54 resultados para Proactive Security
Resumo:
The use of open source software continues to grow on a daily basis. Today, enterprise applications contain 40% to 70% open source code and this fact has legal, development, IT security, risk management and compliance organizations focusing their attention on its use, as never before. They increasingly understand that the open source content within an application must be detected. Once uncovered, decisions regarding compliance with intellectual property licensing obligations must be made and known security vulnerabilities must be remediated. It is no longer sufficient from a risk perspective to not address both open source issues.
Resumo:
Aquest projecte inclou una aproximació als conceptes de RFID i targetes contactless centrant-se en l’ampliament usat MIFARE Classic chip. L’objectiu principal es mostrar el seu funcionament i les seves vulnerabilitats, així com alguns exemples pràctics fent una anàlisi de diferents serveis que les utilitzen.
Resumo:
This special issue of Natural Hazards and Earth System Sciences (NHESS) contains eight papers presented as oral or poster contributions in the Natural Hazards NH-1.2 session on"Extreme events induced by weather and climate change: evaluation, forecasting and proactive planning", held at the European Geosciences Union (EGU) General Assembly in Vienna, Austria, on 13-18 April 2008. The aim of the session was to provide an international forum for presenting new results and for discussing innovative ideas and concepts on extreme hydro-meteorological events, including: (i) the assessment of the risk posed by the extreme events, (ii) the expected changes in the frequency and intensity of the events driven by a changing climate and by multiple human- induced causes, (iii) new modelling approaches and original forecasting methods to predict extreme events and their consequences, and (iv) strategies for hazard mitigation and risk reduction, and for a improved adaptation to extreme hydro-meteorological events ...
Resumo:
Peer-reviewed
Resumo:
Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.
Resumo:
Postprint (published version)
Resumo:
Peer-reviewed