Search results for "YB"

showing 10 items of 4411 documents

Violencia en la red en población adolescente: Cyberbullyingy y Ciberviolencia de Pareja desde el perfil del agresor

2020

Antecedentes: Adolescentes y tecnologías ya son un binomio en nuestro entorno actual. El uso y, cada vez más casos de abuso, de las Tecnologías de la Información y la Comunicación son muy habituales en este periodo de desarrollo vital. Las nuevas tecnologías están provocando cambios profundos en la forma de relacionarse con los demás y, concretamente, la red provoca una especial atracción sobre los adolescentes al facilitar las necesidades de información, socialización y ocio características de esta etapa evolutiva. El acceso a internet y la disponibilidad de medio electrónicos, entre otros, ha posibilitado el auge de dos fenómenos de afectación mundial considerados ya como un problema de s…

violencia adolescenteciber violencia de parejaviolencia y tic:PSICOLOGÍA [UNESCO]UNESCO::PSICOLOGÍACiberagresorcyberbullying
researchProduct

Colonization of adrenal glands and ovaries of mice by variants of HSV 1 and 2

1991

The herpes simplex virus (HSV)-infected mouse model was used to correlate histopathological lesions in adrenal glands and ovaries with the localisation of viral nucleic acids and viral antigens, employing in situ hybridization and immunohistochemistry. In the adrenals, the lesions were mainly restricted to the zona fasciculata and the zona reticularis, sometimes extending to the medulla. In the ovaries, lesions were detected in follicles and in the stroma. During the course of infection, HSV nucleic acids could be detected earlier than HSV proteins. Next to the center of necrotic foci mainly HSV proteins were detected, whereas peripheral cells were found to contain viral nucleic acids. In s…

virusesOvaryIn situ hybridizationBiologymedicine.disease_causeVirusMiceZona fasciculataVirologyAdrenal GlandsmedicineAnimalsAntigens ViralOvaryNucleic Acid HybridizationHerpes SimplexGeneral MedicineImmunohistochemistryVirologymedicine.anatomical_structureHerpes simplex virusDNA ViralNucleic acidImmunohistochemistryFemaleDNA ProbesZona reticularisArchives of Virology
researchProduct

How to Enhance the Sharing of Cyber Incident Information via Fine-Grained Access Control

2022

Industry 4.0 and the ongoing digital transformation along with a large number interconnected machines anddevices increase the role of cybersecurity, cyber incident handling and incident response in the factories of the future (FoF). Cyber incident information sharing plays a major role when we need to formulate situational pictures about FoF operations and environment, and respond to cybersecurity threats related to e.g. the implementation of novel technologies. Sharing of incident information has a major drawback since it may reveal too much about the attack target, e.g. in the case of legacy systems and therefore restrictions may apply. We have developed a proof-of-concept service that co…

visualisationcybersecurityinformation sharingincident management
researchProduct

Cost Efficiency of Hybrid Cloud Storage : Shortening Acquisition Cycle to Mitigate Volume Variation

2015

Hybrid cloud storage infrastructure, which combines cost-effective but inflexible private resources and flexible but premium-priced public cloud storage, allows organizations to operate cost-efficiently under demand volume uncertainty. The extant literature, however, offers a limited analytical insight into the effect that the variation of demand has on the cost-efficient mix of internal and external resources. This paper considers the storage capacity acquisition cycle, i.e. the interval at which the organization re-assesses and acquires additional resources, as a parameter shaping the optimal mix of resources. It introduces a model capturing the compound effect of the acquisition cycle an…

volume variationhybrid cloud storagereassessment intervalconcurrent sourcing
researchProduct

"Are you busy tomorrow" : a cross-cultural study about communication, group forming, leisure, voluntarism and commitment among members of volleyball …

1998

voluntary organizationJyväskyläcommunicationMetsoleisurecommitmentvolleyball cluburheiluseuratlentopalloculture
researchProduct

Wybory niekonkurencyjne w Polsce na poziomie lokalnym – wstępne oceny

2020

Artykuł podejmuje problem obsadzania mandatów bez głosowania w wyborach do rad gmin w gminach liczących do 20 tys. mieszkańców. W stosunku do wyborów z 2014 r. liczba takich przypadków wzrosła w 2018 r. o 77%. Wydaje się, że obowiązujące prawo wyborcze, w szczególności art. 418 § 1 (podział gmin na jednomandatowe okręgi wyborcze), art. 434 § 1 i 2 (zasady organizacji wyborów w przypadku zgłoszenia liczby kandydatów równej liczbie mandatów do obsadzenia) i art. 478 § 2 (tryb zgłaszania kandydatów na wójta lub burmistrza) Kodeksu wyborczego, w połączeniu z uwarunkowaniami lokalnej rywalizacji wyborczej, może sprzyjać powstawaniu zjawiska niekonkurencyjnych wyborów, które skutkują m.in. spadki…

voting systemordynacja wyborcza2018 local elections in Polandjednomandatowe okręgi wyborczerywalizacja wyborczaniekonkurencyjne wyborysingle-seat constituencies.wybory samorządowe w Polsce 2018 r.electoral competitionnon-competitive electionsStudia Regionalne i Lokalne
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures

2022

Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…

vulnerabilitiesATCcybersecurity1090MHzlentoliikenneAerospace Engineeringcountermeasuresavionics978MHzdatalinkATMpentestingaviationexperimental platformElectrical and Electronic EngineeringUATlennonjohtoEFBkyberturvallisuusverkkohyökkäyksetlennonvarmistusADS-B1090ESIEEE Transactions on Aerospace and Electronic Systems
researchProduct

E-health systems in digital environments

2019

As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…

vulnerabilitiescyber threathealthcare systemsterveysalaetäpalvelutcyber-attackstelemedicineteleterveydenhuoltokyberturvallisuusdigitalisaatioverkkohyökkäyksethaavoittuvuus
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct