A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Poland and Space Security
[chapter]
2020
Handbook of Space Security
The objective of the project is to enhance the security of citizens and infrastructure (Earth and space) in the context of space threats, to build national SSA capabilities, and to prepare for commercial ...
works aimed at acquiring new technologies for the purposes of national defense and security -Monitoring defense and security programs and projects while developing recommendations on how to manage their ...
doi:10.1007/978-3-030-22786-9_130-1
fatcat:oddsur2i5vc6pchfm5yhbzze34
Maritime Orbital Strategic Superiority using Artificial Intelligence Capacity Building (MOS2AIC-B)
2020
Journal of Aerospace Engineering and Mechanics
Cubesat role in maritime network support is to quickly morph a surface orbital mesh system including characteristics of cognitive behavior [2] . ...
, based on artificial intelligence contemporary methods, superiority will be ap- ...
From that point on, research in NPS continued [12] with the first ever report to a picosatellite simulated celestial network. ...
doi:10.36959/422/442
fatcat:fsfxpd2a3revpadse2dd6tj2uq
Celestial: Virtual Software System Testbeds for the LEO Edge
[article]
2022
arXiv
pre-print
Additionally, we explore opportunities and implications of deploying a real-time remote sensing application on LEO edge infrastructure in a case study on Celestial. ...
Celestial can efficiently emulate individual satellites and their movement as well as ground station servers with realistic network conditions and in an application-agnostic manner, which we show empirically ...
Jonathan Hasenburg for their valuable feedback on this work. Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) -415899119. ...
arXiv:2204.06282v1
fatcat:4p2h2uvogfbvpp7lg5gwxlelia
Cyberattacks on ships: a wicked problem approach
2018
Maritime Business Review
This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. ...
Findings -The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. ...
To build resilience in these security systems, joint situational awareness can enhance joint decision making with regard to a security event (Gunther, 2015) . What does this mean? ...
doi:10.1108/mabr-08-2018-0026
fatcat:edufjxk74jhfpfp4535vzd44k4
Interconnected Cloud Computing Environments
2014
ACM Computing Surveys
A brief review of the Internet history reveals the fact that the Internet evolved after the formation of primarily independent networks. ...
ACKNOWLEDGMENTS The authors would like to thank Amir Vahid Dastjerdi, Mohsen Amini Salehi, Deepak Poola, and Nikolay Grozev for their constructive comments and suggestions on improving this survey. ...
On the application level, the monitored parameters and the way their values should be retrieved depend on the application and not on the cloud infrastructure it is running on. ...
doi:10.1145/2593512
fatcat:ppy53emxlvehjmhbd44ci4w6my
Research on Trust Computing for Cloud Service Providers
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
There are lot of factors involved to gain confidence of client such as transparency, cost, security etc. ...
Though cloud has become integral part of every new software, still there are gaps in security features and customers keenly look into multiple aspects of cloud service provider features before choosing ...
Cloud Service provides cost benefit in terms of Infrastructure maintenance, Infra cost and other benefits. Additionally they provide more security features and easy application scalability features. ...
doi:10.35940/ijitee.f1227.0486s419
fatcat:cor7ldjshvcr5o7ivb35cys2bu
Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under "Exceptionally Critical Infrastructure Conditions" (ECIC)?
2019
Beijing Law Review
dependent on cyber technology and on critical infrastructures. ...
, international and global networks character. ...
of international and regional law in designing proactive law achieving human security goals in a pluralistic context. ...
doi:10.4236/blr.2019.102020
fatcat:ohk7ilb5vbc6vdquomwa2r4y7e
Characterizing Cloud Federation Approaches
[chapter]
2014
Computer Communications and Networks
Cloud Computing offers on-demand access to computational, infrastructure and data resources operated from a remote source. ...
This novel technology has opened new ways of flexible resource provisions for businesses to manage IT applications and data responding to new demands from customers. ...
Our approach is to utilize cloud infrastructure services to execute such applications on mobile data stored in cloud storages. ...
doi:10.1007/978-3-319-10530-7_12
fatcat:tz65pi4p7rgg5okuonfxbbli5e
Nu@ge: Towards a solidary and responsible cloud computing service
2015
2015 International Conference on Cloud Technologies and Applications (CloudTech)
In this paper, we present the Nu@ge project aimed at building a federation of container-sized datacenter on the French territory. ...
One of those reasons is the data sovereignty, as data can be physically host in sensible locations, resulting in a lack of control for companies. ...
; Oodrive, online storage specialist; DotRiver, private network operator; New GenerationSR, Green IT consulting; LIP6, laboratory and its research team REGAL and PHARE of UPMC University, Paris. ...
doi:10.1109/cloudtech.2015.7337006
fatcat:mny2f2czrzesddywlxwebbr2ai
Regulating Near-Space Activities: Using the Precedent of the Exclusive Economic Zone as a Model?
2019
Ocean Development and International Law
S . commercial space capabilities and services, including commercially viable terrestrial applications that rely on government-provided space systems;Develop•Transparency•and•Confidence-Building•Measures.The ...
, and operate space systems and supporting information systems and networks to support U . ...
planning and satisfy operational requirements as a major intelligence mission; • • Support monitoring, compliance, and verification for transparency and confidence-building measures and, if applicable ...
doi:10.1080/00908320.2018.1548452
fatcat:ure6eelrafabdhjkkr2riwpwqy
Applications and Design for a Cloud of Virtual Sensors
2016
Indonesian Journal of Electrical Engineering and Computer Science
This design operates in a cloud computing vision and can make virtual sensors in upper of physical one available from anywhere using ICT structure. ...
In this paper, we discuss the manner, applications and design issues for a cloud of virtual sensors, and we introduce a distributed system design to deal with physical sensors that reside in diverse locations ...
, application repository, a device registry and an application manager. ...
doi:10.11591/ijeecs.v2.i1.pp229-240
fatcat:ijr66nwp6nehfazolmlaabumde
Architecting cloud-enabled systems: a systematic survey of challenges and solutions
2016
Software, Practice & Experience
It is important to systematically analyze and synthesize the existing research on architecting cloud-based software systems in order to build a cohesive body of knowledge of the reported challenges and ...
Architecting cloud-based systems presents unique challenges as the systems to be designed range from pervasive embedded systems and enterprise applications to smart devices with Internet of Things (IoTs ...
We acknowledge Barbara Kitchenham for providing useful feedback on the protocol and pilot study. ...
doi:10.1002/spe.2409
fatcat:s4hq4gy3yrhsvjxxwwtah2rumm
Methodology to Obtain the Security Controls in Multi-cloud Applications
2016
Proceedings of the 6th International Conference on Cloud Computing and Services Science
The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications' security-aware Service Level Agreements (SLA). ...
The methodology is based on application decomposition and modelling of threats over the components, followed by the analysis of the risks together with the capture of cloud business and security requirements ...
focus on security attacks. ...
doi:10.5220/0005912603270332
dblp:conf/closer/AfolaranmiMRCRL16
fatcat:pkcq4ssbyrfupp44a23vpz4jbm
Awareness raising on EO/GI/SDI for SDGS – the case of Hungary
2017
Micro, Macro & Mezzo Geoinformation
information infrastructure - related capacity building - open data, open source tools and advanced data access architecture - partnership between data custodians and other stakeholders. ...
Awareness raising campaigns are needed form local to global, where the EO4SDGs Strategic Implementation Plan could serve as a guideline (GEO, 2017). ...
SD, UN-GGIM (Academic Network,
Geospatial Societies, Industry,
Regional Networks), Data4SDGs, etc. ...
doaj:d273e5c10137473f9fcc8b42baa04948
fatcat:oarsqqvpzvg7bf2sirerotpn7u
Study of Security Threats and Challenges in Internet of Things Systems
2021
Turkish Journal of Computer and Mathematics Education
Lack of integrity, confidentiality and authorization process of data transmitted over the network of internet of things used the concept of key generation and allocation. ...
In this paper present the review of security threats of internet of things. ...
The security threats of internet of things basically focus on three layers application layer, network layer and mac layer. ...
doi:10.17762/turcomat.v12i2.1137
fatcat:4b76bsbfn5eqnl4kyjtidninri
« Previous
Showing results 1 — 15 out of 1,432 results