Search results for "Security"

showing 10 items of 1693 documents

The Place of Energy Security in the National Security Framework: An Assessment Approach

2022

The term “energy security” is used almost everywhere in economic and political discussions related to energy supply. However, different authors use different meanings to express the concept of energy security. Quite often, this term is used to give more importance or relevance to issues that are often not inherently related to energy security. Attempts to define the essence of the concept of “energy security” have hitherto not been systematic and are characterized by a variety of approaches, and some insufficient justification especially in the aspect of state national security is notable. Our contribution to the discourse development is the consideration of energy s…

ChinaTechnologyControl and OptimizationRenewable Energy Sustainability and the EnvironmentTregression; economic security; energy; Ukraine; correlations; China; U.S.A.Energy Engineering and Power Technologycorrelationseconomic securityregressionElectrical and Electronic EngineeringUkraineEngineering (miscellaneous)energyEnergy (miscellaneous)
researchProduct

Toxicity of binary mixtures of Cu, Cr and As to the earthworm Eisenia andrei

2020

AbstractChromated copper arsenate (CCA) mixtures were used in the past for wood preservation, leading to large scale soil contamination. This study aimed at contributing to the risk assessment of CCA-contaminated soils by assessing the toxicity of binary mixtures of copper, chromium and arsenic to the earthworm Eisenia andrei in OECD artificial soil. Mixture effects were related to reference models of Concentration Addition (CA) and Independent Action (IA) using the MIXTOX model, with effects being related to total and available (H2O and 0.01 M CaCl2 extractable) concentrations in the soil. Since only in mixtures with arsenic dose-related mortality occurred (LC50 92.5 mg/kg dry soil), it wa…

ChromiumDendrodrilus rubidusLUMBRICUS-RUBELLUSBioavailabilityHealth Toxicology and Mutagenesismixture toxicity.0211 other engineering and technologiesMIXTOX model02 engineering and technology010501 environmental sciencesCOCOON PRODUCTIONToxicology01 natural sciencesraskasmetallitchemistry.chemical_compoundSoil PollutantsSEXUAL DEVELOPMENTbiosaatavuusmaaperäbiologyChemistryCopper toxicityGeneral MedicineFreundlich sorption isothermsCONTAMINATED SOILSLumbricus rubellusCOPPER TOXICITYSoil contaminationFOLSOMIA-CANDIDAekotoksikologiaEnvironmental chemistryArsenates/dk/atira/pure/sustainabledevelopmentgoals/good_health_and_well_beingmaaperän saastuminenlierotEisenia andreichemistry.chemical_elementManagement Monitoring Policy and LawmyrkyllisyysArticleArsenicHEAVY-METALSSDG 3 - Good Health and Well-beingENCHYTRAEUS-ALBIDUSToxicity TestsmedicineAnimalsOligochaetaChromated copper arsenateArsenic1172 Environmental sciences0105 earth and related environmental sciences021110 strategic defence & security studiesMixture toxicityCCA metalsEarthwormbiology.organism_classificationmedicine.diseaseEISENIA-FOETIDApuunsuoja-aineetDENDRODRILUS-RUBIDUSbioavailabilityCopper
researchProduct

Towards Next Generation System Architecture for Emergency Services

2011

European Union has decided that all emergencies can be reported to authorities by European citizens by calling 112 or sending a text message to 112. Distributing warnings and alerts of authorities to citizens currently happens through national TV and radio channels, but telecom networks are also used now in some countries for this purpose. During the last ten years there have been attempts to develop new system architectures for various emergency service provision phases. Some of them are already deployed in special cases, like in ambulance services. Multimedia emergency alert messages can be delivered to citizens over fixed and mobile telecom networks and commercial systems are already in …

Civil Emergency MessageWireless networkComputer scienceService delivery frameworkbusiness.industryUsabilityComputer securitycomputer.software_genreService provisioningSystems architecturemedia_common.cataloged_instanceSocial mediaEuropean unionbusinesscomputermedia_common
researchProduct

Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies

2004

An E-commerce transaction is a means to conduct particular commercial activities using the global digital E-commerce infrastructure. We concentrate here on business to customer (B-to-C) E-commerce transactions. These transactions are based on protocols offered by the global infrastructure, primarily the Internet. Using electronic means to do business can greatly improve the efficiency of the business transactions. It, however, poses some problems that were rarely considered to be important before. One class of problems is caused by the behavior of untrusted participants. For reasons such as dishonesty, disputes may arise. In the general case, when a dispute arises an untrustworthy participa…

Class (computer programming)AtomicityDishonestyProcess (engineering)business.industryComputer sciencemedia_common.quotation_subjectEconomics Econometrics and Finance (miscellaneous)Context (language use)E-commerceComputer securitycomputer.software_genreHuman-Computer InteractionThe InternetbusinesscomputerDatabase transactionmedia_commonElectronic Commerce Research
researchProduct

Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing

2013

Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages a…

Class (computer programming)Emergency managementbusiness.industryEconomic shortageComputer securitycomputer.software_genreData scienceImportant researchCrowdsCrowd controlEmergency evacuationbusinessCrowd psychologyPsychologycomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection

2001

Network security, and intrusion detection in particular, represents an area of increased in security community over last several years. However, the majority of work in this area has been concentrated upon implementation of misuse detection systems for intrusion patterns monitoring among network traffic. In anomaly detection the classification was mainly based on statistical or sequential analysis of data often neglect ion temporal events' information as well as existing relations between them. In this paper we consider an anomaly detection problem as one of classification of user behavior in terms of incoming multiple discrete sequences. We present and approach that allows creating and mai…

Class (computer programming)User profileNetwork securitybusiness.industryAnomaly-based intrusion detection systemComputer scienceIntrusion detection systemcomputer.software_genreMisuse detectionData analysisAnomaly detectionData miningbusinesscomputer
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

Comparative analysis of architectures for monitoring cloud computing infrastructures

2015

The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…

Cloud computing securityComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingCloud computingcomputer.software_genreSet (abstract data type)Utility computingHardware and ArchitectureVirtual machineScalabilitybusinesscomputerSoftwareFuture Generation Computer Systems
researchProduct

Distributing Storage in Cloud Environments

2013

Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…

Cloud computing securityComputer sciencebusiness.industryCloud testingDistributed computingLocalityThe InternetCloud computingLoad balancing (computing)businessCloud storageOutsourcing2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum
researchProduct

Cloud Computing Adoption Factors and Processes for Enterprises - A Systematic Literature Review

2014

Cloud computing has received an increasing interest from enterprises since its inception. With its innovative Information Technology (IT) services delivery model, cloud computing could add technical and strategic business values to enterprises. However, it poses highly concerning, internal and external, issues. This paper presents a systematic literature review to explore cloud computing adoption processes in the context of enterprise users and the factors that affect these processes. This is achieved by reviewing 37 articles published about cloud computing adoption. Using the grounded theory approach, articles are classified into eight main categories: internal, external, evaluation, proof…

Cloud computing securityKnowledge managementbusiness.industryProof of conceptComputer scienceInformation systemInformation technologyCloud computingBusiness valuebusinessRisk managementGrounded theoryProceedings of the 4th International Conference on Cloud Computing and Services Science
researchProduct