Search results for "Security"
showing 10 items of 1693 documents
Mini-drones swarms and their potential in conflict situations
2020
The Unmanned Aerial Vehicles (UAV) commonly known as drones are currently used in a wide range of operations such as border monitoring, aerial reconnaissance, traffic control and military interventions in armed conflicts. These aerial vehicles are expected to be reliable, automated and sometimes autonomous machines, albeit the human factor continues to play a crucial role in programming and control. At their genesis, drones were complex, large and reserved to an exclusive club of technologically advanced military powers. They tended to be used against technologically weak military targets. Developments in the price, size and sophistication of drones has now enabled almost anyone to purchase…
Grandes expectativas y una oportunidad perdida. El Tribunal Especial para el Líbano y los objetivos del Consejo de Seguridad
2021
Entre los diversos tribunales penales internacionales ad hoc que se han creado desde finales del siglo XX, el Tribunal Especial para el Líbano destaca por su particularidad, tanto a nivel jurisdiccional como por su contribución al tratamiento de las víctimas. La labor del Tribunal Especial para el Líbano comenzó en 2009, dictando su primera sentencia de instancia el 18 de agosto de 2020. Mediante su constitución, el Consejo de Seguridad de Naciones Unidas apostó por no abandonar el camino iniciado en 1993 con la creación de los tribunales de Yugoslavia y Ruanda; sin embargo, el resultado no ha sido el esperado. Este trabajo pretende analizar las peculiaridades del Tribunal y su trabajo, rea…
Intelligent solutions for real-life data-driven applications
2017
The subject of this thesis belongs to the topic of machine learning or, specifically, to the development of advanced methods for regression analysis, clustering, and anomaly detection. Industry is constantly seeking improved production practices and minimized production time and costs. In connection to this, several industrial case studies are presented in which mathematical models for predicting paper quality were proposed. The most important variables for the prediction models are selected based on information-theoretic measures and regression trees approach. The rest of the original papers are devoted to unsupervised machine learning. The main focus is developing advanced spectral cluster…
The Far-Reaching Consequences of Job Insecurity : A Review on Family-Related Outcomes
2017
Job insecurity (JI) appears a fairly stable job stressor in working life today and likely to impair employee well-being. This review article presents the key findings of studies examining the effects of perceived JI on family well-being (e.g., marital/parental role quality, work–family conflict). The results, based on 25 published peer-reviewed studies, suggest an association between JI and impaired family well-being. Thus, JI spills over into family life as proposed in the spillover theory of work–family interface. Furthermore, studies have found some evidence of crossover effects of JI from parents to children: parents’ JI relates to negative outcomes in children. These results support th…
Bezpieczeństwo państwa a mniejszości narodowe
2017
National minorities, either today and in the past, certainly can be considered as a potential source of various types of threats to the security of State. States as the organizational form of different nations, not always peacefully co-exist, therefore a situation in which people of different nationalities residing in the territory of one country is inevitably more complex and raises many problems. Needs of State in terms of security, differ from those of groups and individual members of society. Threats may vary in nature and intensity and come from different directions, which depends on a wide variety of factors. This relation is not so simple because the State (and the members of the maj…
Control of Political Communication and State Security : Jamal Khashoggi Case
2018
W artykule podjęto problem analizy relacji pomiędzy, z jednej strony, prawem państwa do kontroli przepływu informacji w celu zapewnienia bezpieczeństwa a międzynarodowo uznawanymi prawami człowieka, w tym prawa człowieka do publicznego wyrażania poglądów, z drugiej. Przypadkiem, który poddano analizie, jest zamordowanie saudyjskiego dziennikarza Dżamala Chaszukdżi. W artykule wykorzystano metody jakościowej i ilościowej analizy zawartości mediów pod kątem wpływu relacji medialnych dotyczących morderstwa na reputację polityczną Królestwa Arabii Saudyjskiej w wymiarze politycznym i ekonomicznym
Italy in Uncertain Times: Europeanizing Foreign Policy in the Declining Proces of the American Hegemony
2019
Il libro analizza l'influenza dei cambiamenti nell'ordine internazionale egemonico a guida americana sulle variazioni nei pilastri tradizionali della politica estera italiana (USA, UE e multilateralismo) ed il ruolo che l'Italia gioca all'interno di quell'ordine. Per esplorare queste variazioni, il libro propone un'analisi del comportamento di voto e di sponsorizzazione dell'Italia alle Nazioni Unite nel periodo 2000-2017, guardando sia all'Assemblea Generale sia al Consiglio di Sicurezza, ed enfatizza l'importanza di quest'ultima sede per individuare i riflessi dei cambiamenti nel sistema internazionale sul comportamento italiano. Concentrandosi sul comportamento coalizionale, il libro esp…
Parent–Infant Attachment Insecurity and Emotional Eating in Adolescence: Mediation through Emotion Suppression and Alexithymia
2021
Contains fulltext : 233652.pdf (Publisher’s version ) (Open Access) Emotional eating (EE), the propensity to eat in response to emotions, is thought to have its origins in the early parent-infant relationship. This study tested the hypothesis that infant attachment insecurity results in EE in adolescence through the increased use of the emotion regulation strategy suppression of emotions and subsequent alexithymia. At the age of 15 months, parent-infant attachment security (n = 129) was observed with two abbreviated attachment measures: the shortened strange situation procedure (SSSP), and the shortened attachment Q-set (S-AQS). At the age of 12 years, children completed self-report questio…
Attacking TrustZone on devices lacking memory protection
2021
AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…