415 research outputs found

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    Green ICT for better human life

    Get PDF
    Abstract—Seven decades of rapid development in computing and ICT make it an efficient and effective driving force toward better human life. ICT industry has an appreciated contribution to the global economy associating with innovation, invention and rapid development of almost all the aspect of human life (Education, Health, Industry, Entertainment, Agriculture, Business, etc.). On the other hand, global environment and human life facing serious challenges related to human health and life style, climate change and global warming, and unwise consumption and management of resources. The diversity and rapid increasing of ICT usage in our life leads to more energy consumption and environmental problems, which has negative impact on economy, human health, and life style. The expected ICT consumption of energy for the next few years will be about 15% of the total consumption worldwide. This make ICT industry shared responsibility for global CO2 emissions and environmental problems. Therefore, many developed countries are establishing Green ICT policies and strategies to eliminate environmental and human health problems. Shortage and weakness of Green ICT policies or strategies in developing countries requires adoption of an effective one that leads to wise ICT usage and energy consumption. Ethical and moral values should integrate with technical aspects to have effective strategies for green ICT that leads to better human life

    High-Fidelity Provenance:Exploring the Intersection of Provenance and Security

    Get PDF
    In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. However, the euphoria for the democratization of news publishing was soon followed by scepticism, as a new phenomenon emerged: fake news. With no gatekeepers to vouch for it, the veracity of the information served over the World Wide Web became a major public concern. The Reuters Digital News Report 2020 cites that in at least half of the EU member countries, 50% or more of the population is concerned about online fake news. To help address the problem of trust on information communi- cated over the World Wide Web, it has been proposed to also make available the provenance metadata of the information. Similar to artwork provenance, this would include a detailed track of how the information was created, updated and propagated to produce the result we read, as well as what agents—human or software—were involved in the process. However, keeping track of provenance information is a non-trivial task. Current approaches, are often of limited scope and may require modifying existing applications to also generate provenance information along with thei regular output. This thesis explores how provenance can be automatically tracked in an application-agnostic manner, without having to modify the individual applications. We frame provenance capture as a data flow analysis problem and explore the use of dynamic taint analysis in this context. Our work shows that this appoach improves on the quality of provenance captured compared to traditonal approaches, yielding what we term as high-fidelity provenance. We explore the performance cost of this approach and use deterministic record and replay to bring it down to a more practical level. Furthermore, we create and present the tooling necessary for the expanding the use of using deterministic record and replay for provenance analysis. The thesis concludes with an application of high-fidelity provenance as a tool for state-of-the art offensive security analysis, based on the intuition that software too can be misguided by "fake news". This demonstrates that the potential uses of high-fidelity provenance for security extend beyond traditional forensics analysis

    Status and conservation of the reef gastropod Trochus niloticus in the Philippines

    Get PDF
    The most commercially important reef gastropod Trochus niloticus mainly harvested for the production of mother-of-pearl buttons, is highly susceptible to over- exploitation. Although conservation measures began shortly after the start of its commercial harvest in the early 1900s, their populations have been severely depleted prompting some countries like the Philippines to declare it as a threatened species. With the country's limited success in conserving trochus, this thesis explores the status of trochus in the wild, on-going conservation measures and some aspects of its biology in Palawan, Philippines. Field surveys show that abundance was very low in marine protected sites (MPAs) in mainland Palawan in spite of their proximity to law enforcing bodies. Natural recruits occurred in heavily exploited MP As, but the fates of released juveniles produced from a decade of artificial propagation are unknown. The breeders have high survival rates in intertidal tanks and were successfully induced to spawn after nearly a year of rearing. The growth rates of hatchery produced juveniles in cages on the reef were as fast as in the wild. Translocated wild trochus had high survival rates but growth rates varied among sites. Elasticity analyses of age-based matrix models revealed that survival of sub- and young adults has the greatest contribution to intrinsic population growth rate, so enhancing the survival of these age groups should be preferred over "head starting" when conserving trochus. Efforts to revive the trochus populations should focus on effective long term management/protection of MPAs. Captive rearing of broodstock in subtidal tanks could be a much cheaper alternative to hatchery propagation. Acclimation to predators of hatchery- produced trochus prior to release is hoped to increase their chances of survival. The translocations of wild trochus could be a more effective means of reviving a depleted population in areas having no sign of recruitment.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Resource ecology of the Bolinao coral reef system

    Get PDF
    Coral reefs, Reef fisheries, Ecology, Population dynamics, Overfishing, Stock assessment, Resource management, Philippines, Bolinao,

    Modeling Player Experience for Content Creation

    Full text link
    • …
    corecore