Filters








270,931 Hits in 13.1 sec

Forensics in Industrial Control System: A Case Study [article]

Pieter Van Vliet and M-T. Kechadi and Nhien-An Le-Khac
2016 arXiv   pre-print
In this paper we present a case study of forensics in ICS where we de-scribe a method of safeguarding important volatile artefacts from an embedded industrial control system and several other sources  ...  Data Acquisition (SCADA) system(s) in a nuclear power plant.  ...  The sources of device data can be listed as:  Case study This case study relates to an ICS investigation of an incident in a Wind Turbine in October 2013.  ... 
arXiv:1611.01754v1 fatcat:lbetrz3eyrga5pkgezxzliq42i

Forensics in Industrial Control System: A Case Study [chapter]

Pieter Van Vliet, M.-T. Kechadi, Nhien-An Le-Khac
2016 Lecture Notes in Computer Science  
In this paper we present a case study of forensics in ICS where we describe a method of safeguarding important volatile artefacts from an embedded industrial control system and several other sources.  ...  Data Acquisition (SCADA) system(s) in a nuclear power plant.  ...  The sources of device data can be listed as: • Case study This case study relates to an ICS investigation of an incident in a Wind Turbine in October 2013.  ... 
doi:10.1007/978-3-319-40385-4_10 fatcat:5jwwe57ocna3pivms5rbiv2jq4

A Case Study of Interconnected PHR System Implementation

Junho Moon, Sangsoo Lee, Jeewon Byun, Jong Soo Choi, Dongsoo Kim
2019 Innovative Computing Information and Control Express Letters, Part B: Applications  
Recently, due to the development of ICT, interest in PHR field for personal health care has amplified and various studies are being conducted on the subject.  ...  The desire for better health is constantly increasing.  ...  A Case Study of Interconnected PHR Application. 4.1. System architecture of InPHR. InPHR is the first implementation case of Interconnected PHR type in Korea.  ... 
doi:10.24507/icicelb.10.06.501 fatcat:dmcztpfwxzevbghzlwbd5pp3yu

Course timetabling at a Tunisian University: A case study

Abdelaziz Dammak, Abdelkarim Elloumi, Hichem Kamoun, Jacques A. Ferland
2008 Journal of Systems Science and Systems Engineering  
This heuristic is illustrated with real data for a sub-section of the Faculty of Economics and Management Sciences of Sfax in Tunisia, and the resulting timetables are compared with those generated manually  ...  This paper deals with the Course Timetabling Problem at an institution in a Tunisian University.  ...  Tunisian University: A Case Study J Syst Sci Syst Eng  ... 
doi:10.1007/s11518-008-5079-5 fatcat:d5b5da67bjffpjjukrbzh3qoni

Information Systems for Large-Scale Event Management: A Case Study

Boon-Yuen Ng, Atreyi Kankanhalli
2012 Pacific Asia Journal of the Association for Information Systems  
This paper describes a case of management and deployment of IS for a large-scale event as an exemplar in this area.  ...  Information systems (IS) have considerable use in supporting large-scale communication and coordination.  ...  The case study approach provides richness of data and allows researchers to study the use of IS in a natural setting (Walsham, 2006) .  ... 
doi:10.17705/1pais.04302 fatcat:ad5w5aqxlnap5i2az7e4dqf6cm

Unified Hospital Referral System (UHRS): a case study of Nigeria

F.I. Amadin, N Ukeme
2019 Nigerian Journal of Technology  
actual referral is carried out, hence the need for a Unified hospital referral system (UHRS) in Nigeria.  ...  This paper proposes a UHRS system that will facilitate prompt referral.  ...  The medical expert logs in to study the patient case file, understands the medical history and take medical decision such as the type of standard medical procedure to adopt in treating the patient, drug  ... 
doi:10.4314/njt.v38i1.19 fatcat:qk2uaj4my5ajzdtxq6mprayveq

A Large Embedded System Project Case Study [chapter]

Bob Malcolm
1990 Software Engineering for Large Software Systems  
The tentative analysis is based on a case study of a project which is representative of the typical 'project disaster'.  ...  This paper presents a discussion of why large software projects go wrong.  ...  Its operation was regularly vetted by the customer, and in general got a clean bill of health.  ... 
doi:10.1007/978-94-009-0771-3_4 fatcat:znymleqqdjci5hevx3xgmvr5ue

Studying Expectation Violations in Socio-Technical Systems: a Case Study of the Mobile App Community

Priyanka Patel, Sherlock A. Licorish, Bastin Tony Roy Savarimuthu, Stephen G. MacDonell
2016 European Conference on Information Systems  
in human-software contexts in socio-technical systems.  ...  In addition, we observed that users of different health and fitness apps reported similar expectation violations, as is the case for individuals and groups sharing culturespecific expectations.  ...  The Study of Expectations Expectations are beliefs about future events and/or outcomes (i.e., a belief that something will happen or is likely to happen 1 ).  ... 
dblp:conf/ecis/PatelLSM16 fatcat:tuu2vq65lvffjgfhasisfiwxoa

Liberty Bell Hospital: A Case Study In Employee Information Systems Fraud

Michael K. Lavine, Amelia A. Baldwin, Charles L. Martin Jr
2011 Journal of Business Case Studies (JBCS)  
Information systems provide an attractive opportunity for dishonest employees in sensitive job positions to develop and implement a fraudulent scheme.  ...  This case is designed for use in either an undergraduate auditing, information systems security, accounting ethics, internal auditing, computer ethics or other related class.  ...  As well, how this business unit can support the information systems operations are also included in this case study.  ... 
doi:10.19030/jbcs.v2i3.4891 fatcat:bz3kvldf3vd63k3ijtjsljokn4

MiTAP: a case study of integrated knowledge discovery tools

L. Damianos, S. Wohlever, R. Kozierok, J. Ponte
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
Each day, thousands of articles from electronic information sources spanning multiple languages are automatically captured, translated, tagged, summarized, and presented to users in a variety of ways.  ...  The system provides timely, multi-lingual, global information access to analysts, medical experts and individuals involved in humanitarian assistance and relief work.  ...  They use the system for general research, personal interest, and in conducting studies of foreign media.  ... 
doi:10.1109/hicss.2003.1173927 dblp:conf/hicss/DamianosWKP03 fatcat:fosjpypexvfbjgakr2qykqe62m

Pragmatic Case Studies and Evidence-Based Treatment: Research and Clinical Applications of a Computerized Outcomes Management System

Grant Grissom, John S. Lyons
2006 Pragmatic Case Studies in Psychotherapy  
Polaris-MH is a computer-based system for assessment of adults in outpatient mental health treatment.  ...  This article describes an outcomes management system, Polaris-MH, and its potential utility for supporting the Pragmatic Case Study (PCS) model for psychotherapy research proposed by Fishman.  ...  ( Pragmatic Case Studies and Evidence-Based Treatment: Research and Clinical Applications of a Computerized Outcomes Management System G.  ... 
doi:10.14713/pcsp.v2i3.877 fatcat:lrtcu4sc2vazpozym54cy33aci

Cyber Physical Systems and Environmental Issues: A Smart Home Case Study

Mario Cortes Cornax, Paula Lago, Claudia Roncancio
2022 Research Challenges in Information Science  
We rely on a specific smart home case study to illustrate the potential of considering life-cycle analysis of both the physical devices and data to set up a CPS.  ...  Our research in progress targets a design approach to converge into an equilibrium between utility, performance and minor environmental impact of smart systems.  ...  In this case study, we briefly discuss data footprint considering a 10-year lifetime.  ... 
dblp:conf/rcis/CornaxLR22 fatcat:kzbprcxlejeztk62obeq6ct5hy

Case study of a computer based examination system

Andrew Fluck, Darren Pullen, Colleen Harper
2009 Australasian Journal of Educational Technology  
This study explored a new system based on a customised version of an open source live CD, based on Ubuntu which was used with three groups of pre-service teachers (N=270).  ...  <span>Electronic supported assessment or e-Assessment is a field of growing importance, but it has yet to make a significant impact in the Australian higher education sector (Byrnes &amp; Ellis, 2006).  ...  Thanks also go to the students who have participated in trials and voluntarily responded to questionnaires over the last two years.  ... 
doi:10.14742/ajet.1126 fatcat:6e5mf6aax5b4zhlhkhb4kwxhyq

AIDS-associated central nervous system cryptococcosis: a Brazilian case study

Mara CSM Pappalardo, Regina C??lia Paschoal, Marcia SC Melhem
2007 AIDS (London)  
Resistance to the HIV fusion inhibitor enfuvirtide is associated with mutations in the first heptad repeat region of gp41, but little is known of their impact on replicative fitness in vivo.  ...  Acknowledgements The authors are grateful to the RESIST-1 and 2 study participants, the study coordinators and personnel, and the co-investigators for their involvement in the trial.  ...  Acknowledgements The authors thank Dr Gillian Hales for her interest in the study and scientists from Eurofins VIRalliance Inc. for their help with experimental work.  ... 
doi:10.1097/01.aids.0000287549.79368.33 pmid:17721106 fatcat:6vv2o5jqdzatlbsnowoa5nrwqe

Personalised Provenance Reasoning Models and Risk Assessment in Business Systems: A Case Study

P. Townend, D. Webster, C. C. Venters, V. Dimitrova, K. Djemame, L. Lau, Jie Xu, S. Fores, V. Viduto, C. Dibsdale, N. Taylor, J. Austin (+2 others)
2013 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering  
As modern information systems become increasingly business-and safety-critical, it is extremely important to improve both the trust that a user places in a system and their understanding of the risks associated  ...  Finally, we demonstrate the initial implementation of our personalised provenance system in the context of the Rolls-Royce Equipment Health Management, and discuss its operation, the lessons we have learnt  ...  In a production system, the user will already be assigned a role and the act of logging will assume the role authorizations and privileges.  ... 
doi:10.1109/sose.2013.53 dblp:conf/sose/TownendWVDDLXFVDTAMH13 fatcat:f4ma4ldvxjb5xn6y53zucjbfhe
« Previous Showing results 1 — 15 out of 270,931 results