Results for 'Network Security'

989 found
Order:
  1.  40
    Network security situation awareness forecasting based on statistical approach and neural networks.Pavol Sokol, Richard Staňa, Andrej Gajdoš & Patrik Pekarčík - 2023 - Logic Journal of the IGPL 31 (2):352-374.
    The usage of new and progressive technologies brings with it new types of security threats and security incidents. Their number is constantly growing.The current trend is to move from reactive to proactive activities. For this reason, the organization should be aware of the current security situation, including the forecasting of the future state. The main goal of organizations, especially their security operation centres, is to handle events, identify potential security incidents, and effectively forecast the (...) security situation awareness (NSSA). In this paper, we focus on increasing the efficiency of utilization of this part of cybersecurity. The paper’s main aim is to compare selected statistical models and models based on neural networks to find out which models are more suitable for NSSA forecasting. Based on the analysis provided in this paper, neural network methods prove a more accurate alternative than classical statistical prediction models in NSSA forecasting. In addition, the paper analyses the selection criteria and suitability of time series, which do not only reflect information about the total number of security events but represent a category of security event (e.g. recon scanning), port or protocol. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  24
    IoT network security using autoencoder deep neural network and channel access algorithm.Mustafa Musa Jaber, Amer S. Elameer & Saif Mohammed Ali - 2021 - Journal of Intelligent Systems 31 (1):95-103.
    Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  40
    Networking Security in the Space of the City: Event-ful Battlespaces and the Contingency of the Encounter.Caroline Croser - 2007 - Theory and Event 10 (2).
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  25
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri & Muhammad Ramzan Saeed - 2022 - Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  28
    Resilient infrastructure for network security.Matthew M. Williamson - 2003 - Complexity 9 (2):34-40.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Network Security-Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication.Seong-Seob Hwang, Hyoung-joo Lee & Sungzoon Cho - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 3917--73.
    No categories
     
    Export citation  
     
    Bookmark  
  7.  18
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  19
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  31
    Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks.Vikram Raju Reddicherla, Umashankar Rawat & Kumkum Garg - 2020 - Foundations of Science 25 (4):1125-1146.
    NEMO means Network Mobility which is the extension of Mipv6 and it is invented for accessing internet for the group of people when they are travelling in Vehicle as Network group. During handoff while exchanging Binding Updates between the Mobile Network Node, Correspondent Node and Home Agent, many security threats are present during those messages exchange. It may prone to several standard malicious attacks on the BU and Binding Acknowledgement. An efficient end-to-end security method is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  56
    Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  12. Privacy, Security, and Shared Access-Can Confidentiality Be Protected in a Networked Society?David Voran - 1998 - Bioethics Forum 14:43-48.
     
    Export citation  
     
    Bookmark  
  13.  17
    Secure and user privacy-preserving searching in peer-to-peer networks.J. Sen - 2013 - Logic Journal of the IGPL 21 (4):603-629.
  14.  30
    Secure UAV-Based System to Detect Small Boats Using Neural Networks.Moisés Lodeiro-Santiago, Pino Caballero-Gil, Ricardo Aguasca-Colomo & Cándido Caballero-Gil - 2019 - Complexity 2019:1-11.
    This work presents a system to detect small boats to help tackle the problem of this type of perilous immigration. The proposal makes extensive use of emerging technologies like Unmanned Aerial Vehicles combined with a top-performing algorithm from the field of artificial intelligence known as Deep Learning through Convolutional Neural Networks. The use of this algorithm improves current detection systems based on image processing through the application of filters thanks to the fact that the network learns to distinguish the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  22
    Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks.Jiaqi Liang, Yibei Wu, Jun’E. Li, Xiong Chen, Heqin Tong & Ming Ni - 2021 - Complexity 2021:1-12.
    With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  15
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  86
    Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
    Security police, state security services, security measures, security politics…a dreadful semantic chain. Everything stubbornly conservative, repressive, antithetical to freedom is expressed in the concept of security. The meaning always implies security for an established order against whatever seems to threaten, disturb or endanger it from without or from within. One can secure, reassure, insure or protect Movements, associations and networks within which a part of the population unites spontaneously can be channeled, controlled or combatted. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  32
    Towards secure & green two-stage supply chain networks.Camelia-M. Pintea, Anisoara Calinescu, Corina Pop Sitar & Petrică C. Pop - 2019 - Logic Journal of the IGPL 27 (2):137-148.
  19.  27
    WNN-Based Prediction of Security Situation Awareness for the Civil Aviation Network.Zhijun Wu, Shaopu Ma & Lan Ma - 2015 - Journal of Intelligent Systems 24 (1):55-67.
    The security of the civil aviation network is closely related to flight safety. Security situation prediction is the advanced stage of situational awareness in the civil aviation network. In this article, a prediction approach of security situations for the air traffic management network is proposed on the basis of the wavelet neural network. The proposed approach adopts the wavelet theory and neural network, combining a time-series forecasting method for the prediction of (...) situations in the civil aviation network. The experimental results show that this approach has the advantages of fast training and high prediction accuracy. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  49
    On food security and alternative food networks: understanding and performing food security in the context of urban bias.Jane Dixon & Carol Richards - 2016 - Agriculture and Human Values 33 (1):191-202.
    This paper offers one explanation for the institutional basis of food insecurity in Australia, and argues that while alternative food networks and the food sovereignty movement perform a valuable function in building forms of social solidarity between urban consumers and rural producers, they currently make only a minor contribution to Australia’s food and nutrition security. The paper begins by identifying two key drivers of food security: household incomes (on the demand side) and nutrition-sensitive, ‘fair food’ agriculture (on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  21.  22
    Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification.S. Vadivel, Saad Bayezeed & V. M. Praseetha - 2019 - Journal of Intelligent Systems 29 (1):1379-1387.
    Nowadays, there has been an increase in security concerns regarding fingerprint biometrics. This problem arises due to technological advancements in bypassing and hacking methodologies. This has sparked the need for a more secure platform for identification. In this paper, we have used a deep Convolutional Neural Network as a pre-verification filter to filter out bad or malicious fingerprints. As deep learning allows the system to be more accurate at detecting and reducing false identification by training itself again and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  33
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  21
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  29
    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim & Su Min Kim - 2020 - Complexity 2020:1-9.
    Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  38
    Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.D. Ventura, Aitor Gómez-Goiri, V. Catania, Diego López-de-Ipiña, J. A. M. Naranjo & L. G. Casado - 2016 - Logic Journal of the IGPL 24 (4).
  26.  31
    War as a Network Enterprise: The New Security Terrain and its Implications.Mark Duffield - 2002 - Cultural Values 6 (1):153-165.
    This essay addresses the new phenomenon of network warfare as a realisation of modernity's inner potential and surprising capacities rather than its failure. A feature of the complex capillaries of global governance, network warfare has been endemic for some time in many border regions of the world and reflects an increasing conflation of development and security.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  29
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  37
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  11
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  58
    National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience. [REVIEW]Gail Ridley - 2011 - Journal of Business Ethics 103 (1):111-125.
    This article argues for an extension to the scope of corporate social responsibility (CSR) research to include a contemporary issue of importance to national and global security, critical infrastructure resilience. Rather than extending the multiple perspectives on CSR, this study aimed to identify a method of recognising CSR-related issues, before applying it to two dissimilar case studies on critical infrastructure resilience. One case study was of an international telecommunications company based in the US while the other was of the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  20
    Sat-based verification of security protocols via translation to networks of automata.Mirosław Kurkowski, Wojciech Penczek & Andrzej Zbrzezny - 2007 - In A. Lomuscio & S. Edelkamp, Model Checking and Artificial Intelligence. Springer. pp. 146--165.
  32.  38
    About Security, Democratic Consolidation and Good Governance. Romania within European Context. Book Review for the volume Despre securitate, consolidare democratica si buna guvernare: Romania in context regional, author Ciprian Iftimoaei, Lumen Media Publishing, Iasi, Romania.George Poede - 2015 - Postmodern Openings 6 (2):121-124.
    More than a decade has passed since the tragic events that took place in America in the dramatic day of September 9th 2001. For the first time since the end of the second World War, the United States were being attacked on their own territory, without prior notice, by a non-state military force which was globally organised, for religious and ideological reasons. The terrorist attacks planned and executed by the terrorist organisation Al-Qaeda on American military and civilian targets have reconfigured (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  34.  30
    Technology and Security Analysis of Cryptocurrency Based on Blockchain.Chao Yu, Wenke Yang, Feiyu Xie & Jianmin He - 2022 - Complexity 2022:1-15.
    Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan and Choi and find that the top ten (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  20
    Dynamic Evolution of Securities Market Network Structure under Acute Fluctuation Circumstances.Haifei Liu, Tingqiang Chen & Zuhan Hu - 2017 - Complexity:1-11.
    This empirical research applies cointegration in the traditional measurement method first to build directed weighted networks in the context of stock market. Then, this method is used to design the indicators and the value simulation for measuring network fluctuation and studying the dynamic evolution mechanism of stock market transaction networks as affected by price fluctuations. Finally, the topological structure and robustness of the network are evaluated. The results show that network structure stability is strong in the bull (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  20
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  17
    Ecological Security Evaluation for Marine Ranching Based on the PLTS/ANP Method: A Case Study of Rongcheng.Yuan-Wei Du & Qiong Song - 2022 - Complexity 2022:1-16.
    The evaluation index system of ecological security of marine ranching is based on the assumption that there is independence among evaluation indexes in the existing studies, which ignores the complex interactive paths of marine ranching as an artificial ecosystem. In this study, the MRES evaluation network model that includes interdependent relationships is established based on the Driver-Pressure-State-Impact-Response model and the analytic network process method. Then, the probabilistic linguistic term sets and analytic network process methods are used (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  16
    Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security.Lirong Qiu & Jie Li - 2017 - Complexity:1-11.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  9
    5G Security Features, Vulnerabilities, Threats, and Data Protection in IoT and Mobile Devices: A Systematic Review.Alexandre Sousa & Manuel J. C. S. Reis - forthcoming - Evolutionary Studies in Imaginative Culture:414-427.
    The evolution of wireless communications, from the first to the fifth generation, has driven Internet of Things (IoT) advancements. IoT is transforming sectors like agriculture, healthcare, and transportation, but also presents challenges like spectrum bandwidth demand, speed requirements, and security issues. IoT environments, with embedded sensors and actuators, connect to other devices to transmit and receive data over the internet. These data are processed locally or in the cloud, enabling decision-making and automation. Various wireless technologies, including Bluetooth, Zigbee, LoRa, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  7
    Automated Orchestration of Security Chains Driven by Process Learning.Nicolas Schnepf, Rémi Badonnel, Abdelkader Lahmadi & Stephan Merz - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 289–319.
    Connected devices, such as smartphones and tablets, are exposed to a large variety of attacks. Their protection is often challenged by their resource constraints in terms of CPU, memory and energy. Security chains, composed of security functions such as firewalls, intrusion detection systems and data leakage prevention mechanisms, offer new perspectives to protect these devices using software-defined networking and network function virtualization. However, the complexity and dynamics of these chains require new automation techniques to orchestrate them. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  28
    Assembling local, assembling food security.Angga Dwiartama & Cinzia Piatti - 2016 - Agriculture and Human Values 33 (1):153-164.
    The term ‘food security’ has been used in multiple ways and addresses not only issues around availability and accessibility of foods, but also, among others, the sustainability of livelihoods at the local community level—an issue often seen as a basis for the proliferation of local and alternative food networks. Accordingly, in this paper we attempt to develop a theoretical re-framing that is able to link food security with AFNs in arguing that the understanding of the two notions is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  42.  8
    Jurisprudence in hard and soft law output of international organizations: a network analysis of the use of precedent in UN Security Council and general assembly resolutions.Rafael Mesquita & Antonio Pires - forthcoming - Artificial Intelligence and Law:1-30.
    Do hard law international organizations use jurisprudence differently than soft law ones? Precedent can be asset or an encumbrance to international organizations and their members, depending on their aims and on the policy area. Linking current decisions to previously-agreed ones helps to increase cohesion, facilitate consensus among members, and borrow authority – benefits that might be more necessary for some organizations than for others. To compare whether the features of norm-producing organizations correlate with their preference for jurisprudence, we compare two (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  24
    On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.Mohammad M. Masud, Mohamed Al Hemairy & Zouheir Trabelsi - 2015 - Journal of Intelligent Systems 24 (2):199-213.
    Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. [REVIEW]Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample & Shridat Sugrim - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  22
    Fighting Crime Together: The Challenges of Policing and Security Networks.J. Fleming & J. Wood - 2006 - Dialogue: Academy of the Social Sciences in Australia. 25 (2):59-63.
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  38
    Beyond food security: women’s experiences of urban agriculture in Cape Town.David W. Olivier & Lindy Heinecken - 2017 - Agriculture and Human Values 34 (3):743-755.
    Urban agriculture is an important source of food and income throughout Africa. The majority of cultivators on the continent are women who use urban agriculture to provide for their family. Much research on urban agriculture in Africa focuses on the material benefits of urban agriculture for women, but a smaller body of literature considers its social and psychological empowering effects. The present study seeks to contribute to this debate by looking at the ways in which urban agriculture empowers women on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  32
    Challenges for food security in eritrea - a descriptive and qualitative analysis.Ravinder Rena - unknown
    Food security is about ensuring that all people at all times have both physical and economic access to the basic food they need. In a number of African countries chronic malnutrition and transitory food insecurity are pervasive. Like most African countries, Eritrea is also a victim of the problem of food insecurity. Based on this historical and recurrent food insecurity in Eritrea, an attempt is made in this paper to assess the possible causes of food insecurity in the country. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  11
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  24
    When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?Awais Rashid, Sveta Milyaeva & Ola Michalec - 2022 - Big Data and Society 9 (1).
    Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption of big data technologies in critical infrastructures shapes understandings of risk management, we focus (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. Explanation and trust: what to tell the user in security and AI? [REVIEW]Wolter Pieters - 2011 - Ethics and Information Technology 13 (1):53-64.
    There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, an important goal of explanation is to acquire or maintain the users’ trust. In this paper, I investigate the relation between explanation and trust in the context of (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   9 citations  
1 — 50 / 989