Search results for "YB"
showing 10 items of 4411 documents
Violencia en la red en población adolescente: Cyberbullyingy y Ciberviolencia de Pareja desde el perfil del agresor
2020
Antecedentes: Adolescentes y tecnologías ya son un binomio en nuestro entorno actual. El uso y, cada vez más casos de abuso, de las Tecnologías de la Información y la Comunicación son muy habituales en este periodo de desarrollo vital. Las nuevas tecnologías están provocando cambios profundos en la forma de relacionarse con los demás y, concretamente, la red provoca una especial atracción sobre los adolescentes al facilitar las necesidades de información, socialización y ocio características de esta etapa evolutiva. El acceso a internet y la disponibilidad de medio electrónicos, entre otros, ha posibilitado el auge de dos fenómenos de afectación mundial considerados ya como un problema de s…
Colonization of adrenal glands and ovaries of mice by variants of HSV 1 and 2
1991
The herpes simplex virus (HSV)-infected mouse model was used to correlate histopathological lesions in adrenal glands and ovaries with the localisation of viral nucleic acids and viral antigens, employing in situ hybridization and immunohistochemistry. In the adrenals, the lesions were mainly restricted to the zona fasciculata and the zona reticularis, sometimes extending to the medulla. In the ovaries, lesions were detected in follicles and in the stroma. During the course of infection, HSV nucleic acids could be detected earlier than HSV proteins. Next to the center of necrotic foci mainly HSV proteins were detected, whereas peripheral cells were found to contain viral nucleic acids. In s…
How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control
2022
Industry 4.0 and the ongoing digital transformation along with a large number interconnected machines anddevices increase the role of cybersecurity, cyber incident handling and incident response in the factories of the future (FoF). Cyber incident information sharing plays a major role when we need to formulate situational pictures about FoF operations and environment, and respond to cybersecurity threats related to e.g. the implementation of novel technologies. Sharing of incident information has a major drawback since it may reveal too much about the attack target, e.g. in the case of legacy systems and therefore restrictions may apply. We have developed a proof-of-concept service that co…
Cost Efficiency of Hybrid Cloud Storage : Shortening Acquisition Cycle to Mitigate Volume Variation
2015
Hybrid cloud storage infrastructure, which combines cost-effective but inflexible private resources and flexible but premium-priced public cloud storage, allows organizations to operate cost-efficiently under demand volume uncertainty. The extant literature, however, offers a limited analytical insight into the effect that the variation of demand has on the cost-efficient mix of internal and external resources. This paper considers the storage capacity acquisition cycle, i.e. the interval at which the organization re-assesses and acquires additional resources, as a parameter shaping the optimal mix of resources. It introduces a model capturing the compound effect of the acquisition cycle an…
"Are you busy tomorrow" : a cross-cultural study about communication, group forming, leisure, voluntarism and commitment among members of volleyball …
1998
Wybory niekonkurencyjne w Polsce na poziomie lokalnym – wstępne oceny
2020
Artykuł podejmuje problem obsadzania mandatów bez głosowania w wyborach do rad gmin w gminach liczących do 20 tys. mieszkańców. W stosunku do wyborów z 2014 r. liczba takich przypadków wzrosła w 2018 r. o 77%. Wydaje się, że obowiązujące prawo wyborcze, w szczególności art. 418 § 1 (podział gmin na jednomandatowe okręgi wyborcze), art. 434 § 1 i 2 (zasady organizacji wyborów w przypadku zgłoszenia liczby kandydatów równej liczbie mandatów do obsadzenia) i art. 478 § 2 (tryb zgłaszania kandydatów na wójta lub burmistrza) Kodeksu wyborczego, w połączeniu z uwarunkowaniami lokalnej rywalizacji wyborczej, może sprzyjać powstawaniu zjawiska niekonkurencyjnych wyborów, które skutkują m.in. spadki…
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures
2022
Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…
E-health systems in digital environments
2019
As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security
2018
Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…