Filters








5,400 Hits in 7.0 sec

Validation of Regulation Documents by Automated Analysis of Formal Models

Didier Bert, Fabrice Bouquet, Yves Ledru, Sylvie Vignes
2006 International Conference on Advanced Information Systems Engineering  
Then, models are lightly altered, and test scenarios are generated to determine how security measures could be breaked.  ...  The security of civil aviation is regulated by a series of international standards and recommended practices. The EDEMOI project aims at investigating different techniques to analyse these standards.  ...  In the litterature, regulation modelling has not attracted much attention from the computer science research community.  ... 
dblp:conf/caise/BertBLV06 fatcat:ptczxt2ddvh4bn6urdy7vqqp74

Airport Management Program and Curriculum Issues at 2- and 4-year Aviation Colleges and Universities

Stephen M. Quilty
2004 Collegiate Aviation Review International  
Not as well developed are curricula and goals for student outcomes related to airport management and operations, or aviation management programs in general.  ...  This paper presents and outlines issues as they relate to the development of an airport/aviation management curriculum for 2-and 4-year post secondary education institutions and promotes discussion on  ...  Knowledge of airport certification and security • General airport operations practices • Airline operations • Airport security • Emergency practices and rescue techniques • Emergency and disaster  ... 
doi:10.22488/okstate.18.100326 fatcat:3pgslnkianhktjjftjcxhj5q3m

Emerging Technologies in the Context of "Security"

2006 Connections The Quarterly Journal  
This document provides the framework for concerted European activity in the field of security and, more specifically, in activities to anticipate and cope more effectively and efficiently with new security  ...  In March 2004, the European Commission launched its Preparatory Action on Security Research (PASR), and the Group of Personalities advocated in its report "Research for a Secure Europe" the creation of  ...  Water) Model for Security The underlying structure to this definition is illustrated in the security model below, which was introduced by the ISO Advisory Group on Security in 2004 (ISO/TMB AGS N 46,  ... 
doi:10.11610/connections.05.2.06 fatcat:aduyfku5ajgadjs2urznezoxoy

Detecting Zones And Threat On 3D Body In Security Airports Using Deep Learning Machine

Abel Ag Rb Guimaraes
2018 Zenodo  
Electrical and Computer Engineering Department of Ryerson University, Toronto, ON M5B2K3, Canada  ...  Combining with filters, the model could classify those zones of the bodies with a robust result that can help TSA agency security in all airports of North America and world.  ...  His research interests are in the areas of Computer Vision, Machine Learning, and Data Science.  ... 
doi:10.5281/zenodo.1189344 fatcat:c2qvmc7fxfgzxg23fz7mtunshu

A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System

Joseph R. Laracy
2017 International Journal of Communications, Network and System Sciences  
A new approach is proposed in this paper that applies principles from control theory to enforce constraints on security threats thereby extending techniques used in system safety engineering.  ...  Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats.  ...  function at US Airports.  ... 
doi:10.4236/ijcns.2017.105005 fatcat:emehig6wenhvpblv4b3rs65xku

Computational Game Theory for Security and Sustainability

Albert Xin Jiang, Manish Jain, Milind Tambe
2014 Journal of Information Processing  
Computational game theory can help design such security schedules.  ...  Indeed, casting the problem as a Bayesian Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for security scheduling.  ...  This section provides details on this use of Stackelberg games for modeling security domains.  ... 
doi:10.2197/ipsjjip.22.176 fatcat:7rfo3ldn5ze4jpevtf5e6ldaia

PRIVATE GRAPHS – ACCESS RIGHTS ON GRAPHS FOR SEAMLESS NAVIGATION

W. Dorner, F. Hau, R. Pagany
2016 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
suggest different approaches how to make graph data for navigational purposes available considering access rights and data protection, privacy and security issues as well.  ...  After the success of GNSS (Global Navigational Satellite Systems) and navigation services for public streets, indoor seems to be the next big development in navigational services, relying on RTLS – Real  ...  This system is commonly occurring in computer science, especially, as already mentioned, in file formats.  ... 
doi:10.5194/isprsarchives-xli-b4-579-2016 fatcat:3noyk2ilm5bbfczvxs5xgq677y

PRIVATE GRAPHS – ACCESS RIGHTS ON GRAPHS FOR SEAMLESS NAVIGATION

W. Dorner, F. Hau, R. Pagany
2016 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
suggest different approaches how to make graph data for navigational purposes available considering access rights and data protection, privacy and security issues as well.  ...  After the success of GNSS (Global Navigational Satellite Systems) and navigation services for public streets, indoor seems to be the next big development in navigational services, relying on RTLS – Real  ...  This system is commonly occurring in computer science, especially, as already mentioned, in file formats.  ... 
doi:10.5194/isprs-archives-xli-b4-579-2016 fatcat:twcvrc67f5adtlfq45qxz5a2km

Design of Air Traffic Control Operation System Using Multi Agent Technology and Simulation

Zhipeng Wei, Jing Li
2015 The Open Fuels & Energy Science Journal  
The simulation model uses Agent-based techniques to describe micro behaviors of the air traffic individuals and integrates micro behaviors into dynamic macro performance in system-wide level.  ...  A hybrid air traffic simulation model described by the combination of discrete event and continuoustime models is proposed.  ...  ATC system is a complex system; the use of computer simulation of air traffic control system is an important research tool.  ... 
doi:10.2174/1876973x01508010368 fatcat:wn63jmjwqnbzzeipmt6hgarhla

A survey on formal specification and verification of separation kernels

Yongwang Zhao, Zhibin Yang, Dianfu Ma
2017 Frontiers of Computer Science  
They use mathematical logic and rigorous models for analysis and verification, can be used at all the system life cycles, and provide verified software without bugs with respect to certain properties.  ...  What's even more exciting is that Rockwell Collins's formal work for the AAMP7 chip, [34] , received the highest level of EAL-7 (US) National Security Agency security certification for the Common Criteria  ...  The project established a line-by-line protocol model with AAMP7 microcode and added some security features for inter-partition communication in the protocol model.  ... 
doi:10.1007/s11704-016-4226-2 fatcat:2sbm6z35y5cphjxeg4z2spf63a

Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System

Samidh Chakrabarti, Aaron Strauss
2002 First Monday  
To improve the efficiency of airport security screening, the FAA deployed the Computer Assisted Passenger Screening system (CAPS) in 1999.  ...  In this paper, we show that since CAPS uses profiles to select passengers for increased scrutiny, it is actually less secure than systems that employ random searches.  ...  Using mathematical models and computer simulation, we show how a terrorist cell can increase their chances of mounting a successful attack under the CAPS system as opposed to a security system that uses  ... 
doi:10.5210/fm.v7i10.992 fatcat:tqrot5kaarfg7k5d5vpbie4orq

Opportunities and obligations for physical computing systems

J.A. Stankovic, I. Lee, A. Mok, R. Rajkumar
2005 Computer  
For pervasive computing to achieve its promise, developers must create not only high-level system software and application solutions, but also low-level embedded systems solutions.  ...  Opportunities and Obligations for Physical Computing Systems T he recent confluence of embedded and real-time systems with wireless, sensor, and networking technologies is creating a nascent infrastructure  ...  Security analysts need new techniques for dealing with these simple yet potentially devastating attacks.  ... 
doi:10.1109/mc.2005.386 fatcat:eq66t5tu5jernpkpjfskls3qeu

Security of IoT Automated Devices Using Different Authentication Methods

Nikhil Kumar, Pushpneel Verma, Ajay Singh
2022 International journal of computer science and mobile computing  
Results: Insecure authentication process biometrics, PINs, and other methods offer additional security for IoT that is autonomously implemented.  ...  Additionally, for the purpose of ensuring confidentiality during communications, there are a variety of Authentication methods that meet the requirements of Security.  ...  In the case of Transport Layer Security (TLS) certificates, the user is usually an electronic device or computer but TLS certificates can be used to identify businesses or individuals in addition to their  ... 
doi:10.47760/ijcsmc.2022.v11i02.014 fatcat:bvuk454hwndvfeydksu7apjmlq

The Internet of Things Technology Development and Application -- Zhengzhou Airport as An Example

Songlin Hu, Bing Li, L. Zhao, A. Xavior, J. Cai, L. You
2017 MATEC Web of Conferences  
Combining with the development of the Internet of things industry area, zhengzhou air port development makes us on the Internet of things has a comprehensive and accurate understanding and awareness. 1  ...  Development status at home and abroad Networking is an important part of the strategic emerging industries, is following the computer, Internet and mobile communication is a new round of revolution of  ...  But due to consider their own conditions for application requirements and industrial reality, together with the Internet of things, cloud computing is the development of emerging industries such as law  ... 
doi:10.1051/matecconf/201710003018 fatcat:f2nhfoqr7rcurkc7oyqrtj5pny

Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties [chapter]

Italo Dacosta, Mustaque Ahamad, Patrick Traynor
2012 Lecture Notes in Computer Science  
for their certificates using previously established user authentication credentials.  ...  In this paper, we propose Direct Validation of Certificates (DVCert), a novel protocol that, instead of relying on third-parties for certificate validation, allows domains to directly and securely vouch  ...  Acknowledgments This work was supported in part by the US National Science Foundation (CAREER CNS-0952959).  ... 
doi:10.1007/978-3-642-33167-1_12 fatcat:ye7cuxnz4nepfdubsrf6piumou
« Previous Showing results 1 — 15 out of 5,400 results