Search results for "Security"

showing 10 items of 1693 documents

Desertification and Water Scarcity as a Security Challenge in the Mediterranean

2009

There is a new perception of a global dimension: environmental security. The protection of our fixed and shared environment is gradually coming to people’s attention as an obligatory requirement for equitable development, in order to prevent disasters related to environmental security and to avoid conflicts. The Euro-Mediterranean Region is also immersed in this general trend partly as a consequence of more frequent severe environmental events, such as forest fires, floods and landslides, droughts, torrential rains, heat waves and water scarcity. The Southern and Eastern shores of the Mediterranean undergo even more harsh environmental impacts affecting the stability of the land, its capaci…

Water resourcesEnvironmental securityPoliticsDesertificationOrder (exchange)media_common.quotation_subjectLand degradationEnvironmental scienceEnvironmental planningHuman securityWater scarcitymedia_common
researchProduct

Security Standards Applied to Drinking Water

2021

This chapter presents security standards as applied to drinking water, based on the assumption that freshwater sources face huge threats for humankind both qualitatively and quantitatively due to uncertain global changes, namely population growth, rapid urbanization, and climate change. The study investigates whether the International Featured Standards (IFS—Food), which are complementary to HACCP (Hazard analysis and critical control point), can be used as a system of indicators to measure water security. The case study focuses on bottled water, by identifying structural and contingent risk factors for water as essential food and investigates the suitability of the IFS instrument as an ind…

Water resourcesWater securityFood securitybusiness.industryCritical control pointBusinessHazard analysisBottled waterEnvironmental economicsFood safetyVulnerability (computing)
researchProduct

Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 34th International Conference on Advanced Information Netw…

2020

This proceedings book presents the latest research findings, and theoretical and practical perspectives on innovative methods and development techniques related to the emerging areas of Web computing, intelligent systems and Internet computing. The Web has become an important source of information, and techniques and methodologies that extract quality information are of paramount importance for many Web and Internet applications. Data mining and knowledge discovery play a key role in many of today’s major Web applications, such as e-commerce and computer security. Moreover, Web services provide a new platform for enabling service-oriented systems. The emergence of large-scale distributed co…

Web ComputingBio ComputingIoTInternet ApplicationsArtificial IntelligencePrivacySecurityData MiningWAINA2020Intelligent SystemsMobile and Wireless ComputingWAINA
researchProduct

The Myths of and Solutions for Android OS Controlled and Secure Environment

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"&gt…

Web serverEngineeringbusiness.industryMobile computingBring your own devicecomputer.software_genreComputer securityEncryptionWorld Wide WebServerMalwareWeb contentAndroid (operating system)businesscomputerAndroid; mobile computing; security; BYOD; smartphones; ICTEnvironment. Technology. Resources.
researchProduct

Online Web Bot Detection Using a Sequential Classification Approach

2019

A significant problem nowadays is detection of Web traffic generated by automatic software agents (Web bots). Some studies have dealt with this task by proposing various approaches to Web traffic classification in order to distinguish the traffic stemming from human users' visits from that generated by bots. Most of previous works addressed the problem of offline bot recognition, based on available information on user sessions completed on a Web server. Very few approaches, however, have been proposed to recognize bots online, before the session completes. This paper proposes a novel approach to binary classification of a multivariate data stream incoming on a Web server, in order to recogn…

Web serverHTTP request analysis; Internet security; Machine learning; Neural networks; Sequential classification; Web bot detectionSettore INF/01 - InformaticaWeb bot detectionComputer sciencebusiness.industrySequential classification020206 networking & telecommunications02 engineering and technologyMachine learningcomputer.software_genreInternet securitySession (web analytics)Task (computing)Web trafficMachine learning0202 electrical engineering electronic engineering information engineeringHTTP request analysis020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerNeural networksInternet security2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
researchProduct

Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges

2003

Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across various applications. Ontological definition of every resource as it is assumed in Semantic Web, along with new techniques for semantics processing and new vision Intelligent Web Services is expected to bring Web on its new level. At present, Web Services technology is stressed by the search of a right way for further development. Combination of Semantic Web and Web Services concepts may address many of difficulties of existing technology. It is not a question of whether Semantic Web is coming or not, but a question of …

Web standardsmedicine.medical_specialtyWeb 2.0Web developmentComputer scienceService discoveryWeb engineeringReusecomputer.software_genreSocial Semantic WebWorld Wide WebWeb designSemantic analyticsmedicineWeb navigationSemantic Web StackRDFSemantic WebData Webbusiness.industrycomputer.file_formatWeb application securityOntologyThe InternetWeb mappingWeb servicebusinessWeb intelligenceWS-PolicycomputerWeb modelingInformation integration
researchProduct

Expected principal stress directions under multiaxial random loading. Part I: theoretical aspects of the weight function method

1999

As has been observed experimentally by many authors, the position of the fatigue fracture plane appears to strongly depend on the directions of the principal stresses or strains. In Part I of the present work the expected principal stress directions under multiaxial random loading are theoretically obtained by averaging the instantaneous values of the three Euler angles through some suitable weight functions which are assumed to take into account the main factors influencing fatigue behaviour. Then, in Part II, it is examined how such theoretical principal directions determined by applying the proposed procedure are correlated to the position of the experimental fracture plane for some fati…

Weight functionMaterials scienceContinuum mechanicsbusiness.industryMechanical EngineeringMathematical analysisPrincipal (computer security)Work (physics)Fracture mechanicsStructural engineeringStrength of materialsIndustrial and Manufacturing EngineeringEuler anglessymbols.namesakeMechanics of MaterialsPosition (vector)Modeling and SimulationsymbolsGeneral Materials SciencebusinessInternational Journal of Fatigue
researchProduct

Party Positions on Differentiated European Integration in the Nordic Countries: Growing Together, Growing Apart?

2020

The Nordic countries constitute an interesting laboratory for the study of differentiated European Integration. Even though Denmark, Finland, Iceland, Norway, and Sweden share some historical, cultural, socio-economic and political characteristics, all those countries have ultimately opted for a different kind of relationship with the EU. Whereas Finland, a member of the Eurozone since its inception in 1999, has been considered to be part of the Union’s ‘inner core’ for quite some time, Iceland and Norway, in contrast, have opted to remain outside the EU albeit closely associated via the European Economic Area Agreement. The variation of relationships has also been reflected in Nordic parti…

WertPublic AdministrationSociology and Political ScienceEuropean Politicsdemocracymedia_common.quotation_subjectPolitikwissenschaftparty politicsNordeuropanordic cooperation0211 other engineering and technologiesNorthern Europe02 engineering and technologyEuropapolitikPublic opinionPoliticsvaluelcsh:Political science (General)Political scienceEuropean integration050602 political science & public administrationmedia_common.cataloged_instanceEuropean unionParteipolitikEuropean cooperationlcsh:JA1-92Political scienceeuropean unionmedia_common021110 strategic defence & security studiesGovernmentbusiness.industry05 social sciencesdifferentiationdemocratic valuesDemocracyeuropäische Zusammenarbeit0506 political scienceAgrarian societyPolitical economyddc:320IdeologybusinessEUDemokratiePolitics and Governance
researchProduct

Digital Technologies for Transport and Mobility: Challenges, Trends and Perspectives

2020

This white paper aims at presenting the ideas emerging from the different fields pertaining to transport and mobility, to describe the capacities of current state-of-the-art digital technologies and the perspectives that are expected to shape the future of transport and mobility.

White paperComputer sciencebusiness.industryLogisticSurface transportLogisticsAeronautics and aviationCurrent (fluid)Cyber securityTelecommunicationsbusinessAeronautics and aviation; Cyber security; Logistics; Surface transport
researchProduct

Security in Mobile Wireless Sensor Networks – A Survey

2011

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

Wi-Fi arrayComputer sciencebusiness.industryWireless networkWireless WANComputer securitycomputer.software_genreKey distribution in wireless sensor networksWireless site surveymobile Wireless Sensor Network security Wireless Sensor NetworkNetwork Access ControlVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile wireless sensor networkElectrical and Electronic EngineeringbusinesscomputerWireless sensor networkComputer networkJournal of Communications
researchProduct