Lingareddy, S C; Babu, Dr Vinaya; Dhruve, Kashyap
Wireless Networks rendering varied services has not only become the order of the day but the demand of a large pool of customers as well. Thus, security of wireless networks has become a very essential design criterion. This paper describes our research work focused towards creating secure cognitive wireless local area networks using soft computing approaches. The present dense Wireless Local Area Networks (WLAN) pose a huge threat to network integrity and are vulnerable to attacks. In this paper we propose a secure Cognitive Framework Architecture (CFA). The Cognitive Security Manager (CSM) is the heart of CFA. The CSM incorporates access control using Physical Architecture Description Layer (PADL) and analyzes the operational matrices of the terminals using multi layer neural networks, acting accordingly to identify authorized access and unauthorized usage patterns.
Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.
Metaphor is a universal phenomenon,the traditional metaphor studies it as a means of rhetoric,but metaphor of modern sees it as a cognitive phenomenon.In our life most of the everyday language is metaphor,our mind is also the metaphor.Meta-phor has become an indispensable tool for understanding the world.There are a lot of “building”metaphorical expressions in the life, construction is an important component of people’s lives. K?vecses (2002)discussed briefly some conceptual metaphors of the construction in English,Deignan (2001)make a compre-hensive study on building metaphors which underlie some metaphor expression of “building and construction”.Lan Chun (2003)only referred to “theory is building”,but the concept of “life,relationships”can be understood through building concept,these relative ab-stract concepts can be understood by clear concrete building concept.Hence the studies of building metaphors have not been systematic and comprehensive,people seldom study it.We plan to give a contrastive study of building metaphors.This will further deepen peo-ple’s understanding of building metaphors and enrich the cognitive studies of metaphor.
In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size. PMID:27318284
Kosal, Margaret E; Huang, Jonathan Y
In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists. PMID:26399948
This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern itself with semantic attacks and countermeasures.
Attestation is a promising approach for building secure systems. The recent development of a Trusted Platform Module (TPM) by the Trusted Computing Group (TCG) that is starting to be deployed in common laptop and desktop platforms is fueling research in attestation mechanisms. In this talk, we will present approaches on how to build secure systems with advanced TPM architectures. In particular, we have designed an approach for fine-grained attestation that enables the design of efficient secure distributed systems, and other network protocols.We demonstrate this approach by designing a secure routing protocol.
Juebo Wu; Long Tang
This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces the basic issues about cognitive radio network. Then, according to the differences between cognitive radio network and existing wireless network, it analyses and discusses the dynamic spectrum access security and artificial intelligence. Finally, it draws a conclusion to security problems of cross layer design.
Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...
Carvalho Quaresma, Jose Nuno
This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... perspective of the communications between different principals. The notation used in the GSD framework extends that notation with constructs that allow the security requirements of the messages to be described. From that specification, the developer is guided through a semi-automatic translation that enables...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The...
Nuclear security continuously calls for professionals, familiar with established approaches and challenged by innovations and state-of-the art developments in the associated technology and procedures. The constant loss of qualified personnel due to career development, retirement and administrative changes negatively affects a State’s readiness to carry out nuclear security tasks effectively. At the same time, technology and procedures are evolving at an increasing pace with the introduction of new equipment and techniques. Consequently, there is a rapidly growing need for highly qualified experts in nuclear security at the national level. It was estimated by the World Institute for Nuclear Security, WINS,  that worldwide several thousands of people would benefit from education and training in nuclear security. Many employers do not have such a route to realize demonstrable competence. As such, the associated capacity building is to be delivered by the academia, matching education in academic skills with basic knowledge in nuclear security and with the latest trends in associated fields such as nuclear physics, security sciences and (international) legislation
To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and bio...
To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and biocomputation. I trace computation and botanic simulations back to Alan Turing's little-known 1950s Morphogenetic drawings, reaction-diffusion algorithms, and pioneering artificial intelligence (AI) in order to establish bioarchitecture's generative point of origin. I ask provocatively, Can buildings think? as a question echoing Turing's own, "Can machines think?" PMID:26478784
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into
The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte
Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.
This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured with a...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties of the...... permutations are analyzed for several DSA patterns. Simulations are performed according to the parameters of the IEEE 802.16e system model. The securing mechanism proposed provides intrinsic PHY layer security and it can be easily implemented in the current IEEE 802.16 standard applying almost negligible...
Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment. PMID:26587017
Full Text Available With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people’s awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people’s awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people’s cognition of potential risks in online financial payment.
Full Text Available In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, information security issues pertained to the use of Cognitive Radio in a smart grid environment at different levels and layers are discussed and mitigation techniques are suggested. Finally, the well-known Role-Based Access Control (RBAC is integrated with the Cognitive Radio part of a smart grid communication network to protect against unauthorized access to customer’s data and to the network at large.
WESTPHALL, C. B
Full Text Available This paper present a number of research initiatives related to innovative and cut-edge technologies for Cloud Computing. These are chiefly in the fields of (i environment security, (ii quality assurance, (iii service composition, and (iv system management. We present technologies for intrusion detection; a SLA perspective in security management; customer security concerns; a Cloud-based solution for eHealth; experimental assessment of routing for grid and cloud; simulator improvements to validate the green cloud computing approach, and; a framework to radio layer operation in cognitive networks.
Santosh D Jadhav
Buildings have significant impact on energy use and the environment which in turn affects the development of country. Buildings are significant cause of climate change and energy security. In India , Buildings consumes more than 40% of country’s energy and responsible for almost 40% of greenhouse gas emissions. Many initiatives taken by Government of India to increase the efficiency of buildings such as Bachat Lamp Yojna, Use of Energy Efficient Lamps. Suc...
Shibli, Muhammad Awais
The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some...
Few schools command the funding to shift from zero security to updated closed-circuit TV systems. Cost-effective school security identification cards, which provide a rapid means of identifying those belonging on campus, can be integrated with administrative systems to track attendance, age, subject studied, and other vital statistics. (MLH)
Adelsberger, Zdenko; Grubor, Gojko; Nađ, Ivan
Building object (or asset) security has always been a burning subject in all systems and regimes since ancient times, and will always be. The reason for this lies solely in the fact that these objects have a high material, historical, cultural and other value. Therefore, the owners of such buildings, regardless of whether they are the public, civic or some other social institutions, organizations or individuals, have always paid, more or less, attention to the issue of security of such object...
Owens, Ken R., Jr.; Watkins, Steve E.
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
Full Text Available Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is presented. A brief overview of the cognitive radio, IEEE 802.22 standard and smart grid, is provided. Experimental results obtained by using dimensionality reduction techniques such as principal component analysis (PCA, kernel PCA, and landmark maximum variance unfolding (LMVU on Wi-Fi signal measurements are presented in a spectrum sensing context. Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. From the power system point of view, a supervised learning method called support vector machine (SVM is used for the automated classification of power system disturbances. The impending problem of securing the smart grid is also addressed, in addition to the possibility of applying FPGA-based fuzzy logic intrusion detection for the smart grid.
Full Text Available ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by the smart node are transmitted to the base node through ZigBee. If the temperature exceeds or an overload occurs, a set of remote control instructions are executed in the PC. The base node instructs the smart node to cut off the power to the corresponding branch circuit. The entire operation can be monitored from a remote station. In this proposed system, RFID technique is added to provide a theft control mechanism. To prevent theft of valuables from an unauthorized person,RFID tags are used. RFID reader senses the RFID labels (master/slave tags continuously and sends the information to a PC through ZigBee protocol. The database is checked in PC with the received information. If there is any mismatch in the RFID tags, it is considered to be an illegal input and a warning message is generated at the PC. The database is checked for the owner of that particular item and a confirming message is send to that owner. To search for that item the owner can login WEB. The valuable will be stopped by the entrance guard.
ÇOLAK, İlhami; IRMAK, Erdal
ABSTRACTIn this study, a computer controlled building security system based on CANModul-592 microcontroller has been designed and implemented. The system includes fire alarm and intrusion detectors. The signals generated by detectors are transmitted to CANModul-592 that processes the signals and then sends to a computer via parallel port for controlling and visualization of the system. A program for monitoring and parallel port communication has been developed in Borland Delphi 4.0. The achie...
Building robots with the ability to perform general intelligent action is a primary goal of artificial intelligence research. The traditional approach is to study and model fragments of cognition separately, with the hope that it will somehow be possible to integrate the specialist solutions into a functioning whole. However, while individual specialist systems demonstrate proficiency in their respective niche, current integrated systems remain clumsy in their performance. Recent findings in ...
This publication contains excerpts from the conference on new realities: Disarmament, peace-building and global security organized by the Non-Governmental Organization Committee on Disarmament at the United Nations, 20-23 April, 1993, during the regular session of the Disarmament Commission which took place in New York in April-May, 1993. This conference focused on important and topical disarmament and peacemaking issues, and was an opportunity for delegates, non-governmental organization representatives, United Nations staff members and interested individuals to exchange information and discuss the issues in an informal and cordial atmosphere
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Full Text Available Using an empirically driven case study of the effects of the European Security Strategy of December 2003 this article assesses the trends and nature of European security regime building. In assessing EU security regime building it explores, first of all, a securitisation of the European agenda as a top-down approach – initialled by the European Council that extends the security zone on Europe’s periphery through the emergence of a multilateral order and the development of the foreign and security tool box. Secondly, this research suggests that the EU security regime building as a bottom-up process remains under construction within all three EU pillars by everyday policy-making. More important is the fact that the EU pursues a rigid strategy seeking to create the most total vision of a multidimensional security understanding in order to privilege the fight against terrorism at the regional and global level.
Breisinger, Clemens; Ecker, Olivier; Maystadt, Jean-François; Trinh Tan, Jean-François; Al-Riffai, Perrihan; Bouzar, Khalida; Sma, Abdelkarim; Abdelgadir, Mohamed
This Food Policy Report explains why there is a need to place even higher priority on food security-related policies and programs in conflict-prone countries, and offers insights for policymakers regarding how to do so. To understand the relationship between conflict and food security, this report builds a new conceptual framework of food security and applies it to four case studies on Egypt, Somalia, Sudan, and Yemen. It argues that food security-related policies and programs build resilienc...
Raghuram Ranganathan; Robert Qiu; Zhen Hu; Shujie Hou; Marbin Pazos-Revilla; Gang Zheng; Zhe Chen; Nan Guo
Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs) that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is pres...
Secured opportunistic Medium Access Control (MAC) and complexity reduction in channel estimation are proposed in the Cross layer design Cognitive Radio Networks deploying the secured dynamic channel allocation from the endorsed channel reservation. Channel Endorsement and Transmission policy is deployed to optimize the free channel selection as well as channel utilization to cognitive radio users. This strategy provide the secured and reliable link to secondary users as well as the collision free link to primary users between the physical and MAC layers which yields the better network performance. On the other hand, Complexity Reduction in Minimum Mean Square Errror (CR-MMSE) and Maximum Likelihood (CR-ML) algorithm on Decision Directed Channel Estimation (DDCE) is deployed significantly to achieve computational complexity as Least Square (LS) method. Rigorously, CR-MMSE in sample spaced channel impulse response (SS-CIR) is implemented by allowing the computationally inspired matrix inversion. Regarding CR-ML...
Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.
Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.
The restoration of justice and security is a priority of post-conflict peace-building, but children and youth - two groups especially affected by armed conflict - rarely receive consideration in this process. This paper considers how reform of the security sector can contribute to making security provision more relevant to the concerns of young people and more reflective of their needs and aspirations. Security sector reform and transitional justice have been recognized as central elements of...
This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declara...
Kumar, R.; G. Kousalya
Routers in wireless networks are often prone to variety of attacks like a man in the middle, distributed denial of service, smurf, ping of death, routing loops, counting to infinity. Among all these attacks routing loop is the most common one and it have a harmful effect on network performance. In this study, we have proposed a novel cognitive agents based security scheme to handle routing loops in wireless networks. The proposed scheme uses Cognitive Agents (CAs) on every routers with Observ...
PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit
Mihovska, Albena D.; Prasad, Ramjee; Tragos, Elias Z.;
In cognitive radio (CR) systems communication is not restricted to pre-assigned channels, but is rather able to opportunistically detect and use appropriate portions of spectrum. Although much research effort has been put into this new technology, the technical focus has been mainly directed...
Upon its establishment in accordance with Japan’s commitment statement at the 2010 Nuclear Security Summit in Washington DC, the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) was missioned to provide support to efforts to strengthen nuclear security regimes internationally and nationally. Although capacity building support for safeguards has proven to be useful in ISCN’s experience, some nuclear security-specific features need to be considered regarding its application to nuclear security. These features include the self-determining nature of nuclear security requirements, the importance of nuclear security culture for its performance, and the involvement of professionals from a variety of backgrounds. These features have added a new perspective to ISCN’s approach to its nuclear security capacity building support. The paper presents this approach and what lessons can be drawn for its advancement. It begins with a description of challenges to nuclear security capacity building support, introduces ISCN’s experience in addressing these challenges, and discusses how to apply lessons learned to advance our nuclear security capacity building support. (author)
Wang, Ranxiao Frances
Path integration and cognitive mapping are two of the most important mechanisms for navigation. Path integration is a primitive navigation system which computes a homing vector based on an animal's self-motion estimation, while cognitive map is an advanced spatial representation containing richer spatial information about the environment that is persistent and can be used to guide flexible navigation to multiple locations. Most theories of navigation conceptualize them as two distinctive, independent mechanisms, although the path integration system may provide useful information for the integration of cognitive maps. This paper demonstrates a fundamentally different scenario, where a cognitive map is constructed in three simple steps by assembling multiple path integrators and extending their basic features. The fact that a collection of path integration systems can be turned into a cognitive map suggests the possibility that cognitive maps may have evolved directly from the path integration system. PMID:26442503
Woyach, Kristen Ann
This thesis introduces an incentive-based trust model to let wireless spectrum regulation embrace diverse current and future means of implementing cognitive radio.Cognitive radio has emerged as a way to combat inefficient spectrum use by allowing independently designed networks to share the same frequency band. This philosophy has been embraced by the FCC, which has already allowed cognitive use in the TV bands, and plans to make spectrum sharing the norm in other bands as well. To enact spec...
Cognitive radio (CR) technology introduces a revolutionary wireless communication mechanism in terminals and network segments, so that they are able to learn their environment and adapt intelligently to the most appropriate way of providing the service for the user's exact need. By supporting multi-band, mode-mode cognitive applications, the cognitive radio addresses an interactive way of managing the spectrum that harmonizes technology, market and regulation. This dissertation gives ...
Full Text Available Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such as voice analysis, signature verification, and keystrokedynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method notonly for user verification, but also for identification as well. The work presented in this model borrowsideas from the bioinformatics literature such as position specific scoring matrices (motifs and multiplesequence alignments to provide a novel approach to user verification and identification within the contextof a keystroke dynamics based user authentication system. Similarly Cognitive approach can be defined inmany ways of which one is association based Technique for authentication
Karan Khare; Surbhi Rautji; Deepak Gaur
Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such a...
Chen, G.; Gong, Y; Xiao, P; CHAMBERS, J.
This paper investigates data transmission and physical layer secrecy in cognitive radio network. We propose to apply full duplex transmission and dual antenna selection at secondary destination node. With the full duplex transmission, the secondary destination node can simultaneously apply the receiving and jamming antenna selection to improve the secondary data transmission and primary secrecy performance respectively. This describes an attractive scheme in practice: unlike that in most e...
Improving the security of cognitive radio technology is the goal of Virginia Tech College of Engineering researcher Jung-Min Park, who has received a $430,000 National Science Foundation Faculty Early Career Development Program (CAREER) Award to support his research.
Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)
Riahi, Arbia; Natalizio, Enrico; Challal, Yacine; Mitton, Nathalie; Iera, Antonio
Invited Paper International audience The Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, tec...
Pulwarty, R. S.
The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere
The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters
Capacity building support is critical for the enhancement of international nuclear nonproliferation and security regimes. In this regard the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) is promoting capacity building support internationally in the areas of nuclear nonproliferation and security. Similarly, the International Atomic Energy Agency (IAEA), the U.S. National Nuclear Security Administration (NNSA), and European Commission's Joint Research Centre (EC/JRC) are providing capacity building support for international partners in these fields. While this kind of capacity building support is accelerating, it is increasingly recognized that many challenges exist to achieve effective capacity building support, such as gaps between needs and support contents and possible redundancies in various support activities. As a result, the effectiveness of capacity building support is seriously questioned, and greater importance is now attached to the harmonization among support activities. With this situation in mind, this paper will introduce the concepts and approach of ISCN's capacity building support, discuss the challenges for this support to serve for enduring efforts toward the enhancement of nuclear nonproliferation and security and possible ways to overcome these challenges. (author)
Metaphor is a universal phenomenon. Tradition-ally metaphor is seen as as a means of rhetoric, but now it is seen as a cognitive phenomenon. In our life most of the everyday language is metaphor, our mind is also the metaphor. Metaphor has become an indispensable tool for understanding the world. There are a lot of“building”metaphorical expressions in life, as construction is an important component of people’s lives. But the studies of building metaphors have not been systematic and comprehensive. This thesis gives a contrastive study of building metaphors to deepen people’s understanding of building metaphors and enrich the cognitive studies of metaphor.
Globalization has had a significant on the dynamics of trade. Moreover, these effects have also brought with it negative externalities that exacerbate a country’s propensity towards conflict. Countries today face new threats to security that were not included in a traditional security matrix: piracy, smuggling, transnational criminal organizations, cyber-attacks, terrorism, and ethnic/religious movements. Moreover, there are natural threats such as epidemics, climate change, and natural disas...
Norman, Thomas L
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a
This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.
文海家; ZHANG; Jialan; 等
The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope,which is frequently encountered in town construction in mountainous areas due to terrain limit.On the base of some typical engineering cases in Chongqing,several crucial problems on security assessment of building site adjacent to an excavated high slope,including the natural geological conditions and man-destroyed degree,engineering environment,potential failure pattern of the high slope,calculation parameters and analysis methods,are roundly discussed.It is demonstrated that the conclusion of security assessment can be determined according to the aspects above-mentioned,and the security assessment is one of the fundamental data to insure the safety of the related construction,site and buildings.
Stringer, Steve; Tommerdahl, Jodi
As the field of Mind, Brain, and Education seeks new ways to credibly bridge the gap between neuroscience, the cognitive sciences, and education, various connections are being developed and tested. This article presents a framework and offers examples of one approach, predictive modeling within a virtual educational system that can include…
Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts...
Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia
This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological...... contract in our sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a...
Bhargavan, Karthikeyan; Delignat-Lavaud, Antoine; Maffeis, Sergio
Enu, Donald Bette; Ugwu, Ude
Across the globe, human security and peace building initiative have increasingly assumed prime policy priority necessary for good governance. In Nigeria, this reality has been more pronounced in successive regime failure to face adequately the recurrent Niger Delta challenges for at least the past three decades. This means that peace is neither built on a solid foundation nor has security been achieved. Using the Niger Delta region as a point of focus, the paper examined the interface between...
In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty
Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.
Warli; Fadiana, Mu'jizatin
The purpose of this research is to develop mathematical learning models that accommodate the cognitive styles reflective vs. impulsive students to build problem-solving skills, quality (valid, practical, and effective). To achieve the target would do research development (development research) and method development that consists of five stages,…
Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures
JIANG Limin; JIANG Du
In retrospect of the architecture design of Exit- Entry Administration Building of Shanghai Municipal Public Security Bureau, this paper elaborates on the architect's pursuit of the symbol of the image, the fluidity of the space and the sequence of the function. It promotes a case which deals with the harmony of the architecture individuality and the urban space commonness in city center.
The University of Tennessee (UT) developed its first formal and coordinated efforts in nuclear security education in 2008-2009 with its graduate certificate program in nuclear security in the Department of Nuclear Engineering. Building on this work, in 2011 UT established the UT Institute for Nuclear Security (INS) as a collaborative center at the university to expand its curricular impact as well as foster research and partnerships with nearby major governmental facilities engaged in nuclear security work. Oak Ridge National Laboratory (ORNL), the Y-12 National Security Complex (Y-12), and Oak Ridge Associated Universities (ORAU) have joined with UT as charter members of the INS. The INS has successfully fostered the development of a near-comprehensive nuclear security curriculum within the Department of Nuclear Engineering and the implementation of a non-proliferation focus in the Department of Political Science. In addition to traditional academic offering, the INS is developing a professional development short-course series that facilitates post-graduate entry into the nuclear security field and continuing education. (author)
The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience. PMID:26642176
Full Text Available India is striving to become a knowledge economy by the year 2020. In order to achieve this goal, there is a growing focus both at the government level as well as private sector level to leverage the expertise of the IT and ITES sector of the country which has become one of the main drivers of growth for the Indian Economy. This has lead to increasing investment in IT infrastructure. In this paper we review this trend and analyze the importance of Information Security Infrastructure for the country.We propose a comprehensive conceptual framework for building a robust, resilient and dependable Information Security Infrastructure which will help in establishing India as the secure and trusted hub of the future.
Liu, Yuanwei; Wang, Lifeng; Zaidi, Syed Ali Raza; Elkashlan, Maged; Duong, Trung Q.
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power...
Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland
For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. PMID:26421843
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. PMID:26421843
Iyer Adith Nagarajan
Full Text Available This paper deals with the design and implementation of a building automation and security system which facilitates a healthy, flexible, comfortable and a secure environment to the residents. The design incorporates a SIRC (Sony Infrared Remote Control protocol based infrared remote controller for the wireless operation and control of electrical appliances. Alternatively, the appliances are monitored and controlled via a laptop using a GUI (Graphical User Interface application built in C#. Apart from automation, this paper also focuses on indoor security. Multiple PIR (Pyroelectric Infrared sensors are placed within the area under surveillance to detect any intruder. A web camera used to record the video footage is mounted on the shaft of a servo motor to enable angular motion. Corresponding to which sensor has detected the motion; the ARM7 LPC2148 microcontroller provides appropriate PWM pulses to drive the servo motor, thus adjusting the position and orientation of the camera precisely. OpenCV libraries are used to record a video feed of 5 seconds at 30 frames per second (fps. Video frames are embedded with date and time stamp. The recorded video is compressed, saved to predefined directory (for backup and also uploaded to specific remote location over the internet using Google drive for instant access. The entire security system is automatic and does not need any human intervention.
Lemmen, Christiaan; Enemark, Stig; McLaren, Robin
New solutions in land administration are required that can deliver security of tenure for all, are affordable and can be quickly developed and incrementally improved over time. The Fit-For-Purpose (FFP) approach to land administration has emerged to meet these simple, but challenging requirements......, classification and development of a typology in land rights on the basis of an assessment of existing legitimate rights at the country level. The result of this process can be published in a National Tenure Atlas. ’Record’ means collecting data on evidence of land rights based on FFP approaches in land...... administration following the FFP principles for building the spatial framework. The Social Tenure Domain Model (STDM) is recommended. ‘Review (Conversion)’ means assessing the evidence of rights and any possible out-standing claims and when conditions are met, the security of the rights will be increased...
Soewito, B.; Hirzi
Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.
Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.
Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.
裴庆祺; 李红宁; 赵弘洋; 李男; 闵莹
认知无线电网络通过认知用户对无线环境的感知，获得频谱空洞信息，在不干扰主用户的前提下，伺机接入空闲频谱，从而满足更多用户的频谱需求，提高频谱资源的利用率，然而，也带来了前所未有的安全挑战。依托认知环，从数据信道、控制信道和终端设备三方面介绍其安全性所面临的问题，以及现有的解决方案，最后给出认知无线电网络的安全建议。%Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wire-less environment to meet with the more spectrum requirement of users and improve spectrum utilization. However, it also brings new secure challenges that different from traditional wireless networks. Relying cognition cycle, the security is-sues in cognitive radio networks are presented from data channel, control channel and terminal equipment, then the ex-isting defensive measures and propose the secure recommendations of cognitive radio networks are introduced.
Howard, Patrick D
Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes. This book consists of four main sections. It begins with a description of what it
Haslam, Catherine; Alexander Haslam, S; Knight, Craig; Gleibs, Ilka; Ysseldyk, Renate; McCloskey, Lauren-Grace
Group-based interventions have been argued to slow the cognitive decline of older people residing in care by building social identification and thereby increasing motivation and engagement. The present study explored the identity-cognition association further by investigating the impact of a group decision-making intervention on cognition. Thirty-six care home residents were assigned to one of three conditions: an Intervention in which they made decisions about lounge refurbishment as a group, a Comparison condition in which staff made these decisions, or a no-treatment Control. Cognitive function, social identification, home satisfaction, and lounge use were measured before and after the intervention. Participants in the Intervention condition showed significant increases on all measures, and greater improvement than participants in both Comparison and Control conditions. Consistent with social identity theorizing, these findings point to the role of group activity and social identification in promoting cognitive integrity and well-being among care residents. PMID:24387094
Balmer, JMT; Wang, W-Y
This revelatory study focuses on top Financial Times (FT) ranked British business school managers cognitions of corporate brand building and management. The study insinuates there is a prima facie bilateral link between corporate branding and strategic direction. Among this genus of business school, the data revealed corporate brand building entailed an on-going concern with strategic management, stakeholder management, corporate communications, service focus, leadership, and commitment. Thes...
Ntuen, Celestine (North Carolina Agricultural and Technical State University, Greensboro, NC); Winchester, Woodrow III (North Carolina Agricultural and Technical State University, Greensboro, NC)
In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.
There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
Dr.Ghossoon M.Waleed Al-Saadoo
Full Text Available Today, applications in mobile multi-agent systems require a high degree of confidence that running code inside the system will not be malicious. Also any malicious agents must be identified and contained. Since the inception of mobile agents, the intruder has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agents. Very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists to facilitate provisioning of the required security qualities of mobile agent software while extensively focusing on easing the software development burden.The aim is to build a distributed secure system using multi-agents by applying the principles of software engineering. The objectives of this paper is to introduce multi agent systems that enhance security rules through the access right to building a distributed secure system integrating with principles of software engineering system life cycle, as well as satisfy the security access right for both platform and agents to improve the three characteristics of agents adaptively, mobility and flexibility, which is the main problem that depending on the principles of software engineering life cycle. There are 3 characteristics that satisfied using agent; mobility, adaptively and flexibility. Adaptively (which is the capability to respond to other agencies and/or environment to some degree. Mobility (the ability to transport itself from one environment to another and Flexibility (can be defined to include the following properties; responsive, pro-active and social. This project based on the platform of PHP and MYSQL (Database which can be presented in a website. The implementation and test are applied in both Linux and Windows platforms, including Linux Red Hat 8, Linux Ubuntu 6.06 LTS and Microsoft Windows XP Professional. Since PHP
Cognitive science is the interdisciplinary study of cognition, mind and intelligence that has come out of the bridging between philosophy, psychology, artificial intelligence, neuroscience, linguistics, and anthropology. It has so far not been too concerned with cognition in an inter-species perspective. This thesis is looking at inter-species communication, or more specifically, human-dolphin communication, from a cognitive science perspective. Three aspects of language: a system, a...
蔡亮; 杨小虎; 董金祥
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performane analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections ; and that proactive security is very useful and practical for large, critical applications.
Ohaeri, Ifeoma Ugochi
With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as a promising solution to the scarcity of spectrum. A basic operation of the CRs is spectrum sensing. Whenever a primary signal is detected, CRs have to vacate the specific spectrum band. Malicious users can mimic incumbent transmitters so as to enforce CRs to vacate the specific band. Cognitive radio networks (CRNs) a...
Klotz, L. [Clemson University, 208 Lowry Hall, Clemson, SC 29634 (United States)
Despite a national goal for every building to achieve net-zero energy by 2050 and despite exemplary projects proving the technical and economic feasibility of much better energy performance, commercial buildings in the USA today use more energy per square foot than they ever have. Decisions made during planning, design, and construction (delivery) of commercial buildings appear systematically irrational, not maximizing utility for designers, occupants, or society. In other fields, notably economics, improved understanding of cognitive biases like 'loss aversion' and 'anchoring' has helped to explain seemingly irrational decision making. Related work has examined these cognitive biases for energy decisions made in an occupied building. Less clear is the role these cognitive biases play in the high-impact, long-term energy decisions made during commercial building delivery. As an initial step towards addressing this gap in understanding, this paper outlines key energy decisions in commercial building delivery and shows how cognitive biases may impact these decisions. A suggested approach to study these biases, and to design policies that address them, is provided. By highlighting these potential cognitive biases, based on an understanding of the building delivery process, this paper aims to engage those with relevant expertise in the behavioral and social sciences to help address the decision making that is preventing progress towards improved energy performance in commercial buildings.
Karthik, Rajasekar [ORNL; Patlolla, Dilip Reddy [ORNL; Sorokine, Alexandre [ORNL; White, Devin A [ORNL; Myers, Aaron T [ORNL
Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data . HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 . Though HTML5 provides a rich set of features for building an app, it is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.
Full Text Available Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individuals voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. Due to these advantages, this paper describes design and prototyping a voice-based door access control system for building security. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether to accept or reject the users identity claim or possibly to report insufficient confidence and request additional input before making the decision. Furthermore, intelligent system approach is used to develop authorized person models based on theirs voice. Particularly Adaptive-Network-based Fuzzy Inference Systems is used in the proposed system to identify the authorized and unauthorized people. Experimental result confirms the effectiveness of the proposed intelligent voice-based door access control system based on the false acceptance rate and false rejection rate.
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Full text: Soil erosion and the associated land degradation have long been recognized as major environmental concerns and a constraint to food security and sustainable development. The United Nations has highlighted soil degradation as one of the most significant challenges for sustainable food production in the 21st century (World Summit on Sustainable Development, 2002 Johannesburg, South Africa). The ARCAL (Regional Cooperative Agreement for the Advancement of Nuclear Science and Technology in Latin America and the Caribbean) Regional Strategy Profile identified the inefficient use of soil resources and the resulting permanent loss of productive agricultural land as major limitations to achieving food security in the Latin American and Caribbean region. Currently, about 300 million hectares of land have been affected by degradation. Indicators of the present soil conservation status and probable environmental consequences are essential for an assessment of national economic potential and evaluation of political and social consequences. Large-scale soil erosion assessments, for example in a watershed, cannot be based on direct conventional measurements because of methodological restrictions and excessively high temporal and spatial variability. This can be addressed through the use of fallout radionuclides (caesium-137, lead-210 and beryllium-7), which are widely distributed in the environment, adsorbed by soil particles and hence transported in the landscape in a similar way to soil particles. Therefore the monitoring of their redistribution provides an excellent fingerprint for soil redistribution by erosion or sedimentation. These radionuclide techniques also offer an advantage over the conventional methods, by being much less laborious and pinpointing the sources of soil loss. In 2009, a regional technical cooperation project (RLA/5/051 - ARCAL) was initiated for Latin America, with 15 countries (Argentina, Bolivia, Brazil, Chile, Cuba, El Salvador, Haiti
Building for concrete is temporary. The building of wood and steel stands against the concrete to give form and then gives way, leaving a trace of its existence behind. Concrete is not a building material. One does not build with concrete. One builds for concrete.
The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development
The development of policies to block the further proliferation of nuclear weapons, as one of the major areas in which a united approach should be taken in the interests of collective security, is discussed
National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...
Full Text Available This paper describes the capacity of food-crop production for improving regional food security in Central Java, Indonesia. It is also identify crops which have high and prospective economic-values. The results of the study might help in formulating a proposed model to improve food crops production in supporting food security. The case study was conducted in districts which play the important roles on agriculture (rice production in Central Java, Indonesia. These are Klaten and Magelang districts. Data were collected from farmers and officers from agriculture-related institutions. The results show that Central Java Province has the capacity on food crop (rice production for securing food availability, distribution, and accessibility for people in the region. It has a moderate on food security for the products, and surplus of production have distributed to other regions within the country. However, other food crops still facing shortage of supply since lack of productions. It requires a commitment from government and stakeholders for improving capacity building on agricultural development.
The purpose of this article is not confined to analysis of risks to the Baltic States' energy security. The research aimed to develop methods for risk intensity assessment tools as well empirical examples. It encompasses an effort to tailor a system of damage and probability (i.e. risk intensity) assesment used by other authors to risk analysis. The analysis performed by using this methodology shows the existence of at least two major energy security risks of intolerable intensity for the Bal...
Goss, Thomas J.
Approved for public release, distribution is unlimited A capabilities-based approach to contingency planning offers important opportunities to strengthen both Homeland Defense and Homeland Security. The Department of Defense (DOD) and the Department of Homeland Security (DHS) have already begun moving beyond traditional threat-based and scenario-based planning methodologies toward a more capabilities-based approach, but require embracing this concept more in order to counter challenges in ...
Jaouad Boukachour; Charles-Henri Fredouet; Mame Bigué Gningue
Until lately, transportation risk management has mostly dealt with natural or man-made accidental disasters. The September 11th tragedy has made transportation operators, as well as shippers and public authorities, aware of a new type of risk, man-made and intentional. Securing global transportation networks has become an important concern for governments, practitioners and academics. In the current time-based competition context, securing transportation operations should not be sought at the...
Oakes, Charles G.
The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…
随着记本电脑、PDA、IPAD等移动终端的普及和移动办公需求的增加,无线网络在烟草行业卷烟物流、烟叶生产收购、移动办公等领域得到广泛应用与发展,无线网络的安全也势必成为烟草行业网络安全的一个重要部分,本文介绍无线局域网的概念和技术标准,分析目前烟草企业WLAN面临的安全威胁,介绍了目前WLAN可能使用的加密、认证、VPN、无线入侵检测、一体化安全防护等安全防范技术,重点阐述有线和无线安全一体化是烟草企业WLAN安全未来发展的必然趋势。%With the increased popularity of notebook computers,PDAs, iPad and other mobile terminals and mobile office needs,the wireless network in the tobacco industry,cigarette logistics,tobacco production and acquisition,mobile office,and other fields has been widely used and development of wireless network security is bound to become an important part of the tobacco industry of network security This article describes the conceptual and technical standard of the wireless LAN,analyze security threats facing tobacco companies WLAN WLAN may use encryption, authentication,VPN,wireless intrusion detection,integrated security and security technology,and focuses on wired and wireless security integration is the development trend of the tobacco enterprise WLAN security.
Full text: This research assesses models for financing of new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are France, the United Kingdom, Finland and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania has emerged with the most secure and stable model for financing of new nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environment and competition legislation in the EU. Then the political and economic climate of the afore mentioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models of financing of new nuclear build is explored, contrasted and analysed. The research concludes that there are four main models for financing new nuclear projects in Europe. Each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for financing new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model is the most suitable and provides an example for any new nuclear build aspiring nations in the EU and beyond. (author)
Clinical decision-making is challenging mainly because of two factors: (1) patient conditions are often complicated with partial and changing information; (2) people have cognitive biases in their decision-making and information-seeking. Consequentially, misdiagnoses and ineffective use of resources may happen. To better support clinical…
Usman, Muhammad; Koo, Insoo
Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations. PMID:25295288
This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 - Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or ''clean,'' building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, ''Final Status Survey Plan for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201'') was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one
Aureo de Toledo Gomes
Full Text Available Este artigo almeja analisar as operações de nation-building, que, desde os atentados terroristas de 11 de setembro de 2001, são consideradas uma das maneiras para se lidar com as novas ameaças de segurança internacional, principalmente os ditos Estados Falidos. Assim sendo, revisaremos a bibliografia sobre o tema, procurando identificar as origens destas operações, assim como as definições utilizadas pelos principais autores e os problemas que elas possam apresentar.This article aims to analyze nation-building operations, which have been considered, since September 11, 2001 terrorist attacks, one of the ways to cope with the new threats to international security, mainly the so-called Failed States. Therefore, we will review the bibliography published, trying to identity not only the origins of such operations but also the definitions used by the main authors and the problems that they might present.
C. Cvitanovic; S. Crimp; Fleming, A; Bell, J.; Howden, M.; Hobday, A. J.; Taylor, M; R. Cunningham
Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform ...
Temu, Andrew; Msuya, Elibariki Emmanuel
This paper addresses capacity strengthening needs in the area of ICM to support food security initiatives. It fully acknowledges that FS is a state of assuring physical availability and economic accessibility to enough food in terms of quantity (amount, distribution, calories), quality (safe, nutritious, balanced) and cultural acceptability for all people at all times for a healthy and active life. It starts by outlining how ICM can support strategies to ensure availability, access, acce...
Jeremy Gwin and Douglas Frenette
This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room
Nuclear proliferation and terrorism represent the single most important threat to global security. Yet fundamental differences of opinion remain on how to deal with this ever growing menace to our survival. Should we opt for diplomacy or force? What are the relative merits of collective versus unilateral action? Is it more effective to pursue a policy of containment or one based on inclusiveness? These are not new questions, by any measure. But they have taken on renewed urgency as nations struggle, both regionally and globally, to cope with an extended array of conflicts, highly sophisticated forms of terrorism, and a growing threat of weapons of mass destruction. In a real sense, we are in a race against time - but it's a race we can win if we work together. The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits - by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. The question is how do we best move ahead to achieve the security we seek
Nyoman Utari Vipriyanti; Cening Kardi
Nowadays, there are strong demands on the organic farming. Organic farming as a part of organic agriculture builds on the harmony of nature, through optimizing the use of biodiversity and natural intake of the recycling process of natural materials, in order to reach sustainability, healthy food production and energy saving. Effort to change the behavior of farmers who are accustomed to using inorganic material to organic farming was not easy. This study aimed to determine (1) the costs and...
Berlin: Springer, 2004 - (Van Emde Boa, P.; Pokorný, J.; Bieliková, M.; Štuller, J.), s. 361-372. (Lecture Notes in Computer Science. 2932). ISBN 3-540-20779-1. ISSN 0302-9743. [SOFSEM 2004. Conference on Current Trends in Theory and Practice of Computer Science /30./. Měřín (CZ), 24.01.2004-30.01.2004] R&D Projects: GA ČR GA201/02/1456 Institutional research plan: CEZ:AV0Z1030915 Keywords : embodied cognition * complete agents * mirror neurons * imitation learning * sensorimotor control Subject RIV: BA - General Mathematics
Farroha, Deborah; Farroha, Bassam
We are in an environment of continuously changing mission requirements and therefore our Information Systems must adapt to accomplish new tasks, quicker, in a more proficient manner. Agility is the only way we will be able to keep up with this change. But there are subtleties that must be considered as we adopt various agile methods: secure, protect, control and authenticate are all elements needed to posture our Information Technology systems to counteract the real and perceived threats in today's environment. Many systems have been tasked to ingest process and analyze different data sets than they were originally designed for and they have to interact with multiple new systems that were unaccounted for at design time. Leveraging the tenets of security, we have devised a new framework that takes agility into a new realm where the product will built to work in a service-based environment but is developed using agile processes. Even though these two criteria promise to hone the development effort, they actually contradict each other in philosophy where Services require stable interfaces, while Agile focuses on being flexible and tolerate changes up to much later stages of development. This framework is focused on enabling a successful product development that capitalizes on both philosophies.
Full text: Much has been done to reduce the risk of nuclear terrorism under the auspices of international programs such as the G-8 Global Partnership, the Global Initiative to Combat Nuclear Terrorism, and the Global Threat Reduction Initiative. Despite the practical progress in removing the threat that terrorist groups could obtain the fissile material for an improvised nuclear device, however, much more work remains. In 1980, the 59 states participating in the International Nuclear Fuel Cycle Evaluation agreed that the civilian use of highly enriched uranium (HEU) should be minimized. Decades later, and despite dramatic new threats to world peace, the pledge to forego the use of HEU is not yet universal or legally binding. Nor have improvements to the physical security of this material been sufficient in many locations. This paper surveys the international measures that have been taken towards the formation of an international norm to minimize BEU risks through established mechanisms and suggests several additional approaches that may help to solidify support for practical measures and accelerate the process of civil HEU minimization and improved security globally. HEU reduction requires global cooperation: eliminating a small holding of HEU at a single facility or upgrading its security does not greatly reduce terrorist risks overall. Policymakers must be sure that their counterparts in other states arc engaged in similar efforts. A global HEU minimization norm would validate each nation's efforts, no matter how small, and provide a disincentive for inaction. Clearer standards for the security of this material and commitments to meet these standards would serve the same purpose. While each failure 10 act poses its own risks, it also erodes the usefulness of HEU elimination programs elsewhere and sends the wrong political message to the rest of the world. Moreover, it is technically impossible to minimize the largest REU holdings-those at fuel cycle facilities
As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces. PMID:24080620
Pacheco Pardo, Ramon
China, as host of the six-party talks first convened in August 2003, has been one of the major players in dealing with the North Korean nuclear crisis that began in October 2002. China’s role in the talks has helped to start shaping a stable regional security architecture in Northeast Asia. Beijing’s leadership in building a new security regime in the region suggests a change on Chinese perspectives regarding its role within the broader East Asia’s regional security architecture. After years ...
Gouider, Mohamed Salah; 10.5121/ijdms.2010.2207
The amounts of data available to decision makers are increasingly important, given the network availability, low cost storage and diversity of applications. To maximize the potential of these data within the National Social Security Fund (NSSF) in Tunisia, we have built a data warehouse as a multidimensional database, cleaned, homogenized, historicized and consolidated. We used Oracle Warehouse Builder to extract, transform and load the source data into the Data Warehouse, by applying the KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledge extraction has been performed using the Oracle Discoverer tool. This allowed users to take maximum advantage of knowledge as a regular report or as ad hoc queries. We started by implementing the main topic for this public institution, accounting for the movements of insured persons. The great success that has followed the completion of this work has encouraged the NSSF to complete the achievement of other topics of interest within the NSSF. ...
The cold war is behind us now. It was with us a long time and we came to know it well. It was a dangerous time, but it had familiar contours and predictable reference points. Now, the topography of the bipolar confrontation is gone. We face great uncertainty and, yes, danger is still our companion. It is close at hand in the deadly relics of the cold war-the thousands of nuclear weapons that have been left behind like mines buried in a battlefield long after the guns have fallen silent. Our challenge is to construct a new and safer framework for our mutual relations beyond the cold war, based not on suspicion and fear, but on confidence and partnership. In doing so, it would be well to reflect on the enormous resources that were devoted to building weapons as compared to the relatively modest resources that will be needed to invest in peace. From that comparison should emerge a sense of proportion as to what we are called upon to do. We have choices. We can idly 'sleepwalk through history' and, once again, allow nuclear weapons to generate suspicion, competition, tension, and arms races reminiscent of the cold war. If we allow that to happen, we will have failed in our duty to posterity, and future generations will and should-judge us harshly. This would truly be the 'march of folly'. But if we seize the moment to build a solid foundation of confidence and partnership, we will surely be celebrated for our legacy of wisdom and peace. This is that moment. Let us now be wise
Mohamed Salah GOUIDER
Full Text Available The amounts of data available to decision makers are increasingly important, given the networkavailability, low cost storage and diversity of applications. To maximize the potential of these data withinthe National Social Security Fund (NSSF in Tunisia, we have built a data warehouse as amultidimensional database, cleaned, homogenized, historicized and consolidated. We used OracleWarehouse Builder to extract, transform and load the source data into the Data Warehouse, by applyingthe KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledgeextraction has been performed using the Oracle Discoverer tool. This allowed users to take maximumadvantage of knowledge as a regular report or as ad hoc queries. We started by implementing the maintopic for this public institution, accounting for the movements of insured persons. The great success thathas followed the completion of this work has encouraged the NSSF to complete the achievement of othertopics of interest within the NSSF. We suggest in the near future to use Multidimensional Data Mining toextract hidden knowledge and that are not predictable by the OLAP.
Nyoman Utari Vipriyanti
Full Text Available Nowadays, there are strong demands on the organic farming. Organic farming as a part of organic agriculture builds on the harmony of nature, through optimizing the use of biodiversity and natural intake of the recycling process of natural materials, in order to reach sustainability, healthy food production and energy saving. Effort to change the behavior of farmers who are accustomed to using inorganic material to organic farming was not easy. This study aimed to determine (1 the costs and benefit of local varieties cultivation of paddy, Cicih Gondrong, with semi-organic pattern; and (2 the farmer perception toward Cicih Gondrong semi-organic pattern cultivation. This research used plot demonstration (demplots and survey methods. The results showed that semi-organic cultivation of paddy Cicih Gondrong, economically profitable. There are significant changes in the perception of farmers on the management of local varieties of rice before and after the demonstration carried out. Government role is needed to make organic farming program running well especially to provide assistance and infrastructure support.
The human capacity building support activities of the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security and the cooperation with the international or foreign organizations which handles human capacity building support
The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency has started its human capacity building activities, domestically and internationally, for the government officials and employees of companies of emerging nuclear power countries mainly in Asia. In this paper, we will describe the activities of ISCN on capacity building for these countries and also I will briefly describe, focusing on nuclear security, the activities of IAEA, Sandia National Laboratory of United States, Russia and the development of human capacity building support activities of neighboring countries of China and Korea. By doing this, we will describe the relationship and cooperation of ISCN with these organizations and hope that this would help us for the future development with these organizations and ISCN. (author)
Tickle, Andrew J.; Meng, Yan; Smith, Jeremy S.
Dead Reckoning (DR) is the process of estimating a robot's current position based upon a previously determined position, and advancing that position based upon known speed and direction over time. It is therefore a simple way for an autonomous mobile robot to navigation within a known environment such as a building where measurements have been taken and a predetermined route planned based upon which doors (or areas) the robot would have enough force to enter. Discussed here is the design of a DR navigation system in Altera's DSP Builder graphical design process. The wheel circumference to the step size of stepper motor used to drive the robot are related and so this ratio can be easily changed to easily accommodate changes to the physical design of a robot with minimal changes to the software. The robot calculates its position in relation to the DR map by means of the number of revolutions of the wheels via odometry, in this situation there is no assumed wheel slippage that would induce an accumulative error in the system overtime. The navigation works by using a series of counters, each corresponding to a measurement taken from the environment, and are controlled by a master counter to trigger the correct counter at the appropriate time given the position of robot in the DR map. Each counter has extra safeguards built into them on their enables and outputs to ensure they only count at the correct time and to avoid clashes within the system. The accuracy of the navigation is discussed after the virtual route is plotted in MATLAB as a visual record in addition to how feedback loops, identification of known objects (such as fire safety doors that it would navigate through), and visual object avoidance could later be added to augment the system. The advantages of such a system are that it has the potential to upload different DR maps so that the end robot for can be used in new environments easily.
The occurrence of serious illness is a misfortune of life, which will cause catastrophic medical expense of a family and impact social harmony. We should move forward the prevention pass of serious illness risks, and prevent the risks of serious illness from its occurrence. To reduce the risk of serious illness effectively, we should to do well in four aspects, i.e., disease preventing, medical costs reducing, income increasing and benets level improving, and build a comprehensive security mechanism for serious illness.%重特大疾病的发生是人生的不幸,将给家庭带来灾难性医疗支出,影响社会的和谐安宁.应当将防控重特大疾病风险的关口前移,从源头上化解重特大疾病风险,在"防病、减费、增收、提待"等四方面综合发力,构建重特大疾病的综合保障机制,确保重特大疾病风险得到有效化解.
This article describes the dialectical relation of connotation,environment,and performance of environmental psychology,discusses the application of environmental psychology in building construction security management,which has significant meaning for reducing building construction accidents.%阐述了环境心理学的内涵、环境与行为的辩证关系,探讨了环境心理学在建筑施工安全管理中的应用,对减少建筑施工安全事故的发生具有重要现实意义。
Full Text Available The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points in mind we have chosen to integrate VPN and IDS to provide an efficient solution for security engineers.
Peltier, Thomas R
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r
It has been suggested recently that it may be useful for language teaching practitioners to have some knowledge of cognitive linguistics. Cognitive linguistics (CL) provides tools that may help the language-teaching practitioner to gain insight into the semantic potential of words and communicate the meaning of lexical chunks in greater detail…
Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low
Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...
Halbrendt, Jacqueline; Gray, S.; Crow, S.; Shariq, L.; Tamang, Bishal B.
With the world population having reached unprecedented levels, the need for improved food security and sustainable agricultural practices has become all the more pressing. This is especially relevant for subsistence farmers, such as those in the Mid-hill region of Nepal, who typically rely on crop yields for sustenance and have limited access to opportunities for income generation. Although promoting agricultural development in areas like the Mid-hill region has been a priority for NGOs and r...
Information Security Maturity Model
To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...
Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R
Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to
As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy
Smith, David J.
A central mission of the United States Institute of Peace (USIP) is the promotion of international conflict resolution education by assisting and supporting colleges and universities in their efforts at developing and offering programs, courses, and activities that focus on international peace, conflict, and security. Over the years, a number of…
Ghenai, Chaouki, Ed.
Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…
Full text. This research assesses models for new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are the United Kingdom and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania and the United Kingdom have emerged with different models for new build nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environmental and competition legislation in the EU. Then the political and economic climate of the aforementioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models and the phases of new nuclear build are explored. The research concludes each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model cab stated to be more stable and provides an example for any new nuclear build aspiring nations in the EU and beyond.
王涛; 张雁; 李姝
能力构建的本质在于通过跨层次知识转移形成新的组织知识来对能力内在的知识集合进行替代、补充和增强，以构建出具有新功能企业能力的组织活动。管理认知是推动企业能力构建的关键因素，然而，企业是由不同层次主体构成的复杂组织体系，不同层次的管理认知也会存在明显的层次间分工和合作。通过引入能级的概念可以区别不同组织层次间知识活动的差异，不同层次的管理者在能力构建活动中会代表相应的高层次主体来与低层次主体进行互动，并以差异化管理认知对低层次知识进行再加工，并赋予相应的活化能使其发生活化反应，最终以能级跃迁的形式来完成知识在个体、团队和组织三个层次间的跨层次转移，从而完成能力构建。%The essence of firm capability building lies in that through cross-level knowledge transfer, organizational activities may produce new organizational knowledge to substitute, supplement and strengthen the inner knowledge set so as to build up firm capabilities with new functions. Managerial cognition is one of the critical factors that may promote firm capability building. However, firm is a complicated multi-level organizational system which consists of subjects of varied levels, and there always exists obvious division and cooperation among managerial cognitions of different levels. In the highly competitive market environment, capability building has been an effective approach to promote firm competitiveness which may form strategic assets through continuous evolution of resources. Therefore, it is of high importance to study the effect of managerial cognition on firm capability building, which may carry both theoretical and practical implications. On the one hand, focusing on the micro level of internal firm, the paper firstly introduces the concept of organizational energy level to show the differences of varied
Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report
This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)
The times following international or civil conflicts but also violent revolutions often come with unequal share of the peace dividend for men and women. Delusions for women who gained freedom of movement and of roles during conflict but had to step back during reconstruction and peace have been recorded in all regions of the world. The emergence of peacebuilding as a modality for the international community to ensure peace and security has slowly incorporated gender sensitivity at the level o...
Rigon, Silvia do Amaral; Schmidt, Suely Teresinha; Bógus, Cláudia Maria
This article discusses the establishment of inter-sector action between health and food and nutritional security in Brazil from 2003 to 2010, when this issue was launched as a priority on the government's agenda. A qualitative study was developed according to constructivist epistemology, using key-informant interviews in the field's nationwide social oversight body. Advances and challenges in this process are addressed as analytical categories. The National Food and Nutrition Policy (PNAN) was mentioned as the link between the two fields, decentralized through a network with activity in the states and municipalities. However, the study found political, institutional, and operational obstacles to the effective implementation of the PNAN in the Brazilian Unified National Health System and consequently to a contribution to the advancement of Health and Food and Nutritional Security in the country. The predominance of the biomedical, curative, and high-complexity model was cited as the principal impediment, while health promotion policies like the PNAN were assigned secondary priority. PMID:27049315
The European Nuclear Safety Training and Tutoring Institute (ENSTTI), an initiative of the European Technical Safety Organizations Network-ETSON, provides a high quality training and tutoring programme addressed to professionals at Technical Safety Organizations (TSOs) and nuclear regulatory authorities (NRAs). Through this programme ENSTTI shares, inter alia, the operational experience gained by TSOs in dealing with the interfaces between nuclear security and nuclear safety with international experts. At present, ENSTTI is in the process of broadening its services by developing a comprehensive training programme tailored to the training needs of junior and senior professionals at TSOs and NRAs.This effort aims at building-up mutually recognized technical and regulatory competencies, foster global nuclear security and safety culture, increase workforce mobility and contribute to the lifelong learning efforts of the European Union. In order to give value to learning achieved in the training programme under development, ENSTTI will apply the European Credit System for Vocational Education and Training (ECVET) that is characterized by flexible procedures for validation, transfer and recognition of learning outcomes. This approach should also be of great value for trainees from other regions in the world. (author)
为了应对新形势下公安机关队伍建设面临的各种挑战,推动各项公安工作再上新台阶,铁岭市公安局深入基层,实地开展队伍建设调研,总结了铁岭市当前公安队伍中存在的主要问题及其产生原因,并提出了加强公安队伍建设的建议和对策。%In response to the challenges faced in the team building of public security organs under the new situation, and to promote all aspects of public work to a new level,Tieling Municipal Public Security Bureau went to grassroots level to carry out onsite research on teambuilding. The paper summed up the current exist major problems and the causes in police force in Tieling and made recommendations and response to strengthen the police contingent.
Global climate change and concerns about energy supply security fuelling the nuclear desires of an increasing number of states, there is growing interest within the nonproliferation community to promote the establishment of an international system for the provision of nuclear fuel cycle services that would be 'equitable and accessible to all users of nuclear energy' (Rauf, 2008) while reducing proliferation risks. Although the idea was already voiced on the cradle of civilian use of nuclear energy (Baruch, 1946), the IAEA director's 2003 call for a group of international experts to examine the issue (ElBaradei, 2003) triggered renewed interest that resulted in up to twelve different proposals for multilateral nuclear fuel cycle arrangements (Rauf, 2008; Simpson, 2008). Nonproliferation experts have examined the conditions under which equitable and accessible access to enrichment, reprocessing and spent fuel disposal services can be granted to all users (Rauf, 2008; Braun 2006; Pellaud and al 2005). They suggested putting together multilateral nuclear approaches (MNA) that could consist in the establishment of mechanisms to assure fuel cycle services, or the shared ownership by recipient and host countries of fuel services facilities through either the creation of new multilateral centers or the conversion of existing national facilities into multinational enterprises. While countries that possess nuclear fuel facilities would benefit from the increased global security and strengthened non-proliferation situation that would result from the establishment of these MNAs, they would also be baited into participating by possible attraction of foreign investments as well as the opportunity to export high value services (Rushkin, 2006). Yet, what incentives would there be for a recipient non-nuclear state to participate in an arrangement that would intrinsically strip it of its sovereign right to ensure its fuel supply security? In addition to the economic benefits of
Concerns about climate change and energy security have been major arguments used to justify the recent return of nuclear power as a serious electricity generation option in various parts of the world. This article examines the recent public discussion in Finland, France, and the UK - three countries currently in the process of constructing or planning new nuclear power stations. To place the public discussion on nuclear power within the relationship between policy discourses and contexts, the article addresses three interrelated themes: the justifications and discursive strategies employed by nuclear advocates and critics, the similarities and differences in debates between the three countries, and the interaction between the country-specific state orientations and the argumentation concerning nuclear power. Drawing from documentary analysis and semi-structured interviews, the article identifies and analyses key discursive strategies and their use in the context of the respective state orientations: 'technology-and-industry-know-best' in Finland, 'government-knows-best' in France, and 'markets-know-best' in the UK. The nuclear debates illustrate subtle ongoing transformations in these orientations, notably in the ways in which the relations between markets, the state, and civil society are portrayed in the nuclear debates. - Highlights: → Focus on argumentation on new nuclear power in Finland, France, and the UK. → Nuclear power is justified by climate change, energy security, and independence. → The credibility of discursive strategies varies across countries. → Country-specific state orientations shape the success of discursive strategies. → Discursive strategies contain normative claims about state-society relations.
The security in Europe is not a condition but a process. At different stages of that process the priorities and political significance of various factors determining the security of individual states, and Europe as w whole, are changing. While thinking of future, the importance of searching for new means of confidence building, disarmament, co-ordination and cooperation among various security structures increases
This project provides an efficient and cost-effective solution to building security and active monitoring. The security is monitored and controlled by autonomous patrol robots. Any indication of a security breach will result in an immediate alarm and activation of the robot group to subdue and tranquilize the intruder.
The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly
The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)
Full Text Available Concerns about the appropriate use of EBP with ethnic minority clients and the ability of community agencies to implement and sustain EBP persist and emphasize the need for community-academic research partnerships that can be used to develop, adapt, and test culturally responsive EBP in community settings. In this paper, we describe the processes of developing a community-academic partnership that implemented and pilot tested an evidence-based telephone cognitive behavioral therapy program. Originally demonstrated to be effective for urban, middle-income, English-speaking primary care patients with major depression, the program was adapted and pilot tested for use with rural, uninsured, low-income, Latino (primarily Spanish-speaking primary care patients with major depressive disorder in a primary care site in a community health center in rural Eastern Washington. The values of community-based participatory research and community-partnered participatory research informed each phase of this randomized clinical trial and the development of a community-academic partnership. Information regarding this partnership may guide future community practice, research, implementation, and workforce development efforts to address mental health disparities by implementing culturally tailored EBP in underserved communities.
Henderson, Thomas C.
Our overall goal is to develop a cognitive architecture which will allow autonomous and robust operation of sensor-actuator networks. To achieve this, the perception, concept formation, action cycle will be informed by domain theories of signal analysis, physical phenomena, and behavior. Example scenarios include cognitive vehicles and buildings in which the system understands itself and the activities in and around it by means of distributed video and other sensors. This includes discovery of the cognitive system's own sensing and actuation capabilities.
Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred
Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the
Blackley, John A; Peltier, Justin
Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply thes
Day, C. William
Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…
Fragile states are the toughest development challenge of our era. But we ignore them at our peril: about one billion people live in fragile states, including a disproportionate number of the world's extreme poor, and they account for most of today's wars. These situations require a different framework of building security, legitimacy, governance, and the economy. Only by securing development - bringing security and development together to smooth the transition from conflict to peace and then ...
Dalziel, Henry; Carnall, James
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo
Antti Evesti; Eila Ovaska
Dynamically changing environments and threat landscapes require adaptive information security. Adaptive information security makes it possible to change and modify security mechanisms at runtime. Hence, all security decisions are not enforced at design-time. This paper builds a framework to compare security adaptation approaches. The framework contains three viewpoints, that is, adaptation, security, and lifecycle. Furthermore, the paper describes five security adaptation approaches and compa...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv
Asharov, Gilad; Orlandi, Claudio
We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...
Bazavan, Ioana V
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview
First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan
Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to
Yuri P. Zinchenko
Security psychology is considered through social systemic search for reciprocal contiguity and mutual completion of existing advances of psychology and conceptual security understanding. The ability of systemic vision of security and its cognitive and practical specifics are demonstrated. The possibility to investigate safety psychology as social theoretical construct is suggested. Multi-aspect approach to security is substantiated. Methodological challenges of psychological security are disc...
The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.
Since the reform and opening up, commercial buil-ding presents the trend of building body is more and more high, the body becomes more and more huge, and the structure be-comes more complex. Such a crowded place, building firepro-ofing and timely evacuation after dangerous has become one of the important issues builders should consider.%改革开放以来，商业建筑呈现楼体越来越高耸、身躯越来越庞大、结构越来越复杂的趋势。如此人员密集的场所，建筑的防火与发生危险后能否及时安全疏散便必然成为需要建设者重要考虑的问题之一。
The thesis is focused on the problem of wireless networking and its security. The thesis is divided into two main parts, both parts builds on the bachelor thesis and some of its chapters are further extended and complemented by the issue. The theoretical part deals with the standards of IEEE organization and security policy of Wi-Fi networks with a focus on the distribution of wireless networks and its security. The practical part is focused on the survey of the Wi-Fi safety in selected...
Bauer, Michael D
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--
This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...
Radioactive sources are present in nearly every country around the globe, including in public buildings that are not adequately secured. Many government officials and experts agree that a terrorist group acquiring and using radiological material to make a “dirty bomb” is a major threat to global security. The International Atomic Energy Agency and Nuclear Security Summit process have recognized the importance of radioactive source security as part of a broad nuclear security agenda, and encouraged countries to pursue domestic security improvements. However, the existing mechanisms should be supplemented with Radiological Security Zones (RSZ) that would harmonize protection, ensure common training, and build confidence in effective implementation. (author)
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard
China is building Tibet as an ecological buffer to secure climate systems and maintain environmental stability scientific evidence shows the Tibet Plateau, the main body of the Qinghai-Tibet Plateau, is the"starter" and "regulating area" of
Lee, Ruby B
Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo
Based on The Dictionary of Modern Economics and the economic article title corpus composed of 62307 article titles from three main domestic economic newspapers--21 Century Business Herald, China Business, The Economic Observer Newspaper, this paper treated the ＂store＂ metaphors in the terms of securities and future with linguistic analysis and cognitive analysis, and tried to give definitions to the terms not concluded in the dictionary.%基于《现代经济词典》和由国内三大经济类报纸《21世纪经济报道》、《中国经营报》、《经济观察报》中62307条文章标题所构成的经济报道标题语料库，文章对股票及期货术语中的“仓”隐喻进行了语义分析和认知分析，并对辞典中未收录的“仓”隐喻术语进行了尝试性的定义。
Cookson, Peter W., Jr.
When children are securely attached and feel safe within a group, they are free to use their cognitive capacities in ways that are unimaginable. While there is no secret formula for creating genuine learning environments, the author of this paper offers a few ideas for fostering a positive and caring learning environment in the classroom.
Beata Agnieszka Kulessa
In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency ...
M. de Goede
1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered
Voeller, John G
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Forsberg, Dan; Moeller, Wolf-Dietrich
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em
Consideration of the energetic quality of buildings during specificaton of adequacy limits for the cost of housing and heating in line with the social security statute book; Die Beruecksichtigung der energetischen Gebaeudequalitaet bei der Festlegung von Angemessenheitsgrenzen fuer die Kosten der Unterkunft und Heizung nach dem Sozialgesetzbuch
Malottki, Christian von
The author of the contribution reports on the consideration of the energy quality of buildings during the specification of adequacy limits for the cost of housing and heating in line with the social security statute book. Subsequently to the description of the legal and technical energy starting situation, the methods used to describe the energy quality of buildings, the methods of survey of pricing differences as well as the possibilities of application of an energetically differentiated suitability level are described.
Full Text Available Energy is in the centre of the economic development of each country, setting into motion and fuelling factories, government buildings and offices, schools and hospitals, heating homes and keeping perishable foods cold. Its importance explains its complexity. Energy is source of wealth and competition, base for the political controversies and technological investments, and also the core of the epochal challenges of our global environment. Energy is essential for a sustainable development. Security of supplyis a priority for many countries. In this context, there are more ways through it can be achieved: effective management of the demand, diversification of energy sources and the locations of supply, or even using military presence. Energy security can best be defined as the overlap between economic security, national security and the environmental security. This paper will present the economic component of the energy security concept, its purpose being to analyse the concept of energy security in the world.
Bonsang, E.D.M.; S. Adam; S Perelman
This paper analyzes the effect of retirement on cognitive functioning using two large scale surveys. On the one hand the HRS, a longitudinal survey among individuals aged 50+ living in the United States, allows us to control for individual heterogeneity and endogeneity of the retirement decision by using the eligibility age for Social Security as an instrument. On the other hand, a comparable international European survey, SHARE, allows us to identify the causal effect of retirement on cognit...
As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security
Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are c
This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think...
... for Cognitive Problems? Page reviewed by Dr. Joash Lazarus, NPF Movement Disorders Fellow, Department of Neurology at ... What Are the Alternative Treatments for Cognitive Problems? Anxiety Hallucinations/Delusions Speech and Swallowing Problems Vision Changes ...
Wilson, Kyle M.; Helton, William S; Wiggins, Mark W.
Cognitive engineering is the application of cognitive psychology and related disciplines to the design and operation of human–machine systems. Cognitive engineering combines both detailed and close study of the human worker in the actual work context and the study of the worker in more controlled environments. Cognitive engineering combines multiple methods and perspectives to achieve the goal of improved system performance. Given the origins of experimental psychology itself in issues regard...
The author considers the following areas of cognitive psychology: architectural principles of the human mind; knowledge representation; spreading activation; control of cognition; memory; learning; language; and prediction. He tries to provide pointers to the field at large learning the view of his book the architecture of cognition (Anderson 1983) for those who require a more detailed treatment. 76 references.
<正>Since the end of the cold war,China puts forward a series of new national security ideas with Chinese characteristics such as the"new security concept"and the goal of"building a harmonious world".In May 2014 at the Fourth Summit of Conference on Interaction and Confidence Building Measures in Asia(CICA Summit)held in Shanghai,Chinese President Xi Jinping explicitly put forward the Asian new security concept featured by"common,
As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...
Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
Paul C. Lipson; Sabel, Bradley K.; Frank M. Keane
This paper, originally released in August 1989 as part of a Federal Reserve Bank of New York series on the U.S. securities markets, examines loans of Treasury and agency securities in the domestic market. It highlights some important institutional characteristics of securities loan transactions, in particular the common use of agents to arrange the terms of the loans. While we note that this characteristic sets securities lending apart from most repurchase agreement (repo) transactions, which...
Dufouil, Carole; Fuhrer, Rebecca; Alpérovitch, Annick
OBJECTIVES: To explore whether more cognitive complaints are associated with previous or future cognitive decline. DESIGN: Longitudinal; epidemiology vascular aging study. SETTING: Community in Nantes, France. PARTICIPANTS: Seven hundred thirty-three subjects, aged 59 to 71. MEASUREMENTS: Subjective cognitive complaints were recorded at 4-year follow-up examination in a prospective study of people aged 59 to 71 at study entry. Participants' cognitive performances were assessed repeatedly at e...
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…
Shu, Hong; Edwards, Geoffrey; Qi, Cuihong
In geographic space, it is well known that spatial behaviors of humans are directly driven by their spatial cognition, rather than by the physical or geometrical reality. The cognitive distance in spatial cognition is fundamental in intelligent pattern recognition. More precisely, the cognitive distance can be used to measure the similarities (or relevance) of cognized geographic objects. In the past work, the physical or Euclidean distances are used very often. In practice, many inconsistencies are found between the cognitive distance and the physical distance. Usually the physical distance is overestimated or underestimated in the process of human spatial behaviors and pattern recognition. These inconsistencies are termed distance distortions. The aim of this paper is to illustrate the conceptions of cognitive distance and distance distortion. And if the cognitive distance is argued to be two-dimensional, it exists in heterogeneous space and the property of quasi-metric is shown. If the cognitive distance is multi-dimensional, it exists in homogeneous space and the property of metric is shown. We argue that distance distortions arise from the transformation of homogeneous to heterogeneous space and from the transformation of the two-dimensional cognitive distance to the multi-dimensional cognitive distance. In some sense, the physical distance is an instance of cognitive distance.
Cidrera Lopez, Alain
The overall project is a system (hardware + software) that allows monitoring and control in a building / office different security systems, energy, communications, home automation, PKI's overall business that will increase all the efficiency of the building and the business and ensure the continuity of it. My participation in this Project will mainly focus on the development of hardware components, monitoring and control system (home automation, energy, safety control elements ...) and softwa...
Matthew, David A.
CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...
Ana Cristina Pelosi
Full Text Available The article presents partial results of a research which is aimed at verifying how figurative language, specifically metaphoric and metonymic language, present in different textual genres such as the literary and the journalistic genres, contributes to the emergence and negotiation of meaning. The theoretic and methodological basis of the research comes from Conceptual Metaphor Theory, originally proposed by Lakoff and Johnson (1980 and expanded in the 90’s by theoreticians such as Grady (1997, and from Metaphor-Led Discourse Analysis (CAMERON ET AL, 2009; CAMERON; MASLEN, 2010. Research implementation involves two stages. An analysis of four exemplars of the genres under investigation according to Metaphor-Led Discourse Analysis and a second analysis, still to be carried out, of the talk of three focus groups composed by students of a state school in Santa Maria, RS, after the reading of the different genres. The preliminary analysis presented of the opinion article selected for this study reveals the presence of image-kinesthetic schemas and metaphoric/metonymic vehicles which structure the language present in the analyzed genre and contribute to the emergence of the systematic metaphor INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES.
Brooks, Rodney Allen; Stein, Lynn Andrea
We describe a project to capitalize on newly available levels of computational resources in order to understand human cognition. We will build an integrated physical system including vision, sound input and output, and dextrous manipulation, all controlled by a continuously operating large scale parallel MIMD computer. The resulting system will learn to 'think' by building on its bodily experiences to accomplish progressively more abstract tasks. Past experience suggests that in attempting to build such an integrated system we will have to fundamentally change the way artificial intelligence, cognitive science, linguistics, and philosophy think about the organization of intelligence. We expect to be able to better reconcile the theories that will be developed with current work in neuroscience.
Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat
Rosário, A.; Candeias, A.A.; Roazzi, A.
The Cognitive Assessment System (CAS) is a new measure of cognitive abilities based on the Planning, Attention, Simultaneous and Successive (PASS) Theory. This theory is derived from research in neuropsychological and cognitive Psychology with particular emphasis on the work of Luria (1973). According to Naglieri (1999) and Naglieri and Das (1997), the PASS cognitive processes are the basic building blocks of human intellectual functioning. Planning processes provide cognitive control, utiliz...
The purpose of article is to analyze the arguments of Bruno Latour and Steve Woolgar aimed at eliminating `superfluous' cognitive explanations from discussion of scientific activity. They proposed to a ten-year moratorium on cognitive explanations of scientific activity and promised to reassess explanation in terms of cognition after this period of time if some aspects of scientific inquiry would not be accounted by sociological explanations. Intensive laboratory studies of scientific practice indicated that scientific thinking is not based on mental processes alone but relies on external tools and instruments. On the basis of these kinds of observations, they rejected all cognitive explanations of scientific inquiry. By building on sociocultural theories of cognition, the present study makes the case that the use of conceptual tools significantly transforms cognitive processes. It is concluded that the failure to appreciate cognitive explanations reflects a far toon arrow and non-social concept of cognition: Even after the ten-year moratorium there appears to be many good reasons to reassess the proposal of eliminating cognitive explanations altogether.
Golajapu Venu Madhava Rao
Full Text Available Operating a cloud securely and efficiently entails a great deal of advanceplanning. A data center and redundant internet connection is required at the beginning to connect to cloud. This can constitute the technology portion of an information security and some network devices that safely and securely serve the communication. National Institute of Standards and Technology states that the process of uniquely assigning the information resources to an information system will define the security boundary for that system. A massive amount of gear that is racked and cabled following defined patterns is enabled inside this boundary. Need for the infrastructure that is used to manage the cloud and its resources as it operates the cloud. Each component like server, network and storagerequires some degree of configuration. While designing or planning a complex systemit is important to look ahead the process and procedures required for operation of the system. Small cloud systems can be build without much of planning. But any Cloud system substantially bigger size needs significant planning and design. If we fail to plan it leads to higher cost due to inefficiency in design and process. In this paper we study on the architectural components that can be used to build a cloud with security as a priority. This can be achieved by identifying requirements for secured cloud architecture along with key patterns and architectural elements. This paper first discusses on security patterns and an architectural element required and also focuses on several different cloud architectures and secure cloud operation strategies.
Based on the analysis of the relevant researches at home and abroad and by the methods of literature study,questionnaire and statistics,the article focuses on the different-background Shanghai citizens＇ attitude toward leisure sports exercise and the difference of experience.A further study has also been made on the cognition of building up a city of health with leisure sports exercise as well as the attitude toward exercise and exercise experience.%在分析国内、外相关研究的基础上,通过文献资料、问卷调查和数理统计等研究方法,对不同背景特征的上海市居民在休闲体育锻炼的态度和体验差异进行分析。在此基础上,进一步就以休闲体育锻炼建构健康城市为基础的认同感及运动态度和运动体验的相关性进行了研究。
Full Text Available Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.
After 14 years of development, the Shanghai Cooperation Organization （SCO） , has set its sights on goals for the next de-cade at the 15th meeting of the Council of SCO Heads of State that was held in Ufa, the capital of Russia＇s Bashkortostan Republic, on July 9-10. The SCO, established in Shanghai in 2001, is committed to building fdendly neighbor rela- tions and maintaining security and stability in the Central Asian region through multilateral cooperation.
Briones, Janette C.; Handler, Louis M.
Radios today are evolving from awareness toward cognition. A software defined radio (SDR) provides the most capability for integrating autonomic decision making ability and allows the incremental evolution toward a cognitive radio. This cognitive radio technology will impact NASA space communications in areas such as spectrum utilization, interoperability, network operations, and radio resource management over a wide range of operating conditions. NASAs cognitive radio will build upon the infrastructure being developed by Space Telecommunication Radio System (STRS) SDR technology. This paper explores the feasibility of inserting cognitive capabilities in the NASA STRS architecture and the interfaces between the cognitive engine and the STRS radio. The STRS architecture defines methods that can inform the cognitive engine about the radio environment so that the cognitive engine can learn autonomously from experience, and take appropriate actions to adapt the radio operating characteristics and optimize performance.
Anshakov, Oleg M
Dealing with uncertainty, moving from ignorance to knowledge, is the focus of cognitive processes. Understanding these processes and modelling, designing, and building artificial cognitive systems have long been challenging research problems. This book describes the theory and methodology of a new, scientifically well-founded general approach, and its realization in the form of intelligent systems applicable in disciplines ranging from social sciences, such as cognitive science and sociology, through natural sciences, such as life sciences and chemistry, to applied sciences, such as medicine,
This book consists of essays covering issues in visual cognition presenting experimental techniques from cognitive psychology, methods of modeling cognitive processes on computers from artificial intelligence, and methods of studying brain organization from neuropsychology. Topics considered include: parts of recognition; visual routines; upward direction; mental rotation, and discrimination of left and right turns in maps; individual differences in mental imagery, computational analysis and the neurological basis of mental imagery: componental analysis.
Kimball, Miles S.
Cognitive Economics is the economics of what is in people’s minds. It is a vibrant area of research (much of it within Behavioral Economics, Labor Economics and the Economics of Education) that brings into play novel types of data—especially novel types of survey data. Such data highlight the importance of heterogeneity across individuals and highlight thorny issues for Welfare Economics. A key theme of Cognitive Economics is finite cognition (often misleadingly called “bounded rationality”),...
近年来，医院后勤保障坚持把“吃出营养、吃出健康、吃出战斗力”作为根本去想，努力构建适应保障需求的“高效”饮食机制，全面总结出一套科学办伙食的方法措施，伙食管理明显增强，伙食质量有效提升，为增强部队凝聚力、提高战斗力，促进部队全面建设发挥了重要作用。%in recent years, the hospital logistics guarantee adhere to "eat nutrition, eat healthy, eat a fighting force" as the fundamental to, and strive to build a meet the security needs of the "efficient" diet mechanisms, summarizes a set of office of the methods and measures of food science, food management markedly strong, food quality effectively enhance, to en-hance cohesion force and improving the battle effectiveness, promote the all round construction of the armed forces play an important role.
The so called 'Security Studies' constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control nuclear material (NM) against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of nuclear material. The paper presents the context of security studies carried out in France. (author)
Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...
Larsen, Josefine Kühnel; Struwe, Lars Bangert
Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...
We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)
The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report; Transition et securite energetiques: quels codes volontaires? Efficacite energetique: dialogue AIE, CEI et ISO. Les mesures de securite, solidarite et efficacite de la commission europeenne. Securiser l'approvisionnement en gaz naturel et favoriser la cogeneration. Des batiments moins gourmands en energie: refonte de la directive sur la performance energetique. Efficacite energetique dans les batiments: GDF Suez au rapport (volontaire)
This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)
Naval Postgraduate School Public Affairs Office
Neal Ziring, Technical Director in the Information Assurance Directorate at the National Security Agency (NSA), provided a lecture titled “Building Robust Security Solutions Using Layering and Independence,” Jan. 17.
The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance
Walsh, Patrick T; Hansell, Mike; Borello, Wendy D; Healy, Susan D
We currently have little understanding of how birds know what nest to build and what little we do know has been gained largely from investigations of the completed structures (morphology of finished nests) or of material selection. Here we looked at the behaviours performed by male Southern Masked weaverbirds when building their nests. During the two earliest phases of construction individual males varied in the direction in which they carried and inserted grass into their developing nest, the speed at which they completed phases of nest construction and in the frequency with which they dropped grass during weaving. Behaviours performed during the initial attachment phase, when grass is being secured to a bare branch, were not repeatable within males, whereas during the subsequent "ring" phase behaviours tended to be repeatable. Some males were biased as to which side of the nest they inserted grass blades and strongly lateralized individuals completed phases of nest-building more quickly. The lack of repeatability of most nest-building behaviours and the changes in those behaviours as males build more nests seems most readily explained by increasing dexterity. Further work is required to confirm any role for cognition in these experience-dependent changes. PMID:21736928
Muhammad Waseem Khan
Full Text Available The Short Message Service (SMS is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasnít achieved secure transmission of plaintext between different mobile phone devices. SMS doesnít have its own build-in mechanism to secure the transmitted data because security isnít considered as a priority application for mobile devices. Many SMS security schemes have been proposed by the researchers. This survey presents the existing schemes used to secure SMS message communication. State of the art SMS security solutions for mobile devices is presented from the period 2006-2013. Literature research of those security schemes is conducted and presented in this survey. The effect of each security scheme on mobile deviceís performance is also observed. Finally, a general summary of all security schemes with their limitations is presented.
Beck, Frédéric; Festor, Olivier; State, Radu
While attacks are widespread, network data related to them is rarely available to academies for investigation. In this context, the MADYNES team, which develops research activities on security management, decided to build an infrastructure capable of collecting the necessary data to enable analysis and modeling of malicious systems from a network point of view. This infrastructure is now part of the LORIA High Security Laboratory.
Minder, Bettina; Laursen, Linda Nhu; Lassen, Astrid Heidemann
. Conceptual clustering is used to analyse and order information according to concepts or variables from within the data. The cognitive maps identified are validated through the comments of some of the same experts. The study presents three cognitive maps and respective world-views explaining how the design...
Rossi, Francesca Micol
While the search for models and explanations of cognitive phenomena is a growing area of research, there is no consensus on what counts as a good explanation in cognitive science. This Ph.D. thesis offers a philosophical exploration of the different frameworks adopted to explain cognitive behaviour. It then builds on this systematic exploration to offer a new understanding of the explanatory standards employed in the construction and justification of models and modelling fra...
This collection of research papers on visual cognition first appeared as a special issue of Cognition: International Journal of Cognitive Science. The study of visual cognition has seen enormous progress in the past decade, bringing important advances in our understanding of shape perception, visual imagery, and mental maps. Many of these discoveries are the result of converging investigations in different areas, such as cognitive and perceptual psychology, artificial intelligence, and neuropsychology. This volume is intended to highlight a sample of work at the cutting edge of this research area for the benefit of students and researchers in a variety of disciplines. The tutorial introduction that begins the volume is designed to help the nonspecialist reader bridge the gap between the contemporary research reported here and earlier textbook introductions or literature reviews.
Bortolato, Beatrice; Miskowiak, Kamilla W; Köhler, Cristiano A;
BACKGROUND: Cognitive dysfunction in major depressive disorder (MDD) encompasses several domains, including but not limited to executive function, verbal memory, and attention. Furthermore, cognitive dysfunction is a frequent residual manifestation in depression and may persist during the remitted...... phase. Cognitive deficits may also impede functional recovery, including workforce performance, in patients with MDD. The overarching aims of this opinion article are to critically evaluate the effects of available antidepressants as well as novel therapeutic targets on neurocognitive dysfunction in MDD......, galantamine, scopolamine, N-acetylcysteine, curcumin, statins, and coenzyme Q10. The management of cognitive dysfunction remains an unmet need in the treatment of MDD. However, it is hoped that the development of novel therapeutic targets will contribute to 'cognitive remission', which may aid functional...
Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP)
Tipton, Harold F
Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.
Campagna, Rich; Krishnan, Ashwin
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati
Beata Agnieszka Kulessa
Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur
Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles
Computer Security Team
Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710. Winners must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally… …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...
Meo Colombo Carlotta
Full Text Available The aim of the paper is to study how itâ€™s possible to enhance the cognitive enterprise model by the theory of autopoietic systems. I propose a model that considers the organization as a closed system in which all cognitive activity is necessary to develop coherent operations needed to adapt the firm to environmental perturbations. The central issue of the work consists in the presentation and description of the â€œchain thinking-actionâ€ as a cognitive basis that builds models from which derive the actions that characterize the transformation of a business enterprise in order to maintain the viability over time. A \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"winning\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" entrepreneurial thinking is able to give a direction (objectives-strategy always aimed at improving the organizationâ€™s vital parameters. The role of entrepreneurship and management, therefore, is to create the conditions to encourage a continuous development of cognitive models in organizations, in order to maintain the conditions of survival and to lead the company in a situation of evolution and improvement.
Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag
Huang, Scott; Du, Ding-Zhu
This book provides a reference tool for the increasing number of the scientists whose research is related to sensor network security. The book is organized into several sections, each including some chapters exploring a specific topic. Network security is attracting great attention and there are many research topics waiting to be studied. In this book, the topics covered include network design and modeling, network management, data management, security and applications. The aim, intent, and motivation of this book is to provide a reference tool for the increasing number of scientists whose res
Dunigan, T.H.; Venugopal, N.
This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.
In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin
China's rapid growth in oil demand has become a world-wide consensus. Due to the lack of domestic resources, the best choice for China is active in overseas energy cooperation to ensure oil supply. Considering a variety of factors, the Middle East oil-producing countries should be the primary choice for China's cooperation in the region. Energy cooperation abroad with a number of major oil-producing countries or the oil-exporting countries is necessary to attach importance to raising the safety factor of energy transport. With a positive and friendly attitude, China should cooperate with neighboring countries to build Asia's oil supply security system.%中国的石油需求增长迅速已成为世界性共识.在国内资源条件不理想的情况下,中国的最佳选择是,积极开展海外能源合作,以确保石油供应.各种因素表明,中东产油国应是中国的首选合作方.在开展海外能源合作,与一些主要的石油生产国或石油输出国互动时,既要重视提高海外能源运输的安全系数,也应以积极、友善的姿态,与周边邻国合作,构建亚洲石油供应保障体系.