Search results for "Security"
showing 10 items of 1693 documents
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels
2018
In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.
The Modern Strategies in the Cyber Warfare
2018
As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should addre…
Automatic Counting of Intra-Cellular Ribonucleo-Protein Aggregates in Saccharomyces cerevisiae Using a Textural Approach.
2019
AbstractIn the context of microbiology, recent studies show the importance of ribonucleo-protein aggregates (RNPs) for the understanding of mechanisms involved in cell responses to specific environmental conditions. The assembly and disassembly of aggregates is a dynamic process, the characterization of the stage of their evolution can be performed by the evaluation of their number. The aim of this study is to propose a method to automatically determine the count of RNPs. We show that the determination of a precise count is an issue by itself and hence, we propose three textural approaches: a classical point of view using Haralick features, a frequency point of view with generalized Fourier…
Observations on the Progress of Welfare-State Construction in Hungary, Poland, and the Czech Republic
2003
Three specialists in social services present an assessment of Hungary's performance during the economic transition from the perspective of social policy and the general welfare of the population. Using figures drawn from a variety of European sources, they offer a review of social expenditure, labor market tendencies, and the social security, health and education systems, comparing throughout with data from the Czech Republic, Poland and the European Union.
Entrepreneurship Training and Self-Employment among University Graduates
2012
In economies characterized by low labor demand and high rates of youth unemployment, entrepreneurship training has the potential to enable youth to gain skills and create their own jobs. This paper presents experimental evidence on a new entrepreneurship track that provides business training and personalized coaching to university students in Tunisia. Undergraduates in the final year of licence appliquee were given the opportunity to graduate with a business plan instead of following the standard curriculum. This paper relies on randomized assignment of the entrepreneurship track to identify impacts on labor market outcomes one year after graduation. The analysis finds that the entrepreneur…
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…
Surveillance and privacy as emerging issues in communication and media studies. An introduction
2019
Balleys C., Coll S. (2017). Being publicly intimate: Teenagers managing online privacy. Media, Culture &amp; Society, Vol. 39(6), pp. 885–901.<br /><br />Bond R. M., Fariss C. J., Jones J. J., Kramer A. D. I., Marlow C., Settle J. E., Fowler J. H. (2012). A 61-million-person experiment in social influence and political mobilization, Nature, Vol. 489, pp. 295–298.<br /><br />Dencik L., Jansen F., Metcalfe, P. (2018). A conceptual framework for approaching social justice in an age of datafication, DATAJUSTICE project, https://datajusticeproject.net/2018/08/30/aconceptual-framework-for-approaching-social-justice-in-an-age-of-datafication/, 01.02.2019.<br /><…
The think aloud method in studying the translation process
2019
This paper presents a theoretical description of the process-oriented research method in translation studies known as the think aloud method and a case study of an experimental application of think-aloud protocols (TAP). The article begins with a brief description of the relevance of its topic, taking into account the state of current researches in the field of translation studies. A literature review of recent publications where the think aloud method and think-aloud protocols as the principal introspective and retrospective method in different translation studies is given. The shortcomings and advantages of applying the think aloud method are discussed and the ways to optimise the use of …
Differences in Life Expectancy Between Self-Employed Workers and Paid Employees when Retirement Pensioners: Evidence from Spanish Social Security Rec…
2021
The aim of this paper is to examine differences in life expectancy (LE) between self-employed (SE) and paid employee (PE) workers when they become retirement pensioners, looking at levels of pension income using administrative data from Spanish social security records. We draw on the Continuous Sample of Working Lives (CSWL) to quantify changes in total life expectancy at age 65 (LE(65)) among retired men over the longest possible period covered by this data source: 2005–2018. These changes are broken down by pension regime and initial pension income level for three periods. The literature presents mixed evidence, even for the same country–for Japan and Italy, for example–with some studies …
Toward fast and accurate emergency cases detection in BSNs
2020
International audience; In body sensor networks (BSNs), medical sensors capture physiological data from the human body and send them to the coordinator who act as a gateway to health care. The main aim of BSNs is to save peoples' lives. Therefore, fast and correct detection of emergencies while maintaining low-energy consumption of sensors is essential requirement of BSNs. In this study, the authors propose a new adaptive data sampling approach, where the sampling ratio is adapted based on the sensed data variation. The idea is to use the modified version of the cumulative sum (CUSUM) algorithm (modified CUSUM) that they previously proposed for wireless sensor networks to monitor the data v…