874 research outputs found

    Introducción: la singularidad de la violencia letal en América Latina

    Get PDF
    Los homicidios en América Latina revelan un escenario dramático, no solo por tratarse de la región del planeta con mayor incidencia de homicidios, sino también por su evolución negativa en los últimos años, de tal forma que la brecha con otros continentes continúa creciendo. La singularidad de este «problema latinoamericano» afecta también al perfil de las víctimas, los medios y los móviles de la violencia, que también difieren en alguna medida en relación con otras regiones. Este artículo busca ofrecer un panorama de los homicidios en la región y muestra los principales modelos explicativos adoptados para explicar este fenómeno, así como las políticas que están siendo implementadas en los últimos años para prevenirlo. Por último, el artículo introduce este número monográfico y presenta un resumen de cada artículo, esperando con ello poder contribuir a fomentar la reflexión sobre la violencia letal en América Latina y la participación de todos los sectores en la búsqueda de soluciones.

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches

    Get PDF
    Presently, we are living in a hyper-connected world where millions of heterogeneous devices are continuously sharing information in different application contexts for wellness, improving communications, digital businesses, etc. However, the bigger the number of devices and connections are, the higher the risk of security threats in this scenario. To counteract against malicious behaviours and preserve essential security services, Network Intrusion Detection Systems (NIDSs) are the most widely used defence line in communications networks. Nevertheless, there is no standard methodology to evaluate and fairly compare NIDSs. Most of the proposals elude mentioning crucial steps regarding NIDSs validation that make their comparison hard or even impossible. This work firstly includes a comprehensive study of recent NIDSs based on machine learning approaches, concluding that almost all of them do not accomplish with what authors of this paper consider mandatory steps for a reliable comparison and evaluation of NIDSs. Secondly, a structured methodology is proposed and assessed on the UGR'16 dataset to test its suitability for addressing network attack detection problems. The guideline and steps recommended will definitively help the research community to fairly assess NIDSs, although the definitive framework is not a trivial task and, therefore, some extra effort should still be made to improve its understandability and usability further

    Scalable QoS-aware Mobility for Future Mobile Operators

    Get PDF
    Telecom operators and Internet service providers are heading for a new shift in communications paradigms. The forthcoming convergence of cellular and wireless data networks is often manifested in an “all IP approach” in which all communications are based on an end-to-end IP protocol framework. The approach to network design becomes user and service-centered, so that continuous reachability of mobile users and sustained communication capabilities are default requirements for a prospective architecture. In this article, we describe a network architecture which is able to provide seamless communication mobility, triggered either by the user or by the network, across multiple technologies. The architecture allows for media independent handovers and supports optimized mobility and resource management functions. The main focus of the article is on major technical highlights of mobility and quality-of-service (QoS) management subsystems for converged networks.Publicad

    Securing route optimisation in NEMO

    Get PDF
    Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc,and Wireless Networks. 4-6 April 2005. Riva del Garda, Trentino, ItalyThe network mobility (NEMO) basic support protocol enables mobile networks to change their point of attachment to the Internet, while preserving established sessions of the nodes within the mobile network. When only a nonnested mobile network is considered, the so-called triangle routing is the main problem that should be faced. In mobile IPv6, the route optimisation mechanism solves this problem, and the return routability mechanism aims to limit the security concerns originated because of the route optimisation. Nowadays return routability is considered a weak solution (i.e., based on strong assumptions). In this article we explore different approaches to route optimisation in NEMO and we devise how to adapt some of the terminal mobility solutions to a NEMO environment, where, as we propose, a delegation of signalling rights from the mobile network node to the mobile router is necessary.Publicad

    MIPv6 Experimental Evaluation using Overlay Networks

    Get PDF
    The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming generation of wireless communications. Individual wireless access networks show limitations that can be overcome through the integration of different technologies into a single unified platform (i.e., 4G systems). This paper summarises practical experiments performed to evaluate the impact of inter-networking (i.e. vertical handovers) on the Network and Transport layers. Based on our observations, we propose and evaluate a number of inter-technology handover optimisation techniques, e.g., Router Advertisements frequency values, Binding Update simulcasting, Router Advertisement caching, and Soft Handovers. The paper concludes with the description of a policy-based mobility support middleware (PROTON) that hides 4G networking complexities from mobile users, provides informed handover-related decisions, and enables the application of different vertical handover methods and optimisations according to context.Publicad

    Sinergia entre la Gestión de la Calidad y la Prevención de Riesgos Laborales.

    Get PDF
    Tradicionalmente, se ha orientado la gestión de la calidad hacia el producto, el cliente y el contrato. En función de estos tres pilares, se han desarrollado procedimientos de trabajo que aseguraran la calidad del producto conforme a los requerimientos d

    Memorial do Ignacio Cano

    Get PDF
    Introdução Quando, em finais da década dos 70 na Espanha pós-franquista, decidi estudar sociologia, recebi olhares de incredulidade e incompreensão. Afinal, por que um bom aluno escolheria uma matéria enigmática e de duvidoso rendimento simbólico e material? Naquela Espanha que deixava atrás progressivamente a ditadura, a despeito do golpe de estado de 1981 que acabou não triunfando, a necessidade de mudança social e política era clara, ainda mais para a jovem geração ávida para enterrar déca..
    corecore