Science topic

Security - Science topic

Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Security (10,000)
Sorted by most recent
Book
Full-text available
Decoupling of business models and ecosystems is the disconnection of certain characteristic activities originally planned and completed in coincidence. It could bring in an immense adverse shock in the functioning of established business models and ecosystems possibly bringing them to resilience. Core causes for decoupling and resilience of busines...
Conference Paper
Full-text available
Data is an integral part of almost every business. Sharing data enables new opportunities to generate value or enrich the existing data repository, opening up new potentials for optimization and business models. However, these opportunities are still untapped, as sharing data comes with many challenges. First and foremost, aspects such as trust in...
Chapter
Full-text available
Sustainability deals with companies as a social unit that influences society and is affected by it. Therefore, this society needs to know the social, environmental and economic impacts of the activities carried out by companies and report them. The objective of this research is to define the importance of both sustainability and reporting it throug...
Article
Full-text available
In this study, we present a two-stage robust optimization model for dynamic generation and transmission expansion planning considering discrete recourse decisions and n−K security constraints. Unlike the mainstream literature, our approach exactly considers cost non-convexities, binary commitment decisions, and security constraints. By customizing...
Article
Full-text available
Resumo A utilização de drones, ou aeronaves remotamente pilotadas (RPA), para a gestão da segurança nos canteiros de obras se destaca pela redução do tempo de inspeção e melhoria na identificação de riscos. No entanto, existe uma lacuna referente ao uso efetivo das informações fornecidas com o uso dessa tecnologia no planejamento e controle de segu...
Article
Full-text available
The calamity begins if an attacker successfully compromises a system and gains access to high-level privileges. This paper presents and addresses a vulnerable Linux server with typical flaws and configuration errors. This paper aims to show how these widespread vulnerabilities might be used by an attacker to compromise the server. In order to preve...
Article
Full-text available
The collaborative filtering recommendation technique (CFR) is one of the techniques used in recommended systems, in which the most proximal neighbours to a target user are selected. Their profiles are used to predict rating for items as yet unrated by that target user. However, malicious users inject fake user profiles to destroy the security and r...
Article
Full-text available
The London Interbank Offered Rate (Libor) was a benchmark interest rate that major banks of London charge to each other. This benchmark interest rate is used by major global banks for lending to one another in the international interbank market for different categories of loans. It will, however, be phased out by June 30, 2023. In 1969, this organi...
Article
Full-text available
In the fast growing mobile revolutionary era, many operating systems are playing vital role in present market. This study is intending to identify the apt and secure mobile based on mobile operating systems capability and user requirements.
Chapter
Full-text available
Zusammenfassung Moderne Informations- und Kommunikationstechnologien (IKT) sind das zentrale Nervensystem weltweiter Wirtschaftskreisläufe, des gesellschaftlichen Zusammenlebens und staatlichen Han-delns. Sie sind einerseits eine Errungenschaft, ohne die wir unser Leben nicht so führen könnten, wie wir es kennen. Andererseits können schon kleinste...
Preprint
Full-text available
The paper proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on the elliptic curves. The schemas are construction according to the proposed method here can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message. In additio...
Article
Full-text available
Promise Theory is used as a framework for analysing the baffling escalation in the third phase of the Russo-Ukrainian war that started on February 24, 2022, which suggests unconventional steps. It is argued that an exit of the UK from NATO may constitute an important step towards a more reliable and functional security architecture in Europe.
Conference Paper
Full-text available
Data marketplaces are online platforms that provide a way for individuals to monetize their (personal) data. In traditional data marketplaces, the data is uploaded to the marketplace platform in plain-text. Since the broker has access to all data, such marketplaces are risk to the user's privacy. We present a privacy-preserving marketplace that al...
Article
Full-text available
Scientific research and teaching are two essential tasks of lecturers, having a close relationship, interacting, and reciprocating. In this article, by using research methods combined with candid discussion with unit leaders, the author proposes solutions to improve the quality of scientific research activities for the teaching staff defense and se...
Chapter
Full-text available
Zusammenfassung Energiesysteme sind essenziell für Sicherheit und Wohlstand und zählen zu Recht zu den kritischen Infrastrukturen in Deutschland. Gegenwärtig erzwingt die Energiewende ihren auf vielfältige Weise herausfordernden Umbau – verbunden unter anderem mit einer starken Kopplung der Teilsysteme, beherrschbar nur auf Basis umfassender Digita...
Article
Full-text available
The European Union’s (EU) efforts toward reaching sustainable development goals (SDGs) and the regulatory decisions serve as a model for other nations. Despite the successful progress of the EU in the field of development, it is seen that crime and security problems continue. Security is one of the essential factors for the welfare of the people in...
Chapter
Full-text available
Zusammenfassung Globale Lieferketten sind sensibel und vulnerabel. Jederzeit. Das haben die Erfahrungen während der COVID-19-Pandemie 2020 noch einmal deutlich vor Augen geführt. Rein auf Effizienz ausgerichtete Lieferketten bieten weder Sicherheit noch die notwendige Flexibilität, um zeitnah und angemessen auf Störungen reagieren zu können. Auch h...
Preprint
Full-text available
Delegation and authority scholars in the principal-agent literature repeatedly identify the delegation of authority from principal to agent as resulting in greater agency slack. However, scholars of the principal-agent literature rarely go past the second level on the delegation chain, especially when examining the delegation of authority from inte...
Article
Full-text available
Resumo: A expansão urbana de forma desordenada, bem como a popularização dos automóveis, trouxe grandes impactos ambientais relacionados à mobilidade urbana. A bicicleta é uma alternativa de meio de locomoção sustentável, porém, para ser viável aos usuários é necessária a criação de ciclovias e ciclofaixas com condições de acessibilidade, conforto...
Article
Full-text available
We analyse the estate composition of the richest 30 per cent of people who died in the Netherlands in 1921 to find that households used a broad range of institutions to meet their financial demands. Goods and services were either paid in cash or settled periodically with suppliers. Despite the strong growth of commercial banking in the previous dec...
Article
Full-text available
The gradual expansion of power transmission networks leads to an increase in short-circuit current (SCC), which has an impact on the secure operation of transmission networks when the SCC exceeds the interrupting capacity of the circuit breakers. In this regard, optimal transmission switching (OTS) is proposed to reduce the short-circuit current wh...
Article
Full-text available
Resumo Este artigo analisa efeitos de mídia de curto prazo de anúncios de carros na TV que glorificam o risco, e associações de longo prazo, como o uso de videogames violentos, sobre as atitudes dos jovens em relação à experiência de dirigir. O estudo, que utiliza metodologia experimental com desenho entressujeitos, teve a participação de 106 estud...
Article
Full-text available
Introdução: A dor do parto é uma experiência vivenciada pela maioria das parturientes. Recursos não farmacológicos podem ser usados para reduzir o quadro álgico, a duração e o risco de sofrimento materno e fetal no parto. O objetivo deste estudo foi avaliar os efeitos do uso da bola de nascimento na redução da dor e duração do trabalho de parto. Mé...
Preprint
Full-text available
Digital identities today continue to be a company resource instead of belonging to the actual person they represent. At the same time, the digitalization of everyday services intensifies the Identity Management problem and leads to a constant increase of users online identities and identity related data. This paper presents DIMANDS2, a framework ca...
Article
Full-text available
Focusing on the problem that existing traditional cross-domain group authentication schemes have a high complexity, a certificateless cross-domain group authentication key agreement scheme based on ECC is proposed. The protocol provides scalability and can meet the requirements of cross-domain key negotiation by multiple participants in different d...
Article
Full-text available
This study is aimed at firstly scrutinizing the reshufflings within Syrian security system in the first half of 2019, secondly to understand the internal and external motives and objectives of new appointments in security and intelligence departments. There are two research questions: 1. What were the key factors behind the decision of the Syrian a...
Book
Full-text available
El libro hace un recuento de los doce primeros años (2006-2018) de la confrontación del Estado Mexicano a las organizaciones criminales relacionados a los delitos del narcotráfico. Se expone, las decisiones de política publica en materia de seguridad y sus resultados.
Preprint
Full-text available
Major families of pairing-friendly elliptic curves, including BN, BLS12, BLS24, KSS16, and KSS18 have recently been vulnerable to number field sieve (NFS) attacks. Due to the recent attacks on discrete logs in F_(q^k ), selecting such curves became relevant again. This paper revisited the topic of selecting pairing-friendly curves at different secu...
Article
Full-text available
A odontologia tem abordado em suas literaturas a importância de se preocupar com a saúde associada à autoestima do paciente, evidenciando os problemas como um todo e não apenas como casos clínicos isolados, sendo comprovado que a aparência física possui influência significativa em vários conceitos da vida do indivíduo. Nessa perspectiva, enfatiza-s...
Preprint
Full-text available
With unprecedented mass inflow of Rohingya refugees in Bangladesh in 2017, the host country has been suffering many security issues of varying degrees in individual, state, and international levels. The article argues that protracted presence of Rohingya has created multi-faced individual level security issues usually ignored by the research commun...
Article
Full-text available
Currently, we are living through the implementation of the electrical smart grid, a network that can intelligently integrate the actions of all users connected to it in order to efficiently deliver the sustainable, economical and secure supply of electricity [...]
Article
Full-text available
La caída en las coberturas de vacunación asociada con la desconfianza de la población hacia las vacunas, ha sido definida como una amenaza para la salud a nivel global. A través de un enfoque cualitativo, estudiamos la significación social de las vacunas y, mediante entrevistas realizadas a madres y padres de la Ciudad de Buenos Aires, describimos...
Article
Full-text available
Aproximadamente 30 milhões de pessoas vivem nas áreas rurais brasileiras, com realidades bastante distintas e nem sempre favoráveis ao acesso a direitos fundamentais, como a saúde, lazer, educação, segurança, renda, alimentação. Então, como estes indivíduos poderiam permanecer nestes territórios, com alcance do estado de desenvolvimento humano? E a...
Article
Full-text available
New economic paradigms: The Sharing economy and the Circular economy are extremely significant and their favorable impact on global economic conditions is unquestionable. However, the emergence of Blockchain technology opens up space for significant improvements in these paradigms in terms of efficiency, security and trust. Blockchain technology re...
Article
Full-text available
In this paper, we present a new account of teleological reasons, i.e. reasons to perform a particular action because of the outcomes it promotes. Our account gives the desired verdict in a number of difficult cases, including cases of overdetermination and non-threshold cases like Parfit’s famous Drops of water. The key to our account is to look mo...
Article
Full-text available
Cloud computing technology is the most widely used current application. Due to the strength of the infrastructure, the ease of providing services, and its speed, it is scalable and expandable, and it has many characteristics. Despite all that has been mentioned about cloud computing, it faces many problems. Like flexibility and security which is it...
Article
Full-text available
Essa pesquisa analisou a motivação para a prática de atividades físicas em mulheres praticantes de hidroginástica. Foi utilizado Inventário de Motivação a Prática de Atividades Físicas (IMPRAF-54). A dimensão com maior média foi “saúde”, sendo essa significativamente diferente das demais dimensões. Estética e competitividade motivam pouco as partic...
Article
Full-text available
For of copyright security for sight and sound information, computerized watermarking innovation has drawn in increasingly more consideration in different exploration fields. Analysts have started to investigate the achievability of applying it to include picture detecting information as of late. On account of the distinction of remote detecting pic...
Article
Full-text available
Este trabalho teve como objetivo realizar a caracterização físico-química de cortes cárneos, coxa e peito, de frangos convencionais e frango caipira. As amostras foram coletadas na cidade de Uberlândia, no estado de Minas Gerais, Brasil. No sistema convencional as aves são escolhidas geneticamente para procriar gerações bem específicas dentro do pr...
Article
Full-text available
Software-defined networking (SDN) has recently aimed to support the ever-changing and flexible nature of network functions through simplified software-enabled control. Decoupling the forwarding plane from the control plane is how SDN showcases its innovative side. However, that does not lessen concerns about security. Newer and more devastating att...
Article
Full-text available
With the rapid development of Internet technology, numerous malicious URLs have appeared, which bring a large number of security risks. Efficient detection of malicious URLs has become one of the keys for defense against cyber attacks. Deep learning methods bring new developments to the identification of malicious web pages. This paper proposes a m...
Article
Full-text available
Resumo: Introdução: O Teste de Progresso (TP) é uma avaliação cognitiva abrangente e longitudinal com vantagens para o aprendiz, os programas educacionais e a sociedade. No Brasil, embora seja amplamente utilizado na graduação, existe pouca experiência do seu uso na residência médica. Este estudo visa retratar a experiência da Federação Brasileira...
Article
Full-text available
Resumo: Introdução: O ensino por meio da vivência prática, denominado preceptoria, permite aos aprendizes buscar informações e esclarecer dúvidas com os preceptores, de maneira a desenvolver competências e habilidades em um ambiente de apoio e segurança, elementos essenciais ao bom aprendizado. Objetivo: Esse estudo objetivou compreender as concepç...
Article
Full-text available
A segurança da rede elétrica preocupa-se tanto com a integridade física dos componentes do sistema elétrico quanto com o bem-estar daqueles que operam nele ou em seu entorno. A distribuição de eletricidade é vulnerável a uma ampla variedade de modos de falha. Eletricidade gerada por descargas atmosféricas como raios, que podem causar danos à infrae...
Conference Paper
Full-text available
Xülasə. Optik-lifli rabitə xətlərinin analizi göstərir ki, veriliş mühiti kimi optik liflərdən istifadə olunan optik telekommunikaisya sistemləri elektromaqnit maneələrinə qarşı davamlıdır. Optik lif üzrə ötürülən informasiya icazə verilməyən müdaxilələrdən tam mühafizə olunur. Optik-lifli rabitə xətlərində ötürülən hər hansı növ informasiyaya icaz...
Chapter
Full-text available
En esta obra Testimonios antropológicos de la pandemia por Covid-19, decidimos compartir, como académicos, nuestra experiencia de trabajo con actores de veinticuatro comunidades rurales de la Península de Yucatán, sistematizando y dando a conocer el proceso de construcción de una certificación colaborativa en materia sanitaria. Dicha certificación...
Article
Full-text available
Em hebraico, Krav Magá pode ser traduzido como “luta corpo a corpo” ou “combate de contato”. É uma técnica israelense que permite à pessoa se defender, mesmo inferiorizada em termos de força. Também é usada por tropas especiais, ou seja, por efetivos treinados para tratar de questões de segurança. Ela foi idealizada e desenvolvida pelo judeu-húngar...
Presentation
Full-text available
Top trends impacting load balancing (including containers, security)
Article
Full-text available
Background Tracheostomy is widely used for securing the airway; however, complications do occur. One such rare complication is a fracture of the tracheostomy tube which presents as a foreign body of the tracheobronchial tree. Case presentation We report a case of a 7-year-old child who presented with mild respiratory distress following fracture an...
Article
Full-text available
This paper studies the problem of fractional-order impulsive security control for uncertain fractional-order delayed multi-agent systems (FDMASs) under Denial-of-Service (DoS) attack. New sufficient conditions to achieve impulsive secure consensus are analyzed. To determine the stability of the resulting error system, we utilized fractional-calculu...
Chapter
Full-text available
Sia lo studio sia la pratica della sicurezza internazionale sono andati incontro a profonde trasformazioni negli ultimi trent'anni. Laddove prima l'unico interesse era la sicurezza materiale degli Stati, ora il panorama dei temi affrontati si è ampliato notevolmente, includendo numerosi elementi precedentemente sottovalutati. I cambiamenti climatic...
Article
Full-text available
Resumo Este artigo apresenta o relato da experiência de supervisão de desinstitucionalização do sistema prisional a partir da articulação da Rede de Atenção Psicossocial (RAPS), realizada de 2014 a 2021 no âmbito da Superintendência de Saúde Mental/Secretaria Municipal de Saúde do Rio de Janeiro. Trata-se de um trabalho de desinstitucionalização de...
Article
Full-text available
Attachment is important for pro-relationship behavior. Past research has suggested that anxious and avoidant attachment makes people less likely to forgive, but dyadic effects of secure and preoccupied attachment have not been considered. We tested actor and partner effects of attachment on forgiveness (increased benevolence; decreased resentment)...
Article
Full-text available
In this paper, we study the hybrid dual attack over learning with errors (LWE) problems for any secret distribution. Prior to our work, hybrid attacks are only considered for sparse and/or small secrets. A new and interesting result from our analysis shows that for most cryptographic use cases a hybrid dual attack outperforms a standalone dual atta...
Article
Full-text available
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure use...
Chapter
Full-text available
Ländliche Räume sind wieder »in«: In Zeiten der Corona-Krise gelten sie als vermeintlich sicherere Orte, Investor*innen entdecken das Land als einträgliches Geschäftsfeld und Eigentümer*innen profitieren von Preissteigerungen bei Grund und Boden. Gleichzeitig entwickeln sich ländliche Räume stark auseinander: in prosperierende und abgehängte Region...
Presentation
Full-text available
The Postil interview with Michael Jabara Carley about his forthcoming book _Stalin's Gamble: The Search for Allies against Hitler, 1930-1936_, University of Toronto Press, June 2023
Article
Full-text available
RNA viruses can quickly spread and cause serious, even fatal, illnesses in both humans and animals. Platforms for creating and refining viral mutants for vaccine development have been made available by the introduction of reverse genetics methods for manipulating and studying the genomes of RNA viruses. In this article, we review the effects of RNA...
Article
Full-text available
O novo mandato de Xi Jinping e seus reflexos para a segurança e defesa da China
Article
Full-text available
This article is an overview of recent progress on a theory of games, whose payoffs are probability distributions rather than real numbers, and which have their equilibria defined and computed over a (suitably restricted yet dense) set of distributions. While the classical method of defining game models with real-valued utility functions has proven...
Article
Full-text available
São muitos os assentamentos no país ocupados majoritariamente por famílias de baixa renda. O objetivo deste trabalho é apontar as formas de provisão habitacional acessíveis à população de baixa renda e investigar se as moradias obtidas podem ser consideradas adequadas segundo o conceito apresentado pela Organização das Nações Unidas (ONU). Para ati...
Preprint
Full-text available
This paper introduces SPOT, a Secure and Privacy-preserving prOximity based protocol for e-healthcare systems. It relies on a distributed proxy-based approach to preserve users' privacy and a semi-trusted computing server to ensure data consistency and integrity. The proposed protocol ensures a balance between security, privacy and scalability. As...
Article
Full-text available
This paper deals with the references generation for a team of unmanned aerial vehicles tethered to a ground station for inspection applications. In order to deploy the team of vehicles in a suitable location to cover the largest area, each vehicle is commanded to securely navigate in an area of interest while it is tethered to another vehicle or to...
Article
Full-text available
Electrical network components catastrophically fail as a result of aberrant system oscillations. Also, consequently leads to saturation in the ferromagnetic core elements. These factors induce distortions in the voltage and current waveforms as well as a large rise in voltage or current. This paper presents the role of distributed generation (DG) i...
Article
Full-text available
Most traditional theories of clientelism assert that parties in need of securing electoral support invest in vote buying. We consider this framework limited because of two reasons. First, it assumes that losses and gains affect a party’s decision-making process in comparable ways. Second, the framework assumes that the decision-making process of cl...
Article
Full-text available
This article discusses the process of online collection of signatures for legislative proposals, taking as a starting point the current process for popular initiative in California. It describes how online signature of popular initiative petitions would work, as well as security issues and other objections to the collection of signatures via the in...
Conference Paper
Full-text available
A segurança do operador em uma planta industrial é altamente relevante, principalmente em trabalho em altura onde os acidentes potenciais possuem elevada gravidade. Neste aspecto, uma empresa de não-tecidos, analisando as atividades desenvolvida em sua planta e aplicando a ferramenta FMEA detectou a necessidade de implementação de dispositivo de li...
Article
Full-text available
O iogurte é um alimento lácteo de grande importância para a alimentação humana em virtude de suas propriedades funcionais, além de ser muito popular em todo o mundo. Tradicionalmente, no Brasil esse produto é elaborado a partir do leite bovino. Entretanto, nos últimos anos tem crescido a produção de iogurte fabricado a partir do leite de outros mam...
Article
Full-text available
Resumo Objetivou-se relatar a experiência no gerenciamento de pesquisa-ação sobre inquérito de hepatite C junto à comunidade carcerária no Triângulo Mineiro, Minas Gerais. A proposta foi desenvolvida entre março de 2019 e março de 2020, alcançando 240 pessoas, com o intuito de conter a disseminação do agravo por meio de inquérito, testagem e acompa...
Article
Full-text available
Las evidencias científicas han corroborado una subrepresentación de las mujeres en el periodismo de opinión, en línea con el patrón de exclusión de la voz de las mujeres en el espacio público. Este trabajo explora dicho fenómeno desde el periodismo local: cuantifica la producción de piezas de opinión durante dos semanas en 53 medios locales de la c...
Preprint
Full-text available
We consider the problem of controller design for linear time-invariant cyber-physical systems (CPSs) controlled via networks. Specifically, we adopt the set-up that a controller has already been designed to stabilize the plant. However, the closed loop system may be subject to actuator and sensor attacks. We first perform a reachability analysis to...
Article
Full-text available
In order to secure our data, Cryptography can guarantee the confidentiality and integrity of both data at rest and data in transit in order to secure our data. Additionally, it can prevent repudiation and authenticate senders and recipients to one another. Several endpoints, often multiple clients, and one or more back-end servers are common featur...
Conference Paper
Full-text available
Job satisfaction of library Professionals is essential in achieving objectives. Motivation and Job security are the two main factors that affect job satisfaction. The objectives of the study are to the relationship between job satisfaction and intrinsic and extrinsic motivational factor and job security. A Total no of 70 private and government libr...
Article
Full-text available
Introducción: La pandemia COVID-19 ha supuesto un reto social, económico, pero sobre todo sanitario. La consulta telefónica que se inició durante el confinamiento, inicialmente en atención primaria y después, con la relajación de las medidas, en la atención hospitalaria, se ha implementado como opción asistencial. Se ha elaborado un estudio para in...
Article
Full-text available
This paper investigates secure control of Networked Inverted Pendulum Visual Servo Systems (NIPVSSs) based on Active Disturbance Rejection Control (ADRC). Firstly, considering the network- and image-induced delays in conjuction with computational errors caused by image processing and image attacks, the model of NIPVSSs is established. Secondly, the...
Article
Full-text available
Este artículo explora y analiza la inseguridad ciudadana frente a la delincuencia en Chile, especialmente la vinculada con los llamados delitos de mayor connotación social (DMCS). El diseño metodológico fue de corriente cuantitativa y de tipo analítico-transeccional, utilizando técnicas descriptivas e inferenciales con datos de la Encuesta Nacional...
Presentation
Full-text available
VI Congresso e Central de Negócios Brasil Sul de Avicultura, Suinocultura e Laticínios promovido pela AVISULAT. [7º Seminário ASGAV/SIPARGS SST Segurança, Saúde e Medicina do Trabalho] Painel 2 - Gestão de riscos: desafios e oportunidades na evolução da SST Estratégias de amostragem: Gestão das exposições em Higiene Ocupacional com foco na propos...
Chapter
Full-text available
This essay examines the relationship between critical minerals and resource security and then considers Australia’s current strategy toward the critical minerals sector as well as its emerging international strategy.