5,128 research outputs found
AntibIoTic: Protecting IoT Devices Against DDoS Attacks
The 2016 is remembered as the year that showed to the world how dangerous
Distributed Denial of Service attacks can be. Gauge of the disruptiveness of
DDoS attacks is the number of bots involved: the bigger the botnet, the more
powerful the attack. This character, along with the increasing availability of
connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the
malware industry. In this paper we present the main idea behind AntibIoTic, a
palliative solution to prevent DDoS attacks perpetrated through IoT devices
Flow of online misinformation during the peak of the COVID-19 pandemic in Italy
The COVID-19 pandemic has impacted on every human activity and, because of
the urgency of finding the proper responses to such an unprecedented emergency,
it generated a diffused societal debate. The online version of this discussion
was not exempted by the presence of d/misinformation campaigns, but differently
from what already witnessed in other debates, the COVID-19 -- intentional or
not -- flow of false information put at severe risk the public health, reducing
the effectiveness of governments' countermeasures. In the present manuscript,
we study the effective impact of misinformation in the Italian societal debate
on Twitter during the pandemic, focusing on the various discursive communities.
In order to extract the discursive communities, we focus on verified users,
i.e. accounts whose identity is officially certified by Twitter. We thus infer
the various discursive communities based on how verified users are perceived by
standard ones: if two verified accounts are considered as similar by non
unverified ones, we link them in the network of certified accounts. We first
observe that, beside being a mostly scientific subject, the COVID-19 discussion
show a clear division in what results to be different political groups. At this
point, by using a commonly available fact-checking software (NewsGuard), we
assess the reputation of the pieces of news exchanged. We filter the network of
retweets (i.e. users re-broadcasting the same elementary piece of information,
or tweet) from random noise and check the presence of messages displaying an
url. The impact of misinformation posts reaches the 22.1% in the right and
center-right wing community and its contribution is even stronger in absolute
numbers, due to the activity of this group: 96% of all non reputable urls
shared by political groups come from this community.Comment: 25 pages, 4 figures. The Abstract, the Introduction, the Results, the
Conclusions and the Methods were substantially rewritten. The plot of the
network have been changed, as well as table
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
The Internet of Things (IoT) is rapidly changing our society to a world where
every "thing" is connected to the Internet, making computing pervasive like
never before. This tsunami of connectivity and data collection relies more and
more on the Cloud, where data analytics and intelligence actually reside. Cloud
computing has indeed revolutionized the way computational resources and
services can be used and accessed, implementing the concept of utility
computing whose advantages are undeniable for every business. However, despite
the benefits in terms of flexibility, economic savings, and support of new
services, its widespread adoption is hindered by the security issues arising
with its usage. From a security perspective, the technological revolution
introduced by IoT and Cloud computing can represent a disaster, as each object
might become inherently remotely hackable and, as a consequence, controllable
by malicious actors. While the literature mostly focuses on security of IoT and
Cloud computing as separate entities, in this article we provide an up-to-date
and well-structured survey of the security issues of Cloud computing in the IoT
era. We give a clear picture of where security issues occur and what their
potential impact is. As a result, we claim that it is not enough to secure IoT
devices, as cyber-storms come from Clouds
Teoria e prática na Educação Física Escolar : uma proposta metodológica
Orientador: Wanderley Marchi JuniorMonografia (licenciatura) - Universidade Federal do Paraná. Setor de Ciências Biológicas. Curso de Educação Físic
Cyber-storms come from clouds:Security of cloud computing in the IoT era
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds
Plan de gestión de recursos humanos para oficiales calificados en fuerzas especiales del Ejército del Perú
El producto final del proceso de investigación es la propuesta de un plan de gestión de recursos del personal militar de oficiales calificados en Fuerzas Especiales del Ejército del Perú, que tiene un horizonte de cumplimiento de mediano plazo de cuatro años, con la finalidad de identificar formalmente una línea de carrera de las Fuerzas Especiales dentro del Ejército, que no solo la haga competitiva entre las FF. AA. peruanas, sino que le permita hacer más eficiente la gestión de los recursos destinados a la formación y asignación, monitorear el desarrollo profesional de este personal, verificar su contribución al cumplimiento de los roles estratégicos y vincular su desempeño a los objetivos estratégicos institucionales. Los objetivos de este plan en lo que respecta al planeamiento de la formación de las Fuerzas Especiales son: captación eficaz de personal militar de oficiales calificado en Fuerzas Especiales y capacitar eficazmente personal militar de oficiales en operaciones de Fuerzas Especiales. Mientras que para el empleo de este cuerpo de élite son: desarrollar Fuerzas Especiales con capacidad para operar en todos los espectros y rango de las operaciones y acciones militares, y evaluar el desempeño del personal de oficiales de Fuerzas Especiales
Phase-shifting by means of an electronically tunable lens: quantitative phase imaging of biological specimens with digital holographic microscopy
The use of an electronically tunable lens (ETL) to produce controlled phase shifts in interferometric arrangements is shown. The performance of the ETL as a phase-shifting device is experimentally validated in phase-shifting digital holographic microscopy. Quantitative phase maps of a section of the thorax of a Drosophila melanogaster fly and of human red blood cells have been obtained using our proposal. The experimental results validate the possibility of using the ETL as a reliable phase-shifter device
The discovery of the southernmost ultra-high-resolution Holocene paleoclimate sedimentary record in Antarctica
The response of the Antarctic ice sheet to climate warming is the main source of uncertainty regarding future global sea level rise, since little is known about its present and past dynamics. The last deglaciation is the most recent interval of large-scale climate warming, during which the Northern and Southern Hemisphere ice sheets retreated, and sea level rose globally, although at a non-uniform rate. Geologic records from the polar regions are
fundamental in determining the factors that caused the major changes in ice sheets during the last deglacial under different boundary conditions. Here, we combine morpho-bathymetric and seismic data with sediment cores and oceanographic measurements to reconstruct the processes that influenced the deposition of the southernmost, most extensive, ultrahigh-resolution record of the Holocene in Edisto Inlet fjord (Ross Sea,
Antarctica). We find that post-glacial sedimentation resulted in a layered diatom mud up to 110 m thick that was locally redistributed by bottom currents over confined drifts-moats in the central part of the fjord. After the Holocene climatic optimum, the fjord was not carved by ground ice, and there continued to be internal fjord water circulation associated with Ross Sea circulation. These results support a retreat of coastal glaciers by about
11 kiloyears ago (ka) from the continental shelf of North Victoria Land
- …