Spelling suggestions: "subject:" 2security"" "subject:" bsecurity""
861 |
Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi OhaeriOhaeri, Ifeoma Ugochi January 2012 (has links)
With the rapid proliferation of new technologies and services in the wireless domain,
spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as a
promising solution to the scarcity of spectrum. A basic operation of the CRs is spectrum
sensing. Whenever a primary signal is detected, CRs have to vacate the specific spectrum
band. Malicious users can mimic incumbent transmitters so as to enforce CRs to vacate
the specific band. Cognitive radio networks (CRNs) are expected to bring an evolution to
the spectrum scarcity problem through intelligent use of the fallow spectrum bands.
However, as CRNs are wireless in nature, they face all common security threats found in
the traditional wireless networks. Common security combating measures for wireless
environments consist of authorization, authentication, and access control. But CRNs face
new security threats and challenges that have arisen due to their unique cognitive (self-configuration,
self-healing, self-optimization, and self-protection) characteristics. Because
of these new security threats, the use of traditional security combating measures would be
inadequate to address the challenges. Consequently, this research work proposes an
Intrusion Detection and Response Model (IDRM) to enhance security in cognitive radio
networks. Intrusion detection monitors all the activities in order to detect the intrusion. It
searches for security violation incidents, recognizes unauthorized accesses, and identifies
information leakages. Unfortunately, system administrators neither can keep up with the
pace that an intrusion detection system is delivering responses or alerts, nor can they react
within adequate time limits. Therefore, an automatic response system has to take over this
task by reacting without human intervention within the cognitive radio network. / Thesis (M.Sc.(Computer Science) North-West University, Mafikeng Campus, 2012
|
862 |
Assessment of operational cost and level of income on poultry food security project in Ngaka Modiri Molema North West province, South Africa / Barileng Leornard MogojeMogoje, Barileng Leornard January 2011 (has links)
The aim of this study was establish operational systems and viable size of community
poultry projects versus number of beneficiaries to determine the capacity to sustain
itself and serve its purpose as food security projects. Community poultry projects are
expected to serve their purpose of securing food to beneficiaries and continue to run
sustainably for longer time. The current study uses qualitative method to assess the
performance of community poultry projects. The study used questionnaire to collect
primary data by interviewing the accessible beneficiaries of existing poultry
community.
The results of the survey revealed that the majority of community poultry projects are
not viable to fulfil purpose of their establishment which is to secure food for
beneficiaries and to be self-sustainable. However, the average value of reward was
equivalent to R3 a day from both broiler and layer projects. The study further
revealed that the reward was paid once a year. The rewards in terms of product were
expected to be consumed by household and transferred into cash to buy other types
of food required. The food is mainly determined by the size of the household.
However the question remains, R3 a day is sufficient to buy food for a family for four
members. Based on the outcome of this study, researcher encourages further
research into to all agricultural related community food security projects. Research
studies may determine if these projects are really aimed at helping economic growth
in rural communities or whether they have capacity to secure basic food for
beneficiaries while sustaining them self. Agreed minimum value of reward per
beneficiaries must be established to ensure a future perfect match on size on all
agricultural projects versus number of beneficiaries. / Thesis (MBA) North-West University, Mafikeng Campus, 2011
|
863 |
A SECURE MEDIA STREAM COMMUNICATION FOR NEXT GENERATION NETWORKWu, Hao, Zhong, Zhangdui 10 1900 (has links)
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada / In NGN, the open interfaces and the IP protocol make the hazard of security aspect increased
accordingly. Thereby, it is a very important premise for NGN network operation to afford a good
secure media stream communication. In this paper, we will present a secure media stream
communication for NGN. Then we will discuss the three parts of the media stream secure
communication——media stream source authentication, secret key negotiation and distribution;
media stream encryption/decryption in detail. It can effectively realize media stream end-to-end
secure communication. Meanwhile, it also makes use of the expanding of former protocol during
the secret key negotiation process.
|
864 |
APPLICATION OF INTRUSION DETECTION SOFTWARE TO PROTECT TELEMETRY DATA IN OPEN NETWORKED COMPUTER ENVIRONMENTS.Kalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California / Over the past few years models for Internet based sharing and selling of telemetry data have been
presented [1] [2] [3] at ITC conferences. A key element of these sharing/selling architectures was
security. This element was needed to insure that information was not compromised while in transit or to
insure particular parties had a legitimate right to access the telemetry data. While the software managing
the telemetry data needs to be security conscious, the networked computer hosting the telemetry data to
be shared or sold also needs to be resistant to compromise. Intrusion Detection Systems (IDS) may be
used to help identify and protect computers from malicious attacks in which data can be compromised.
|
865 |
Touching the void : the museological implications of theft on public art collectionsSeaton, Jillian Elizabeth January 2014 (has links)
Of central importance to this thesis is the way security measures contradict the process through which museums have been seeking to divest themselves of theoretical hierarchies and value judgments in recent years. A context for investigation is established that considers how a perceptible increase in art theft, complicated by the escalating value of individual objects and the proliferation of museums as represented by a rise in attendance figures has produced a climate of vulnerability for arts collections around the world. In response, museums are installing unprecedented levels of security that are having a significant impact on established viewing conditions and redefining museum space. Further hindering this situation is the disparity between the fields of museology and museum security. These two fields have grown simultaneously, yet independently of one another producing a significant paradox between museum rhetoric and practice. To address the disconnection, this thesis seeks to make museum security relevant to academic discourse by aligning features related to the safeguarding of collections with contemporary museological considerations. Taking the void left behind by a stolen object as a point of departure, this thesis examines the ways in which theft alters the relationship between viewer, object and space in the museum setting. Three major case studies each form a chapter exploring the impact of the theft on established viewing conditions. As the first art theft of the modern era, the theft of the Mona Lisa from the Louvre, Paris (1911) creates an historic precedence for this investigation allowing for the examination of how conventions based upon exclusivity were dismantled by the theft, only to be reproduced by a legacy of increasingly prohibitive security measures. The theft of thirteen objects from the Isabella Stewart Gardner Museum, Boston (1990) is used to address the implications of theft on a fixed and introspective collection, and in particular upon institutional identity and public memory. The theft of the Scream and Madonna from the Munch Museum, Oslo (2004) and its subsequent security upgrade reveal a negation of institutional transparency and the birth of a new security aesthetic. An analysis of each space is balanced against material gathered from a variety of visual, textual and ephemeral sources to produce a developed understanding of affected space.
|
866 |
Methods for improving unfamiliar face matchingDowsett, Andrew James January 2015 (has links)
Matching unfamiliar faces is known to be a very difficult task. Yet, despite this, we frequently rely on this method to verify people's identity in high security situations, such as at the airport. Because of such security implications, recent research has focussed on investigating methods to improve our ability to match unfamiliar faces. This has involved methods for improving the document itself, such that photographic-ID presents a better representation of an individual, or training matchers to be better at the task. However, to date, no method has demonstrated significant improvements that would allow the technique to be put into practice in the real world. The experiments in this thesis therefore further explore methods to improve unfamiliar face matching. In the first two chapters both variability and feedback are examined to determine if these previously used techniques do produce reliable improvements. Results show that variability is only of use when training to learn a specific identity, and feedback only leads to improvements when the task is difficult. In the final chapter, collaboration is explored as a new method for improving unfamiliar face matching in general. Asking two people to perform the task together did produce consistent accuracy improvements, and importantly, also demonstrated individual training benefits. Overall, the results further demonstrate that unfamiliar face matching is difficult, and although finding methods to improve this is not straightforward, collaboration does appear to be successful and worth exploring further. The findings are discussed in relation to previous attempts at improving unfamiliar face matching, and the effect these may have on real world applications.
|
867 |
The structure of the welfare stateMacCulloch, Robert January 1996 (has links)
No description available.
|
868 |
Non-repudiationZhou, Jianying January 1997 (has links)
No description available.
|
869 |
On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment PlatformTan, Song 07 May 2016 (has links)
A Smart Grid is a digitally enabled electric power grid that integrates the computation and communication technologies from cyber world with the sensors and actuators from physical world. Due to the system complexity, typically the high cohesion of communication and power system, the Smart Grid innovation introduces new and fundamentally different security vulnerabilities and risks. In this work, two important research aspects about cyber-physical security of Smart Grid are addressed: (i) The construction, impact and countermeasure of data integrity attacks; and (ii) The design and implementation of general cyber-physical security experiment platform. For data integrity attacks: based on the system model of state estimation process in Smart Grid, firstly, a data integrity attack model is formulated, such that the attackers can generate financial benefits from the real-time electrical market operations. Then, to reduce the required knowledge about the targeted power system when launching attacks, an online attack approach is proposed, such that the attacker is able to construct the desired attacks without the network information of power system. Furthermore, a network information attacking strategy is proposed, in which the most vulnerable meters can be directly identified and the desired measurement perturbations can be achieved by strategically manipulating the network information. Besides the attacking strategies, corresponding countermeasures based on the sparsity of attack vectors and robust state estimator are provided respectively. For the experiment platform: ScorePlus, a software-hardware hybrid and federated experiment environment for Smart Grid is presented. ScorePlus incorporates both software emulator and hardware testbed, such that they all follow the same architecture, and the same Smart Grid application program can be tested on either of them without any modification; ScorePlus provides a federated environment such that multiple software emulators and hardware testbeds at different locations are able to connect and form a unified Smart Grid system; ScorePlus software is encapsulated as a resource plugin in OpenStack cloud computing platform, such that it supports massive deployments with large scale test cases in cloud infrastructure.
|
870 |
JAVA: A PARADIGM SHIFT IN TELEMETRY SOFTWARE ARCHITECTURESYang, Kent 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / In the commercial marketplace, Java has emerged as the preeminent standard for
platform-independent application development. Many reasons for this include platform
independence, robustness, effective distribution models, security effectiveness, and a rich
set of application programming interfaces (APIs). This paper will provide insight into the
design of the Java platform as it relates to the development of telemetry systems. Specific
elements of Java will be explored to better understand how to take advantage of a Java
platform. The paper will conclude with examples showing Java's effectiveness on overall
software development and deployment, the benefits of reduced new code
implementations, and how deploying this unique software platform will change the
software paradigm in the real-time environment.
|
Page generated in 0.0567 seconds