Results 81 to 90 of about 4,917 (184)

Developing Digital Competences. Work learn trajectories in Italian School System [PDF]

open access: yes, 2017
The work based learning is the core European dispositions on educational and training issue and a pillar of the Europe 2020 strategy (EUCOM 2009/C119/02).
LO PRESTI, Veronica
core  

Cybersecurity: mapping the ethical terrain [PDF]

open access: yes
This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others ...
Adam C. Gastineau   +5 more
core  

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]

open access: yes, 2015
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard   +6 more
core   +2 more sources

Towards Reversible Cyberattacks [PDF]

open access: yes, 2010
This paper appeared in the Proceedings of the 9th European Conference on Information Warfare and Security, July 2010, Thessaloniki, Greece.Warfare without damage has always been a dream of military planners. Traditional warfare usually leaves persistent
Rowe, Neil C.
core  

Constraining Attacker Capabilities Through Actuator Saturation

open access: yes, 2017
For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the ...
cardenas   +6 more
core   +1 more source

The Generatıonal Dıvısıon of Warfare and Controversıal Issues

open access: yesSocial Development & Security
Purpose. To identify the transformational trends and controversial points of the changing face of military violence in the context of the concept of “Generations of warfare”. Method.
Zafar Nuri Najafov
doaj   +1 more source

Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts [PDF]

open access: yes, 2014
This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The honeypots were located on the same /24 IPv4 network and configured as identically as possible.
Rabadia, Priya N, Valli, Craig
core   +1 more source

Home - About - Disclaimer - Privacy