Search results for "Security"
showing 10 items of 1693 documents
Desertification and Water Scarcity as a Security Challenge in the Mediterranean
2009
There is a new perception of a global dimension: environmental security. The protection of our fixed and shared environment is gradually coming to people’s attention as an obligatory requirement for equitable development, in order to prevent disasters related to environmental security and to avoid conflicts. The Euro-Mediterranean Region is also immersed in this general trend partly as a consequence of more frequent severe environmental events, such as forest fires, floods and landslides, droughts, torrential rains, heat waves and water scarcity. The Southern and Eastern shores of the Mediterranean undergo even more harsh environmental impacts affecting the stability of the land, its capaci…
Security Standards Applied to Drinking Water
2021
This chapter presents security standards as applied to drinking water, based on the assumption that freshwater sources face huge threats for humankind both qualitatively and quantitatively due to uncertain global changes, namely population growth, rapid urbanization, and climate change. The study investigates whether the International Featured Standards (IFS—Food), which are complementary to HACCP (Hazard analysis and critical control point), can be used as a system of indicators to measure water security. The case study focuses on bottled water, by identifying structural and contingent risk factors for water as essential food and investigates the suitability of the IFS instrument as an ind…
Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 34th International Conference on Advanced Information Netw…
2020
This proceedings book presents the latest research findings, and theoretical and practical perspectives on innovative methods and development techniques related to the emerging areas of Web computing, intelligent systems and Internet computing. The Web has become an important source of information, and techniques and methodologies that extract quality information are of paramount importance for many Web and Internet applications. Data mining and knowledge discovery play a key role in many of today’s major Web applications, such as e-commerce and computer security. Moreover, Web services provide a new platform for enabling service-oriented systems. The emergence of large-scale distributed co…
The Myths of and Solutions for Android OS Controlled and Secure Environment
2015
<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords">…
Online Web Bot Detection Using a Sequential Classification Approach
2019
A significant problem nowadays is detection of Web traffic generated by automatic software agents (Web bots). Some studies have dealt with this task by proposing various approaches to Web traffic classification in order to distinguish the traffic stemming from human users' visits from that generated by bots. Most of previous works addressed the problem of offline bot recognition, based on available information on user sessions completed on a Web server. Very few approaches, however, have been proposed to recognize bots online, before the session completes. This paper proposes a novel approach to binary classification of a multivariate data stream incoming on a Web server, in order to recogn…
Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges
2003
Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across various applications. Ontological definition of every resource as it is assumed in Semantic Web, along with new techniques for semantics processing and new vision Intelligent Web Services is expected to bring Web on its new level. At present, Web Services technology is stressed by the search of a right way for further development. Combination of Semantic Web and Web Services concepts may address many of difficulties of existing technology. It is not a question of whether Semantic Web is coming or not, but a question of …
Expected principal stress directions under multiaxial random loading. Part I: theoretical aspects of the weight function method
1999
As has been observed experimentally by many authors, the position of the fatigue fracture plane appears to strongly depend on the directions of the principal stresses or strains. In Part I of the present work the expected principal stress directions under multiaxial random loading are theoretically obtained by averaging the instantaneous values of the three Euler angles through some suitable weight functions which are assumed to take into account the main factors influencing fatigue behaviour. Then, in Part II, it is examined how such theoretical principal directions determined by applying the proposed procedure are correlated to the position of the experimental fracture plane for some fati…
Party Positions on Differentiated European Integration in the Nordic Countries: Growing Together, Growing Apart?
2020
The Nordic countries constitute an interesting laboratory for the study of differentiated European Integration. Even though Denmark, Finland, Iceland, Norway, and Sweden share some historical, cultural, socio-economic and political characteristics, all those countries have ultimately opted for a different kind of relationship with the EU. Whereas Finland, a member of the Eurozone since its inception in 1999, has been considered to be part of the Union’s ‘inner core’ for quite some time, Iceland and Norway, in contrast, have opted to remain outside the EU albeit closely associated via the European Economic Area Agreement. The variation of relationships has also been reflected in Nordic parti…
Digital Technologies for Transport and Mobility: Challenges, Trends and Perspectives
2020
This white paper aims at presenting the ideas emerging from the different fields pertaining to transport and mobility, to describe the capacities of current state-of-the-art digital technologies and the perspectives that are expected to shape the future of transport and mobility.
Security in Mobile Wireless Sensor Networks – A Survey
2011
Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…