119,944 research outputs found

    Federated Identity and Access Management for the Internet of Things

    Get PDF

    Access and engagement in ICT: teaching pupils for whom English is an additional language

    Get PDF

    Securing Our Future Homes: Smart Home Security Issues and Solutions

    Get PDF
    The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a home that always operates in consideration of security, energy, efficiency and convenience, whether anyone is home or not

    Perspectives of Integrated “Next Industrial Revolution” Clusters in Poland and Siberia

    Get PDF
    Rozdział z: Functioning of the Local Production Systems in Central and Eastern European Countries and Siberia. Case Studies and Comparative Studies, ed. Mariusz E. Sokołowicz.The paper presents the mapping of potential next industrial revolution clusters in Poland and Siberia. Deindustrialization of the cities and struggles with its consequences are one of the fundamental economic problems in current global economy. Some hope to find an answer to that problem is associated with the idea of next industrial revolution and reindustrialization initiatives. In the paper, projects aimed at developing next industrial revolution clusters are analyzed. The objective of the research was to examine new industrial revolution paradigm as a platform for establishing university-based trans-border industry clusters in Poland and Siberia47 and to raise awareness of next industry revolution initiatives.Monograph financed under a contract of execution of the international scientific project within 7th Framework Programme of the European Union, co-financed by Polish Ministry of Science and Higher Education (title: “Functioning of the Local Production Systems in the Conditions of Economic Crisis (Comparative Analysis and Benchmarking for the EU and Beyond”)). Monografia sfinansowana w oparciu o umowę o wykonanie projektu między narodowego w ramach 7. Programu Ramowego UE, współfinansowanego ze środków Ministerstwa Nauki i Szkolnictwa Wyższego (tytuł projektu: „Funkcjonowanie lokalnych systemów produkcyjnych w warunkach kryzysu gospodarczego (analiza porównawcza i benchmarking w wybranych krajach UE oraz krajach trzecich”))

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc
    corecore