Search results for "Security"

showing 10 items of 1693 documents

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

2018

In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.

Cybersecuritybusiness.industryComputer scienceKeystreamBoundary (topology)Stream cipher020206 networking & telecommunications02 engineering and technologyRC4Symmetric-key algorithmChacha200202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHardware_ARITHMETICANDLOGICSTRUCTURESbusinessSymmetric encryptionStream cipherAlgorithm
researchProduct

The Modern Strategies in the Cyber Warfare

2018

As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should addre…

CyberwarfareComputer scienceCognitive computingComputerApplications_COMPUTERSINOTHERSYSTEMSDeterrence theorySpace (commercial competition)Computer securitycomputer.software_genreBattlespaceCyberspacecomputerInformation warfareUse of force
researchProduct

Automatic Counting of Intra-Cellular Ribonucleo-Protein Aggregates in Saccharomyces cerevisiae Using a Textural Approach.

2019

AbstractIn the context of microbiology, recent studies show the importance of ribonucleo-protein aggregates (RNPs) for the understanding of mechanisms involved in cell responses to specific environmental conditions. The assembly and disassembly of aggregates is a dynamic process, the characterization of the stage of their evolution can be performed by the evaluation of their number. The aim of this study is to propose a method to automatically determine the count of RNPs. We show that the determination of a precise count is an issue by itself and hence, we propose three textural approaches: a classical point of view using Haralick features, a frequency point of view with generalized Fourier…

CytoplasmSaccharomyces cerevisiae ProteinsZernike polynomialsComputer scienceSaccharomyces cerevisiaeGreen Fluorescent Proteins0211 other engineering and technologiessub-cellular structuresContext (language use)02 engineering and technologySaccharomyces cerevisiaeProtein aggregationribonucleo-protein aggregatesCytoplasmic GranulesModels BiologicalPoly(A)-Binding Proteins03 medical and health sciencessymbols.namesakeProtein Aggregates[SDV.IDA]Life Sciences [q-bio]/Food engineeringGeneralized Fourier descriptorsInstrumentation030304 developmental biology021110 strategic defence & security studies0303 health sciencesFusionHaralickbiologyZernikeA proteinbiology.organism_classificationFourier transformMicroscopy FluorescenceRibonucleoproteinssymbolsBiological systemMicroscopy and microanalysis : the official journal of Microscopy Society of America, Microbeam Analysis Society, Microscopical Society of Canada
researchProduct

Observations on the Progress of Welfare-State Construction in Hungary, Poland, and the Czech Republic

2003

Three specialists in social services present an assessment of Hungary's performance during the economic transition from the perspective of social policy and the general welfare of the population. Using figures drawn from a variety of European sources, they offer a review of social expenditure, labor market tendencies, and the social security, health and education systems, comparing throughout with data from the Czech Republic, Poland and the European Union.

CzechEconomics and Econometricseducation.field_of_studySociology and Political Sciencemedia_common.quotation_subjectPopulationSocial WelfareWelfare statelanguage.human_languageSocial securityEconomyPolitical sciencePolitical Science and International Relationslanguagemedia_common.cataloged_instanceEuropean unioneducationWelfaremedia_commonSocial policyPost-Soviet Affairs
researchProduct

Entrepreneurship Training and Self-Employment among University Graduates

2012

In economies characterized by low labor demand and high rates of youth unemployment, entrepreneurship training has the potential to enable youth to gain skills and create their own jobs. This paper presents experimental evidence on a new entrepreneurship track that provides business training and personalized coaching to university students in Tunisia. Undergraduates in the final year of licence appliquee were given the opportunity to graduate with a business plan instead of following the standard curriculum. This paper relies on randomized assignment of the entrepreneurship track to identify impacts on labor market outcomes one year after graduation. The analysis finds that the entrepreneur…

DISADVANTAGED YOUTHEMPLOYMENT PROGRAMSUNIVERSITY STUDENTSFINANCIAL ANALYSISEXAMSENTREPRENEURSHIP SUPPORTPRIVATE SECTOR JOBSCLASSROOMEMPLOYMENT OPPORTUNITIESEMPLOYMENTACTIVE LABOR MARKETHIGH UNEMPLOYMENTPERSONALITYPRESENT EVIDENCEINFORMATION ABOUT CREDITENTREPRENEURIAL ACTIVITIES[ SHS.EDU ] Humanities and Social Sciences/EducationWORKERSENROLLMENT RATESBUSINESS OWNERSWAGE SUBSIDYEMPLOYMENT OUTCOMESGRADUATION RATEOCCUPATIONSMENTAL HEALTHPUBLIC SECTOR JOBSLABOR MARKET OUTCOMESYOUTH TRAININGCOLLEGE GRADUATEINTERVENTIONSEARNINGSREADINGSKILLED WORKERSBUSINESS TRAININGSALARIED EMPLOYMENT[SHS.EDU]Humanities and Social Sciences/EducationCOMPETENCIESLOCAL EMPLOYMENT OFFICEVENTURE CAPITAL FIRMWORKERUNEMPLOYEDUNIVERSITY PROFESSORSPLAYINGHIGHER EDUCATIONJOB SEARCHLITERACYRECOGNITIONENTREPRENEURSHIP TRAININGSTHINKINGBUSINESS SURVIVALSURVIVAL RATESYOUTH UNEMPLOYMENTEMPLOYABILITYLABOR DEMANDUNEMPLOYMENT SPELLSATTRITIONMINIMUM WAGESKILLS DEVELOPMENTPROFITABILITYFINANCIAL LITERACYPRODUCTIVITY GROWTHENTREPRENEURSPREVIOUS SECTIONGROSS ENROLLMENTSPORTSUNIVERSITY DEGREEEMPLOYMENT STATUSLABOUREXCLUSIONYOUTH UNEMPLOYMENT RATESTART-UPHUMAN DEVELOPMENTNEW BUSINESSESYOUTH EMPLOYMENTPOST-SECONDARY EDUCATIONACADEMIC YEARACCESS TO INFORMATIONUNEMPLOYMENT RATEEMPLOYMENT RATEMINISTRIES OF EDUCATIONBUSINESS PLANLABOR ECONOMICSTELECOMMUNICATIONSJOB SATISFACTIONWAGE SUBSIDY PROGRAMSSOCIAL NETWORKYOUNG WORKERSGROSS ENROLLMENT RATESLOANProgram evaluationPRIVATE SECTOR WAGEMICROFINANCEWAGE SUBSIDIESDEVELOPMENT BANKINDIVIDUAL ENTREPRENEURSHIPComputingMilieux_THECOMPUTINGPROFESSIONGRADUATION REQUIREMENTSPRIVATE SECTOR JOBPUBLIC EMPLOYMENTATTENTIONSALARIED WORKERSKILLS TRAININGSTART-UP CAPITALLEADERSHIPGENDERADMINISTRATIVE RECORDSON-THE-JOB TRAININGFEMALE ENTERPRISEENTREPRENEURSHIP DEVELOPMENTLOCAL EMPLOYMENT OFFICESLABOR FORCE SURVEYPRELIMINARY EVIDENCEEMPLOYERSGRADUATES WITH SKILLSENTREPRENEURFAMILIESTRAINING PROGRAMSEMPLOYMENT OFFICEYOUTH UNEMPLOYMENT RATESCLASSROOM TRAININGJOB OPPORTUNITIESFIRM SIZEUNDERGRADUATESJOBSCURRICULUMUNIVERSITY GRADUATESEMPLOYMENT PROGRAMPUBLIC SECTOR JOBTRAINING PROGRAMMINISTRY OF EDUCATIONTRAINING COURSEUNEMPLOYED YOUTHTRAINING COMPONENTCOMMUNITY COLLEGEENTREPRENEURIAL ACTIVITYEMPLOYMENT IMPACTSSelf-employmentPREVIOUS STUDIESSELF-EMPLOYMENTLACK OF ACCESSLABOR MARKETELIGIBLE STUDENTSSOCIAL COHESIONVOCATIONAL TRAINING PROGRAMSCONTROL GROUPSTECHNICAL KNOWLEDGETERTIARY EDUCATIONGROWTH OPPORTUNITIESSOCIAL SECURITYLITERATURELABOR MARKET EXPERIENCETRAINING PARTICIPANTSECONOMIC CHARACTERISTICSPERSONALITY TRAITSEntrepreneurship trainingDEVELOPMENT CENTERCREDIT CONSTRAINTSEMPLOYMENT POLICIESBUSINESS PLANSOPEN ACCESSTRAINING CONTENTMICRO ENTERPRISESPAPERSWAGE EMPLOYMENTACTIVE LABOR MARKET PROGRAMSJOB OFFERSUBSTITUTION EFFECTPRIVATE SECTORCREDIT ACCESSBehavioral skill[SHS.EDU] Humanities and Social Sciences/EducationHOUSEHOLD INCOMEMICROFINANCE INSTITUTIONSYOUTH TRAINING PROGRAMTEACHINGLEARNINGACCESS TO CREDITPSYCHOLOGYACHIEVEMENTINTERNATIONAL BANKVENTURE CAPITALACCESS TO JOBSUNIVERSITIESPROGRAM BENEFICIARIESSoft skillMOTIVATIONRECALLCREDIT APPLICATIONSLABOR FORCEFINANCIAL SUPPORTBUSINESS NETWORKSMICRO FINANCEVOCATIONAL TRAININGENTREPRENEURIAL SKILLSYouth employmentENTREPRENEURSHIP TRAININGLACK OF INFORMATIONACTIVE LABOR
researchProduct

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

2017

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…

DNS tunneling detectionSIMPLE (military communications protocol)business.industryComputer scienceDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreDomain (software engineering)protokollat0202 electrical engineering electronic engineering information engineeringAPT020201 artificial intelligence & image processingThe Internetcovert channels detectiontietoturvabusinesscomputerProtocol (object-oriented programming)
researchProduct

Surveillance and privacy as emerging issues in communication and media studies. An introduction

2019

Balleys C., Coll S. (2017). Being publicly intimate: Teenagers managing online privacy. Media, Culture & Society, Vol. 39(6), pp. 885–901.<br /><br />Bond R. M., Fariss C. J., Jones J. J., Kramer A. D. I., Marlow C., Settle J. E., Fowler J. H. (2012). A 61-million-person experiment in social influence and political mobilization, Nature, Vol. 489, pp. 295–298.<br /><br />Dencik L., Jansen F., Metcalfe, P. (2018). A conceptual framework for approaching social justice in an age of datafication, DATAJUSTICE project, https://datajusticeproject.net/2018/08/30/aconceptual-framework-for-approaching-social-justice-in-an-age-of-datafication/, 01.02.2019.<br />&lt…

Data collectionAction (philosophy)DataficationControl (management)Mediated communicationMedia studiesSocial mediaBusinessInformation securityField (computer science)Mediatization Studies
researchProduct

The think aloud method in studying the translation process

2019

This paper presents a theoretical description of the process-oriented research method in translation studies known as the think aloud method and a case study of an experimental application of think-aloud protocols (TAP). The article begins with a brief description of the relevance of its topic, taking into account the state of current researches in the field of translation studies. A literature review of recent publications where the think aloud method and think-aloud protocols as the principal introspective and retrospective method in different translation studies is given. The shortcomings and advantages of applying the think aloud method are discussed and the ways to optimise the use of …

Data collectionProcess (engineering)media_common.quotation_subjectlcsh:PG1-9665Principal (computer security)Lautes DenkenField (computer science)verbale Daten.lcsh:Slavic languages. Baltic languages. Albanian languagesMathematics educationTranslation studiesIntrospectionRelevance (information retrieval)prozessorientierte ForschungsmethodenProtokolle des Lauten DenkensThink aloud protocolPsychologyTAPmedia_commonІноземні мови
researchProduct

Differences in Life Expectancy Between Self-Employed Workers and Paid Employees when Retirement Pensioners: Evidence from Spanish Social Security Rec…

2021

The aim of this paper is to examine differences in life expectancy (LE) between self-employed (SE) and paid employee (PE) workers when they become retirement pensioners, looking at levels of pension income using administrative data from Spanish social security records. We draw on the Continuous Sample of Working Lives (CSWL) to quantify changes in total life expectancy at age 65 (LE(65)) among retired men over the longest possible period covered by this data source: 2005–2018. These changes are broken down by pension regime and initial pension income level for three periods. The literature presents mixed evidence, even for the same country–for Japan and Italy, for example–with some studies …

Data sourcePensionSample (statistics)01 natural sciencesArticleSocial security010104 statistics & probability03 medical and health sciences0302 clinical medicineEconomía públicaEconomicsSelf employedLife expectancyIncome levelDemographic economics030212 general & internal medicineEconometría0101 mathematicsSocioeconomic statusDemographyPublic financeEuropean Journal of Population
researchProduct

Toward fast and accurate emergency cases detection in BSNs

2020

International audience; In body sensor networks (BSNs), medical sensors capture physiological data from the human body and send them to the coordinator who act as a gateway to health care. The main aim of BSNs is to save peoples' lives. Therefore, fast and correct detection of emergencies while maintaining low-energy consumption of sensors is essential requirement of BSNs. In this study, the authors propose a new adaptive data sampling approach, where the sampling ratio is adapted based on the sensed data variation. The idea is to use the modified version of the cumulative sum (CUSUM) algorithm (modified CUSUM) that they previously proposed for wireless sensor networks to monitor the data v…

Data variabilityProperty (programming)Computer science010401 analytical chemistryReal-time computing020206 networking & telecommunicationsCUSUM02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationIndustrial and Manufacturing Engineering0104 chemical sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Data samplingSampling (signal processing)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Default gateway0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor network
researchProduct