874 research outputs found
Introducción: la singularidad de la violencia letal en América Latina
Los homicidios en América Latina revelan un escenario dramático, no solo por tratarse de la región del planeta con mayor incidencia de homicidios, sino también por su evolución negativa en los últimos años, de tal forma que la brecha con otros continentes continúa creciendo. La singularidad de este «problema latinoamericano» afecta también al perfil de las víctimas, los medios y los móviles de la violencia, que también difieren en alguna medida en relación con otras regiones. Este artículo busca ofrecer un panorama de los homicidios en la región y muestra los principales modelos explicativos adoptados para explicar este fenómeno, así como las políticas que están siendo implementadas en los últimos años para prevenirlo. Por último, el artículo introduce este número monográfico y presenta un resumen de cada artículo, esperando con ello poder contribuir a fomentar la reflexión sobre la violencia letal en América Latina y la participación de todos los sectores en la búsqueda de soluciones.
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches
Presently, we are living in a hyper-connected world where millions of heterogeneous devices are continuously sharing information in different application contexts for wellness, improving communications, digital businesses, etc. However, the bigger the number of devices and connections are, the higher the risk of security threats in this scenario. To counteract against malicious behaviours and preserve essential security services, Network Intrusion Detection Systems (NIDSs) are the most widely used defence line in communications networks. Nevertheless, there is no standard methodology to evaluate and fairly compare NIDSs. Most of the proposals elude mentioning crucial steps regarding NIDSs validation that make their comparison hard or even impossible. This work firstly includes a comprehensive study of recent NIDSs based on machine learning approaches, concluding that almost all of them do not accomplish with what authors of this paper consider mandatory steps for a reliable comparison and evaluation of NIDSs. Secondly, a structured methodology is proposed and assessed on the UGR'16 dataset to test its suitability for addressing network attack detection problems. The guideline and steps recommended will definitively help the research community to fairly assess NIDSs, although the definitive framework is not a trivial task and, therefore, some extra effort should still be made to improve its understandability and usability further
Scalable QoS-aware Mobility for Future Mobile Operators
Telecom operators and Internet service providers
are heading for a new shift in communications
paradigms. The forthcoming convergence
of cellular and wireless data networks is often
manifested in an “all IP approach” in which all
communications are based on an end-to-end IP
protocol framework. The approach to network
design becomes user and service-centered, so
that continuous reachability of mobile users and
sustained communication capabilities are default
requirements for a prospective architecture. In
this article, we describe a network architecture
which is able to provide seamless communication
mobility, triggered either by the user or by the
network, across multiple technologies. The architecture
allows for media independent handovers
and supports optimized mobility and resource
management functions. The main focus of the
article is on major technical highlights of mobility
and quality-of-service (QoS) management subsystems
for converged networks.Publicad
Securing route optimisation in NEMO
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc,and Wireless Networks. 4-6 April 2005. Riva del Garda, Trentino, ItalyThe network mobility (NEMO) basic support protocol enables mobile networks to change their point of attachment to the Internet, while preserving established sessions of the nodes within the mobile network. When only a nonnested mobile network is considered, the so-called triangle routing is the main problem that should be faced. In mobile IPv6, the route optimisation mechanism solves this problem, and the return routability mechanism aims to limit the security concerns originated because of the route optimisation. Nowadays return routability is considered a weak solution (i.e., based on strong assumptions). In this article we explore different approaches to route optimisation in NEMO and we devise how to adapt some of the terminal mobility solutions to a NEMO environment, where, as we propose, a delegation of signalling rights from the mobile network node to the mobile router is necessary.Publicad
MIPv6 Experimental Evaluation using Overlay Networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated
Wireless Networks and Overlay Networks, which are present in the notion of the
forthcoming generation of wireless communications. Individual wireless access networks
show limitations that can be overcome through the integration of different technologies
into a single unified platform (i.e., 4G systems). This paper summarises practical experiments
performed to evaluate the impact of inter-networking (i.e. vertical handovers) on
the Network and Transport layers. Based on our observations, we propose and evaluate a
number of inter-technology handover optimisation techniques, e.g., Router Advertisements
frequency values, Binding Update simulcasting, Router Advertisement caching, and Soft
Handovers. The paper concludes with the description of a policy-based mobility support
middleware (PROTON) that hides 4G networking complexities from mobile users, provides
informed handover-related decisions, and enables the application of different vertical
handover methods and optimisations according to context.Publicad
Sinergia entre la Gestión de la Calidad y la Prevención de Riesgos Laborales.
Tradicionalmente, se ha orientado la gestión de la calidad hacia el producto, el cliente y el contrato. En función de estos tres pilares, se han desarrollado procedimientos de trabajo que aseguraran la calidad del producto conforme a los requerimientos d
Memorial do Ignacio Cano
Introdução Quando, em finais da década dos 70 na Espanha pós-franquista, decidi estudar sociologia, recebi olhares de incredulidade e incompreensão. Afinal, por que um bom aluno escolheria uma matéria enigmática e de duvidoso rendimento simbólico e material? Naquela Espanha que deixava atrás progressivamente a ditadura, a despeito do golpe de estado de 1981 que acabou não triunfando, a necessidade de mudança social e política era clara, ainda mais para a jovem geração ávida para enterrar déca..
- …