Search results for "Security"

showing 10 items of 1693 documents

L’occupation de l’Iraq. Le Conseil de sécurité, le droit de la guerre et le droit des peuples à disposer d’eux-mêmes

2004

By Resolutions No. 1483 and 1511 (2003), the Security Council authorized the occupying powers in Iraq to intervene in the political and economic affairs of the occupied territory beyond the limits provided for by international law of war. At the same time, this authorization restricts the right of the Iraqui peole to self- determination, considered in its external aspect. Thus, the problem arises whether it is within the Security Council's powers to adopt resolutions which restrict the enjoyment of rights protected by rules of jus cogens. Furthermore, because the occupying government interpreted these resolutions broadly, it may be asked whether this interpretation is lawful. From a close e…

United Nations Security Council - Belligerent Occupation - Self-Determination of Peoples - Interpretation of Security Council's ResolutionsConsiglio di Sicurezza dell'ONU - Occupazione bellica - Principio di autodeterminazione dei popoli - Interpretazione delle risoluzioni del Consiglio di Sicurezza
researchProduct

The United Citizens Organization: Public-private partnerships in global governance

2020

Can Public-Private Partnerships be applied to global affairs and governance? This paper reviews the existing relations between public and private global actors. I argue that current international politics is largely an outcome of these relations. Although for the foreseeable future the role of traditional nation-states on the global scene should not be dismissed, they come under the constant pressure of different private actors, particularly of MNCs and NGOs. If this is the case, the question of global responsibility must be raised. It has been the traditional role of governments to stand for such societal values as security and prosperity, and be responsible for their citizens. With the ch…

United NationsSecurityProfessional responsibilityPublic-private partnershipsWorld governmentGlobal governanceGlobalizationResearch in Globalization
researchProduct

PIL.20-21-Unit 7. The role of the United Nations

2020

Public International Law. Unit 7. The role of the United Nations. Powerpoint of the Academic course 2020-2021.

United Nationspublic international lawUnited Nations Economic and Social CouncilUnited Nations General AssemblyUNESCO::CIENCIAS JURÍDICAS Y DERECHOUnited Nations Security Council
researchProduct

Evaluation of a hash-compress-encrypt pipeline for storage system applications

2015

Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.

UnixDatabaseComputer sciencebusiness.industryHash functionData securityCryptographycomputer.software_genreEncryptionPipeline (software)Pipeline transportEmbedded systemComputer data storagebusinesscomputer2015 IEEE International Conference on Networking, Architecture and Storage (NAS)
researchProduct

Bot recognition in a Web store: An approach based on unsupervised learning

2020

Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…

Unsupervised classificationWeb bot detectionComputer Networks and CommunicationsComputer scienceInternet robot02 engineering and technologyMachine learningcomputer.software_genreWeb trafficWeb serverMachine learning0202 electrical engineering electronic engineering information engineeringArtificial neural networkbusiness.industrySupervised learning020206 networking & telecommunicationsPerceptronWeb application securityWeb botComputer Science ApplicationsSupport vector machineGenerative modelComputingMethodologies_PATTERNRECOGNITIONHardware and ArchitectureSupervised classificationUnsupervised learning020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer
researchProduct

Sprawa operacyjnego sprawdzenia kryptonim „Zakonnik”. inwigilacja ks. Henryka Surmy przez Służbę Bezpieczeństwa w latach 1974-1977

2018

Celem opracowania jest ukazanie na przykładzie jednego z zakonników sposobu postępowania Służby Bezpieczeństwa wobec duchownych, którzy znaleźli się w spektrum zainteresowania tej instytucji, z uwagi na podejrzenie prowadzenia „antypaństwowej” działalności. Tego rodzaju sprawy operacyjnego sprawdzenia zakładane były przez Służbę Bezpieczeństwa PRL bardzo często i miały na celu sprawdzenie doniesień o prowadzeniu przez duchownych działalności uznawanej przez władze komunistyczne za wrogą ustrojowi PRL. Ks. Henryk Surma, nie godząc się na komunistyczne ograniczenia praw człowieka, ani na dążenia władz PRL zmierzające do marginalizacji Kościoła, próbował na własną rękę pozyskać środki na remon…

Urząd Bezpieczeństwa; PRLSecurity Office; People’s Republic of Poland; surveillance; freedom of conscience and religion; Church-State relations; monks; clergy; Church in the period of People’sPolska Rzeczpospolita Ludowa; inwigilacja; wolność sumienia i religii; relacje państwo-kościół; zakonnicy; duchowni; kościół w PRLStudia z Prawa Wyznaniowego
researchProduct

Platform for efficient and secure data collection and exploitation in intelligent vehicular networks

2016

Nowadays, automotive area is witnessing a tremendous evolution due to the increasing growth in communication technologies, environmental sensing & perception aptitudes, and storage & processing capacities that we can find in recent vehicles. Indeed, a car is being a kind of intelligent mobile agent able to perceive its environment, sense and process data using on-board systems and interact with other vehicles or existing infrastructure. These advancements stimulate the development of several kinds of applications to enhance driving safety and efficiency and make traveling more comfortable. However, developing such advanced applications relies heavily on the quality of the data and therefore…

VANETAnalyse de donnéesData analysisSécuritéNetwork SelectionQuality of serviceCollecte de donnéesData collectionSecurity[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Qualité de ServiceRoutageRoutingSelection du réseau
researchProduct

Pattern recognition based authentication in mobile and wireless systems

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Securing Assets with RFID

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct