173 Hits in 6.4 sec

Smart cities, social media platforms and security: online content regulation as a site of controversy and conflict

Chiara Poletti, Marco Michieli
2018 City, Territory and Architecture  
Since the attack to the Charlie Hebdo offices, city-regions and social media digital technologies have increasingly been changing the definition of 'territory of security' and 'security governance' .  ...  References Abrahamsen R, Leander A (eds) (2015) Routledge handbook of private security studies. Routledge, London Adamson FB (2016) Spaces of global security: beyond methodological nationalism.  ...  perform socio-technical arrangements.  ... 
doi:10.1186/s40410-018-0096-2 fatcat:utzmjmmv3vgqdghe4rgycbbsfm

SAM-SoS: A Stochastic Software Architecture Modeling and Verification Approach for Complex System-of-Systems

Ahmad Mohsin, Naeem Khalid Janjua, Syed M. S. Islam, Muhammad Ali Babar
2020 IEEE Access  
[F<=T("Send(A) ∧ Send(B)")] P R 2 Average No. of Alerts and Warnings R{"Alerts-Warnings"}=?[C<=T] RR 1 CPS nodes Reliability P =?  ...  The proposed approach is validated using a case study of a Cyber-Physical System (CPS)-based SoS (CPSoS) for Real-Time Fire Monitoring and Emergency Response.  ...  He leads the theme on Platform and Architecture for Cyber Security as a Service with the Cyber Security Cooperative Research Centre.  ... 
doi:10.1109/access.2020.3025934 fatcat:mnc7pxj2dvco7exkwctvyhemkq

Research and Science Today no. 2/2021

RST Journal
2021 Zenodo  
visibility of Research and Science Today, it is indexed in over 30 international databases (IDB) and is present in over 200 online libraries and catalogues; therefore, anybody can easily consult the articles featured  ...  Yadav D, Nair S, Norkus EP, Pitchumoni CS. Nonspecific hyperamylasemia and hyperlipasemia in diabetic ketoacidosis: incidence and correlation with biochemical abnormalities.  ...  resilience and cyber security law enforcement.  ... 
doi:10.5281/zenodo.5817172 fatcat:3wxuosz2iffhtdmzjwsr6jvuv4

Exploring the Challenges of Implementing Guidelines for the Design of Visual Analytics Systems

Johanna Haider, Margit Pohl, Eva-Catherine Hillemann, Alexander Nussbaumer, Simon Attfield, Peter Passmore, B. L. William Wong
2015 Proceedings of the Human Factors and Ergonomics Society Annual Meeting  
on Human-Systems Integration Panel: Applying Human-Systems Integration to Cyber Security GENERAL SESSIONS Tuesday, October 27, 1:30-3:00 p.m.  ...  Smith-Jackson, North Carolina A&T State U., Dementia Caregiver Empowerment Using a Cyber-Socio-Physical Model TUESDAY, OCTOBER 27 PD2 -PDTG Stanley H.  ... 
doi:10.1177/1541931215591053 fatcat:zoxfse3x5bc7llbelxqnopbjce

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
This "either/or" thinking results in systems that are neither usable nor secure. Our industry is littered with examples. First: security warnings.  ...  Despite researchers' good intentions, these warnings just inure people to them. I've read dozens of studies about how to get people to pay attention to security warnings.  ...  The incumbent will augment the department's emphases in at least one of the following areas: cloud computing, particularly secure cloud computing; mobile computing, particularly secure mobile computing  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry


2021 Zenodo  
The report also presents how EVAGUIDE with its innovative features and services may address the needs for safety and evacuation in stadia and large facilities, as presented in the SGSA & UEFAS's guidelines  ...  Red Cross, Knights of St.  ...  guidelines for natural disasters early warning system (EWS).  ... 
doi:10.5281/zenodo.4651113 fatcat:nl4c4jzcbrcsdnnlxwi46qvfbq

[Front cover]

2020 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)  
IoT devices are affected by cyber-attacks, such as the Mirai botnet. IoT Security Risks and Resilience-From Networks to Supply Chain explains the features of CPS and IoT security.  ...  Security, IEEE Security & Privacy, and featured at leading news sites such as The Wall Street Journal, The Washington Post and the New York Times.  ... 
doi:10.1109/wf-iot48130.2020.9221244 fatcat:nfrea7jitzh4tpn5k4sg3bsnmq

Road Safety from the Perspective of European Union

2021 International Conference Safe and Secure Society  
Development trends in the field of cyber security. Anect has published a brief summary of cyber security trends for the coming period (IT Systems Magazine, 2019).  ...  on cyber security issues and increase public security awareness.  ...  The basic goal was to build risk assessment and early warning systems, strengthen intervention capacities for emergency management at the local and regional level, and support specialized rescue modules  ... 
doi:10.36682/icsss_2021_5 fatcat:zya2p2j3uvepndomvdsp4zyoni


A. Gorokhov
2020 Русская политология – Russian Political Science  
Ecuadorians approvingly qualifi ed infrastructure development and reforms in the social security system [2] .  ...  To meet the technical requirements, the following principles must be observed, consider them in Figure 2 .  ...  A special feature during the years of the European migration crisis was the outbreak of terrorist attacks on individuals, property and business.  ... 
doi:10.51180/rps.2020.15.2.014 fatcat:iltkeasqnfazpc4jiyu7k3febi

1st Politeia International Conference Proceedings. Europe at the Crossroads: Leadership, Challenges and State of Play

Symeon Sidiropoulos, Stylianos Tzagkarakis, Dimitrios Kritas
2021 Social Science Research Network  
They use daily data for a period from 2 nd May 1990 to 1 st September 2006.  ...  It includes six strategic priorities: 1) to achieve cyber-resilience; 2) to reduce cybercrime; 3) to develop a cyber-defence policy and capabilities related to the Common Security and Defence Policy (CSDP  ...  Where the "European energy security strategy" will lead? The energy security stress tests showed that if Russian or Ukrainian gas is disrupted there is going to be a substantial impact on the EU.  ... 
doi:10.2139/ssrn.3784083 fatcat:rocpuffwfjc3jclwpxt54gbsbq

Analysis Of Existing Assessment Resilience Approaches, Indicators And Data Sources: Usability And Limitations Of Existing Indicators For Assessing, Predicting And Monitoring Critical Infastructure Resilience

Aleksandar Jovanović, Peter Klimek, Amrita Choudhary, I. Linkov, Knut Øien, Nicolas Schmid, Maike Vollmer, Johan Sanne, S.L. Andersson, Zoltán Székely, Riitta Molarius, Thomas Knape (+4 others)
2016 Zenodo  
Source Who issued KPI EC References From which document was the KPI taken 300/2008/EC Table 21 : 21 Technical features of indicator LAW Technical Features Unit(s) No further explanation  ...  General Information Short name Unique name of the KPI COMM Long name Detailed name of the KPI Communication efficiency Table 24 : 24 Technical features of indicator COMM Technical Features  ...  Is it a safety/security official of a city?  ... 
doi:10.5281/zenodo.376412 fatcat:q7zy65ybkrfj5minndadozq3cm

Open Identity Summit 2020

2020 Open Identity Summit  
Digital services as well as work processes, customer relationship management, telecommunications and payment systems relyo nf orms of IdM. IdM is abusiness-critical infrastructure.  ...  Security Dialogue, 46 (2):144Ű164, 2015.  ...  Given their conceptual relation to threat and risk analysis from the Ąeld of cyber security and the progress in automation in that area (cf.  ... 
dblp:conf/openidentity/X20 fatcat:ls26vmy7yveqzfzphbizad6kxi

Toxicity Analysis and Cry Gene Profiling of Bacillus Thuringiensis Isolated from Western Ghats of Tamil Nadu State, India

A. Ramalakshmi, P. Annakodi, V. Udayasurian, V. Balasubramani
2018 Proceedings of the Indian National Science Academy  
This becomes evident from the quote due to Kurt Gödel 2 from his Gibbs Lecture: "the greatest improvement was made possible through the precise definition of the concept of finite procedure, which plays  ...  Research on cyber security can be summed up by: Security never settles on a claim. Every security claim has a lifetime. This fact provides a basis for setting an agenda for cyber security research.  ...  Broad Challenges for Cyber security To realize a firm cyber security is to provide a holistic approach to fraud prevention. This requires disruptive approaches to handle infections and cyber crime.  ... 
doi:10.16943/ptinsa/2018/49413 fatcat:2w6rohpbava5zh6m26tsiz7qky

D3.1 – State-of-the-Art and Market Analysis Report

ASSIST-IoT Consortium
2021 Zenodo  
No connection and no interoperability. • Level 1 -Technical. Have technical connection(s) and can exchange data between systems.  ...  Also, SecureIoT introduces a range of security interoperability mechanisms in order to support cross-vertical and cross-platform cyber-security scenarios.  ... 
doi:10.5281/zenodo.6705158 fatcat:xote6pjzubcvxo4aqxxbraooxi

Rejuvenating transatlantic strategic culture: Towards a new Atlanticism [article]

Joe Burton
2020 Zenodo  
Towards a 'democratic' way of AI Like-minded states can embed democratic values into technology by treating systems, particularly AI, as inherently socio-technical.  ...  standards suited for AI. 13 hile socio-technical standards are difficult to achieve, they are not without precedent: IEEE 010-2020, which assesses how intelligent systems impact human well-being , could  ...  In addition, she works on strategic foresight, as well as security and conflict in the Middle East and orth Africa.  ... 
doi:10.5281/zenodo.6138769 fatcat:jizrtgl6hbg5lmg5sulwvw653e
« Previous Showing results 1 — 15 out of 173 results