim to construct a tool to detect money laundering criminals. Methods We combine Benford’s Law and machine learning algorithms (logistic regression, decision trees, neural networks, and random forests) to find patterns of money laundering criminals in the conte…

Actuarial scienceScrutinyArtificial neural networkComputer sciencebusiness.industryDecision treeContext (language use)02 engineering and technologySpace (commercial competition)Money launderingComputer securitycomputer.software_genreMachine learning01 natural sciencesPathology and Forensic MedicineBenford's law010104 statistics & probabilityOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligence0101 mathematicsbusinessLawcomputerForensic science international
researchProduct

OHP-041 Formulary Decision-Making For Biosimilars: Considerations For Hospital Pharmacists

2013

Background It has been 6 years since the first biosimilar was approved for use in the European Union (EU). Given the likelihood that biosimilar monoclonal antibodies will be approved in Europe in the near future, it is timely to review the formulary selection criteria for biologicals and biosimilars. The European Medicines Agency (EMA) has issued guidelines that define the regulation of biosimilars in Europe and recommend approaches to establish biosimilarity. However, several questions regarding the assessment of biosimilars for formulary inclusion remain unanswered, including those related to manufacturing and drug supply. Purpose To aid hospital pharmacists in developing evaluation crite…

Actuarial sciencebusiness.industrySupply chainmedia_common.quotation_subjectBiosimilarHealth caremedia_common.cataloged_instanceMedicineQuality (business)Product (category theory)Supply chain securityGeneral Pharmacology Toxicology and PharmaceuticsFormularyEuropean unionbusinessmedia_commonEuropean Journal of Hospital Pharmacy
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

The Perception of Psychosocial Risks and Work-Related Stress in Relation to Job Insecurity and Gender Differences: A Cross-Sectional Study

2018

Introduction. The perception of psychosocial risks exposes workers to develop work-related stress. Recently the attention of scientific research has focused on a psychosocial risk already identified as “job insecurity” that regards the “overall concern about the continued existence of the job in the future” and that also depends on worker’s perception, different for each gender. Aim of the Study. The aim of this cross sectional study is to show if job insecurity, in the form of temporary contracts, can influence the perception of psychosocial risks and therefore increase worker’s vulnerability to work-related stress and how the magnitude of this effect differs between genders. Materials and…

AdultEmploymentMaleTypologyArticle SubjectCross-sectional studymedia_common.quotation_subjectVulnerabilitylcsh:Medicine050109 social psychologywork related stresspsychosocial riskJob SatisfactionGeneral Biochemistry Genetics and Molecular BiologyOccupational StressSex FactorsSurveys and QuestionnairesPerceptionStatistical significance0502 economics and businessHumans0501 psychology and cognitive sciencesjob insecuritymedia_commonGeneral Immunology and MicrobiologyJob insecurityjob insecurity; work related stress; gender differences; psychosocial risk05 social scienceslcsh:RGeneral MedicineTest (assessment)Cross-Sectional Studiesgender differencesFemalePerceptionCorrigendumPsychologyPsychosocialStress Psychological050203 business & managementClinical psychologyResearch ArticleBioMed Research International
researchProduct

Effectance and control as determinants of video game enjoyment

2007

This article explores video game enjoyment originated by games' key characteristic, interactivity. An online experiment (N = 500) tested experiences of effectance (perceived influence on the game world) and of being in control as mechanisms that link interactivity to enjoyment. A video game was manipulated to either allow normal play, reduce perceived effectance, or reduce perceived control. Enjoyment ratings suggest that effectance is an important factor in video game enjoyment but that the relationship between control of the game situation and enjoyment is more complex. © 2007 Mary Ann Liebert, Inc.

AdultEngineeringInjury controlAdolescentAccident preventionControl (management)HappinessPoison controlComputer securitycomputer.software_genreUser-Computer InterfaceInteractivityHumansPerceived controlVideo gameApplied PsychologyAgedbusiness.industryCommunicationComputingMilieux_PERSONALCOMPUTINGGeneral MedicineConsumer BehaviorMiddle AgedPlay and PlaythingsHuman-Computer InteractionVideo GamesbusinesscomputerSocial psychology
researchProduct

Testing the validity of the International Atomic Energy Agency (IAEA) safety culture model

2012

This paper takes the first steps to empirically validate the widely used model of safety culture of the International Atomic Energy Agency (IAEA), composed of five dimensions, further specified by 37 attributes. To do so, three independent and complementary studies are presented. First, 290 students serve to collect evidence about the face validity of the model. Second, 48 experts in organizational behavior judge its content validity. And third, 468 workers in a Spanish nuclear power plant help to reveal how closely the theoretical five-dimensional model can be replicated. Our findings suggest that several attributes of the model may not be related to their corresponding dimensions. Accordi…

AdultMaleEngineeringAdolescentOperations researchPoison controlHuman Factors and ErgonomicsOCCUPATIONAL SAFETYComputer securitycomputer.software_genrelaw.inventionYoung AdultATOMIC PROCESSESlawSurveys and QuestionnairesNuclear power plantAgency (sociology)Content validityHumansSafety cultureSafety Risk Reliability and QualityFace validityModels Statisticalbusiness.industryAtomic energyPublic Health Environmental and Occupational HealthInternational AgenciesReproducibility of ResultsMiddle AgedNuclear EnergyOrganizational CultureSpainOrganizational behaviorModels OrganizationalSafety cultureFemaleSafetyFactor Analysis Statisticalbusinesscomputer
researchProduct

Development and validation of the Spanish Hazard Perception Test.

2014

The aim of the current study is to develop and obtain valid evidence for a hazard perception test suitable for the Spanish driving population. To obtain valid evidence to support the use of the test, the effect of hazardous and quasi-hazardous situations on the participants' hazard prediction is analyzed and the pattern of results for drivers with different driving experience--that is, learner, novice, and expert drivers and reoffender vs. nonoffender drivers--is compared. Potentially hazardous situations are those that develop without involving any real hazard (i.e., the driver did not actually have to decelerate or make any evasive maneuver to avoid a potential collision). The current stu…

AdultMaleEngineeringAutomobile DrivingAdolescentPsychometricsApplied psychologyPopulationVideo RecordingPoison controlComputer securitycomputer.software_genreOccupational safety and healthYoung AdultRisk-TakingInjury preventionHumanseducationeducation.field_of_studybusiness.industryPublic Health Environmental and Occupational HealthHuman factors and ergonomicsReproducibility of ResultsMiddle AgedCollisionHazardTest (assessment)SpainAutomobile Driver ExaminationFemaleSafetybusinessSafety ResearchcomputerLicensureTraffic injury prevention
researchProduct