5,128 research outputs found

    AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    Get PDF
    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices

    Flow of online misinformation during the peak of the COVID-19 pandemic in Italy

    Get PDF
    The COVID-19 pandemic has impacted on every human activity and, because of the urgency of finding the proper responses to such an unprecedented emergency, it generated a diffused societal debate. The online version of this discussion was not exempted by the presence of d/misinformation campaigns, but differently from what already witnessed in other debates, the COVID-19 -- intentional or not -- flow of false information put at severe risk the public health, reducing the effectiveness of governments' countermeasures. In the present manuscript, we study the effective impact of misinformation in the Italian societal debate on Twitter during the pandemic, focusing on the various discursive communities. In order to extract the discursive communities, we focus on verified users, i.e. accounts whose identity is officially certified by Twitter. We thus infer the various discursive communities based on how verified users are perceived by standard ones: if two verified accounts are considered as similar by non unverified ones, we link them in the network of certified accounts. We first observe that, beside being a mostly scientific subject, the COVID-19 discussion show a clear division in what results to be different political groups. At this point, by using a commonly available fact-checking software (NewsGuard), we assess the reputation of the pieces of news exchanged. We filter the network of retweets (i.e. users re-broadcasting the same elementary piece of information, or tweet) from random noise and check the presence of messages displaying an url. The impact of misinformation posts reaches the 22.1% in the right and center-right wing community and its contribution is even stronger in absolute numbers, due to the activity of this group: 96% of all non reputable urls shared by political groups come from this community.Comment: 25 pages, 4 figures. The Abstract, the Introduction, the Results, the Conclusions and the Methods were substantially rewritten. The plot of the network have been changed, as well as table

    Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

    Get PDF
    The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of Cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds

    Teoria e prática na Educação Física Escolar : uma proposta metodológica

    Get PDF
    Orientador: Wanderley Marchi JuniorMonografia (licenciatura) - Universidade Federal do Paraná. Setor de Ciências Biológicas. Curso de Educação Físic

    Cyber-storms come from clouds:Security of cloud computing in the IoT era

    Get PDF
    The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds

    Plan de gestión de recursos humanos para oficiales calificados en fuerzas especiales del Ejército del Perú

    Get PDF
    El producto final del proceso de investigación es la propuesta de un plan de gestión de recursos del personal militar de oficiales calificados en Fuerzas Especiales del Ejército del Perú, que tiene un horizonte de cumplimiento de mediano plazo de cuatro años, con la finalidad de identificar formalmente una línea de carrera de las Fuerzas Especiales dentro del Ejército, que no solo la haga competitiva entre las FF. AA. peruanas, sino que le permita hacer más eficiente la gestión de los recursos destinados a la formación y asignación, monitorear el desarrollo profesional de este personal, verificar su contribución al cumplimiento de los roles estratégicos y vincular su desempeño a los objetivos estratégicos institucionales. Los objetivos de este plan en lo que respecta al planeamiento de la formación de las Fuerzas Especiales son: captación eficaz de personal militar de oficiales calificado en Fuerzas Especiales y capacitar eficazmente personal militar de oficiales en operaciones de Fuerzas Especiales. Mientras que para el empleo de este cuerpo de élite son: desarrollar Fuerzas Especiales con capacidad para operar en todos los espectros y rango de las operaciones y acciones militares, y evaluar el desempeño del personal de oficiales de Fuerzas Especiales

    Phase-shifting by means of an electronically tunable lens: quantitative phase imaging of biological specimens with digital holographic microscopy

    Get PDF
    The use of an electronically tunable lens (ETL) to produce controlled phase shifts in interferometric arrangements is shown. The performance of the ETL as a phase-shifting device is experimentally validated in phase-shifting digital holographic microscopy. Quantitative phase maps of a section of the thorax of a Drosophila melanogaster fly and of human red blood cells have been obtained using our proposal. The experimental results validate the possibility of using the ETL as a reliable phase-shifter device

    The discovery of the southernmost ultra-high-resolution Holocene paleoclimate sedimentary record in Antarctica

    Get PDF
    The response of the Antarctic ice sheet to climate warming is the main source of uncertainty regarding future global sea level rise, since little is known about its present and past dynamics. The last deglaciation is the most recent interval of large-scale climate warming, during which the Northern and Southern Hemisphere ice sheets retreated, and sea level rose globally, although at a non-uniform rate. Geologic records from the polar regions are fundamental in determining the factors that caused the major changes in ice sheets during the last deglacial under different boundary conditions. Here, we combine morpho-bathymetric and seismic data with sediment cores and oceanographic measurements to reconstruct the processes that influenced the deposition of the southernmost, most extensive, ultrahigh-resolution record of the Holocene in Edisto Inlet fjord (Ross Sea, Antarctica). We find that post-glacial sedimentation resulted in a layered diatom mud up to 110 m thick that was locally redistributed by bottom currents over confined drifts-moats in the central part of the fjord. After the Holocene climatic optimum, the fjord was not carved by ground ice, and there continued to be internal fjord water circulation associated with Ross Sea circulation. These results support a retreat of coastal glaciers by about 11 kiloyears ago (ka) from the continental shelf of North Victoria Land
    corecore