84 Hits in 11.1 sec

Mayhem in the Push Clouds

Tongxin Li, Xiaoyong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, XiaoFeng Wang, Xinhui Han
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Push messaging is among the most important mobile-cloud services, offering critical supports to a wide spectrum of mobile apps.  ...  In this paper, we report the first security analysis on those push-messaging services, which reveals the pervasiveness of subtle yet significant security flaws in them, affecting billions of mobile users  ...  More effort is certainly needed to dig deeper on this subject to better understand the security risks in push messaging services and mobile clouds in general.  ... 
doi:10.1145/2660267.2660302 dblp:conf/ccs/LiZXLNWH14 fatcat:xm6ynadl4vfa5hcccxexbnneue

A Performance Perspective Analysis: A Detailed Vision on Denial of Service and Distributed Denial of Service on Cloud Computing

2019 International journal of recent technology and engineering  
The primary objective of this paper is to discuss different security mechanisms applied to multiple malicious threats in the cloud to understand the various issues and challenges faced in earlier research  ...  In recent days cloud computing and cloud-based service, provisions play a vital and significant role in Internet-based information computing.  ...  Due to the essential need of cloud service in the recent days, it pushed more attention to the malicious users to make the security attacks and to decay the process.  ... 
doi:10.35940/ijrte.c5002.098319 fatcat:4fyxd6fzrjg3ljcldck7w6omb4

Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things

Md. Mahmud Hossain, Maziar Fotouhi, Ragib Hasan
2015 2015 IEEE World Congress on Services  
With increased deployment of IoT devices in the real world, they can be, and in some cases, already are subject to malicious attacks to compromise the security and privacy of the IoT devices.  ...  While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape.  ...  Acknowledgements: This research was supported by the National Science Foundation CAREER Award CNS-1351038 and an Amazon AWS for Education Grant.  ... 
doi:10.1109/services.2015.12 dblp:conf/services/HossainFH15 fatcat:pe5f5locendejefbudm3r7hbdu

Governance of the Internet of Things (IoT) [article]

Lawrence J. Trautman
2020 arXiv   pre-print
We believe this Article contributes to our understanding of the widespread exposure to malware associated with IoT and adds to the nascent but emerging literature on governance of enterprise risk, a subject  ...  First, we define the Internet of Things (IoT), comment on the explosive growth in sensory devices connected to the Internet, provide examples of IoT devices, and speak to the promise of the IoT.  ...  implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and 4 7 In an effort to mitigate "this risk, the IETF is pushing IoT vendors  ... 
arXiv:2004.03765v1 fatcat:sbkfrlaq6fat3bajd5l3ax6rhy

Transdisciplinary consolidation of financial technologies with knowledge systems
Трансдисциплінарна консолідація фінансових технологій із системами знань

Oleksandr LYUBICH, SESE "The Academy of Financial Management", Oleksandr STRYZHAK, SESE "The Academy of Financial Management"
2021 Fìnansi Ukraïni  
Consolidated interaction is carried out in the process of implementing innovative projects. An aggregative model of consolidated interaction is presented.  ...  The article describes a cognitive IT technology that provides consolidated interaction with online narrative documents which show various financial technologies.  ...  In the past, the United States and DOD led in The log entry for the IMP (Interface Message Processor) at UCLA, recording the first ARPANET message.  ... 
doi:10.33763/finukr2021.11.054 fatcat:edc3aarta5gq7be2wixkynjz7q

Interrogating "privacy" in a world brimming with high political entanglements, surveillance, interdependence & interconnections

Robert Mathews
2017 Health and Technology  
Informational access behaviors and their relationship to the future of privacy and security The Mobile Mindset Study [181] broadcast that 'a new mobile mindset' had materialized in societies, largely  ...  Tbps -Terabits Per Second 1,099,511,627,776 bits per second 49 Gbps -Gigabits Per Second 1,073,741,824 bits per second In the interest of suitably considering Privacy and Security risk mitigation and  ... 
doi:10.1007/s12553-017-0211-5 fatcat:ns36lqkcgfde7aqsgx2eclg2i4

Stress tested: the COVID-19 pandemic and Canadian national security

Kurt F. Jensen
2022 Intelligence and national security  
Acknowledgements The editors would like to thank all of the contributors for agreeing to undertake this project during incredibly demanding times: your commitment to timely and relevant research is an  ...  We are also grateful to the Privy Council Office's Intelligence Assessment Secretariat for  ...  hate, (re)mobilize, and promote their ideologies online in new and novel ways.  ... 
doi:10.1080/02684527.2022.2044599 fatcat:yhlzap2rknh3fdiscpnzui65we

Threats and Alert Analytics in Autonomous Vehicles

Aakanksha Rastogi, Kendall Nygard
This paper aims to understand and study the technology behind these self-driving cars and explore, identify and address popular threats, vulnerabilities and hacking attacks to which these cars are prone  ...  This paper also establishes a relationship between these threats, trust and reliability. An analysis of the alert systems in self-driving cars is also presented.  ...  This can result in highway mayhems, destruction and casualties.  ... 
doi:10.29007/j6h1 fatcat:upmhc4xn7nf4xonk5dnjq5wani

Conflict and Terrorism in South Asia Since 9/11

Ryan Shaffer
2016 Terrorism and Political Violence  
systems, security services, emergency services, and disaster response systems.  ...  The cloud also will put increased computing capability and meaningful analysis in the hands of 80 percent of the world's population. • Mobile devices are becoming increasingly rich sensor platforms, enabling  ...  A stronger US economy dependent on trade in services and cutting-edge technologies would be a boost for the world economy, laying the basis for stronger multilateral cooperation.  ... 
doi:10.1080/09546553.2016.1255065 fatcat:xvag3ncx2jcuppohe4j44kuqsq

A Widening Attack Plain Threatcasting Report: Army Cyber Institute Participants and Army Cyber Institute Overview 1 A Widening Attack Plain-Threatcasting Report for the Army Cyber Institute

Brian David, Johnson
List out what the Blue Team doesn't have control over to disrupt, mitigate and recover from the threat. but this will have a significant affect on the futures you have modeled. 1 DNA is out in the cloud  ...  The Internet was constructed to push out data to as many people as possible. The Internet was never designed for security. a. Do we need to build a new version that has security and privacy?  ...  Negative Education and public/private partnerships that encourages shared responsibility in our collective security.  ... 

'Not for everyone, but kind of amazing': institutional friction and the nature of sustainability education

Joseph Henderson
2014 Environmental Education Research  
IRB permissions were secured and research began in earnest.  ...  ] activities from local to global levels, understanding the conditions under which the institutions can effectively advance mitigation and adaptation goals, and improving understanding of the conditions  ... 
doi:10.1080/13504622.2014.938318 fatcat:axxiwg7i4jab5ezxxflgv7t4e4

Research and Science Today No. 1(17)/2019

Snejana SULIMA, Victoria Ogechukwu NWACHUKWU, Chijioke NWACHUKWU, Dorin SAVIN, Hassen NAGESSO, Tariku AYELE, Birhanu NIGUSSIE, Costina SFINTEŞ, Flavius Cristian MĂRCĂU, Paula MUREȘAN, Claudiu – Constantin TALABĂ, Vasile-Cătălin GOLOP (+36 others)
2019 Research and Science Today  
Regarding the national and international visibility of Research and Science Today, it is indexed in over 30 international databases (IDB) and is present in over 200 online libraries and catalogues; therefore  ...  RESEARCH AND SCIENCE TODAY is a biannual science journal established in 2011.  ...  We are grateful for the time and information ACKNOWLEDGEMENTS All authors equally contributed in the research and drafting of this paper. All authors report no potential conflict of interest.  ... 
doaj:bccbd2b387264dcda0a1496c20b20ad8 fatcat:svhes3zkxzdxjnakbkktgy2cxu

Summer/Fall 2022

2022 The Journal of Values Based Leadership  
Teaching students how to understand their personal core values and how such values impact organizational performance.  ...  In addition to articles that bridge theory and practice, the JVBL is interested in book reviews, case studies, personal experience articles, and pedagogical papers.  ...  LEADERSHIP Acknowledgement The author wishes to thank Drs. Tom Karp and Phillip Gates for their collaboration and assistance with this project.  ... 
doi:10.22543/1948-0733.1426 fatcat:kppfvsdg6raeddnkybuf2m7i6e


Pedro Trovão do Rosário
2021 CRITICAL DIALOGUES Human Rights, Democracy and Pandemic Perspectives  
supervision system and constitutional review theory, basic human rights theory, international human rights law implementation mechanism, the stateof emergency system, and national security and public  ...  The main social positions and part-time jobs held by Professor Mo Jihong include: Honorary President of the International Association of Constitutional Law (Lifetime), an executive member of China Law  ...  Mitigation includes all the actions adopted to decrease or minimize the adverse impacts of a hazardous event that cannot be 13 "Prevention measures can also be taken during or after a hazardous event or  ... 
doi:10.55658/gpcds978-65-00-40218-6.chapter4 fatcat:ww53ibmztff7vig4v7sx3mealq

South African philosophy of life Ubuntu and its significance for understanding non-violence as universal human value
Южноафриканская философия жизни «Ubuntu» и ее значение для понимания ненасилия как общечеловеческой ценности

V.A. Sitarov, Moscow City University, V.G. Maralov, Cherepovets State University
2021 Alma mater Vestnik Vysshey Shkoly  
Shown is that in Ubuntu priorities are affirmation of value of human life and its unity, humanistic relations, solution of conflicts by using dialog and non-violence methods.  ...  Analyzed is contribution that is being introduced by Ubuntu in comprehension of non-violence.  ...  He or she is well aware of the hazards of smoking but he continues nevertheless in the brazen belief that nothing serious is going to happen.  ... 
doi:10.20339/am.01-21.101 fatcat:vonmaxns2fagzclk33ovvz56p4
« Previous Showing results 1 — 15 out of 84 results