Listing 1 - 10 of 52 | << page >> |
Sort by
|
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
This book presents valuable research results in the challenging field of systems (cyber)security. It is a reprint of the Information (MDPI, Basel) - Special Issue (SI) on Advanced Topics in Systems Safety and Security. The competitive review process of MDPI journals guarantees the quality of the presented concepts and results. The SI comprises high-quality papers focused on cutting-edge research topics in cybersecurity of computer networks and industrial control systems. The contributions presented in this book are mainly the extended versions of selected papers presented at the 7th and the 8th editions of the International Workshop on Systems Safety and Security—IWSSS. These two editions took place in Romania in 2019 and respectively in 2020. In addition to the selected papers from IWSSS, the special issue includes other valuable and relevant contributions. The papers included in this reprint discuss various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation. Given this diversity of topics and the scientific level of papers, we consider this book a valuable reference for researchers in the security and safety of systems.
Technology: general issues --- industrial control safety --- attack quantification --- common vulnerability scoring system --- attack tree --- distribution automation system --- Command and Control Citizen Security Center --- Command and Control Information System (C2IS) --- crime detection --- homeland security --- Android applications --- multi-threading --- operational semantics --- reverse engineering --- Smali+ --- cyber attack --- attacker --- attacker profile --- attacker behaviour --- metrics --- features --- attributes --- intelligent data analysis --- attack forecasting --- comparative review --- alert correlation --- attack evaluation --- attacker skill level --- attack prediction --- attack projection --- early-stage detection --- Bayesian network
Choose an application
L’Occident a basculé dans une nouvelle réalité le matin tragique du 11 septembre 2001 lorsque quatre avions détournés par les hommes d’Oussama ben Laden ont frappé le cœur de l’Amérique. Il n’en fallut pas davantage pour que nous nous engagions dans une lutte sans merci contre ce terrorisme d’une violence qui nous était jusqu’alors inconnue. Or, 20 ans après le début de cette guerre, force est de constater que sa réussite demeure bien relative et sujette à de nombreuses questions. En effet, avec le recul dont nous disposons, que penser de nos interventions en Afghanistan et en Irak qui ont déstabilisé toute une région, fait émerger de nouvelles menaces terroristes à l’instar de celle de l’État islamique et entraîné la mort de dizaines de milliers d’innocentes victimes ? Se pourrait-il que nous ayons commis l’erreur de croire qu’il était possible de vaincre cette menace, alors qu’elle ne peut, dans le meilleur des cas, qu’être contenue ? Est-il possible que les méthodes utilisées ne se soient pas révélées appropriées et que nous aurions dû envisager d’autres solutions plus efficaces et moralement supérieures ? Dans ce livre, Jean-François Caron explique en quoi la lutte contre le terrorisme contemporain ne peut s’effectuer de manière traditionnelle, mais plutôt au moyen de ce qu’il appelle des solutions de rechange violentes à la guerre. En effet, en lieu et place de larges déploiements de troupes et d’invasions de territoires jugés hostiles, la menace terroriste doit plutôt être combattue par un usage restreint et ciblé de la force armée. Cette stratégie nous force toutefois à repenser les termes de la guerre en légitimant le recours à ces mesures, plus particulièrement lorsqu’elles sont utilisées de manière préemptive et lorsqu’elles impliquent le ciblage mortel de ces ennemis invisibles.Ce livre est un incontournable pour qui désire comprendre la nature du terrorisme d’aujourd’hui et les solutions de remplacement à une conception de la guerre qui a prouvé ses limites stratégiques et morales au cours des 20 dernières années.
Terrorisme --- Lutte contre --- TERRORISM--PREVENTION --- JUST WAR DOCTRINE --- PREEMPTIVE ATTACK (MILITARY SCIENCE) --- Terrorism --- Prevention. --- History.
Choose an application
Preemptive attack (Military science) --- War and emergency powers --- Syria --- United States --- Syria. --- United States. --- Military relations
Choose an application
Choose an application
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and ancient manuals are well familiar from the Classical period throughout the Hellenistic great battlefields until the end of the Middle Ages, the chronological scope of this codex. 0The current book is the first to encompass this long array of time while trying to enrich the reader with the continuity, development and regression in the different periods and spheres of the ancient poliorcetics and beyond; the papers presented here are focusing on the physical fortifications, besieging and defense techniques, development and efficiency of ancient projectiles and sieging machinery, battlefields and the historiographical evidence.
Siege warfare --- Military architecture --- Architecture --- Architecture and war --- Military engineering --- Attack and defense (Military science) --- Fortifications, Attack and defense of --- Fortress warfare --- Siege craft --- Siegecraft --- Military art and science --- Fortification --- Intrenchments --- History --- Military archaeology
Choose an application
Selbstmordattentate werden seit jeher von Bildern begleitet und durch diese bestimmt. Von Märtyrerpostern über Videotestamente bis hin zu Computersimulationen und Livestreams vom Tatort - die Bildproduktionen der Milizen sind auf vielfältige Weise an der Tat beteiligt und müssen als Akteure im politischen Feld ernstgenommen werden. Verena Straub zeigt erstmals die Geschichte sogenannter Märtyrerzeugnisse auf, die seit den 1970er Jahren in diversen politischen Kontexten operieren. In zahlreichen Falluntersuchungen analysiert sie deren ästhetische und mediale Bandbreite, ihre Handlungsdimensionen und Genderpolitiken, ihre künstlerischen Aneignungen und ethischen Herausforderungen.
Bild; Kunst; Medien; Terror; Selbstmordattentat; Politik; Gewalt; Bildwissenschaft; Terrorismus; Fundamentalismus; Kunstwissenschaft; Image; Art; Media; Suicide Attack; Politics; Violence; Visual Studies; Terrorism; Fundamentalism; Fine Arts --- Art. --- Fine Arts. --- Fundamentalism. --- Media. --- Politics. --- Suicide Attack. --- Terror. --- Terrorism. --- Violence. --- Visual Studies.
Choose an application
Biopolymers including natural (e.g., polysaccharides, proteins, gums, natural rubbers, bacterial polymers), synthetic (e.g., aliphatic polyesters and polyphosphoester), and biocomposites are of paramount interest in regenerative medicine, due to their availability, processability, and low toxicity. Moreover, the structuration of biopolymer-based materials at the nano- and microscale along with their chemical properties are crucial in the engineering of advanced carriers for drug products. Finally, combination products including or based on biopolymers for controlled drug release offer a powerful solution to improve the tissue integration and biological response of these materials. Understanding the drug delivery mechanisms, efficiency, and toxicity of such systems may be useful for regenerative medicine and pharmaceutical technology. The main aim of the Special Issue on “Biopolymers in Drug Delivery and Regenerative Medicine” is to gather recent findings and current advances on biopolymer research for biomedical applications, particularly in regenerative medicine, wound healing, and drug delivery. Contributions to this issue can be as original research or review articles and may cover all aspects of biopolymer research, ranging from the chemical synthesis and characterization of modified biopolymers, their processing in different morphologies and hierarchical structures, as well as their assessment for biomedical uses.
Technology: general issues --- coating --- modification --- nanotechnology --- un-pigmented paints --- permeability --- pull-off --- artificial weathering --- coatings --- durability --- natural weathering --- oak wood --- wettability --- phenol --- carbohydrates --- beech --- birch --- spruce --- sessile oak --- wood --- surface modification --- esterification --- classic approaches --- modern approaches --- shelling --- western larch --- confocal profilometry --- profiling --- growth rings --- latewood --- earlywood --- pith-side-up --- bark-side-up --- spruce wood --- fungicides --- plasma --- UV-additives --- weathering --- adhesion --- caffeine --- TiO2 nanoparticles --- transparent coatings --- UV-resistance --- mould attack --- leaching --- micronized basic copper carbonate --- peroxide --- surface protection --- Norway spruce --- thermally treated wood --- DCSBD --- plasma treatment --- surface free energy
Choose an application
Coatings based on hydroxyapatite and calcium phosphates have a significant relevance in several research fields, such as biomaterials, cultural heritage, and water treatment, due to their characteristic properties. Hydroxyapatite can easily accommodate foreign ions, which can either be incorporated into the lattice, thanks to its specific lattice characteristics, or be adsorbed onto its surface. All these substitutions significantly alter the morphology, lattice parameters, and crystallinity of hydroxyapatite so they influence its main properties. These ion substitutions can be sought or can derive from substrate contaminations, which is an important aspect to be evaluated. Finally, this capability can be used to obtain hydroxyapatites with specific properties, such as antibacterial characteristics, among others. For these reasons, the aim of this Special Issue is to document current advances in the field of ion-substituted hydroxyapatites and highlight possible future perspectives regarding their use. Contributions in the form of original articles and review articles are presented, covering different areas of application.
History of engineering & technology --- calcium phosphates --- ion-substituted apatites --- bone regeneration --- plasma-assisted deposition --- solubility --- crystallinity --- composition --- lithium-doped hydroxyapatite coatings --- renewable resources for implant coatings --- pulsed laser deposition --- biocompatibility --- inhibition of microbial biofilms development --- zinc --- hydroxyapatite --- ultrasound measurement --- sol–gel spin coating --- layers --- C. albicans --- S. aureus --- calcium phosphate --- magnesium phosphate --- struvite --- dolomite --- consolidating treatment --- cultural heritage --- ammonium phosphate --- marble --- calcite --- dissolution --- electrodeposition --- protective coatings --- acid attack --- potential --- current --- RF magnetron sputtering --- GLAD --- carbonated hydroxyapatite --- nanomaterials --- coatings --- cave painting --- inorganic consolidant --- ethyl silicate --- TEOS --- non-thermal plasma --- wettability --- bone --- allograft --- autograft --- xenograft --- ion-substituted calcium phosphates --- nanostructured coatings
Listing 1 - 10 of 52 | << page >> |
Sort by
|