Filters








1,432 Hits in 6.3 sec

Poland and Space Security [chapter]

Małgorzata Polkowska
2020 Handbook of Space Security  
The objective of the project is to enhance the security of citizens and infrastructure (Earth and space) in the context of space threats, to build national SSA capabilities, and to prepare for commercial  ...  works aimed at acquiring new technologies for the purposes of national defense and security -Monitoring defense and security programs and projects while developing recommendations on how to manage their  ... 
doi:10.1007/978-3-030-22786-9_130-1 fatcat:oddsur2i5vc6pchfm5yhbzze34

Maritime Orbital Strategic Superiority using Artificial Intelligence Capacity Building (MOS2AIC-B)

Mantzouris Dr. Georgios, Bordetsky Alex
2020 Journal of Aerospace Engineering and Mechanics  
Cubesat role in maritime network support is to quickly morph a surface orbital mesh system including characteristics of cognitive behavior [2] .  ...  , based on artificial intelligence contemporary methods, superiority will be ap-  ...  From that point on, research in NPS continued [12] with the first ever report to a picosatellite simulated celestial network.  ... 
doi:10.36959/422/442 fatcat:fsfxpd2a3revpadse2dd6tj2uq

Celestial: Virtual Software System Testbeds for the LEO Edge [article]

Tobias Pfandzelter, David Bermbach
2022 arXiv   pre-print
Additionally, we explore opportunities and implications of deploying a real-time remote sensing application on LEO edge infrastructure in a case study on Celestial.  ...  Celestial can efficiently emulate individual satellites and their movement as well as ground station servers with realistic network conditions and in an application-agnostic manner, which we show empirically  ...  Jonathan Hasenburg for their valuable feedback on this work. Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) -415899119.  ... 
arXiv:2204.06282v1 fatcat:4p2h2uvogfbvpp7lg5gwxlelia

Cyberattacks on ships: a wicked problem approach

Joan Mileski, Christopher Clott, Cassia Bomer Galvao
2018 Maritime Business Review  
This increased automation creates new security vulnerabilities for the maritime industry in cyberspace.  ...  Findings -The authors find that inconsistent information is presented on the location of same ships at the same time in the Port.  ...  To build resilience in these security systems, joint situational awareness can enhance joint decision making with regard to a security event (Gunther, 2015) . What does this mean?  ... 
doi:10.1108/mabr-08-2018-0026 fatcat:edufjxk74jhfpfp4535vzd44k4

Interconnected Cloud Computing Environments

Adel Nadjaran Toosi, Rodrigo N. Calheiros, Rajkumar Buyya
2014 ACM Computing Surveys  
A brief review of the Internet history reveals the fact that the Internet evolved after the formation of primarily independent networks.  ...  ACKNOWLEDGMENTS The authors would like to thank Amir Vahid Dastjerdi, Mohsen Amini Salehi, Deepak Poola, and Nikolay Grozev for their constructive comments and suggestions on improving this survey.  ...  On the application level, the monitored parameters and the way their values should be retrieved depend on the application and not on the cloud infrastructure it is running on.  ... 
doi:10.1145/2593512 fatcat:ppy53emxlvehjmhbd44ci4w6my

Research on Trust Computing for Cloud Service Providers

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
There are lot of factors involved to gain confidence of client such as transparency, cost, security etc.  ...  Though cloud has become integral part of every new software, still there are gaps in security features and customers keenly look into multiple aspects of cloud service provider features before choosing  ...  Cloud Service provides cost benefit in terms of Infrastructure maintenance, Infra cost and other benefits. Additionally they provide more security features and easy application scalability features.  ... 
doi:10.35940/ijitee.f1227.0486s419 fatcat:cor7ldjshvcr5o7ivb35cys2bu

Cyber Threats, Harsh Environment and the European High North (EHN) in a Human Security and Multi-Level Regulatory Global Dimension: Which Framework Applicable to Critical Infrastructures under "Exceptionally Critical Infrastructure Conditions" (ECIC)?

Sandra Cassotta, Roman Sidortsov, Christer Pursiainen, Michael Evan Goodsite
2019 Beijing Law Review  
dependent on cyber technology and on critical infrastructures.  ...  , international and global networks character.  ...  of international and regional law in designing proactive law achieving human security goals in a pluralistic context.  ... 
doi:10.4236/blr.2019.102020 fatcat:ohk7ilb5vbc6vdquomwa2r4y7e

Characterizing Cloud Federation Approaches [chapter]

Attila Kertesz
2014 Computer Communications and Networks  
Cloud Computing offers on-demand access to computational, infrastructure and data resources operated from a remote source.  ...  This novel technology has opened new ways of flexible resource provisions for businesses to manage IT applications and data responding to new demands from customers.  ...  Our approach is to utilize cloud infrastructure services to execute such applications on mobile data stored in cloud storages.  ... 
doi:10.1007/978-3-319-10530-7_12 fatcat:tz65pi4p7rgg5okuonfxbbli5e

Nu@ge: Towards a solidary and responsible cloud computing service

Daniel Balouek-Thomert, Eddy Caron, Pascal Gallard, Laurent Lefevre
2015 2015 International Conference on Cloud Technologies and Applications (CloudTech)  
In this paper, we present the Nu@ge project aimed at building a federation of container-sized datacenter on the French territory.  ...  One of those reasons is the data sovereignty, as data can be physically host in sensible locations, resulting in a lack of control for companies.  ...  ; Oodrive, online storage specialist; DotRiver, private network operator; New GenerationSR, Green IT consulting; LIP6, laboratory and its research team REGAL and PHARE of UPMC University, Paris.  ... 
doi:10.1109/cloudtech.2015.7337006 fatcat:mny2f2czrzesddywlxwebbr2ai

Regulating Near-Space Activities: Using the Precedent of the Exclusive Economic Zone as a Model?

Hao Liu, Fabio Tronchetti
2019 Ocean Development and International Law  
S . commercial space capabilities and services, including commercially viable terrestrial applications that rely on government-provided space systems;Develop•Transparency•and•Confidence-Building•Measures.The  ...  , and operate space systems and supporting information systems and networks to support U .  ...  planning and satisfy operational requirements as a major intelligence mission; • • Support monitoring, compliance, and verification for transparency and confidence-building measures and, if applicable  ... 
doi:10.1080/00908320.2018.1548452 fatcat:ure6eelrafabdhjkkr2riwpwqy

Applications and Design for a Cloud of Virtual Sensors

Ammar Jameel Hussein, Ammar Riadh, Mohammed Alsultan, Abd Al-razak Tareq
2016 Indonesian Journal of Electrical Engineering and Computer Science  
This design operates in a cloud computing vision and can make virtual sensors in upper of physical one available from anywhere using ICT structure.  ...  In this paper, we discuss the manner, applications and design issues for a cloud of virtual sensors, and we introduce a distributed system design to deal with physical sensors that reside in diverse locations  ...  , application repository, a device registry and an application manager.  ... 
doi:10.11591/ijeecs.v2.i1.pp229-240 fatcat:ijr66nwp6nehfazolmlaabumde

Architecting cloud-enabled systems: a systematic survey of challenges and solutions

Muhammad Aufeef Chauhan, Muhammad Ali Babar, Boualem Benatallah
2016 Software, Practice & Experience  
It is important to systematically analyze and synthesize the existing research on architecting cloud-based software systems in order to build a cohesive body of knowledge of the reported challenges and  ...  Architecting cloud-based systems presents unique challenges as the systems to be designed range from pervasive embedded systems and enterprise applications to smart devices with Internet of Things (IoTs  ...  We acknowledge Barbara Kitchenham for providing useful feedback on the protocol and pilot study.  ... 
doi:10.1002/spe.2409 fatcat:s4hq4gy3yrhsvjxxwwtah2rumm

Methodology to Obtain the Security Controls in Multi-cloud Applications

Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Massimiliano Rak, Valentina Casola, Erkuden Rios, Jose L. Martinez Lastra
2016 Proceedings of the 6th International Conference on Cloud Computing and Services Science  
The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications' security-aware Service Level Agreements (SLA).  ...  The methodology is based on application decomposition and modelling of threats over the components, followed by the analysis of the risks together with the capture of cloud business and security requirements  ...  focus on security attacks.  ... 
doi:10.5220/0005912603270332 dblp:conf/closer/AfolaranmiMRCRL16 fatcat:pkcq4ssbyrfupp44a23vpz4jbm

Awareness raising on EO/GI/SDI for SDGS – the case of Hungary

Szabolcs MIHÁLY, Tamás PALYA, Gábor REMETEY-FÜLÖPP
2017 Micro, Macro & Mezzo Geoinformation  
information infrastructure - related capacity building - open data, open source tools and advanced data access architecture - partnership between data custodians and other stakeholders.  ...  Awareness raising campaigns are needed form local to global, where the EO4SDGs Strategic Implementation Plan could serve as a guideline (GEO, 2017).  ...  SD, UN-GGIM (Academic Network, Geospatial Societies, Industry, Regional Networks), Data4SDGs, etc.  ... 
doaj:d273e5c10137473f9fcc8b42baa04948 fatcat:oarsqqvpzvg7bf2sirerotpn7u

Study of Security Threats and Challenges in Internet of Things Systems

Rohit Chawla, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
Lack of integrity, confidentiality and authorization process of data transmitted over the network of internet of things used the concept of key generation and allocation.  ...  In this paper present the review of security threats of internet of things.  ...  The security threats of internet of things basically focus on three layers application layer, network layer and mac layer.  ... 
doi:10.17762/turcomat.v12i2.1137 fatcat:4b76bsbfn5eqnl4kyjtidninri
« Previous Showing results 1 — 15 out of 1,432 results