36,291 research outputs found
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Recommended from our members
Reverse Engineering Environment for Teaching Secure Coding in Java
Few toolsets for program analysis and Java learning system provide an integrated console, debugger, and reverse engineered visualizer. We present an interactive debugging environment for Java which helps students to understand the secure coding by detecting and visualizing the data flow anomaly. Previous research shows that the earlier students learn secure coding concepts, even at the same time as they first learn to write code, the better they will continue using secure coding practices. This paper proposes web-based Java programming environment for teaching secure coding practices which provides the essential and fundamental skills in secure coding. Also, this tool helps students to understand the data anomaly and security leak with detecting vulnerabilities in given code.Cockrell School of Engineerin
On the Use of XML in Medical Imaging Web-Based Applications
The rapid growth of digital technology in medical fields over recent years has increased the need for applications able to manage patient medical records, imaging data, and chart information. Web-based applications are implemented with the purpose to link digital databases, storage and transmission protocols, management of large volumes of data and security concepts, allowing the possibility to read, analyze, and even diagnose remotely from the medical center where the information was acquired. The objective of this paper is to analyze the use of the Extensible Markup Language (XML) language in web-based applications that aid in diagnosis or treatment of patients, considering how this protocol allows indexing and exchanging the huge amount of information associated with each medical case. The purpose of this paper is to point out the main advantages and drawbacks of the XML technology in order to provide key ideas for future web-based applicationsPeer ReviewedPostprint (author's final draft
Recommended from our members
Towards a Theory of Analytical Behaviour: A Model of Decision-Making in Visual Analytics
This paper introduces a descriptive model of the human-computer processes that lead to decision-making in visual analytics. A survey of nine models from the visual analytics and HCI literature are presented to account for different perspectives such as sense-making, reasoning, and low-level human-computer interactions. The survey examines the people and computers (entities) presented in the models, the divisions of labour between entities (both physical and role-based), the behaviour of both people and machines as constrained by their roles and agency, and finally the elements and processes which define the flow of data both within and between entities. The survey informs the identification of four observations that characterise analytical behaviour - defined as decision-making facilitated by visual analytics: bilateral discourse, divisions of labour, mixed-synchronicity information flows, and bounded behaviour. Based on these principles, a descriptive model is presented as a contribution towards a theory of analytical behaviour. The future intention is to apply prospect theory, a economic model of decision-making under uncertainty, to the study of analytical behaviour. It is our assertion that to apply prospect theory first requires a descriptive model of the processes that facilitate decision-making in visual analytics. We conclude it necessary to measure the perception of risk in future work in order to apply prospect theory to the study of analytical behaviour using our proposed model
Using the Proteus virtual environment to train future IT professionals
Abstract. Based on literature review it was established that the use of augmented reality as an innovative technology of student training occurs in following
directions: 3D image rendering; recognition and marking of real objects; interaction of a virtual object with a person in real time. The main advantages of using AR and VR in the educational process are highlighted: clarity, ability to simulate processes and phenomena, integration of educational disciplines, building an open education system, increasing motivation for learning, etc. It has
been found that in the field of physical process modelling the Proteus Physics Laboratory is a popular example of augmented reality. Using the Proteus
environment allows to visualize the functioning of the functional nodes of the computing system at the micro level. This is especially important for
programming systems with limited resources, such as microcontrollers in the process of training future IT professionals. Experiment took place at Borys
Grinchenko Kyiv University and Sumy State Pedagogical University named after A. S. Makarenko with students majoring in Computer Science (field of knowledge is Secondary Education (Informatics)). It was found that computer modelling has a positive effect on mastering the basics of microelectronics. The ways of further scientific researches for grounding, development and
experimental verification of forms, methods and augmented reality, and can be used in the professional training of future IT specialists are outlined in the article
Social Media for Cities, Counties and Communities
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other tools and services with user- generated content have made a staggering amount of information (and misinformation) available. Some government officials seek to leverage these resources to improve services and communication with citizens, especially during crises and emergencies. Yet, the sheer volume of social data streams generates substantial noise that must be filtered. Potential exists to rapidly identify issues of concern for emergency management by detecting meaningful patterns or trends in the stream of messages and information flow. Similarly, monitoring these patterns and themes over time could provide officials with insights into the perceptions and mood of the community that cannot be collected through traditional methods (e.g., phone or mail surveys) due to their substantive costs, especially in light of reduced and shrinking budgets of governments at all levels. We conducted a pilot study in 2010 with government officials in Arlington, Virginia (and to a lesser extent representatives of groups from Alexandria and Fairfax, Virginia) with a view to contributing to a general understanding of the use of social media by government officials as well as community organizations, businesses and the public. We were especially interested in gaining greater insight into social media use in crisis situations (whether severe or fairly routine crises, such as traffic or weather disruptions)
- …