Search results for "Security."

showing 10 items of 1645 documents

Characteristics and Measures for Mobile-Masquerader Detection

2006

Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.

Computer scienceFunctional abilitiesSubstitution (logic)Computer securitycomputer.software_genreSecurity policycomputerMobile device
researchProduct

Passenger Car Equivalents for Heavy Vehicles at Roundabouts. a Synthesis Review

2019

Passenger Car Equivalents (PCEs in the following) are used to transform a mixed fleet of vehicles into a fleet of equivalent passenger cars and to analyze capacity and level-of-service of roads and intersections. Most roundabouts guidelines propose constant values for PCEs but a single PCE value can result improper under heterogeneous traffic conditions. PCEs should be vary with traffic and road conditions and consequently PCEs applied to undersaturated traffic conditions can overestimate the heavy vehicle effect or be not sensitive to the traffic level or characteristics of heavy vehicles. Compared to other at-grade intersections, the interaction between the operational performances of the…

Computer scienceGeography Planning and Development0211 other engineering and technologiesMicrosimulation020101 civil engineering02 engineering and technology0201 civil engineeringTransport engineeringlcsh:HT165.5-169.9roundaboutSettore ICAR/04 - Strade Ferrovie Ed Aeroporti021110 strategic defence & security studiesheavy vehiclescapacitymicrosimulationTraffic simulationBuilding and Constructionlcsh:City planningTraffic flowUrban Studiespassenger car equivalentlcsh:TA1-2040Traffic conditionsRoundaboutstatistical methodsPassenger car equivalentEstimation methodslcsh:Engineering (General). Civil engineering (General)Frontiers in Built Environment
researchProduct

Multi-agent Systems for Estimating Missing Information in Smart Cities

2019

International audience; Smart cities aim at improving the quality of life of citizens. To do this, numerous ad-hoc sensors need to be deployed in a smart city to monitor the environmental state. Even if nowadays sensors are becoming more and more cheap their installation and maintenance costs increase rapidly with their number. This paper makes an inventory of the dimensions required for designing an intelligent system to support smart city initiatives. Then we propose a multi-agent based solution that uses a limited number of sensors to estimate at runtime missing information in smart cities using a limited number of sensors.

Computer scienceMulti-agent system020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Missing Information EstimationSmart city11. Sustainability0202 electrical engineering electronic engineering information engineeringSmart City020201 artificial intelligence & image processingState (computer science)Cooperative Multi-agent Systemscomputer
researchProduct

A Software Package for a Serum Bank Management

1979

A serum-bank is a collection of human serum samples coming from different locations (in our case Children Hospital, schools, factories, town departemens), allocated in some archives. Principal users of a such data-bank are, of course, physicians and biologists that are mainly interested in statistical analysis (computation of averages, variances factor analysis, etc.) of immunological and epidemiological relevance, in order to investigate about some haematochemical parameters common to some selected subset of the archives [1], [2].

Computer sciencePrincipal (computer security)Relevance (information retrieval)Statistical analysisOperations managementMarketingSoftware packageSerum samplesBank management
researchProduct

Experimental evaluation of privacy-preserving aggregation schemes on planetlab

2015

New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…

Computer sciencePrivacy softwareSettore ING-INF/03 - TelecomunicazioniAggregate (data warehouse)aggregationComputer securitycomputer.software_genreprivacySecret sharingInformation sensitivityPlanetLabInformation leakageSecure multi-party computationcomputer
researchProduct

On the darker side of C++

1988

We discuss several negative features and properties of the C++ language, some common with C, others pertaining to C++ classes. Remedies are proposed for most of the latter ones, most of the former ones being feared to be already incurable. The worst class-related defects claimed in present C++ have to do with free store management. Some hints are given to programmers on how to avoid pitfalls.

Computer scienceProgramming languageObject-orientationComputer securitycomputer.software_genrecomputer
researchProduct

MEDiSN

2010

Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high quality care. At the same time, there is a growing concern about hospitals' ability to provide effective care during disaster events. For these reasons, tools that automate patient monitoring have the potential to greatly improve efficiency and quality of health care. Towards this goal, we have developed MEDiSN , a wireless sensor network for monitoring patients' physiological data in hospitals and during disaster events. MEDiSN comprises Physiological Monitors (PMs), which are custom-built, patient-worn motes that sample, encrypt, and sign physiological data and Relay Po…

Computer scienceRemote patient monitoringNetwork packetbusiness.industryQuality of serviceTestbedComputer securitycomputer.software_genreEncryptionHardware and ArchitectureHealth careWirelessbusinesscomputerWireless sensor networkSoftwareACM Transactions on Embedded Computing Systems
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

A risk evaluation framework for the best maintenance strategy: the case of a marine salt manufacture firm

2020

Highlights • This paper proposes a MCDM framework to support risk evaluation for maintenance activities. • The ANP is proposed to select the best maintenance strategy on the basis of real systems’ features. • The ELECTRE III is used to prioritise the main risks related to the interventions of the selected maintenance policy. • The proposed framework is applied to a core subsystem of a real-world marine salt manufacture firm.

Computer scienceSalt (cryptography)Analytic network processmedia_common.quotation_subject0211 other engineering and technologies09.- Desarrollar infraestructuras resilientes promover la industrialización inclusiva y sostenible y fomentar la innovación02 engineering and technologyArticleIndustrial and Manufacturing EngineeringSettore ING-IND/17 - Impianti Industriali MeccaniciELECTRESafety Risk Reliability and QualityMaintenance policy selection risk evaluation ANP ELECTRE IIImedia_commonELECTRE III021110 strategic defence & security studies021103 operations researchRisk evaluationMultiple-criteria decision analysisRisk evaluationInterdependenceCore (game theory)Intervention (law)Risk analysis (engineering)Maintenance policy selectionMATEMATICA APLICADAANP
researchProduct

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct