4,857 Hits in 10.1 sec

Desk-Research Analysis and Identification of SA and Training Tools

Mateusz Macias
2021 Zenodo  
The content consists of a desk research performed by the project consortium partners experienced in specific areas focusing on technologies that are improved or developed in ASSISTANCE.  ...  With more than 70 models, EFFECTS ( Figure 17 ) simulates a wide variety of scenarios: from leaks and ruptures in pipelines, pressure valves, vessels and storage tanks, to confined gas explosions, BLEVEs  ...  Their Sygic Professional Navigation offers pro level traffic rerouting to make fleet operations more efficient.  ... 
doi:10.5281/zenodo.4584704 fatcat:foln2lpxqjehjppjda2ycn6cjy

An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification

Maxime Lecomte, Jacques Fournier, Philippe Maurine
2017 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
can leak sensitive data or cause a denial of service) [1] .  ...  It seems interesting to route RO so that they occupy a large area rather than route them on the smallest possible surface area. I.  ... 
doi:10.1109/tvlsi.2016.2627525 fatcat:gogmuwklxval7nznisqv3k6ymy

BLCS: Brain-Like based Distributed Control Security in Cyber Physical Systems [article]

Hui Yang, Kaixuan Zhan, Michel Kadoch, Yongshen Liang, Mohamed Cheriet
2020 arXiv   pre-print
the private information of each domain against cyber-attacks.  ...  BLS utilizes parts of information to perform control identification through relation network and deep learning of behavior library.  ...  We assume SC1 sent the information Isc1={t, lloc, atype} related its identification to make SCs of another domain trust it.  ... 
arXiv:2002.06259v1 fatcat:ojrov6fibzbjjmyvswneuu5mfa

Cardigan: SDN distributed routing fabric going live at an Internet exchange

Jonathan Stringer, Dean Pemberton, Qiang Fu, Christopher Lorier, Richard Nelson, Josh Bailey, Carlos N. A. Correa, Christian Esteve Rothenberg
2014 2014 IEEE Symposium on Computers and Communications (ISCC)  
Cardigan applies a routing as a service abstraction to a RouteFlow controlled IP network in an effort to reduce operational complexity.  ...  In order to build operational confidence, we built Cardigan -a distributed router using OpenFlowand deployed it at a public Internet exchange.  ...  control peering, enforceable inter-domain policies, originspecific routing).  ... 
doi:10.1109/iscc.2014.6912501 dblp:conf/iscc/StringerPFLNBCR14 fatcat:ptlcosl7ibhh3jgma7zblootde

A Survey on the Path Computation Element (PCE) Architecture

Francesco Paolucci, Filippo Cugini, Alessio Giorgetti, Nicola Sambo, Piero Castoldi
2013 IEEE Communications Surveys and Tutorials  
among cooperating PCEs in multi-layer/domain scenarios, while preserving scalability and confidentiality.  ...  Its actual effectiveness depends on a number of factors.  ...  In the former case, depicted in Fig. 2 -a the PCE returns the detailed endto-end path route (step 1-2, dotted lines), whereas in the latter, depicted in Fig. 2 -b and Fig. 2 -c, more than one PCEs are  ... 
doi:10.1109/surv.2013.011413.00087 fatcat:ncgex62e2vhyvcnbxpjjr3bynq

Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring

Salman Ali, Saad Qaisar, Husnain Saeed, Muhammad Khan, Muhammad Naeem, Alagan Anpalagan
2015 Sensors  
This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations.  ...  Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to OPEN ACCESS Sensors 2015, 15 7173 leverage environment, strategic and  ...  PipeGuard is able to detect leaks in a more reliable and autonomous fashion as compared to passive approaches [52] .  ... 
doi:10.3390/s150407172 pmid:25815444 pmcid:PMC4431241 fatcat:lrlo53npgnb4ldkjjfatmerbmm

Secure and Energy-aware Heuristic Routing Protocol for Wireless Sensor Network

Khalid Haseeb, Khaled Mohamad Almustafa, Zahoor Jan, Tanzila Saba, Usman Tariq
2020 IEEE Access  
Firstly, the proposed protocol makes use of an artificial intelligence-based heuristic analysis to accomplish a reliable, and intellectual learning scheme.  ...  This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see  ...  Moreover, the SEHR protocol makes use of the counter mode (CTR) [23] , a cryptography algorithm, to provide data encryption and authentication for securing the inter-routing.  ... 
doi:10.1109/access.2020.3022285 fatcat:5l532wvn7jcu7fguq7idwd42te

AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks

M.Narasimha Rao
2012 IOSR Journal of Computer Engineering  
Recently, multihop wireless mesh networks (WMNs) have involved increasing attention and deployment as a low-cost move toward to give broadband Internet access at an urban scale.  ...  Regardless of the required, partial security research has been conducted towards privacy protection in WMNs.  ...  Inter-region secure communication was achieved by using the concepts of public-key cryptography.This paper can serve as a platform for developing partially distributed system for practical scenarios as  ... 
doi:10.9790/0661-0520112 fatcat:wxrb53grjzdjrmbikh65wzm5iy

Identification of MRI Biomarkers and Histopathological Alterations in Response to Combination Therapy with Antiangiogenic Agents and Radiation in a Murine Model of Glioma Tumor

Shahrzad Jalali, Warren Foltz, Kelly Burrell, Caroline Chung, Gelareh Zadeh
2012 Journal of Neurological Surgery. Part B: Skull Base: an interdisciplinary approach  
The Occipital Transtentorial Approach for Superior Vermian and Superomedial Cerebellar Arteriovenous Malformations: Advantages, Limitations, and Options Nancy McLaughlin (presenter), Neil A.  ...  Inter-rater reliability was tested on 50 of the CT scans. Results: A total of 400 CT scans were reviewed. The mean and median petrous angles were 17.7 and 16.5 degrees, respectively.  ...  With a median follow-up of more than 19 months, none have had a recurrent CSF leak.  ... 
doi:10.1055/s-0032-1312269 fatcat:5ayg4hdxofe2hbqoyx52xt4npm

A Taxonomy of Blockchain Technologies: Principles of Identification and Classification

Paolo Tasca, Claudio J. Tessone
2019 Ledger  
A taxonomy tree is used to summarise the study and provide a navigation tool across different blockchain architectural configurations.  ...  A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are deconstructed into their building blocks.  ...  Campbell for his invaluable comments on a previous version of this paper. They also thank Alessandro Recchia and Thayabaran Thanabalasingham for their support and contribution.  ... 
doi:10.5195/ledger.2019.140 fatcat:klipzqst2jajzpjvgcyjio7mvq

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.  ...  Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol  ...  While inter-domain authentication is a more expensive operation than authentication in intra-domain, it occurs less frequently.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks

Marco Chiesa, Andrzej Kamisinski, Jacek Rak, Gabor Retvari, Stefan Schmid
2021 IEEE Communications Surveys and Tutorials  
We then present a taxonomy of the state of the art, summarize the main lessons learned, and propose a few concrete future directions.  ...  This survey presents a systematic, tutorial-like overview of packet-based fast-recovery mechanisms in the data plane, focusing on concepts but structured around different networking technologies, from  ...  Such an overlay makes the prompt restoration of inter-domain connectivity even more complex [237] .  ... 
doi:10.1109/comst.2021.3063980 fatcat:t6z3ph7d6vhvjerxhgx2kh762u

Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction

M. A. Abedin, V. Ng, L. Khan
2010 The Journal of Artificial Intelligence Research  
More precisely, given a set of possible causes, or shaping factors, this task of cause identification involves identifying all and only those shaping factors that are responsible for the incidents described  ...  We investigate two approaches to cause identification.  ...  The observed inter-annotator agreement, α, in this case was found to be 0.72, which indicates reliable agreement.  ... 
doi:10.1613/jair.2986 fatcat:vw2hmdrp5fezhk7l3ooxh3p3j4

Internet Kill Switches Demystified

Benjamin Rothenberger, Daniele E. Asoni, David Barrera, Adrian Perrig
2017 Proceedings of the 10th European Workshop on Systems Security - EuroSec'17  
As more networks move towards centralized key architectures such as DNSSEC and BGPsec, adversarial kill switches become more powerful.  ...  We also describe recovery procedures and properties intended to evaluate kill switch events, finding that recovering from a compromised key may take up to 48 hours.  ...  BACKGROUND BGPsec Securing inter-domain routing requires that IP address blocks and AS numbers used for routing advertisements are valid and that entities disseminating these advertisements are authorized  ... 
doi:10.1145/3065913.3065922 dblp:conf/eurosec/RothenbergerABP17 fatcat:rfdny65gifc43mmb7jw5opbrfy

Identification and Characterization of Biomarkers of Organophosphorus Exposures in Humans [chapter]

Jerry H. Kim, Richard C. Stevens, Michael J. MacCoss, David R. Goodlett, Alex Scherl, Rebecca J. Richter, Stephanie M. Suzuki, Clement E. Furlong
2009 Advances in Experimental Medicine and Biology  
Butyrylcholinesterase (BChE) inhibition has been a standard for monitoring OP exposure.  ...  Acylpeptide hydrolase (APH) is a red blood cell (RBC) cytosolic serine proteinase that removes Nacetylated amino acids from peptides and cleaves oxidized proteins.  ...  The OP-tyrosine bond is more stable and does not age like OPs adducted to active-site serines , allowing for a longer window of exposure detection and a more reliable identification of the OP involved  ... 
doi:10.1007/978-1-60761-350-3_7 pmid:20221871 pmcid:PMC2878371 fatcat:qaw4gweoknf5vg3guplpco45zi
« Previous Showing results 1 — 15 out of 4,857 results