Search results for "Security"

showing 10 items of 1693 documents

Testbed implementation of the meta-MAC protocol

2016

The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…

Wireless mesh networkInter-Access Point ProtocolComputer sciencebusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science (all)020206 networking & telecommunications020302 automobile design & engineeringOrder One Network Protocol02 engineering and technologyWireless LAN controllerWireless Transport Layer Security0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringMedia access controlElectrical and Electronic EngineeringbusinessIEEE 802.11sWireless distribution systemComputer network
researchProduct

EL SISTEMA DE PROTECCIÓN AL MENOR EN ESPAÑA:

2019


 La legislación recientemente aprobada a nivel nacional en materia de protección a la infancia y la adolescencia requiere, desde el punto de vista socioeducativo, analizar tanto sus principales aportaciones y novedades como, también y sobre todo, las exigencias a las que los profesionales de dicho ámbito hemos de dar respuesta. El análisis documental de dichos textos, así como de la literatura científica al respecto, nos ha permitido detectar que, sin duda, son numerosos los retos que se dibujan en el horizonte y diversas las posibilidades que se plantean. Es amplio y largo el camino que queda por recorrer si realmente pretendemos contribuir al bienestar de los menores y adolescentes …

Work (electrical)Point (typography)Political scienceWelfare economicsPrincipal (computer security)LegislationScientific literatureEdetania. Estudios y propuestas socioeducativas
researchProduct

Introducing History of Mathematics Education Through Its Actors: Peter Treutlein’s Intuitive Geometry

2018

This paper deals with the questions why and how to introduce into teacher education the history of teaching practices and educational reforms. In particular, we are interested in the developments of curricular school geometry during the 19th century and the reforms at the beginning of the last century in Germany. The life and work of Peter Treutlein—a contemporary of Felix Klein—and a conceptual reformist of geometry instruction, schoolbook author, committed teacher and school principal with educational experience of many years opens to us many opportunities to link present teaching practices in Geometry to its traditions, some of which we will discuss.

Work (electrical)Principal (computer security)History of mathematicsGeometrySociologyTeacher education
researchProduct

CREATING A POSITIVE WORKING ENVIRONMENT FOR TEACHERS

2018

The purpose of the research paper is to study a positive working environment importance for teachers work satisfaction and the role of principal in improving working conditions. Whereas teacher profession is subject to different changes and reforms it makes the whole profession and teacher well-being an important subject to discuss.The research paper includes analysis of the theoretical material about physical environment as well as psychological (also called microclimate). Empirical part is based on teacher’s survey – 97 teachers from different schools in Riga were involved. The statements of survey have partially adopted from Teaching and Learning International Study TALIS 2013. The main …

Work (electrical)Principal (computer security)Mathematics educationSubject (philosophy)Job satisfactionPsychologyResearch taskWork environmentWorking environmentmicroclimate; principal; TALIS 2013; teacher work satisfactionSOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference
researchProduct

Policing in the Slovak Republic: The Organization and Current Problems of Police Work

2013

The Police hold one of the most important roles within the modern society from the viewpoint of providing and maintaining peace, order and security. In the Slovak Republic the police have been in existence for a relatively short time, but legislation regulating their activities and structure has already undergone several reforms. This treatise contains information regarding the structure and tasks of the Police of the Slovak Republic, discusses the development of criminality within the Slovak Republic, and analyses the current social status of the Police.

Work (electrical)Security serviceOrder (exchange)Political scienceCrime ratelanguageLegislationSlovakCriminologylanguage.human_languageSocial status
researchProduct

Higher education graduates' employment and the uncertainty of working life.

2012

The aim of this chapter is to examine how the uncertainty and instability of working life is reflected in Finnish polytechnic graduates’ employment. The present study investigates the fields of business and engineering by comparing two graduate cohorts. The societal context in which new graduates enter working life is that of an increasing precariousness in the labour market, which affects higher education graduates as well as the general population. Nowadays, a higher education qualification is not necessarily a guaranteed path to a high income and high social status as it used to be. Insecurity and uncertainty in society and working life can be considered as general features of late moder…

Working lifeeducation.field_of_studyEconomic growthlate modernSocietal contextHigher educationbusiness.industryPopulationtyöllistyminenepävakaustyöllisyysHigh educationmyöhäismodernihigher education graduatesPaid workkorkeakoulutetutWork (electrical)Political scienceDemographic economicsinsecuritytyöelämäbusinesseducationSocial status
researchProduct

Honeypot utilization for analyzing cyber attacks

2016

Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.

World Wide WebEngineeringHoneypotSoftwarebusiness.industryPseudoserverEffective methodInformation securitybusinessComputer securitycomputer.software_genrecomputerHackerProccedings of the 10th European Conference on Software Architecture Workshops
researchProduct

Internet – Technical Development and Applications

2009

Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…

World Wide WebEngineeringManagement information systemsbusiness.industryKey (cryptography)The InternetDigital economyInformation securitybusinessDomain (software engineering)
researchProduct

Tailorable Representation of Security Control Catalog on Semantic Wiki

2018

Selection of security controls to be implemented is an essential part of the information security management process in an organization. There exist a number of readily available information security management system standards, including control catalogs, that could be tailored by the organizations to meet their security objectives. Still, it has been noted that many organizations tend to lack even the implementation of the fundamental security controls. At the same time, semantic wikis have become popular collaboration and information sharing platforms that have proven their strength as an effective way to distribute domain-specific information within an organization. This paper evaluates…

World Wide WebInformation security managementKnowledge basebusiness.industryProcess (engineering)Computer scienceInformation sharingControl (management)Information securitybusinessSecurity controlsInformation security management system
researchProduct

Security Implications of Using Third-Party Resources in the World Wide Web

2018

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…

World Wide WebScripting languageComputer scienceCross-site scriptingWeb pageMalwareAttack surfaceContent Security Policycomputer.software_genreSecurity policycomputerVulnerability (computing)2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct