44 research outputs found

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    A Survey of the European Security Market

    Get PDF
    This document synthesizes the results of the research made on the European security market. It deals with questions of interest regarding the provision of security goods and services for protecting society from terrorism and organised crime. It explores issues such as market revenues, demand and supply, industrial capabilities, technology, research and development, innovation, business strategies, competition as well as market structure, agents' conduct and economic performance. The research has been based upon desk analysis of open source information related to the security market. Economic theory and critical analysis has been applied to understand the gathered information, derive knowledge, point out key issues and assess trends and drivers that will likely shape the sector's future. The study is the outcome of the working package number 5 included in the research project A new Agenda for European Security Economics (EUSECON). This project with code number 218195 has been financed by the European Commission within the 7th European Research Framework Programme. The task has been performed by the company ISDEFE according to the scope and work plan described in the EUSECON proposal. The author wishes to express his appreciation to all the individuals that have provided input and valuable comments to this study, including anonymous referees. Any flaws or omissions contained in this document are solely the responsibility of the author.

    Securing Cooperative Spectrum Sensing Against Collusive False Feedback Attack in Cognitive Radio Networks

    No full text

    A Survey of the European Security Market

    Full text link
    This document synthesizes the results of the research made on the European security market. It deals with questions of interest regarding the provision of security goods and services for protecting society from terrorism and organised crime. It explores issues such as market revenues, demand and supply, industrial capabilities, technology, research and development, innovation, business strategies, competition as well as market structure, agents' conduct and economic performance. The research has been based upon desk analysis of open source information related to the security market. Economic theory and critical analysis has been applied to understand the gathered information, derive knowledge, point out key issues and assess trends and drivers that will likely shape the sector's future. The study is the outcome of the working package number 5 included in the research project A new Agenda for European Security Economics (EUSECON). This project with code number 218195 has been financed by the European Commission within the 7th European Research Framework Programme. The task has been performed by the company ISDEFE according to the scope and work plan described in the EUSECON proposal. The author wishes to express his appreciation to all the individuals that have provided input and valuable comments to this study, including anonymous referees. Any flaws or omissions contained in this document are solely the responsibility of the author

    Políticas de Copyright de Publicações Científicas em Repositórios Institucionais: O Caso do INESC TEC

    Get PDF
    A progressiva transformação das práticas científicas, impulsionada pelo desenvolvimento das novas Tecnologias de Informação e Comunicação (TIC), têm possibilitado aumentar o acesso à informação, caminhando gradualmente para uma abertura do ciclo de pesquisa. Isto permitirá resolver a longo prazo uma adversidade que se tem colocado aos investigadores, que passa pela existência de barreiras que limitam as condições de acesso, sejam estas geográficas ou financeiras. Apesar da produção científica ser dominada, maioritariamente, por grandes editoras comerciais, estando sujeita às regras por estas impostas, o Movimento do Acesso Aberto cuja primeira declaração pública, a Declaração de Budapeste (BOAI), é de 2002, vem propor alterações significativas que beneficiam os autores e os leitores. Este Movimento vem a ganhar importância em Portugal desde 2003, com a constituição do primeiro repositório institucional a nível nacional. Os repositórios institucionais surgiram como uma ferramenta de divulgação da produção científica de uma instituição, com o intuito de permitir abrir aos resultados da investigação, quer antes da publicação e do próprio processo de arbitragem (preprint), quer depois (postprint), e, consequentemente, aumentar a visibilidade do trabalho desenvolvido por um investigador e a respetiva instituição. O estudo apresentado, que passou por uma análise das políticas de copyright das publicações científicas mais relevantes do INESC TEC, permitiu não só perceber que as editoras adotam cada vez mais políticas que possibilitam o auto-arquivo das publicações em repositórios institucionais, como também que existe todo um trabalho de sensibilização a percorrer, não só para os investigadores, como para a instituição e toda a sociedade. A produção de um conjunto de recomendações, que passam pela implementação de uma política institucional que incentive o auto-arquivo das publicações desenvolvidas no âmbito institucional no repositório, serve como mote para uma maior valorização da produção científica do INESC TEC.The progressive transformation of scientific practices, driven by the development of new Information and Communication Technologies (ICT), which made it possible to increase access to information, gradually moving towards an opening of the research cycle. This opening makes it possible to resolve, in the long term, the adversity that has been placed on researchers, which involves the existence of barriers that limit access conditions, whether geographical or financial. Although large commercial publishers predominantly dominate scientific production and subject it to the rules imposed by them, the Open Access movement whose first public declaration, the Budapest Declaration (BOAI), was in 2002, proposes significant changes that benefit the authors and the readers. This Movement has gained importance in Portugal since 2003, with the constitution of the first institutional repository at the national level. Institutional repositories have emerged as a tool for disseminating the scientific production of an institution to open the results of the research, both before publication and the preprint process and postprint, increase the visibility of work done by an investigator and his or her institution. The present study, which underwent an analysis of the copyright policies of INESC TEC most relevant scientific publications, allowed not only to realize that publishers are increasingly adopting policies that make it possible to self-archive publications in institutional repositories, all the work of raising awareness, not only for researchers but also for the institution and the whole society. The production of a set of recommendations, which go through the implementation of an institutional policy that encourages the self-archiving of the publications developed in the institutional scope in the repository, serves as a motto for a greater appreciation of the scientific production of INESC TEC

    Reports to the President

    Get PDF
    A compilation of annual reports for the 1988-1989 academic year, including a report from the President of the Massachusetts Institute of Technology, as well as reports from the academic and administrative units of the Institute. The reports outline the year's goals, accomplishments, honors and awards, and future plans

    On the Ethical Implications of Personal Health Monitoring

    Get PDF
    Recent years have seen an influx of medical technologies capable of remotely monitoring the health and behaviours of individuals to detect, manage and prevent health problems. Known collectively as personal health monitoring (PHM), these systems are intended to supplement medical care with health monitoring outside traditional care environments such as hospitals, ranging in complexity from mobile devices to complex networks of sensors measuring physiological parameters and behaviours. This research project assesses the potential ethical implications of PHM as an emerging medical technology, amenable to anticipatory action intended to prevent or mitigate problematic ethical issues in the future. PHM fundamentally changes how medical care can be delivered: patients can be monitored and consulted at a distance, eliminating opportunities for face-to-face actions and potentially undermining the importance of social, emotional and psychological aspects of medical care. The norms evident in this movement may clash with existing standards of ‘good’ medical practice from the perspective of patients, clinicians and institutions. By relating utilitarianism, virtue ethics and theories of surveillance to Habermas’ concept of colonisation of the lifeworld, a conceptual framework is created which can explain how PHM may be allowed to change medicine as a practice in an ethically problematic way. The framework relates the inhibition of virtuous behaviour among practitioners of medicine, understood as a moral practice, to the movement in medicine towards remote monitoring. To assess the explanatory power of the conceptual framework and expand its borders, a qualitative interview empirical study with potential users of PHM in England is carried out. Recognising that the inherent uncertainty of the future undermines the validity of empirical research, a novel epistemological framework based in Habermas’ discourse ethics is created to justify the empirical study. By developing Habermas’ concept of translation into a procedure for assessing the credibility of uncertain normative claims about the future, a novel methodology for empirical ethical assessment of emerging technologies is created and tested. Various methods of analysis are employed, including review of academic discourses, empirical and theoretical analyses of the moral potential of PHM. Recommendations are made concerning ethical issues in the deployment and design of PHM systems, analysis and application of PHM data, and the shortcomings of existing research and protection mechanisms in responding to potential ethical implications of the technology.he research described in this thesis was sponsored and funded by the Centre for Computing and Social Responsibility of De Montfort University, and was linked to the research carried out in FP7 research projects PHM-Ethics (GA 230602) and ETICA (Ethical Issues of Emerging ICT Applications, GA 230318)

    Firm Competitive Advantage Through Relationship Management

    Get PDF
    Relationship management (RM) is an essential part of business, but its success as a business model can be hard to measure, with some firms embracing a model that is truly relationship-orientated, while others claim to be relationship-orientated but in fact prefer transactional short-term gain. This open access book aims to develop a mid-range theory of relationship management, examining truly relationship-orientated firms to discover not only what qualities these firms have that make them successful at the RM model, but also what benefits this model has for the firm. It addresses questions like how RM-mature companies achieve and sustain competitive advantage, and what determines the scale and scope of these firms, illustrating with case studies. This book will be of interest to scholars studying leadership and strategy, especially those interested in relationship management, business ethics and corporate social responsibility. It will also be of interest to professionals looking to develop their understanding of relationship management

    Reports to the President

    Get PDF
    A compilation of annual reports for the 1985-1986 academic year, including a report from the President of the Massachusetts Institute of Technology, as well as reports from the academic and administrative units of the Institute. The reports outline the year's goals, accomplishments, honors and awards, and future plans

    Global Food Value Chains and Competition Law BRICS Draft Report

    Get PDF
    corecore