822 resultados para Computer and network security
Resumo:
This edited volume analyzes recent key developments in EU border management. In light of the refugee crises in the Mediterranean and the responses on the part of EU member states, this volume presents an in-depth reflection on European border practices and their political, social and economic consequences. Approaching borders as concepts in flux, the authors identify three main trends: the rise of security technologies such as the EUROSUR system, the continued externalization of EU security governance such as border mission training in third states, and the unfolding dynamics of accountability. The contributions show that internal security cooperation in Europe is far from consolidated, since both political oversight mechanisms and the definition of borders remain in flux. This edited volume makes a timely and interdisciplinary contribution to the ongoing academic and political debate on the future of open borders and legitimate security governance in Europe. It offers a valuable resource for scholars in the fields of international security and migration studies, as well as for practitioners dealing with border management mechanisms.
Resumo:
A cikk fókuszában az üzleti hálózatok állnak. Az IMP-csoport (Industrial Marketing and Purchasing Group) üzleti kapcsolatokkal, üzleti hálózatokkal foglalkozó több évtizedes kutatási eredményeire és fogalomrendszerére építve a szerzők áttekintik a téma alapvető megközelítéseit, majd a Versenyképesség-kutatás 2009. évi felmérésének adatait Felhasználva, megvizsgálják a vállalatvezetők által észlelt hálózati pozíció és a versenyképesség összefüggéseit. A vállalatvezetők értékelése szerint elemzik az iparági hálózatukban központi szerepet játszó, befolyással bíró (domináns hálózati pozícióval rendelkező) vállalatokat, különös tekintettel az üzleti teljesítmény és a versenyképesség jellemzőire. / === / The paper analyses the business network position of Hungarian companies, based on data of the Competitiveness research program. After an overview of the theoretical background of business relationships, business networks and network position – based on the IMP (Industrial Marketing and Purchasing Group) approach, the authors analyse the performance and competitiveness characteristics of firms with central position in their industrial network.
Resumo:
Tanulmányunk fókuszában az üzleti hálózatok állnak. Az IMP csoport (Industrial Marketing and Purchasing Group) üzleti kapcsolatokkal, üzleti hálózatokkal foglalkozó több évtizedes kutatási eredményeire és fogalomrendszerére alapozva áttekintjük a téma alapmegközelítéseit, majd a Versenyképesség-kutatás 2009. évei felmérése adatainak felhasználásával vizsgáljuk a hálózati kép és a versenyképesség összefüggéseit. Jellemezzük a vállaltvezetők értékelése szerint az iparági hálózatukban központi szerepet játszó, befolyással bíró (domináns hálózati pozícióval rendelkező) vállalatokat, különös tekintettel az üzleti teljesítmény és versenyképesség jellemzőire. ________ The paper analyses the business network position of Hungarian companies, based on data of the Competitiveness research program. After an overview of the theoretical background of business relationships, business networks and network position – based on the IMP (Industrial Marketing and Purchasing Group) approach, we analyse the performance and competitiveness characteristics of firms with central position in their industrial network.
Resumo:
Small Arms and Light Weapons (SALW) proliferation was undertaken by the Non-Governmental Organizations (NGOs) as the next important issue in international relations after the success of the International Campaign to Ban Landmines (ICBL). This dissertation focuses on the reasons why the issue of SALW resulted in an Action Program rather than an international convention. Thus, this result was considered as unsuccessful by the advocates of regulating the illicit trade in SALW. The study provides a social movement theoretical approach, using framing, political opportunity and network analysis to explain why the advocates of regulating the illicit trade in SALW did no succeed in their goals. The UN is taken as the arena in which NGOs, States and International Governmental Organizations (IGOs) discussed the illicit trade in SALW. ^ The findings of the study indicate that the political opportunity for the issue of SALW was not ideal. The network of NGOs, States and IGOs was not strong. The NGOs advocating regulation of SALW were divided over the approach of the issue and were part of different coalitions with differing objectives. Despite initial widespread interest among States, only a couple of States were fully committed to the issue till the end. The regional IGOs approached the issue based on their regional priorities and were less interested in an international covenant. The advocates of regulating illicit trade in SALW attempted to frame SALW as a humanitarian issue rather than as a security issue. Thus they were not able to use frame alignment to convince states to treat SALW as a humanitarian issue. In conclusion it can be said that all three items, framing, political opportunity and the network, play a role in the lack of success of advocates for regulating the illicit trade in SALW. ^
Resumo:
A wireless mesh network is a mesh network implemented over a wireless network system such as wireless LANs. Wireless Mesh Networks(WMNs) are promising for numerous applications such as broadband home networking, enterprise networking, transportation systems, health and medical systems, security surveillance systems, etc. Therefore, it has received considerable attention from both industrial and academic researchers. This dissertation explores schemes for resource management and optimization in WMNs by means of network routing and network coding.^ In this dissertation, we propose three optimization schemes. (1) First, a triple-tier optimization scheme is proposed for load balancing objective. The first tier mechanism achieves long-term routing optimization, and the second tier mechanism, using the optimization results obtained from the first tier mechanism, performs the short-term adaptation to deal with the impact of dynamic channel conditions. A greedy sub-channel allocation algorithm is developed as the third tier optimization scheme to further reduce the congestion level in the network. We conduct thorough theoretical analysis to show the correctness of our design and give the properties of our scheme. (2) Then, a Relay-Aided Network Coding scheme called RANC is proposed to improve the performance gain of network coding by exploiting the physical layer multi-rate capability in WMNs. We conduct rigorous analysis to find the design principles and study the tradeoff in the performance gain of RANC. Based on the analytical results, we provide a practical solution by decomposing the original design problem into two sub-problems, flow partition problem and scheduling problem. (3) Lastly, a joint optimization scheme of the routing in the network layer and network coding-aware scheduling in the MAC layer is introduced. We formulate the network optimization problem and exploit the structure of the problem via dual decomposition. We find that the original problem is composed of two problems, routing problem in the network layer and scheduling problem in the MAC layer. These two sub-problems are coupled through the link capacities. We solve the routing problem by two different adaptive routing algorithms. We then provide a distributed coding-aware scheduling algorithm. According to corresponding experiment results, the proposed schemes can significantly improve network performance.^
Resumo:
A two-year longitudinal study was conducted to investigate late adolescents in transition. An initial investigation with senior high school students assessed students prior to leaving home for college and after college entrance. Of the original 131 participants recontacted two years after their graduation, 78 returned surveys. The study (a) explored changes in social network structure and function, (b) determined whether late adolescent-parent-peer relations change over time, and (c) identified prospectively the impact of social support, adolescent-parent-peer relations, and attachment security on well-being and feelings about the transition after high school. Students attending college locally reported an increase in total network support at Time 2. Regardless of location, more support from friends was received after the transition from high school, whereas family support did not vary across time. Parent relations were closer after the transition and were predictive of various well-being measures and feelings about the transition from high school. ^
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
With the advent of peer to peer networks, and more importantly sensor networks, the desire to extract useful information from continuous and unbounded streams of data has become more prominent. For example, in tele-health applications, sensor based data streaming systems are used to continuously and accurately monitor Alzheimer's patients and their surrounding environment. Typically, the requirements of such applications necessitate the cleaning and filtering of continuous, corrupted and incomplete data streams gathered wirelessly in dynamically varying conditions. Yet, existing data stream cleaning and filtering schemes are incapable of capturing the dynamics of the environment while simultaneously suppressing the losses and corruption introduced by uncertain environmental, hardware, and network conditions. Consequently, existing data cleaning and filtering paradigms are being challenged. This dissertation develops novel schemes for cleaning data streams received from a wireless sensor network operating under non-linear and dynamically varying conditions. The study establishes a paradigm for validating spatio-temporal associations among data sources to enhance data cleaning. To simplify the complexity of the validation process, the developed solution maps the requirements of the application on a geometrical space and identifies the potential sensor nodes of interest. Additionally, this dissertation models a wireless sensor network data reduction system by ascertaining that segregating data adaptation and prediction processes will augment the data reduction rates. The schemes presented in this study are evaluated using simulation and information theory concepts. The results demonstrate that dynamic conditions of the environment are better managed when validation is used for data cleaning. They also show that when a fast convergent adaptation process is deployed, data reduction rates are significantly improved. Targeted applications of the developed methodology include machine health monitoring, tele-health, environment and habitat monitoring, intermodal transportation and homeland security.
Resumo:
Acknowledgements We are grateful to the United Kingdom Economic and Social Research Council Nexus Network for funding this work.
Resumo:
Acknowledgement Construction and maintenance of the experiment system was funded by the state Special Fund for Agro-scientific Research in the Public Interest “Climate Change Impacts on Crop Production and Mitigation” under a grant number 200903003. This work was financially supported by Ministry of Science and Technology of China under a grant number 2012BAC19B01 and Department of Science and Technology of Jiangsu province under a grant number BK20150684. The international cooperation was funded by “111 project” (B12009) and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD). The contribution of Pete Smith was funded by the Chinese Ministry of Agriculture and the United Kingdom Department for Environment, Food and Rural Affairs (DEFRA) under UK-China Sustainable Agriculture Innovation Network (SAIN). The contribution of Timothy Filley was also funded by the state foreign expert agency under a project of Foreign High-end expert program. The authors thank Jiangsu Tianniang Agro-Technology Company Ltd. for the assistance in maintaining the experiment system.
Resumo:
Acknowledgements We are grateful to the United Kingdom Economic and Social Research Council Nexus Network for funding this work.
Resumo:
Winner of best paper award.
Resumo:
Acknowledgements We are grateful to the United Kingdom Economic and Social Research Council Nexus Network for funding this work.
Resumo:
Due to huge popularity of portable terminals based on Wireless LANs and increasing demand for multimedia services from these terminals, the earlier structures and protocols are insufficient to cover the requirements of emerging networks and communications. Most research in this field is tailored to find more efficient ways to optimize the quality of wireless LAN regarding the requirements of multimedia services. Our work is to investigate the effects of modulation modes at the physical layer, retry limits at the MAC layer and packet sizes at the application layer over the quality of media packet transmission. Interrelation among these parameters to extract a cross-layer idea will be discussed as well. We will show how these parameters from different layers jointly contribute to the performance of service delivery by the network. The results obtained could form a basis to suggest independent optimization in each layer (an adaptive approach) or optimization of a set of parameters from different layers (a cross-layer approach). Our simulation model is implemented in the NS-2 simulator. Throughput and delay (latency) of packet transmission are the quantities of our assessments. © 2010 IEEE.