405 resultados para Cyber-amoureux


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are becoming more sophisticated to evade state-of-the-art detection approaches. Many Android malware families employ obfuscation techniques in order to avoid detection and this may defeat static analysis based approaches. Dynamic analysis on the other hand may be used to overcome this limitation. Hence in this paper we propose DynaLog, a dynamic analysis based framework for characterizing Android applications. The framework provides the capability to analyse the behaviour of applications based on an extensive number of dynamic features. It provides an automated platform for mass analysis and characterization of apps that is useful for quickly identifying and isolating malicious applications. The DynaLog framework leverages existing open source tools to extract and log high level behaviours, API calls, and critical events that can be used to explore the characteristics of an application, thus providing an extensible dynamic analysis platform for detecting Android malware. DynaLog is evaluated using real malware samples and clean applications demonstrating its capabilities for effective analysis and detection of malicious applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviours to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises access control detection, protocol whitelisting, model-based detection, and multi-parameter based detection. This SCADA-specific IDS is implemented and validated using a comprehensive and realistic cyber-physical test-bed and data from a real 500kV smart substation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Health Behaviours in School Children (HBSC) survey 2014 shows that overall health levels are good. There are encouraging findings on consumption of fruit and vegetables, teeth cleaning, and a drop in smoking levels and consumption of sweets and soft drinks.  However, many children said they find it easy to get cigarettes, too many children are going to bed hungry, and there are concerns about levels of cyber bullying. A total of 13,611 pupils were surveyed with questions on topics like general health, food and dietary behaviour, exercise and physical activity, self-care, smoking, use of alcohol and other substances, bullying including cyber bullying, and sexual health behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thèse réalisée en cotutelle avec l'université Paris1-Sorbonne

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work explores the development of MemTri. A memory forensics triage tool that can assess the likelihood of criminal activity in a memory image, based on evidence data artefacts generated by several applications. Fictitious illegal suspect activity scenarios were performed on virtual machines to generate 60 test memory images for input into MemTri. Four categories of applications (i.e. Internet Browsers, Instant Messengers, FTP Client and Document Processors) are examined for data artefacts located through the use of regular expressions. These identified data artefacts are then analysed using a Bayesian Network, to assess the likelihood that a seized memory image contained evidence of illegal activity. Currently, MemTri is under development and this paper introduces only the basic concept as well as the components that the application is built on. A complete description of MemTri coupled with extensive experimental results is expected to be published in the first semester of 2017.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract—With the proliferation of Software systems and the rise of paradigms such the Internet of Things, Cyber- Physical Systems and Smart Cities to name a few, the energy consumed by software applications is emerging as a major concern. Hence, it has become vital that software engineers have a better understanding of the energy consumed by the code they write. At software level, work so far has focused on measuring the energy consumption at function and application level. In this paper, we propose a novel approach to measure energy consumption at a feature level, cross-cutting multiple functions, classes and systems. We argue the importance of such measurement and the new insight it provides to non-traditional stakeholders such as service providers. We then demonstrate, using an experiment, how the measurement can be done with a combination of tools, namely our program slicing tool (PORBS) and energy measurement tool (Jolinar).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is now generally accepted that cyber crime represents a big threat to organisations, and that they need to take appropriate action to protect their valuable information assets. However, current research shows that, although small businesses understand that they are potentially vulnerable, many are still not taking sufficient action to counteract the threat. Last year, the authors sought, through a more generalised but categorised attitudinal study, to explore the reasons why smaller SMEs in particular were reluctant to engage with accepted principles for protecting their data. The results showed that SMEs understood many of the issues. They were prepared to spend more but were particularly suspicious about spending on information assurance. The authors’ current research again focuses on SME attitudes but this time the survey asks only questions directly relating to information assurance and the standards available, in an attempt to try to understand exactly what is causing them to shy away from getting the badge or certificate that would demonstrate to customers and business partners that they take cyber security seriously. As with last year’s study, the results and analysis provide useful pointers towards the broader business environment changes that might cause SMEs to be more interested in working towards an appropriate cyber security standard.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le présent mémoire doctoral a comme principal objectif de déterminer si la dynamique d’attachement entre les deux conjoints (i.e., le pairage des styles d’attachement de chacun : sécure, préoccupé, craintif et détaché) permet de mieux rendre compte de l’insatisfaction sexuelle que le style d’attachement de chacun, pris séparément. Afin d’y parvenir, les conjoints seront pairés quant à leur style d’attachement afin de créer des pairages (3 et 16 pairages). Par la suite, ces pairages seront comparés sur le plan de leur insatisfaction sexuelle tout en tenant compte du genre des conjoints et de certaines covariables (durée de la relation et statut marital). L’échantillon de l’étude se compose de 1078 individus hétérosexuels qui consultent en psychothérapie conjugale (539 couples). Deux questionnaires (le Questionnaire sur les expériences d’attachement amoureux (QEAA) (Experiences in close relationships (ECR) ; Brennan, et al., 1998; traduit par Lafontaine & Lussier, 2003) et le Questionnaire de Hudson (Index of Sexual Satisfaction (ISS); Hudson, 1978; traduit par Comeau & Boisvert, 1985)) sont utilisés afin de mesurer les représentations d’attachement des participants et le degré de l’insatisfaction d’un individu par rapport à sa relation avec un partenaire. Dans un premier temps, une analyse factorielle exploratoire permet de vérifier que le Questionnaire de Hudson comporte une seule composante dans sa structure. Ensuite, une ANOVA à mesures répétées pour le genre des participants (3 (pairage) X 2 (femmes vs hommes)) détermine s’il existe des différences de moyennes entre les dyades d’attachement, et ce, selon le sexe. Les résultats montrent que les pairages vivant le plus d’insatisfaction sexuelle sont celles composés de deux conjoints insécures et ceux étant plus satisfaits sont ceux unissant deux partenaires sécures. Enfin, une ANOVA à mesures répétées pour le genre des participants (16 (pairage) X 2 (femmes vs hommes)) est employée dans le but de déterminer s’il existe des différences de moyennes entre les dyades d’attachement des participants. Les femmes les plus satisfaites sont les femmes préoccupées jumelées à un homme sécure et celles les plus insatisfaites sexuellement sont dans un pairage craintive-craintif. Chez les hommes, les satisfaits sexuellement sont issus du pairage composé d’une femme préoccupée et d’un homme préoccupé et ceux étant les plus insatisfaits de leur sexualité sont les détachés jumelés à une femme détachée. Les analyses présentement également les taux de prévalence des types d’attachement, mais aussi des pairages de ces mêmes représentations, et ce, dans une population clinique. Le type d’attachement sécure semble donc avoir un effet protecteur pour l’insatisfaction sexuelle, tout comme le style préoccupé. Toutefois, la détresse sexuelle apparaît être plus présente au sein des types détaché et craintif.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a software protection assessment process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The spatial and temporal fluidity conditioned by the technologies of social interaction online have been allowing that collective actions of protest and activism arise every day in cyberspace - the cyber-activism. If before these actions were located in geographical boundaries, today's demands and mobilizations extrapolate the location, connect to the global, and at the same time, return to the regional through digital virtuality. Within this context of the relationship between digital technology and global flow of sociability, emerges in October 2010 the social movement of the hashtag "#ForaMicarla", which means the dissatisfaction of cibernauts from Natal of Twitter with the current management of the municipality of Natal-RN, Micarla de Sousa (Green Party). We can find in the center of this movement and others who appeared in the world at the same time a technological condition of Twitter, with the hashtag "#". Given this scenario, this research seeks to analyze how the relationship of the agents of movement hashtag "ForaMicarla", based on the principle that it was formed in the Twitter network and is maintained on the platform on a daily basis, it can create a new kind of political culture. Thus, this study discusses theoretically the importance of Twitter and movements that emerge on the platform and through it to understand the social and political demands of the contemporary world and this public sphere, which now seems to include cyberspace

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le domaine des relations hétérosexuelles chez les adultes handicapés mentaux occupe une place centrale dans le courant actuel de la normalisation. Les personnes handicapées mentales légères et moyennes principalement voient de plus en plus s'ouvrir à eux de nouvelles possibilités de vivre leur sexualité de façon harmonieuse. Les centres de service hors institution, tels les foyers de groupe, les appartements super visés et les ateliers protégés permettent â l'individu d'entrer en contact, de façon régulière, avec des personnes de sexe opposé. Bien souvent, toutefois, ces mêmes personnes seront mal à l'aise face à l'utilisation de ces nouvelles possibilités. Le caractère précaire de leur vécu amoureux sera en quelque sorte un appel pressant à l'action éducative. Cette action ne peut, par ailleurs, se concevoir sans une compréhension des possibilités, des besoins et des désirs de ces adultes de s'engager dans la vie amoureuse.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management.