16,331 research outputs found

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Participatory design research for the development of real-time simulation models in healthcare

    Get PDF
    This is the final version. Available from Taylor & Francis via the DOI in this record. The implementation challenges for modelling and simulation in health and social care are wellknown and understood. Yet increasing availability of data and a better understanding of the value of Operational Research (OR) applications are strengthening opportunities to support healthcare delivery. Participative approaches in healthcare modelling have shown value through stakeholder engagement and commitment towards co-creation of models and knowledge but are limited in focus on model design and development. For simulation modelling, a participative design research methodology can support development for sustained use, emphasising model usefulness and usability using iterative cycles of development and evaluation. Within a structured methodology, measures of success are built into the design process, focusing on factors which contribute to success, with implicit goals of implementation and improvement. We illustrate this through a participative case study which demonstrates development of the component parts of a real-time simulation model aimed at reducing emergency department crowdingEconomic and Social Research CouncilEconomic and Social Research Counci

    Re-prioritizing climate services for agriculture: Insights from Bangladesh

    Get PDF
    Considerable progress has been made in establishing climate service capabilities over the last few decades, but the gap between the resulting services and national needs remains large. Using climate services for agriculture in Bangladesh as a case study example, we highlight mismatches between local needs on the one hand, and international initiatives that have focused largely on prediction on the other, and we make suggestions for addressing such mismatches in similar settings. To achieve greater benefit at the national level, there should be a stronger focus on addressing important preliminaries for building services. These preliminaries include the identification of priorities, the definition of responsibilities and expectations, the development of climate services skills, and the construction of a high-quality and easily usable national climate record. Once appropriate institutional, human resources and data infrastructure are in place, the implementation of a climate monitoring and watch system would form a more logical basis for initial climate service implementation than attempting to promote sub-seasonal to seasonal climate forecasting, especially when and where the inherent predictability is limited at best. When and where forecasting at these scales is viable, efforts should focus on defining and predicting high-impact events important for decision making, rather than on simple seasonal aggregates that often correlate poorly with outcomes. Some such forecasts may be more skillful than the 3- to 4-month seasonal aggregates that have become the internationally adopted standard. By establishing a firm foundation for climate services within National Meteorological Services, there is a greater chance that individual climate service development initiatives will be sustainable after their respective project lifetimes

    Countermeasures for the majority attack in blockchain distributed systems

    Get PDF
    La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació

    Examples of works to practice staccato technique in clarinet instrument

    Get PDF
    Klarnetin staccato tekniğini güçlendirme aşamaları eser çalışmalarıyla uygulanmıştır. Staccato geçişlerini hızlandıracak ritim ve nüans çalışmalarına yer verilmiştir. Çalışmanın en önemli amacı sadece staccato çalışması değil parmak-dilin eş zamanlı uyumunun hassasiyeti üzerinde de durulmasıdır. Staccato çalışmalarını daha verimli hale getirmek için eser çalışmasının içinde etüt çalışmasına da yer verilmiştir. Çalışmaların üzerinde titizlikle durulması staccato çalışmasının ilham verici etkisi ile müzikal kimliğe yeni bir boyut kazandırmıştır. Sekiz özgün eser çalışmasının her aşaması anlatılmıştır. Her aşamanın bir sonraki performans ve tekniği güçlendirmesi esas alınmıştır. Bu çalışmada staccato tekniğinin hangi alanlarda kullanıldığı, nasıl sonuçlar elde edildiği bilgisine yer verilmiştir. Notaların parmak ve dil uyumu ile nasıl şekilleneceği ve nasıl bir çalışma disiplini içinde gerçekleşeceği planlanmıştır. Kamış-nota-diyafram-parmak-dil-nüans ve disiplin kavramlarının staccato tekniğinde ayrılmaz bir bütün olduğu saptanmıştır. Araştırmada literatür taraması yapılarak staccato ile ilgili çalışmalar taranmıştır. Tarama sonucunda klarnet tekniğin de kullanılan staccato eser çalışmasının az olduğu tespit edilmiştir. Metot taramasında da etüt çalışmasının daha çok olduğu saptanmıştır. Böylelikle klarnetin staccato tekniğini hızlandırma ve güçlendirme çalışmaları sunulmuştur. Staccato etüt çalışmaları yapılırken, araya eser çalışmasının girmesi beyni rahatlattığı ve istekliliği daha arttırdığı gözlemlenmiştir. Staccato çalışmasını yaparken doğru bir kamış seçimi üzerinde de durulmuştur. Staccato tekniğini doğru çalışmak için doğru bir kamışın dil hızını arttırdığı saptanmıştır. Doğru bir kamış seçimi kamıştan rahat ses çıkmasına bağlıdır. Kamış, dil atma gücünü vermiyorsa daha doğru bir kamış seçiminin yapılması gerekliliği vurgulanmıştır. Staccato çalışmalarında baştan sona bir eseri yorumlamak zor olabilir. Bu açıdan çalışma, verilen müzikal nüanslara uymanın, dil atış performansını rahatlattığını ortaya koymuştur. Gelecek nesillere edinilen bilgi ve birikimlerin aktarılması ve geliştirici olması teşvik edilmiştir. Çıkacak eserlerin nasıl çözüleceği, staccato tekniğinin nasıl üstesinden gelinebileceği anlatılmıştır. Staccato tekniğinin daha kısa sürede çözüme kavuşturulması amaç edinilmiştir. Parmakların yerlerini öğrettiğimiz kadar belleğimize de çalışmaların kaydedilmesi önemlidir. Gösterilen azmin ve sabrın sonucu olarak ortaya çıkan yapıt başarıyı daha da yukarı seviyelere çıkaracaktır

    Anuário científico da Escola Superior de Tecnologia da Saúde de Lisboa - 2021

    Get PDF
    É com grande prazer que apresentamos a mais recente edição (a 11.ª) do Anuário Científico da Escola Superior de Tecnologia da Saúde de Lisboa. Como instituição de ensino superior, temos o compromisso de promover e incentivar a pesquisa científica em todas as áreas do conhecimento que contemplam a nossa missão. Esta publicação tem como objetivo divulgar toda a produção científica desenvolvida pelos Professores, Investigadores, Estudantes e Pessoal não Docente da ESTeSL durante 2021. Este Anuário é, assim, o reflexo do trabalho árduo e dedicado da nossa comunidade, que se empenhou na produção de conteúdo científico de elevada qualidade e partilhada com a Sociedade na forma de livros, capítulos de livros, artigos publicados em revistas nacionais e internacionais, resumos de comunicações orais e pósteres, bem como resultado dos trabalhos de 1º e 2º ciclo. Com isto, o conteúdo desta publicação abrange uma ampla variedade de tópicos, desde temas mais fundamentais até estudos de aplicação prática em contextos específicos de Saúde, refletindo desta forma a pluralidade e diversidade de áreas que definem, e tornam única, a ESTeSL. Acreditamos que a investigação e pesquisa científica é um eixo fundamental para o desenvolvimento da sociedade e é por isso que incentivamos os nossos estudantes a envolverem-se em atividades de pesquisa e prática baseada na evidência desde o início dos seus estudos na ESTeSL. Esta publicação é um exemplo do sucesso desses esforços, sendo a maior de sempre, o que faz com que estejamos muito orgulhosos em partilhar os resultados e descobertas dos nossos investigadores com a comunidade científica e o público em geral. Esperamos que este Anuário inspire e motive outros estudantes, profissionais de saúde, professores e outros colaboradores a continuarem a explorar novas ideias e contribuir para o avanço da ciência e da tecnologia no corpo de conhecimento próprio das áreas que compõe a ESTeSL. Agradecemos a todos os envolvidos na produção deste anuário e desejamos uma leitura inspiradora e agradável.info:eu-repo/semantics/publishedVersio

    Adopting the technology acceptance model: A Namibian perspective

    Get PDF
    Background: The adoption of online banking is still a concern in developing countries, with limited research in investigating the factors that can lead to the intention to use and the actual usage of online banking. Objectives: This research aims to broaden the knowledge about technology adoption by applying the technology acceptance model (TAM) to the online banking environment in Namibia. Methods: A descriptive, quantitative research design and structural equation modelling (SEM) were employed to analyse the data. Results: The adopted TAM had good model fit if applied to online banking in Namibia. Nine of the 12 hypotheses were accepted. Conclusion: System quality and social influence act as external factors that influence the level of trust, perceived ease of use and perceived usefulness. High levels of ease of use and usefulness of the online banking system result in a positive attitude towards the online banking system that in turn leads to the intention to use the system and then actual usage. Contribution: This study adopted the TAM and included social influence, system quality and perceived trust as factors that can influence the usage of online banking. The study contributed towards the knowledge of technology acceptance from an online banking perspective and can aid the banking sector in increasing the adoption of online banking systems

    Big Tech and research funding: A bibliometric approach

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Data Science and Advanced Analytics, specialization in Business AnalyticsTechnology companies have radically transformed our daily life in the recent years with help of the wide usage of internet. While transforming our lives, these companies also have grown up even bigger in the recent times and have become more powerful not only financially, but also in terms of computing power and data. Although there have been lots of research done on the influence of large digital economy players (Big Tech) in different fields, the academic influence of these companies is little understood. By drawing on 130,000 academic papers for which there is evidence of support by the Big Tech, the present work applies bibliometric approaches (on the metadata) and text mining techniques (on the contents) to shed a light on the outcomes of this relationship. In particular, we take into consideration research funding (direct strategies) and conference sponsorships (indirect strategies) to empirically explore this relatively unexplored side of Big Tech’s influence in contemporary society. While developing the analysis a key limitation was the scarcity of prior work exploring the connections between digital platforms and the scientific enterprise. There are several results that come to light from such a perspective, one of these findings is that among the research supported by Big Tech companies, there is big gap between the number of outcomes with the content about the technical perspectives (like machine learning or artificial intelligence) than the content about reflexive (say ethical or environmental) dimensions of innovation, ladder being very small. These findings may stimulate further inquiries into identifying the possible risks, if any, are generated from the direct and indirect financial support by corporate informational giants to academia. The causes and consequences of this non-market activity by companies with big market power may require further attention and research in this field

    Responsible E-Waste Value Chains in Africa

    Get PDF
    Population growth, increasing prosperity and changing consumer habits globally are increasing demand for consumer electronics. Further to this, rapid changes in technology, falling prices, increased affordability and consumer appetite for new products have exacerbated e-waste management challenges and seen millions of tons of electronic devices become obsolete. This rapid literature review collates evidence from academic, policy focussed and grey literature on e-waste value chains. The report should be read I conjunction with an earlier report on e-waste management. E-waste is any electrical or electronic equipment, including all components, subassemblies and consumables, which are part of the equipment at the time the equipment becomes waste. When e-waste is collected and treated formally, it normally includes the following steps: Collection, Sorting and disassembly, Size reduction, Separation. The following five pillars of a sustainable e-waste management system have been identified: • Business and finance • Policy and regulation • Technology and skills • Monitoring and control • Marketing and awareness As such, to support the development of a responsible e-waste value chain, the following elements must be addressed. • Understanding how e-waste is currently managed • There is no one-size-fits all solution to building a robust e-waste management system based on extended producer responsibility. • An e-waste system built without a participatory approach is likely to be hampered by a series of issues. • An overarching policy is necessary • The choices made for the sector should be founded on two crucial elements – data from on the ground, and inputs from stakeholders. • Enforcement is incumbent on the government mandate The push towards a circular economy has provided stakeholders across the value chain with an impetus to initiate systemic improvements and invest in infrastructure and awareness raising.FCDO (Foreign, Commonwealth and Development Office

    Strategies for Early Learners

    Get PDF
    Welcome to learning about how to effectively plan curriculum for young children. This textbook will address: • Developing curriculum through the planning cycle • Theories that inform what we know about how children learn and the best ways for teachers to support learning • The three components of developmentally appropriate practice • Importance and value of play and intentional teaching • Different models of curriculum • Process of lesson planning (documenting planned experiences for children) • Physical, temporal, and social environments that set the stage for children’s learning • Appropriate guidance techniques to support children’s behaviors as the self-regulation abilities mature. • Planning for preschool-aged children in specific domains including o Physical development o Language and literacy o Math o Science o Creative (the visual and performing arts) o Diversity (social science and history) o Health and safety • Making children’s learning visible through documentation and assessmenthttps://scholar.utc.edu/open-textbooks/1001/thumbnail.jp
    corecore