Search results for "Security"
showing 10 items of 1693 documents
Development of a Taekwondo Combat Model Based on Markov Analysis
2019
The purpose of the present study was to examine male and female Olympic taekwondo competitors' movement patterns according to their tactical actions by applying a Markov processes analysis. To perform this study, 11,474 actions by male competitors and 12,980 actions by female competitors were compiled and analyzed. The results yielded 32 significant sequences among male competitors and 30 among female competitors. Male competitors demonstrated 11 sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive action. Female competitors demonstrated nine sequences initiated by an attack, 11 initiated by a counterattack, and 10 initiated by a defensive move.…
La Seguridad ciudadana como función del Estado
2014
Este trabajo se centra en uno de los temas medulares de la organización del Estado como es la garantía de la seguridad, y tiene como objeto reivindicar, al calor la reciente sacudida legislativa en materia, la función de la Seguridad ciudadana como una función pública a desarrollar por las Fuerzas y Cuerpos de Seguridad; en tanto que exigencia constitucional, presupuesto de la salvaguarda de los derechos fundamentales y de las libertades públicas. Publicación en línea: 23 diciembre 2014
Protection Motivation Theory in Information Systems Security Research
2021
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic
2016
Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network tr…
Assessing the carbon footprint across the supply chain: Cow milk vs soy drink
2022
Abstract Since livestock product consumption could have a significant effect on tackling climate change, in the few last years, there has been an increasing consumer demand for non-dairy alternatives. Despite plant-based beverages being considered crucial to foster the transition towards sustainable diet models, no studies have yet compared the level of emissions of plant-based beverages with animal-based ones. The present study aims at computing the carbon footprint of cow milk and that of soy drink and evaluating the carbon footprint results in the light of the substitutability of cow's milk with soy drink, analyzing the potential environmental, economic and nutritional trade-offs between…
A “Best Current Practice” for 3GPP-based cellular system security
2014
This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…
GPRS Security for Smart Meters
2013
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.
Secure and scalable dataprocessing and communications for an Animal Tracking System
2003
Masteroppgave i informasjons- og kommunikasjonsteknologi 2003 - Høgskolen i Agder, Grimstad Modern technology is constantly being employed in new fields, by new industries and people. The cost of advanced technological equipment decreases continously, and equipment that was reserved for people and corporations with a lot of money has now become household products. This enables many interesting ideas and projects, Kitron Development’s radiocollar project being one of them. Kitron Development is involved in a project to track the position of animals by substituting the traditional bell collar with a collar that contains a GPS receiver. The collar transmits its position to a base station using…
2019
Abstract This study presents evidence on the effect of parenthood on labor market outcomes in Finland. We use population-based data drawn from administrative registers and an event study design centered around the birth of the first child using the specification proposed in Kleven et al. (2019b) . The study confirms that women encounter large short- and long-term child penalties in gross labor earnings and that penalties are associated with employment participation. Taxes and social security transfers considerably reduce the child penalty, which also varies by the number of children.
A critical review on the implementation of static data sampling techniques to detect network attacks
2021
International audience; Given that the Internet traffic speed and volume are growing at a rapid pace, monitoring the network in a real-time manner has introduced several issues in terms of computing and storage capabilities. Fast processing of traffic data and early warnings on the detected attacks are required while maintaining a single pass over the traffic measurements. To palliate these problems, one can reduce the amount of traffic to be processed by using a sampling technique and detect the attacks based on the sampled traffic. Different parameters have an impact on the efficiency of this process, mainly, the applied sampling policy and sampling ratio. In this paper, we investigate th…