A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Desk-Research Analysis and Identification of SA and Training Tools
2021
Zenodo
The content consists of a desk research performed by the project consortium partners experienced in specific areas focusing on technologies that are improved or developed in ASSISTANCE. ...
With more than 70 models, EFFECTS ( Figure 17 ) simulates a wide variety of scenarios: from leaks and ruptures in pipelines, pressure valves, vessels and storage tanks, to confined gas explosions, BLEVEs ...
Their Sygic Professional Navigation offers pro level traffic rerouting to make fleet operations more efficient. ...
doi:10.5281/zenodo.4584704
fatcat:foln2lpxqjehjppjda2ycn6cjy
An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification
2017
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
can leak sensitive data or cause a denial of service) [1] . ...
It seems interesting to route RO so that they occupy a large area rather than route them on the smallest possible surface area.
I. ...
doi:10.1109/tvlsi.2016.2627525
fatcat:gogmuwklxval7nznisqv3k6ymy
BLCS: Brain-Like based Distributed Control Security in Cyber Physical Systems
[article]
2020
arXiv
pre-print
the private information of each domain against cyber-attacks. ...
BLS utilizes parts of information to perform control identification through relation network and deep learning of behavior library. ...
We assume SC1 sent the information Isc1={t, lloc, atype} related its identification to make SCs of another domain trust it. ...
arXiv:2002.06259v1
fatcat:ojrov6fibzbjjmyvswneuu5mfa
Cardigan: SDN distributed routing fabric going live at an Internet exchange
2014
2014 IEEE Symposium on Computers and Communications (ISCC)
Cardigan applies a routing as a service abstraction to a RouteFlow controlled IP network in an effort to reduce operational complexity. ...
In order to build operational confidence, we built Cardigan -a distributed router using OpenFlowand deployed it at a public Internet exchange. ...
control peering, enforceable inter-domain policies, originspecific routing). ...
doi:10.1109/iscc.2014.6912501
dblp:conf/iscc/StringerPFLNBCR14
fatcat:ptlcosl7ibhh3jgma7zblootde
A Survey on the Path Computation Element (PCE) Architecture
2013
IEEE Communications Surveys and Tutorials
among cooperating PCEs in multi-layer/domain scenarios, while preserving scalability and confidentiality. ...
Its actual effectiveness depends on a number of factors. ...
In the former case, depicted in Fig. 2 -a the PCE returns the detailed endto-end path route (step 1-2, dotted lines), whereas in the latter, depicted in Fig. 2 -b and Fig. 2 -c, more than one PCEs are ...
doi:10.1109/surv.2013.011413.00087
fatcat:ncgex62e2vhyvcnbxpjjr3bynq
Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring
2015
Sensors
This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. ...
Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to OPEN ACCESS Sensors 2015, 15 7173 leverage environment, strategic and ...
PipeGuard is able to detect leaks in a more reliable and autonomous fashion as compared to passive approaches [52] . ...
doi:10.3390/s150407172
pmid:25815444
pmcid:PMC4431241
fatcat:lrlo53npgnb4ldkjjfatmerbmm
Secure and Energy-aware Heuristic Routing Protocol for Wireless Sensor Network
2020
IEEE Access
Firstly, the proposed protocol makes use of an artificial intelligence-based heuristic analysis to accomplish a reliable, and intellectual learning scheme. ...
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. ...
Moreover, the SEHR protocol makes use of the counter mode (CTR) [23] , a cryptography algorithm, to provide data encryption and authentication for securing the inter-routing. ...
doi:10.1109/access.2020.3022285
fatcat:5l532wvn7jcu7fguq7idwd42te
AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks
2012
IOSR Journal of Computer Engineering
Recently, multihop wireless mesh networks (WMNs) have involved increasing attention and deployment as a low-cost move toward to give broadband Internet access at an urban scale. ...
Regardless of the required, partial security research has been conducted towards privacy protection in WMNs. ...
Inter-region secure communication was achieved by using the concepts of public-key cryptography.This paper can serve as a platform for developing partially distributed system for practical scenarios as ...
doi:10.9790/0661-0520112
fatcat:wxrb53grjzdjrmbikh65wzm5iy
Identification of MRI Biomarkers and Histopathological Alterations in Response to Combination Therapy with Antiangiogenic Agents and Radiation in a Murine Model of Glioma Tumor
2012
Journal of Neurological Surgery. Part B: Skull Base: an interdisciplinary approach
The Occipital Transtentorial Approach for Superior Vermian and Superomedial Cerebellar Arteriovenous Malformations: Advantages, Limitations, and Options Nancy McLaughlin (presenter), Neil A. ...
Inter-rater reliability was tested on 50 of the CT scans. Results: A total of 400 CT scans were reviewed. The mean and median petrous angles were 17.7 and 16.5 degrees, respectively. ...
With a median follow-up of more than 19 months, none have had a recurrent CSF leak. ...
doi:10.1055/s-0032-1312269
fatcat:5ayg4hdxofe2hbqoyx52xt4npm
A Taxonomy of Blockchain Technologies: Principles of Identification and Classification
2019
Ledger
A taxonomy tree is used to summarise the study and provide a navigation tool across different blockchain architectural configurations. ...
A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are deconstructed into their building blocks. ...
Campbell for his invaluable comments on a previous version of this paper. They also thank Alessandro Recchia and Thayabaran Thanabalasingham for their support and contribution. ...
doi:10.5195/ledger.2019.140
fatcat:klipzqst2jajzpjvgcyjio7mvq
Security and Privacy Issues in Wireless Mesh Networks: A Survey
[article]
2013
arXiv
pre-print
A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded. ...
Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol ...
While inter-domain authentication is a more expensive operation than authentication in intra-domain, it occurs less frequently. ...
arXiv:1302.0939v1
fatcat:4bxooy2dubeopa3qbcyg5yvi3y
A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks
2021
IEEE Communications Surveys and Tutorials
We then present a taxonomy of the state of the art, summarize the main lessons learned, and propose a few concrete future directions. ...
This survey presents a systematic, tutorial-like overview of packet-based fast-recovery mechanisms in the data plane, focusing on concepts but structured around different networking technologies, from ...
Such an overlay makes the prompt restoration of inter-domain connectivity even more complex [237] . ...
doi:10.1109/comst.2021.3063980
fatcat:t6z3ph7d6vhvjerxhgx2kh762u
Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction
2010
The Journal of Artificial Intelligence Research
More precisely, given a set of possible causes, or shaping factors, this task of cause identification involves identifying all and only those shaping factors that are responsible for the incidents described ...
We investigate two approaches to cause identification. ...
The observed inter-annotator agreement, α, in this case was found to be 0.72, which indicates reliable agreement. ...
doi:10.1613/jair.2986
fatcat:vw2hmdrp5fezhk7l3ooxh3p3j4
Internet Kill Switches Demystified
2017
Proceedings of the 10th European Workshop on Systems Security - EuroSec'17
As more networks move towards centralized key architectures such as DNSSEC and BGPsec, adversarial kill switches become more powerful. ...
We also describe recovery procedures and properties intended to evaluate kill switch events, finding that recovering from a compromised key may take up to 48 hours. ...
BACKGROUND
BGPsec Securing inter-domain routing requires that IP address blocks and AS numbers used for routing advertisements are valid and that entities disseminating these advertisements are authorized ...
doi:10.1145/3065913.3065922
dblp:conf/eurosec/RothenbergerABP17
fatcat:rfdny65gifc43mmb7jw5opbrfy
Identification and Characterization of Biomarkers of Organophosphorus Exposures in Humans
[chapter]
2009
Advances in Experimental Medicine and Biology
Butyrylcholinesterase (BChE) inhibition has been a standard for monitoring OP exposure. ...
Acylpeptide hydrolase (APH) is a red blood cell (RBC) cytosolic serine proteinase that removes Nacetylated amino acids from peptides and cleaves oxidized proteins. ...
The OP-tyrosine bond is more stable and does not age like OPs adducted to active-site serines , allowing for a longer window of exposure detection and a more reliable identification of the OP involved ...
doi:10.1007/978-1-60761-350-3_7
pmid:20221871
pmcid:PMC2878371
fatcat:qaw4gweoknf5vg3guplpco45zi
« Previous
Showing results 1 — 15 out of 4,857 results