4,870 research outputs found

    A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

    Get PDF
    The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.info:eu-repo/semantics/publishedVersio

    Displacement and the Humanities: Manifestos from the Ancient to the Present

    Get PDF
    This is the final version. Available on open access from MDPI via the DOI in this recordThis is a reprint of articles from the Special Issue published online in the open access journal Humanities (ISSN 2076-0787) (available at: https://www.mdpi.com/journal/humanities/special_issues/Manifestos Ancient Present)This volume brings together the work of practitioners, communities, artists and other researchers from multiple disciplines. Seeking to provoke a discourse around displacement within and beyond the field of Humanities, it positions historical cases and debates, some reaching into the ancient past, within diverse geo-chronological contexts and current world urgencies. In adopting an innovative dialogic structure, between practitioners on the ground - from architects and urban planners to artists - and academics working across subject areas, the volume is a proposition to: remap priorities for current research agendas; open up disciplines, critically analysing their approaches; address the socio-political responsibilities that we have as scholars and practitioners; and provide an alternative site of discourse for contemporary concerns about displacement. Ultimately, this volume aims to provoke future work and collaborations - hence, manifestos - not only in the historical and literary fields, but wider research concerned with human mobility and the challenges confronting people who are out of place of rights, protection and belonging

    An analysis of the process of policy-making to prevent deforestation in Indonesia

    Get PDF
    The environmental, social, and economic value of Indonesia’s tropical forests has generated extensive interest and scrutiny, both local and global. International stakeholders are heavily involved in Indonesian forest policies, including in the issue of deforestation, both because of their immense interest in the Indonesian environment, and because of Indonesia’s lack of development capacity. Many of domestic and international stakeholders participating in the policy-making processes with regard to Indonesian forests have discrete views and concerns. A successful policy would be one that meets all the requirements of all such actors. This study was conducted to analyze the policy process including some questions about Indonesia’s policies for the prevention of deforestation: 1. ‘When are such policies formed?’, 2. ‘Who is involved in the policy-making process?’, 3. How are the resulting policies implemented?’ Appropriate research methods and analysis frameworks for the examination of policy processes were developed for this study and were applied to Indonesia’s deforestation prevention policies. The current study interviewed 72 of the 114 people who were involved in the policy-making process identified through this study, to analyze the means and motives that are involved in the policy-making process and to ascertain the respondents’ interactions with the other actors. The environmental contexts of the development of guidelines were examined by analyzing the streams of problems, politics, and policies through the Multiple Streams Framework to assess the manner in which the current Indonesian deforestation prevention policies have been established. Subsequently, the actors involved in the policy-making processes and the interactions between them were identified to create a structure of the policy network. Further, the parties that exert a significant influence on the deforestation prevention policy were identified. The characteristics of this policy network were confirmed, and the general network was classified into the Relation Network, Information Network and Trust Network. The result of the analyses reveals that the situation pertaining to the deforestation of Indonesian tropical forests has not substantially improved, even though the problem of forest degradation has been recognized in Indonesia for a long time now. The burden of environmental duties demanded from Indonesia by the international community has increased. As Indonesia has transformed politically from a long-standing military regime to a democratic government, its municipalities have gradually been strengthened and various levels of stakeholders including regional governments, NGO, and the private sector, have become actively invested in Indonesian policy-design. At the same time, international attention, and demand for preserving Indonesian forests have become more specific. Indonesia operated through a powerful presidential system and its president exerts much authority over the country’s society. In such a situation, the Indonesian President Susilo Bambang Yudhoyono (SBY)’s announcement at the G20 Summit in 2009 opened the Policy Window. President SBY declared that Indonesia would reduce emissions of greenhouse gas up to 41% 2020. This proclamation received much attention from both domestic and international groups, and led to sweeping changes in Indonesia’s forest policy. In all three of the above-mentioned sub-networks, the overwhelmingly powerful influence of the Ministry of Environment and Forestry, the main policy designer of the Indonesian deforestation prevention policy, was confirmed. The Ministry of Environment and Forestry was found to obtain the highest centrality value in the Relation Network and the gap between this actor and the other policy actors was extremely wide. However, the centrality value of the Ministry of Environment and Forestry was relatively low in the Information and Trust Networks, and this centrality was distributed to the other actors. These outcomes imply that not only the Ministry of Environment and Forestry, but also other organizations such as intergovernmental organizations and academic organizations contribute relevant information with regard to the policy, that the information dependency and trust of the other actors are decentralized, and that these other actors primarily depend on and trust international donors (e.g., World Bank, UN-REDD+ Task Force) and academics who are also interested actors in the formation of the forest policy of Indonesia. Many of the interested actors, especially intergovernmental organizations, academic organizations, NGOs, have access to the policy network of Indonesia’s deforestation prevention policy without any significant barriers. Hence, this policy network may be termed an open system. However, the internal policy actors are judged to be rigid in terms of their systems. The policy network for deforestation prevention has also emerged as a partially vertical hierarchy, as the Indonesian central government’s powerful initiative leads and directs the policy network along with a small number of other influential bodies. According to the classification of policy network types proposed by Marsh and Rhode (1992), the policy network for the prevention of deforestation in Indonesia may be described as an Issue Network with a vertical hierarchy

    Autonomous Demand Side Management of Electric Vehicles

    Get PDF
    There is an error in the table of content, where publication A and B have swiched places.Demand-side management approaches that exploit the temporal flexibility of electric vehicles have attracted much attention in recent years due to the increasing market penetration. These demand-side management measures contribute to alleviating the burden on the power system, especially in distribution grids where bottlenecks are more prevalent. Electric vehicles can be defined as an attractive asset for distribution system operators, which have the potential to provide grid services if properly managed. In this thesis, first, a systematic investigation is conducted for two typically employed demand-side management methods reported in the literature: A voltage droop control-based approach and a market-driven approach. Then a control scheme of decentralized autonomous demand side management for electric vehicle charging scheduling which relies on a unidirectionally communicated grid-induced signal is proposed. In all the topics considered, the implications on the distribution grid operation are evaluated using a set of time series load flow simulations performed for representative Austrian distribution grids. Droop control mechanisms are discussed for electric vehicle charging control which requires no communication. The method provides an economically viable solution at all penetrations if electric vehicles charge at low nominal power rates. However, with the current market trends in residential charging equipment especially in the European context where most of the charging equipment is designed for 11 kW charging, the technical feasibility of the method, in the long run, is debatable. As electricity demand strongly correlates with energy prices, a linear optimization algorithm is proposed to minimize charging costs, which uses next-day market prices as the grid-induced incentive function under the assumption of perfect user predictions. The constraints on the state of charge guarantee the energy required for driving is delivered without failure. An average energy cost saving of 30% is realized at all penetrations. Nevertheless, the avalanche effect due to simultaneous charging during low price periods introduces new power peaks exceeding those of uncontrolled charging. This obstructs the grid-friendly integration of electric vehicles.publishedVersio

    Advances and Applications of DSmT for Information Fusion. Collected Works, Volume 5

    Get PDF
    This fifth volume on Advances and Applications of DSmT for Information Fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics, and is available in open-access. The collected contributions of this volume have either been published or presented after disseminating the fourth volume in 2015 in international conferences, seminars, workshops and journals, or they are new. The contributions of each part of this volume are chronologically ordered. First Part of this book presents some theoretical advances on DSmT, dealing mainly with modified Proportional Conflict Redistribution Rules (PCR) of combination with degree of intersection, coarsening techniques, interval calculus for PCR thanks to set inversion via interval analysis (SIVIA), rough set classifiers, canonical decomposition of dichotomous belief functions, fast PCR fusion, fast inter-criteria analysis with PCR, and improved PCR5 and PCR6 rules preserving the (quasi-)neutrality of (quasi-)vacuous belief assignment in the fusion of sources of evidence with their Matlab codes. Because more applications of DSmT have emerged in the past years since the apparition of the fourth book of DSmT in 2015, the second part of this volume is about selected applications of DSmT mainly in building change detection, object recognition, quality of data association in tracking, perception in robotics, risk assessment for torrent protection and multi-criteria decision-making, multi-modal image fusion, coarsening techniques, recommender system, levee characterization and assessment, human heading perception, trust assessment, robotics, biometrics, failure detection, GPS systems, inter-criteria analysis, group decision, human activity recognition, storm prediction, data association for autonomous vehicles, identification of maritime vessels, fusion of support vector machines (SVM), Silx-Furtif RUST code library for information fusion including PCR rules, and network for ship classification. Finally, the third part presents interesting contributions related to belief functions in general published or presented along the years since 2015. These contributions are related with decision-making under uncertainty, belief approximations, probability transformations, new distances between belief functions, non-classical multi-criteria decision-making problems with belief functions, generalization of Bayes theorem, image processing, data association, entropy and cross-entropy measures, fuzzy evidence numbers, negator of belief mass, human activity recognition, information fusion for breast cancer therapy, imbalanced data classification, and hybrid techniques mixing deep learning with belief functions as well

    Improving the provision of services in the community for people with a sexual attraction to minors, people at risk of and/or who have perpetrated sexual abuse against children

    Get PDF
    The aim of this mixed methods research was to understand how the current provision of community-based services in the UK for people who have a sexual attraction to minors, people at risk of committing and/or who have committed sexual abuse against children can be improved. This is essential to enhance the wellbeing of this population and safeguard children. This study's quantitative phase included an online survey of 318 members of the general public, while the qualitative phase consisted in interviewing 20 people who work or have worked with people who are sexually attracted to minors and/or have committed or are at risk of committing sexual offences against children. According to the survey results, the general public supports a programme like the German Dunkelfeld (free, confidential and widely advertised service for people sexually attracted to minors), despite an undecided/slightly negative attitude towards people who commit sexual offences against children. Although, there is some variance in their opinions. In turn, the thematic analysis of the interviews revealed six themes: the level of acceptability of the programme is influenced by the level of knowledge on the topic; various large-scale strategies need to be implemented to ease the public attitudes; Dunkelfeld's confidentiality approach provides unique benefits; all-round responsivity is required; employees must possess a unique set of aptitudes; funding is essential, but this should not fall onto the service users. This research showed that a policy and practise model for programmes in the UK must consider current best practises while also addressing current shortcomings. First, programmes must be widely accepted and advertised in the community, so that people are aware of them and may use/recommend them. Second, they must secure adequate funding to ensure that supply meets demand. Third, Dunkelfeld's approach to confidentiality is a delicate subject that needs to be clarified but can be beneficial. Finally, a sex-positive approach may aid an all-round responsive programme's ability to become normalised and welcoming to diverse clients
    corecore