To see the other types of publications on this topic, follow the link: Security Monitors.

Journal articles on the topic 'Security Monitors'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Monitors.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chevalier, Yannick, and Michaël Rusinowitch. "Implementing Security Protocol Monitors." Electronic Proceedings in Theoretical Computer Science 342 (September 6, 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Badger, L. "Information security: from reference monitors to wrappers." IEEE Aerospace and Electronic Systems Magazine 13, no. 3 (March 1998): 32–33. http://dx.doi.org/10.1109/62.659861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Narasimhan, Seetharam, Wen Yueh, Xinmu Wang, Saibal Mukhopadhyay, and Swarup Bhunia. "Improving IC Security Against Trojan Attacks Through Integration of Security Monitors." IEEE Design & Test of Computers 29, no. 5 (October 2012): 37–46. http://dx.doi.org/10.1109/mdt.2012.2210183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Magazinius, Jonas, Alejandro Russo, and Andrei Sabelfeld. "On-the-fly inlining of dynamic security monitors." Computers & Security 31, no. 7 (October 2012): 827–43. http://dx.doi.org/10.1016/j.cose.2011.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Woods, David, Stephanie McNee, James W. Davis, Alexander Morison, Patrick Maughan, and Klaus Christoffersen. "Event Template Hierarchies as Means for Human-Automation Collaboration in Security Surveillance." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 3 (September 2005): 302–6. http://dx.doi.org/10.1177/154193120504900319.

Full text
Abstract:
Advances in remote sensing systems provide human monitors access to more data. The current challenge is to help extract relevant patterns and direct the attention of human monitors and human problem holders to the changing security picture with respect to acute situations (a normal market scene turns into an ethnic confrontation) or longer term trends (seeing new patterns of 'typical' behavior to avoid false alarms). Security surveillance monitoring can be advanced through new event recognition capability of autonomous monitors and by effectively coupling these sensor/algorithm systems to human monitors and problem holders. To meet these challenges in security surveillance, we have developed an event-sensitivea rchitecturew here machine agents provide event-basedi nformationt o human monitors and problem holders and are re-directable given contextual information. The key innovation is a context-based hierarchical event template structure which can be used to integrate data over a distributed sensor system.
APA, Harvard, Vancouver, ISO, and other styles
6

Deyglun, C. "Testing and performances of Spectroscopic Radiation Portal Monitor for homeland security." EPJ Web of Conferences 225 (2020): 07008. http://dx.doi.org/10.1051/epjconf/202022507008.

Full text
Abstract:
Each year States report to IAEA loss, theft or out of regulatory control radioactive materials. Most incidents are minor, but material is potentially available for criminal acts. Measures to reduce the radiological and nuclear threat are many-faceted. An important component is the ability to detect illicit transport of radioactive material. Spectroscopic Radiation Portal Monitors are deployed around the world to detect illegal radioactive material traffic. A combination of experimental data collected during testing campaigns and simulations is a good way to study the performance of Spectroscopic Radiation Portal Monitors in realistic conditions. The paper presents a process to evaluate the performances of a portal, based on a combination of experimental data and MCNP simulations to calculate the detection probability and the false alarm rate. IRSN developed platforms for testing Spectroscopic Radiation Portal Monitors for pedestrian control. Experimental data were collected from an available commercial Spectroscopic Radiation Portal Monitor, tested in the framework of the Illicit Trafficking Radiation Assessment Program phase II Round Robin Test. Many scenarios were tested with different sources using realistic setups and many experimental data were collected. The tested equipment was then simulated with MCNP only based on the data provided in the user manual and the standards found in the industry. To get a realistic idea of the uncertainty, all the variables inherent in the measurement were considered, their relative contributions were identified and quantified, then propagated to predict an overall uncertainty. The combination of experimental data, numerical simulations and uncertainty evaluation showed good agreement with experimental assays. The results were used to test the sensitivity of a Spectroscopic Radiation Portal Monitor to special nuclear materials for different alarm thresholds. This process applied to different scenarios according to defined targets should help in the selection of operating characteristics of the portal.
APA, Harvard, Vancouver, ISO, and other styles
7

Albeshri, Aiiad, and Vijey Thayananthan. "Analytical Techniques for Decision Making on Information Security for Big Data Breaches." International Journal of Information Technology & Decision Making 17, no. 02 (March 2018): 527–45. http://dx.doi.org/10.1142/s0219622017500432.

Full text
Abstract:
In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Freysdóttir, Gerður Rán, Kristín Björnsdóttir, and Margrét Hrönn Svavarsdóttir. "Nurses’ use of monitors in patient surveillance: an ethnographic study on a coronary care unit." European Journal of Cardiovascular Nursing 18, no. 4 (November 30, 2018): 272–79. http://dx.doi.org/10.1177/1474515118816930.

Full text
Abstract:
Background: Physiological monitors are increasingly used for patient surveillance. Although nurses play a vital role in the observation, analysis and use of information obtained from these devices, difficulties in their use, coupled with the high frequency of false and nuisance monitor alarms, can lead to negative working conditions and threaten patient safety. Aim: With the purpose of promoting effective monitor use and ensuring patient safety, the aim was to explore both how cardiovascular nurses use monitors in patient surveillance and the effect that the monitors have on the nurses’ work. Methods: A qualitative ethnographic design with semi-structured interviews and a field observation conducted at a 35-bed coronary care unit. A purposive sample was used in selecting participants. Data were analysed using systematic text condensation. Results: Eight registered nurses, all women, aged 27–49 years, were participants. The themes helping device, competence development and distractions and strain reflected both the knowledge on which the nurses drew in working with monitors and their influence on the nurses’ work. False security and collaboration and teamwork discussed how the nurses trust and depend on each other during monitor surveillance and how poor work conditions and unclear responsibility undermine surveillance. Conclusions: Monitors enable nurses to observe critically ill cardiac patients closely and respond quickly to life-threatening changes in their condition. Current work arrangements and limited training diminish the reliability of monitor surveillance. It is imperative to revise the structure of the surveillance and improve education in monitor surveillance to enhance nurses’ clinical competence and patients’ safety.
APA, Harvard, Vancouver, ISO, and other styles
9

Karger, Paul A., and David R. Safford. "I/O for Virtual Machine Monitors: Security and Performance Issues." IEEE Security & Privacy Magazine 6, no. 5 (September 2008): 16–23. http://dx.doi.org/10.1109/msp.2008.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khoury, Raphaël, and Nadia Tawbi. "Which security policies are enforceable by runtime monitors? A survey." Computer Science Review 6, no. 1 (January 2012): 27–45. http://dx.doi.org/10.1016/j.cosrev.2012.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dr. R. Balasubramanian, P. Ramachandran ,. "TC-CNN: A Tree Classified model using AI for identifying malware intrusions in open Networks." Psychology and Education Journal 58, no. 2 (February 20, 2021): 6561–73. http://dx.doi.org/10.17762/pae.v58i2.3189.

Full text
Abstract:
Proliferation of the internet by multiple devices has led to dramatic increases in network traffic. The Internet medium has also been growing with this usage, but this fast growth has also resulted in new threats making networks vulnerable to intruders and attackers or malicious users. This has made network security an important factor due to excessive usage of ICT (Information and Communications Technology) as threats to IVTs has also grown manifold. Securing data is a major issue, especially when they are transmitted across open networks. IDSs (Intrusion Detection Systems) are methods or techniques or algorithm which cater to detection of intrusions while on transit. IDSs are useful in identifying harmful operations. Secure automated threat detection and prevention is a more effective procedure to reduce workloads of monitors by scanning the network, server functions and inform monitors on suspicious activity. IDSs monitor systems continually in the angle of threat. This paper’s proposed technique detects suspicious activities using AI (Artificial Intelligence) and analyzes networks concurrently for defense from harmful activities. The proposed algorithm’s experimental results conducted on the UNSW_NB15_training-set shows good performances in terms of accuracy clocking above 96%.
APA, Harvard, Vancouver, ISO, and other styles
12

Morys, Lukáš, and Josef Smolík. "Bezpečnostní politika fotbalového mistrovství Evropy 2012." Studia sportiva 8, no. 1 (July 14, 2014): 13–24. http://dx.doi.org/10.5817/sts2014-1-2.

Full text
Abstract:
This paper deals with security policy for the European Football Championship 2012 held in Poland and Ukraine. The aim of this study is to identify the most serious security risks arising from the holding of EURO 2012 and to clarify what security procedures and strategies were chosen by the host countries to ensure safe championship. The article also monitors the course of the European Championship in terms of security.
APA, Harvard, Vancouver, ISO, and other styles
13

Lin, Mao, Yong Wang, and Gang Shi. "Social Security Video Surveillance Systems." Advanced Materials Research 433-440 (January 2012): 5906–10. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5906.

Full text
Abstract:
the reform and open policy has brought us Chinese people rich and colorful. However, the disparity between the rich and poor gap are increasing due to the uneven development in Chinese economic so that state of social security become more and more terrible than the pass. Thus, it is very meaningful to establish a social security video surveillance system to achieve security linkage management by this way that monitors the important insecure point by installing one or more camera to capturing the situation real-time. When there is something happen, the monitoring center will cause an alert signal to administer for further processing. In this paper, we present a scheme to achieve the social security requirement.
APA, Harvard, Vancouver, ISO, and other styles
14

Britton, Katherine E., and Jennifer D. Britton-Colonnese. "Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors." Journal of Diabetes Science and Technology 11, no. 2 (February 13, 2017): 216–19. http://dx.doi.org/10.1177/1932296816681585.

Full text
Abstract:
Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients’ expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients’ physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.
APA, Harvard, Vancouver, ISO, and other styles
15

Lucas, L., L. Pibida, M. Unterweger, and L. Karam. "Gamma-ray emitting test sources for Portal Monitors used for homeland security." Radiation Protection Dosimetry 113, no. 1 (December 7, 2004): 108–11. http://dx.doi.org/10.1093/rpd/nch422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Khan, Zeeshan Ali, and Ubaid Abbasi. "Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things." Electronics 9, no. 3 (February 29, 2020): 415. http://dx.doi.org/10.3390/electronics9030415.

Full text
Abstract:
Internet of Things (IoT) networks consist of tiny devices with limited processing resources and restricted energy budget. These devices are connected to the world-wide web (www) using networking protocols. Considering their resource limitations, they are vulnerable to security attacks by numerous entities on the Internet. The classical security solutions cannot be directly implemented on top of these devices for this reason. However, an Intrusion Detection System (IDS) is a classical way to protect these devices by using low-cost solutions. IDS monitors the network by introducing various metrics, and potential intruders are identified, which are quarantined by the firewall. One such metric is reputation management, which monitors the behavior of the IoT networks. However, this technique may still result in detection error that can be optimized by combining this solution with honeypots. Therefore, our aim is to add some honeypots in the network by distributing them homogeneously as well as randomly. These honeypots will team up with possible maliciously behaving nodes and will monitor their behavior. As per the simulation results, this technique reduces the error rate within the existing IDS for the IoT; however, it costs some extra energy. This trade-off between energy consumption and detection accuracy is studied by considering standard routing and MAC protocol for the IoT network.
APA, Harvard, Vancouver, ISO, and other styles
17

Graniszewski, Waldemar, and Adam Arciszewski. "Performance analysis of selected hypervisors (Virtual Machine Monitors - VMMs)." International Journal of Electronics and Telecommunications 62, no. 3 (September 1, 2016): 231–36. http://dx.doi.org/10.1515/eletel-2016-0031.

Full text
Abstract:
Abstract Virtualization of operating systems and network infrastructure plays an important role in current IT projects. With the number of services running on different hardware resources it is easy to provide availability, security and efficiency using virtualizers. All virtualization vendors claim that their hypervisor (virtual machine monitor - VMM) is better than their competitors. In this paper we evaluate performance of different solutions: proprietary software products (Hyper-V, ESXi, OVM, VirtualBox), and open source (Xen). We are using standard benchmark tools to compare efficiency of main hardware components, i.e. CPU (nbench), NIC (netperf), storage (Filebench), memory (ramspeed). Results of each tests are presented.
APA, Harvard, Vancouver, ISO, and other styles
18

Siswanto, Siswanto, M. Anif, Dwi Nur Hayati, and Yuhefizar Yuhefizar. "Pengamanan Pintu Ruangan Menggunakan Arduino Mega 2560, MQ-2, DHT-11 Berbasis Android." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 3, no. 1 (April 6, 2019): 66–72. http://dx.doi.org/10.29207/resti.v3i1.797.

Full text
Abstract:
In the era of technological advancements, security systems are not only required to provide safe conditions but also provide easy access, monitors and remote control. Room insecurity such as theft or fire cases can occur especially in rooms that are not equipped with security systems and special safeguards. Based on this, it is necessary to develop a security system that can be accessed and monitored remotely and provides early warning of early indications of danger through a smartphone. System development is done through the stages of making software and hardware. The hardware consists of Arduino Mega 2560 to regulate the system, MySQL Server Database, CC3000 Wi-Fi Shield as a communication device between Arduino and the server, Limit Switch to detect forced push on the door, MQ-2 measures the presence of indoor gas leak, sensor DHT-11 to measure room temperature, the camera is VC0706 to capture images in the door area. Android application as a system interface to change key status and monitor the condition of the room. A warning notification of the gas leak danger indication is sent to the user's smartphone by displaying the gas content value. A warning message has a forced push on the door equipped with a feature to display the camera capture results. The final result of this research is that a room security system has been successfully established where door lock access and room monitoring can be done through an android application installed on a smartphone. The system can provide hazard warning messages properly.
APA, Harvard, Vancouver, ISO, and other styles
19

KIM, SANGKYUN. "ASSESSMENT ON SECURITY RISKS OF CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS." International Journal of Software Engineering and Knowledge Engineering 20, no. 01 (February 2010): 103–9. http://dx.doi.org/10.1142/s0218194010004591.

Full text
Abstract:
To adapt to the firm's environmental changes continuously, the customer relationship management system is a key which monitors external changes and adapts internal cultures and processes in response to external challenges. Increasing use of customer relationship management systems in competitive business environments has given rise to various kinds of security problems. This paper reviews previous studies on customer relationship management systems, protection of customer information, and evaluation of information security systems. Finally, considering the characteristics of customer relationship management systems and security evaluation methodology, this paper suggests the assessment criteria for security risks of customer relationship management systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Schmidt, Frank. "Recommendations for improving the security of humanitarian workers." International Review of the Red Cross 37, no. 317 (April 1997): 152–55. http://dx.doi.org/10.1017/s0020860400085089.

Full text
Abstract:
The meeting of heads of delegation and regional delegates held in Glion from 19 to 22 January 1997 was a milestone in the recent history of the ICRC. Its aim was to mobilize senior operational staff around security issues in situations where humanitarian operations are undertaken. The recent tragic events affecting the ICRC (the assassination of ten staff members in Burundi, Chechnya and Cambodia) and the murder of three members of Médecins du monde as well as four United Nations human rights monitors in Rwanda, have highlighted the need to reassess security and humanitarian action on behalf of conflict victims.
APA, Harvard, Vancouver, ISO, and other styles
21

Alla, Amvalko. "Development of a strategy for the protection of information resources of the airport." Technium: Romanian Journal of Applied Sciences and Technology 2, no. 7 (December 30, 2020): 398–404. http://dx.doi.org/10.47577/technium.v2i7.2301.

Full text
Abstract:
The article considers the problems of research of scientific and practical activity of the airport complex. It is proved that the aviation security system monitors the activities of the SAB, and quantitative assessment of the level of informatization of aviation security at the airport, emphasizes the need for the management system to protect the concept of creating an independent airport security system. The author argues that the assessment of cyber risks, as one of the components of the synergistic effect of the measures taken against acts of unlawful interference, will prevent cybercriminals.
APA, Harvard, Vancouver, ISO, and other styles
22

Lin, Changyuan, Hamzeh Khazaei, Andrew Walenstein, and Andrew Malton. "Autonomic Security Management for IoT Smart Spaces." ACM Transactions on Internet of Things 2, no. 4 (November 30, 2021): 1–20. http://dx.doi.org/10.1145/3466696.

Full text
Abstract:
Embedded sensors and smart devices have turned the environments around us into smart spaces that could automatically evolve, depending on the needs of users, and adapt to the new conditions. While smart spaces are beneficial and desired in many aspects, they could be compromised and expose privacy, security, or render the whole environment a hostile space in which regular tasks cannot be accomplished anymore. In fact, ensuring the security of smart spaces is a very challenging task due to the heterogeneity of devices, vast attack surface, and device resource limitations. The key objective of this study is to minimize the manual work in enforcing the security of smart spaces by leveraging the autonomic computing paradigm in the management of IoT environments. More specifically, we strive to build an autonomic manager that can monitor the smart space continuously, analyze the context, plan and execute countermeasures to maintain the desired level of security, and reduce liability and risks of security breaches. We follow the microservice architecture pattern and propose a generic ontology named Secure Smart Space Ontology (SSSO) for describing dynamic contextual information in security-enhanced smart spaces. Based on SSSO, we build an autonomic security manager with four layers that continuously monitors the managed spaces, analyzes contextual information and events, and automatically plans and implements adaptive security policies. As the evaluation, focusing on a current BlackBerry customer problem, we deployed the proposed autonomic security manager to maintain the security of a smart conference room with 32 devices and 66 services. The high performance of the proposed solution was also evaluated on a large-scale deployment with over 1.8 million triples.
APA, Harvard, Vancouver, ISO, and other styles
23

Datta, Shoumen Palit Austin. "Cybersecurity - Personal Security Agents for People, Process, Atoms & Bits." Journal of Innovation Management 5, no. 1 (May 18, 2017): 4–13. http://dx.doi.org/10.24840/2183-0606_005.001_0002.

Full text
Abstract:
It was predicted by experts. The DDoS attack using an internet device on October 21, 2016, generated a flurry of suggestions from vast number of pundits. What if the attacks were not limited to social media sites but instead targeted heart monitors to deliver shocks to patients with cardiac arrhythmia? In this article the potential of personal security agents (PSA) is suggested as a modular tool to model people, process, bits and atoms (objects) with layers to address trust, privacy and security. Can we explore the potential of creating wrappers within these layers to include cognitive firewalls?
APA, Harvard, Vancouver, ISO, and other styles
24

Grisa, Tomas, Daniel Sas, and Lubomir Gryc. "On a multidimensional data processing method for radiation portal monitors." Nuclear Technology and Radiation Protection 35, no. 3 (2020): 235–43. http://dx.doi.org/10.2298/ntrp2003235g.

Full text
Abstract:
From a homeland security point of view, it is important to detect the transportation of radioactive materials or potential radioactive contamination. The most commonly used devices are radiation portal monitors with plastic scintillation detectors. A signal from such detectors is processed by an amplitude analyser which can separate pulses into several mutually independent energy windows (representing energy intervals of gamma radiation). Therefore, the most appropriate method of evaluation is by the use of algorithms for multidimensional processing. This article describes a novel generalised approach designed with respect to the properties of radiation portal monitors. It includes a description of formulas and a whole algorithm as well as the procedure for determining the appropriate critical and detection limits. The predicted probability distribution for the proposed method of calculation was verified by simulations and experimental measurements. The algorithm was also compared with a commonly used gross counting algorithm.
APA, Harvard, Vancouver, ISO, and other styles
25

Yadav, Anuj Kumar, Ritika, and Madan Garg. "Cryptographic Solution for Security Problem in Cloud Computing Storage During Global Pandemics." International Journal of Safety and Security Engineering 11, no. 2 (April 30, 2021): 193–99. http://dx.doi.org/10.18280/ijsse.110208.

Full text
Abstract:
Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.
APA, Harvard, Vancouver, ISO, and other styles
26

Muka, Romina, Sule Yildrim-Yayilgan, and Kozeta Sevrani. "Security Analysis of Wireless BAN in e-Health." Spring 2017 5, no. 2 (May 1, 2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.

Full text
Abstract:
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a WBAN to safeguard patients from different exploits or malicious attacks, since e-Health technologies are increasingly connected to the Internet via wireless communications. In this paper we outline the most important security requirements for WBANs. Furthermore, we discuss key security threats to avoid. Finally, we conclude with a summary of security mechanisms to follow that address security and privacy concerns of WBANs, and need to be explored in an increasingly connected healthcare world.
APA, Harvard, Vancouver, ISO, and other styles
27

L, Raghavendar Raju, and C. R. K. Reddy. "Node activity based trust and reputation estimation approach for secure and QoS routing in MANET." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 5340. http://dx.doi.org/10.11591/ijece.v9i6.pp5340-5350.

Full text
Abstract:
Achieving safe and secure communication in MANETs is a key challenge due to its dynamic nature. A number of security studies disclose that reputation management systems are able to be effectual with less overhead. The reputation of a node is calculated by using automated assessment algorithms depend on predefined trust scheme. This paper proposes a Node Activity-based Trust and Reputation estimation (NA-TRE) approach for the security and QoS routing in MANET. NA-TRE aims to find trust estimation and reputation of a node. The NA-TRE approach monitors the activity changes, packet forwarding or dropping in a node to find the status of the node. The various activities of a node like Normal State (NS), Resource Limitation State (RS) and Malicious State (MS) are monitored. This status of a node is helpful in computing trust and reputation. In this paper NA-TRE approach compared with existing protocols AODV, FACE and TMS to evaluate the efficiency of MANET. The experiment results show that 20% increasing of throughput, 10% decrease of overhead and end to end delay.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhao, Liang, and Yi Cheng. "Intelligent Wireless Alarm System Based on 51 Single Chip." Advanced Materials Research 753-755 (August 2013): 2645–48. http://dx.doi.org/10.4028/www.scientific.net/amr.753-755.2645.

Full text
Abstract:
In order to meet the increasingly high residential security and intelligence requirements, the paper presents an easy method to operate reliable performance of intelligent wireless alarm system, which can realize the signal automatically detection and telephone automatically alarm.Intelligent detector monitors to the disaster through a wireless way when the alarm signal is sent to the host,and the host microprocessor will automatically control telephone interface circuit.
APA, Harvard, Vancouver, ISO, and other styles
29

Shin, Sooyeon, and Taekyoung Kwon. "A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes." Sensors 19, no. 9 (April 29, 2019): 2012. http://dx.doi.org/10.3390/s19092012.

Full text
Abstract:
A wireless sensor network (WSN) is used for a smart home system’s backbone that monitors home environment and controls smart home devices to manage lighting, heating, security and surveillance. However, despite its convenience and potential benefits, there are concerns about various security threats that may infringe on privacy and threaten our home life. For protecting WSNs for smart homes from those threats, authentication and key agreement are basic security requirements. There have been a large number of proposed authentication and key agreement scheme for WSNs. In 2017, Jung et al. proposed an efficient and security enhanced anonymous authentication with key agreement scheme by employing biometrics information as the third authentication factor. They claimed that their scheme resists on various security attacks and satisfies basic security requirements. However, we have discovered that Jung et al.’s scheme possesses some security weaknesses. Their scheme cannot guarantee security of the secret key of gateway node and security of session key and protection against user tracking attack, information leakage attack, and user impersonation attack. In this paper, we describe how those security weaknesses occur and propose a lightweight three-factor authentication and key agreement scheme in WSNs for smart homes, as an improved version of Jung et al.’s scheme. We then present a detailed analysis of the security and performance of the proposed scheme and compare the analysis results with other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
30

Jiang, Xin, Mingzhe Liu, Kun Yang, Yanhua Liu, and Ruili Wang. "A Security Sandbox Approach of Android Based on Hook Mechanism." Security and Communication Networks 2018 (July 19, 2018): 1–8. http://dx.doi.org/10.1155/2018/9856537.

Full text
Abstract:
As the most widely applied mobile operating system for smartphones, Android is challenged by fast growing security problems, which are caused by malicious applications. Behaviors of malicious applications have become more and more inconspicuous, which largely increase the difficulties of security detection. This paper provides a new security sandbox approach of Android based on hook mechanism, to further enrich Android malware detection technologies. This new sandbox monitors the behaviors of target application by using a process hook-based dynamic tracking method during its running period. Compared to existing techniques, (1) this approach can create a virtual space where apk can be installed, run, and uninstalled, and it is isolated from the outside and (2) a risk assessment approach based on behavior analysis is given so that users can obtain an explicit risk prognosis for an application to improve their safety. Tests on malware and normal application samples verify this new security sandbox.
APA, Harvard, Vancouver, ISO, and other styles
31

Yalandra, Hengky, and Putra Jaya. "RANCANG BANGUN PENGAMAN PINTU PERSONAL ROOM MENGGUNAKAN SENSOR SIDIK JARI BERBASIS ARDUINO." Voteteknika (Vocational Teknik Elektronika dan Informatika) 7, no. 2 (June 1, 2019): 118. http://dx.doi.org/10.24036/voteteknika.v7i2.104347.

Full text
Abstract:
The development of a personal room door security system needs to be improved, due to the high crime rate of theft. Personal room is a room that is private and feels to have important things in it. The design and manufacture of this tool aims to create a personal room door security system that uses fingerprint sensors and touch sensors as input functions. This system uses Arduino as the system's main controller. The output component uses a doorlock solenoid, 16x2 LCD and buzzer. The doorlock solenoid functions as a personal room door lock, 16x2 LCD monitors the work process of the system, and buzzer as a sound indicator. Based on the testing and analysis conducted, it was concluded that the personal room door security system could work well. The system can open the door using a fingerprint sensor or touch sensor, so it can improve the personal room door security system. Keywords: Fingerprint sensor, Touch sensor, Arduino, Doorlock Solenoid, 16x2 LCD.
APA, Harvard, Vancouver, ISO, and other styles
32

Hemaanand, M., V. Sanjay Kumar, and R. Karthika. "Smart Surveillance System Using Computer Vision and Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 68–73. http://dx.doi.org/10.1166/jctn.2020.8631.

Full text
Abstract:
With the evolution of technology ensuring people for their safety and security all around the time constantly is a big challenge. We propose an advanced technique based on deep learning and artificial intelligence platform that can monitor the people, their homes and their surroundings providing them a quantifiable increase in security. We have surveillance cameras in our homes for video capture as well as security purposes. Our proposed technique is to detect and classify as well as inform the user if there is any breach in security of the classified object using the cameras by implementing deep learning techniques and the technology of internet of things. It can serve as a perimeter monitoring and intruder alert system in smart surveillance environment. This paper provides a well-defined structure for live stream data analysis. It overcomes the challenge of static closed circuit cameras television as it serves as a motion based tracking system and monitors events in real time to ensure activities are limited to specific persons within authorized areas. It has the advantage of creating multiple bounding boxes to track down the objects which could be any living or non-living thing based on the trained modules. The trespasser or intruder can be efficiently detected using the CCTV camera surveillance which is being supported by the real-time object classifier algorithm at the intermediate module. The proposed method is mainly supported by the real time object detection and classification which is implemented using Mobile Net and Single shot detector.
APA, Harvard, Vancouver, ISO, and other styles
33

Lonzetta, Angela, Peter Cope, Joseph Campbell, Bassam Mohd, and Thaier Hayajneh. "Security Vulnerabilities in Bluetooth Technology as Used in IoT." Journal of Sensor and Actuator Networks 7, no. 3 (July 19, 2018): 28. http://dx.doi.org/10.3390/jsan7030028.

Full text
Abstract:
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). It can be found in cell phones, headsets, speakers, printers, keyboards, automobiles, children’s toys, and medical devices, as well as many other devices. The technology can also be found in automated smart homes, to provide monitors and controls for lights, thermostats, door locks, appliances, security systems, and cameras. Bluetooth offers convenience and ease of use, but it lacks a centralized security infrastructure. As a result, it has serious security vulnerabilities, and the need for awareness of the security risks are increasing as the technology becomes more widespread. This paper presents an overview of Bluetooth technology in IoT including its security, vulnerabilities, threats, and risk mitigation solutions, as well as real-life examples of exploits. Our study highlights the importance of understanding attack risks and mitigation techniques involved with using Bluetooth technology on our devices. Real-life examples of recent Bluetooth exploits are presented. Several recommended security measures are discussed to secure Bluetooth communication.
APA, Harvard, Vancouver, ISO, and other styles
34

Jayashree, Devasagayam, V. Uma Rani, and K. Soma Sundaram. "Trust Based Misbehavior Detection in Wireless Sensor Networks." Applied Mechanics and Materials 622 (August 2014): 191–98. http://dx.doi.org/10.4028/www.scientific.net/amm.622.191.

Full text
Abstract:
Due to emerging technology Wireless Sensor Network (WSN), it is necessary to monitor the behavior of sensor nodes and establish the secure communication in network. Security is a challenging task in wireless environment. Several encryption mechanisms are available to prevent outsider attacks, but no mechanism available for insider attacks. A trust model is a collection of rules used to establish co-operation or collaboration among nodes as well as monitoring misbehavior of wireless sensor networks. Trust model is necessary to enhance secure localization, communication or routing, aggregation, collaboration among nodes. In this paper, proposed a behavior based distributed trust model for wireless sensor network to effectively deal with self-ish or malicious nodes. Here, take multidimensional trust attributes derived from communications and networks to evaluate the overall trust of sensor nodes. It monitors the behavior of nodes and establishes secure communication among networks.
APA, Harvard, Vancouver, ISO, and other styles
35

Mishra, Sangeet, Asis Kumar Tripathy, and Pallavi Joshi. "Making a Cloud Data Secure and Effective for Better Performance of Services." Indonesian Journal of Electrical Engineering and Computer Science 2, no. 3 (June 1, 2016): 695. http://dx.doi.org/10.11591/ijeecs.v2.i3.pp695-702.

Full text
Abstract:
<p>Cloud data security is one of the major and crucial concern in everyday life. Now a days cloud computing is emerging as vast and fastest growing technology depending on the usage. Cloud computing does not allow to keep data at user site and thus a data security is concerned to be a major challenging task regarding data storage. This paper overall describes the monitoring of the cloud data concerning data storage. In this paper we proposed a new methodology that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud. Our proposed technique provides data security by using the third party monitoring system which acts as an interface between the cloud consumer and cloud owner. Basically third party monitors the each and every activity of the cloud consumer and based upon his performance he respond to the cloud owner for taking decision. Our proposed concept provides the security from consumer point of view and owner side of view making the flexibility to the cloud infrastructure. Existing work focus mainly on security from owner side of view that not well fitted into the lifecycle of data security.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Zhu, Jianfeng, Ao Luo, Guanhua Li, Bowei Zhang, Yong Wang, Gang Shan, Yi Li, et al. "Jintide: Utilizing Low-Cost Reconfigurable External Monitors to Substantially Enhance Hardware Security of Large-Scale CPU Clusters." IEEE Journal of Solid-State Circuits 56, no. 8 (August 2021): 2585–601. http://dx.doi.org/10.1109/jssc.2021.3058551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Xiu Kuan, Yao Chen, and Hai Ning Yu. "Research on Web-Based Elevator Failure Remote Monitoring System." Applied Mechanics and Materials 494-495 (February 2014): 797–800. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.797.

Full text
Abstract:
Recently, elevator failure arose frequently, and has been gradually increasing. An elevator failure remote monitoring system is indispensable to enhance security of and maximize the total facilities efficiency. We reuse existing web technologies and standards to design a web-based elevator failure remote monitoring system which is independent of elevator manufacturers own monitors and complies with the REST architectural style to provide a universal API. We also propose nine types of detectable failure and their detection methods.
APA, Harvard, Vancouver, ISO, and other styles
38

Khasawneh, Mahmoud, and Anjali Agarwal. "A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks." Security and Communication Networks 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/3261058.

Full text
Abstract:
Spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary nodes can threaten these spectrum sensing results by launching passive and active attacks that prevent legitimate nodes from using the spectrum efficiently. Securing the spectrum sensing process has become an important issue in CRNs in order to ensure reliable and secure spectrum sensing and fair management of resources. In this paper, a novel collaborative approach during spectrum sensing process is proposed. It monitors the behavior of sensing nodes and identifies the malicious and misbehaving sensing nodes. The proposed approach measures the node’s sensing reliability using a value called belief level. All the sensing nodes are grouped into a specific number of clusters. In each cluster, a sensing node is selected as a cluster head that is responsible for collecting sensing-reputation reports from different cognitive nodes about each node in the same cluster. The cluster head analyzes information to monitor and judge the nodes’ behavior. By simulating the proposed approach, we showed its importance and its efficiency for achieving better spectrum security by mitigating multiple passive and active attacks.
APA, Harvard, Vancouver, ISO, and other styles
39

Kumar Panda, Dr Subodh, M. Harshita, Nishmitha A R, and Priyanka P. "Design and Development of Web Based Embedded Robot for Safety and Security Applications." Journal of University of Shanghai for Science and Technology 23, no. 07 (July 10, 2021): 543–49. http://dx.doi.org/10.51201/jusst/21/07180.

Full text
Abstract:
This paper proposes the design and development of an embedded system with a robot for safety and security application using wifi communication and the webserver. This compact design has a robot along with various peripherals and sensors for detecting hazardous gas leakage and performs necessary control actions like an alarm for fire accidents, intruder detection, and sends alert messages to the local system. The robot can extinguish the fire and monitors the area inside the industry and passes the audio-video streaming to the local system. This robot also has a battery-powered wireless AV camera which provides robotic in-front environment information to the local and remote system and performs the audio and video streaming through a web server.
APA, Harvard, Vancouver, ISO, and other styles
40

Xu, Hong. "Extended Web Services Model Design for Non-Functional Requirements." Applied Mechanics and Materials 63-64 (June 2011): 855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.855.

Full text
Abstract:
To manage web services, it needs to monitors quality of them periodically when changing their status like availability, performance and security policy. The non-functional requirements of web services based on QoS parameters has been presented in this paper for the purpose of finding the best available web service during Web services discovery process. We also presented an extended web services framework based on SOA structure for providing information about quality of web services and build a prototype for applying quality factors.
APA, Harvard, Vancouver, ISO, and other styles
41

Ranganathan, Raghuram, Robert Qiu, Zhen Hu, Shujie Hou, Marbin Pazos-Revilla, Gang Zheng, Zhe Chen, and Nan Guo. "Cognitive Radio for Smart Grid: Theory, Algorithms, and Security." International Journal of Digital Multimedia Broadcasting 2011 (2011): 1–14. http://dx.doi.org/10.1155/2011/502087.

Full text
Abstract:
Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs) that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is presented. A brief overview of the cognitive radio, IEEE 802.22 standard and smart grid, is provided. Experimental results obtained by using dimensionality reduction techniques such as principal component analysis (PCA), kernel PCA, and landmark maximum variance unfolding (LMVU) on Wi-Fi signal measurements are presented in a spectrum sensing context. Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. From the power system point of view, a supervised learning method called support vector machine (SVM) is used for the automated classification of power system disturbances. The impending problem of securing the smart grid is also addressed, in addition to the possibility of applying FPGA-based fuzzy logic intrusion detection for the smart grid.
APA, Harvard, Vancouver, ISO, and other styles
42

Bridi, Adriana Carla, Thiago Quinellato Louro, and Roberto Carlos Lyra da Silva. "Clinical Alarms in intensive care: implications of alarm fatigue for the safety of patients." Revista Latino-Americana de Enfermagem 22, no. 6 (December 2014): 1034–40. http://dx.doi.org/10.1590/0104-1169.3488.2513.

Full text
Abstract:
OBJECTIVES: to identify the number of electro-medical pieces of equipment in a coronary care unit, characterize their types, and analyze implications for the safety of patients from the perspective of alarm fatigue.METHOD: this quantitative, observational, descriptive, non-participatory study was conducted in a coronary care unit of a cardiology hospital with 170 beds.RESULTS: a total of 426 alarms were recorded in 40 hours of observation: 227 were triggered by multi-parametric monitors and 199 were triggered by other equipment (infusion pumps, dialysis pumps, mechanical ventilators, and intra-aortic balloons); that is an average of 10.6 alarms per hour.CONCLUSION: the results reinforce the importance of properly configuring physiological variables, the volume and parameters of alarms of multi-parametric monitors within the routine of intensive care units. The alarms of equipment intended to protect patients have increased noise within the unit, the level of distraction and interruptions in the workflow, leading to a false sense of security.
APA, Harvard, Vancouver, ISO, and other styles
43

Taiwo, Olutosin, and Absalom E. Ezugwu. "Internet of Things-Based Intelligent Smart Home Control System." Security and Communication Networks 2021 (September 23, 2021): 1–17. http://dx.doi.org/10.1155/2021/9928254.

Full text
Abstract:
The smart home is now an established area of interest and research that contributes to comfort in modern homes. With the Internet being an essential part of broad communication in modern life, IoT has allowed homes to go beyond building to interactive abodes. In many spheres of human life, the IoT has grown exponentially, including monitoring ecological factors, controlling the home and its appliances, and storing data generated by devices in the house in the cloud. Smart home includes multiple components, technologies, and devices that generate valuable data for predicting home and environment activities. This work presents the design and development of a ubiquitous, cloud-based intelligent home automation system. The system controls, monitors, and oversees the security of a home and its environment via an Android mobile application. One module controls and monitors electrical appliances and environmental factors, while another module oversees the home’s security by detecting motion and capturing images. Our work uses a camera to capture images of objects triggered by their motion being detected. To avoid false alarms, we used the concept of machine learning to differentiate between images of regular home occupants and those of an intruder. The support vector machine algorithm is proposed in this study to classify the features of the image captured and determine if it is that of a regular home occupant or an intruder before sending an alarm to the user. The design of the mobile application allows a graphical display of the activities in the house. Our work proves that machine learning algorithms can improve home automation system functionality and enhance home security. The work’s prototype was implemented using an ESP8266 board, an ESP32-CAM board, a 5 V four-channel relay module, and sensors.
APA, Harvard, Vancouver, ISO, and other styles
44

Di, Xiao Qiang, Hua Min Yang, and Jin Qing Li. "Intrusion Response Mobile Firewall Design in Ad Hoc Networks and Based on SMP Performance Analysis." Applied Mechanics and Materials 496-500 (January 2014): 1909–14. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1909.

Full text
Abstract:
According to the characteristics of Ad Hoc networks, distributed intrusion response mobile firewall system is designed based on mobile Agent. Surveillance agent monitors neighbors communication behavior, and reports to the control agent. Control agent is in charge of judging, and activates tracing agent and blocking agent. Defensive agent is set up in system to keep the firewall mobile features. Depending on semi-Markov process (SMP) theory, we have created a dynamic behavior model of the mobile firewall system and analyze the performance of network security.
APA, Harvard, Vancouver, ISO, and other styles
45

Rabab, Sana, Jack Tomlin, Nick Huband, and Birgit Völlm. "Care quality commission inspections of high-security hospitals." Journal of Forensic Practice 22, no. 2 (March 6, 2020): 83–96. http://dx.doi.org/10.1108/jfp-09-2019-0044.

Full text
Abstract:
Purpose Patients detained in high-security psychiatric hospitals are particularly vulnerable to excessive restrictions and exploitation. In the UK, the care quality commission (CQC) monitors and regulates forensic healthcare provision. The purpose of this study is to identify key concerns highlighted in CQC inspection reports of the three high-secure hospitals in England between 2010 and 2018. Design/methodology/approach In this qualitative study, 49 CQC inspection reports from three high-secure hospitals were subjected to thematic analysis. Findings Five central themes emerged: staffing and management; restrictive practice; physical environment and ward atmosphere; patients’ needs and involvement in their care; and legal and statutory matters. There was some variation in the overall quality of care between the hospitals. Positive staff–patient interactions and good practice in assessing and delivering care were consistently observed. However, enduring staff shortages within each hospital were experienced negatively and sometimes co-occurred with concerns over restrictive practices, poor care-plan procedure and inadequate legal documentation. Over time, Rampton and Broadmoor Hospitals appeared to worsen with regard to staffing levels, staff morale and management involvement. While services progressed over time in providing patients with access to advocacy and information concerning their rights, in some recent inspections it remained unclear whether patients were adequately involved in the care-plan process. Practical implications These findings provide preliminary indicators for areas requiring further attention from policymakers, clinicians and advocates. Originality/value This study appears to be the first systematic analysis of key concerns expressed in CQC reports of English high-security hospitals.
APA, Harvard, Vancouver, ISO, and other styles
46

Ghawade, Miss Manoshri A. "Study of Intrusion Detection System." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.

Full text
Abstract:
An intrusion detection system (IDS) could be a device or software application that observes a network for malicious activity or policy violations. Any malicious activity or violation is often reported or collected centrally employing a security information and event management system. Some IDS’s are proficient of responding to detected intrusion upon discovery. These are classified as intrusion prevention systems (IPS). A system that analyzes incoming network traffic is thought as Network intrusion detection system (NIDS). A system that monitors important software files is understood as Host intrusion detection system (HIDS). Wireless sensor networks (WSNs) are vulnerable to different kinds of security threats which will degenrate the performance of the entire network; that may lead to fatal problems like denial of service (DoS) attacks, direction attacks, Sybil attack etc. Key management protocols, authentication protocols and secure routing cannot provide security to WSNs for these varieties of attacks. Intrusion detection system (IDS) could be a solution to the present problem. It analyzes the network by collecting sufficient amount of knowledge and detects abnormal behavior of sensor node(s).
APA, Harvard, Vancouver, ISO, and other styles
47

Sripath Roy, K., S. Sowmya, M. Manasa, D. Alekhya, and P. Abhinav. "Decentralized weather monitoring system for smart cities." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 67. http://dx.doi.org/10.14419/ijet.v7i2.20.11755.

Full text
Abstract:
Internet of things involves monitoring as one of its major applications. It mostly includes condition-based decisions without human intervention. Monitoring systems continuously read the data from sensors, upload the data to a database and take appropriate decisions when they encounter an abnormal data. This provides a good basis for the IoT control systems which now are mostly common. This paper explains the solution to replace the single server system which means a centralized system with an individual server system which is a decentralized system. A decentralized system provides high security to the data and ensures data privacy which centralized systems fail to do. This decentralized system involves maintaining own server but ensuring the availability of data & communication without loss of privacy, ensuring minimization of security threats. This application involves building of a collective application on an android platform to present the data to the users based on the user hierarchy defined. The app provides high security through authentication based on the rights that user possesses. This app is designed to continuously monitor the air pollution in the areas across the city and give alerts or notifications whenever the pollution level reaches to a threshold. Additionally, the app monitors temperature and humidity level. Analytics are performed on the data from sensors and a graph is plotted as the value of a parameter across time. Separate graphs are plotted for each parameter. A user with administrator privilege can view the data of all the areas whereas a user from a single location or a user with general privilege gets the data of his own location.
APA, Harvard, Vancouver, ISO, and other styles
48

Suwansrikham, Parinya, She Kun, Shaukat Hayat, and Jehoiada Jackson. "Dew Computing and Asymmetric Security Framework for Big Data File Sharing." Information 11, no. 6 (June 5, 2020): 303. http://dx.doi.org/10.3390/info11060303.

Full text
Abstract:
Due to the advancement of technology, devices generate huge working files at a rapid rate. These data, which are of considerable scale and are created very fast, can be called big data. Keeping such files in one storage device is impossible. Therefore, a large file size is recommended for storage in a cloud storage service. Although this concept is a solution to solve the storage problem, it still faces challenges in terms of reliability and security. The main issues are the unreliability of single cloud storage when its service is down, and the risk of insider attack from the storage service. Therefore, this paper proposes a file sharing scheme that increases both the reliability of the file fragments using a multi-cloud storage system and decreases the risk from insider attack. The dew computing concept is used as a contributor to the file-sharing scheme. The working file is split into fragments. Each fragment is deployed to cloud storage services, one fragment per one cloud provider manner. The dew server controls users’ access and monitors the availability of fragments. Finally, we verify the proposed scheme in aspects of the downloading performance, and security.
APA, Harvard, Vancouver, ISO, and other styles
49

Dijkstra, Hylke. "Agenda-setting in the Common Security and Defence Policy: An institutionalist perspective." Cooperation and Conflict 47, no. 4 (November 27, 2012): 454–72. http://dx.doi.org/10.1177/0010836712462772.

Full text
Abstract:
The European Union (EU) has launched an impressive number of crisis management missions since its Common Security and Defence Policy became operational in 2003. This article analyses the agenda-setting phase of these civilian and military operations in order to explain why the EU has sent troops, policemen, judges, prosecutors and monitors across three continents. It presents an institutionalist perspective and argues that the former High Representative Javier Solana and his officials have been instrumental in putting various operations on the agenda. They have employed deliberate agenda-setting strategies, such as venue shopping, conflict expansion and issue framing, to further their bureaucratic interest of launching new missions. Solana and his officials had the ability to affect the agenda-setting process thanks to their pivotal position in policy making. This gave them with superior information on the state of play and an early mover advantage as well as strong international networks. The article provides empirical evidence from the crisis management missions in Aceh, Bosnia, Chad and Kosovo. It concludes with the changes to the Common Security and Defence Policy after the Treaty of Lisbon.
APA, Harvard, Vancouver, ISO, and other styles
50

Sun, Jian, Qiang Wang, and Yang Yang. "A Coordinated Volt/Var Control Strategy for Wind Farm Group." Applied Mechanics and Materials 701-702 (December 2014): 641–44. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.641.

Full text
Abstract:
A coordinated Volt / Var control strategy for wind farm group is proposed. The area voltage control center monitors the pilot bus in the central substation where many wind farms are connected to, and coordinates all kinds of reactive power resources in different wind farms to regulate the voltage profile of all wind farms. The genetic algorithm is used to solve such a multi-objective optimization model. The simulation results of a typical wind power system show that the coordinated control strategy has better performance than the current individual one in respects of security and economy of the grid.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography