Search results for "Security"
showing 10 items of 1693 documents
‘Mind the Gap: IR and the challenge of international politics'
2015
The discipline of International Relations (IR) for a long time of its history has developed in the form of Great Debates that involved competing paradigms and schools. More recently, it has been described as a cacophony of voices unable to communicate among themselves, but also incapable to provide keys to understand an ever more complex reality. This collection aims at evaluating the heuristic value of a selection of traditional paradigms (realism and liberalism), schools (constructivism), and subdisciplines (security studies and international political economy) so as to assess the challenges before IR theory today and the ability of the discipline to provide tools to make the changed worl…
Autonomous management of Quality of Service and security in an Internet of Things environment
2019
Nowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even imposs…
Mapping Elderly Citizen’s Computer and ICT Use in a Small-sized Norwegian Municipality
2015
In Norway, many citizensâ services are exclusively or at least delivered online. They usually require sufficient knowledge to use information and communication technologies (ICT). As part of an Interreg IV European project focused on e-inclusion for elderly, this work presents a study to map computer and Internet use among the elderly. The study was carried out in a small municipality of 10 000 inhabitants in Southern Norway, of whom15% were 65-year-olds or older. 178 replies out of 500 were obtained. Results showed that 9 out of 10 had access to and frequently used a computer at home. However, there still was 1 out of 5 who did not make effective use of ICT. Importantly, half of the resp…
Bezpieczeństwo młodzieży gimnazjalnej województwa opolskiego w cyberprzestrzeni
2017
Przedmiotem niniejszego artykułu jest bezpieczeństwo młodzieży gimnazjalnej w Internecie, w województwie opolskim. W kwietniu 2016 r. przeprowadzono anonimowe badanie nad poczuciem bezpieczeństwa w sieci uczniów wybranych szkół gimnazjalnych, w klasach od I do III. Na ankiety odpowiedziało 799 uczniów, w tym 393 kobiet i 406 mężczyzn. Z badań wynika, że wszyscy badani korzystają z Internetu, większość z nich codziennie. Poczucie bezpieczeństwa wśród badanych jest wysokie. Większość uczniów korzysta z Internetu zarówno dla rozrywki i aby przygotować się do zajęć w szkole. Warto zauważyć, że młodzież w wieku gimnazjalnym bardzo dużo czasu poświęca na rozrywkę w Internecie. Większość ankietowa…
Struggles for recognition: a content analysis of messages posted on the Internet
2012
Anders Johan W Andersen,1,2 Tommy Svensson31Department of Psychosocial Health, University of Agder, Norway; 2Nordic School of Public Health, Gothenburg, Sweden; 3Department of Behavioral Sciences and Learning, Linköping University, Linköping, SwedenBackground: The Internet has enlarged the possibilities of human communication and opened new ways of exploring perceptions of mental health. This study is part of a research project aiming to explore, describe, and analyze different discourses of mental health in Norway and Sweden, using material from Internet-based services.Aim: To examine messages posed by users of publicly available question-and-answer services and to descri…
YIHADISMO, DESRADICALIZACIÓN, ADOCTRINAMIENTO Y DEFENSA SOCIAL
2021
En el presente trabajo se analiza el programa español de intervención en radicalización violenta con internos islamistas en centros penitenciarios desde el punto de vista de la resocialización y poniendo el foco en el respeto por los derechos y libertades fundamentales, pero también, y precisamente por ello, se cuestiona la imbricación de la Instrucción 2/2016, de 25 de octubre, dentro de las políticas securitarias dirigidas a la incapacitación, y particularmente el hecho de que los destinatarios del programa sean incluidos, todos ellos, en los FIES (Ficheros de Internos de Especial Seguimiento).
Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network
2016
International audience; In this paper, we propose an efficient and lightweight attack detection mechanism for a smart grid Neighborhood Area Network (NAN) that combine between distributed and centralized intrusion detection. A NAN includes the customers' appliances, smart meters and collectors. The smart meters measure the power consumption of each appliance and the collectors aggregate the measures and forward them to the control center for analysis. Intrusion Detection System (IDS) agents, proposed in our framework, run in a distributed fashion at smart meters level and in a centralized fashion at collector and control center nodes. A combination between a rule-based detection and a learn…
A Trusted Hybrid Learning Approach to Secure Edge Computing
2021
Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…
Development of a Low-Cost IoT System for Lightning Strike Detection and Location
2019
Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…
Semantic Description of IoT Security for Smart Grid
2017
Master's thesis Information- and communication technology IKT590 - University of Agder 2017 This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and counter measures for the main components of SHEMS such as Smart Meter, Smart Appliance, Home Gateway, and Billing data. The ontology extends the SAREF energy management ontology with security features. We have two main reasons for selecting SAREF ontology to base our work on. First, SAREF is standardized by ETSI. Second, it is specifically designed for energy management and efficiency. …