Search results for "Security"

showing 10 items of 1693 documents

Development of a Taekwondo Combat Model Based on Markov Analysis

2019

The purpose of the present study was to examine male and female Olympic taekwondo competitors' movement patterns according to their tactical actions by applying a Markov processes analysis. To perform this study, 11,474 actions by male competitors and 12,980 actions by female competitors were compiled and analyzed. The results yielded 32 significant sequences among male competitors and 30 among female competitors. Male competitors demonstrated 11 sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive action. Female competitors demonstrated nine sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive move.…

Frequency of occurrenceVDP::Medisinske Fag: 700::Idrettsmedisinske fag: 850::Treningslære: 851combat sportslcsh:BF1-990Markov processComputer securitycomputer.software_genre050105 experimental psychologyCompetition (economics)03 medical and health sciencessymbols.namesake0302 clinical medicinePsychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal ResearchMartial artsMarkov chainprobabilistic models05 social sciencesCompetitor analysisCounterattacklcsh:Psychologymartial artsstatisticssymbolstactical patternsPsychologyRelevant informationcomputer030217 neurology & neurosurgery
researchProduct

La Seguridad ciudadana como función del Estado

2014

Este trabajo se centra en uno de los temas medulares de la organización del Estado como es la garantía de la seguridad, y tiene como objeto reivindicar, al calor la reciente sacudida legislativa en materia, la función de la Seguridad ciudadana como una función pública a desarrollar por las Fuerzas y Cuerpos de Seguridad; en tanto que exigencia constitucional, presupuesto de la salvaguarda de los derechos fundamentales y de las libertades públicas. Publicación en línea: 23 diciembre 2014

Fuerzas Cuerpos de Seguridadfunción del EstadoWelfare economicsmedia_common.quotation_subjectK520-5582Fundamental rightsLegislatureComparative law. International uniform lawK1-7720SafeguardingPublic administrationSecurity forcesGeographyLaw in general. Comparative and uniform law. JurisprudenceState (polity)derechos fundamentalesPublic serviceDrets humansElement (criminal law)seguridad ciudadanamedia_common
researchProduct

Protection Motivation Theory in Information Systems Security Research

2021

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…

Future studiesKnowledge managementthreat messageliterature reviewkäyttäjätComputer Networks and CommunicationsuhatInformation systems securityasenteet02 engineering and technologyProtection Motivation TheoryManagement Information Systemssuojelumotivaaatioteoria020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringIs securityInformation systemRoad maptietoturvasuojelutietojärjestelmätbehavioral IS securitybusiness.industry05 social sciencesInformation securityIS security threatFear appealProtection motivation theoryfear appeal050211 marketingbusinessACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

2016

Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network tr…

Fuzzy clusteringbusiness.industryNetwork securityComputer scienceNetwork packet05 social sciencesDenial-of-service attack02 engineering and technologyIntrusion detection systemEncryption0502 economics and business0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionActivity-based costingbusiness050203 business & managementComputer network
researchProduct

Assessing the carbon footprint across the supply chain: Cow milk vs soy drink

2022

Abstract Since livestock product consumption could have a significant effect on tackling climate change, in the few last years, there has been an increasing consumer demand for non-dairy alternatives. Despite plant-based beverages being considered crucial to foster the transition towards sustainable diet models, no studies have yet compared the level of emissions of plant-based beverages with animal-based ones. The present study aims at computing the carbon footprint of cow milk and that of soy drink and evaluating the carbon footprint results in the light of the substitutability of cow's milk with soy drink, analyzing the potential environmental, economic and nutritional trade-offs between…

GHG emissionEnvironmental EngineeringClimate ChangeSupply chainDiet transitionAnimal-based beverageLife cycle approach.BeveragesCow milkAgricultural scienceSettore ING-IND/17 - Impianti Industriali MeccaniciAnimalsEnvironmental ChemistryProduction (economics)Life cycle approach GHG emissions Animal-based beverage Alternative plant-based beverage Diet transitionWaste Management and DisposalCarbon FootprintConsumption (economics)Food securitybusiness.industryfood and beveragesAlternative plant-based beverage Animal-based beverage Diet transition GHG emissions Life cycle approachPollutionDietMilkGreenhouse gasCarbon footprintCattleFemaleLivestockAlternative plant-based beverageBusiness
researchProduct

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

GPRS Security for Smart Meters

2013

Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.

GPRSComputer science[SHS.INFO]Humanities and Social Sciences/Library and information sciences02 engineering and technology[INFO] Computer Science [cs]Encryption[SHS.INFO] Humanities and Social Sciences/Library and information sciencesGPRS core networkAMI0202 electrical engineering electronic engineering information engineeringWirelessMetering mode[INFO]Computer Science [cs]General Packet Radio ServiceSmartgridMobile network operatorAuthenticationbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunicationsSmart gridSecuritybusinessSmart MeteringComputer network
researchProduct

Secure and scalable dataprocessing and communications for an Animal Tracking System

2003

Masteroppgave i informasjons- og kommunikasjonsteknologi 2003 - Høgskolen i Agder, Grimstad Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations with a lot of money has now become household products. This enables many interesting ideas and projects, Kitron Development’s radiocollar project being one of them. Kitron Development is involved in a project to track the position of animals by substituting the traditional bell collar with a collar that contains a GPS receiver. The collar transmits its position to a base station using…

GPRSSQLIKT590ServletsSecurityScalabilityVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Databaser og multimediasystemer: 428GSMDBMSJavaPythonVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Systemutvikling og -arbeid: 426
researchProduct

2019

Abstract This study presents evidence on the effect of parenthood on labor market outcomes in Finland. We use population-based data drawn from administrative registers and an event study design centered around the birth of the first child using the specification proposed in Kleven et al. (2019b) . The study confirms that women encounter large short- and long-term child penalties in gross labor earnings and that penalties are associated with employment participation. Taxes and social security transfers considerably reduce the child penalty, which also varies by the number of children.

Gender inequalityEconomics and Econometricseducation.field_of_studyEarnings05 social sciencesPopulationEvent studyPopulation basedSocial security0502 economics and businessEconomicsDemographic economics050207 economicseducationFinance050205 econometrics Economics Letters
researchProduct

A critical review on the implementation of static data sampling techniques to detect network attacks

2021

International audience; Given that the Internet traffic speed and volume are growing at a rapid pace, monitoring the network in a real-time manner has introduced several issues in terms of computing and storage capabilities. Fast processing of traffic data and early warnings on the detected attacks are required while maintaining a single pass over the traffic measurements. To palliate these problems, one can reduce the amount of traffic to be processed by using a sampling technique and detect the attacks based on the sampled traffic. Different parameters have an impact on the efficiency of this process, mainly, the applied sampling policy and sampling ratio. In this paper, we investigate th…

General Computer ScienceComputer science020209 energyReal-time computingintrusion detection system (IDS)data streamsContext (language use)02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Data sampling[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]statistical analysisSampling process0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceStatic dataGeneral EngineeringVolume (computing)Process (computing)Sampling (statistics)Internet traffic[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTK1-9971[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical engineering. Electronics. Nuclear engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct