8,455 research outputs found
Non-Invasive Measurement of Frog Skin Reflectivity in High Spatial Resolution Using a Dual Hyperspectral Approach
Background:Most spectral data for the amphibian integument are limited to the visible spectrum of light and have been collected using point measurements with low spatial resolution. In the present study a dual camera setup consisting of two push broom hyperspectral imaging systems was employed, which produces reflectance images between 400 and 2500 nm with high spectral and spatial resolution and a high dynamic range.Methodology/Principal Findings:We briefly introduce the system and document the high efficiency of this technique analyzing exemplarily the spectral reflectivity of the integument of three arboreal anuran species (Litoria caerulea, Agalychnis callidryas and Hyla arborea), all of which appear green to the human eye. The imaging setup generates a high number of spectral bands within seconds and allows non-invasive characterization of spectral characteristics with relatively high working distance. Despite the comparatively uniform coloration, spectral reflectivity between 700 and 1100 nm differed markedly among the species. In contrast to H. arborea, L. caerulea and A. callidryas showed reflection in this range. For all three species, reflectivity above 1100 nm is primarily defined by water absorption. Furthermore, the high resolution allowed examining even small structures such as fingers and toes, which in A. callidryas showed an increased reflectivity in the near infrared part of the spectrum.Conclusion/Significance:Hyperspectral imaging was found to be a very useful alternative technique combining the spectral resolution of spectrometric measurements with a higher spatial resolution. In addition, we used Digital Infrared/Red-Edge Photography as new simple method to roughly determine the near infrared reflectivity of frog specimens in field, where hyperspectral imaging is typically difficult. © 2013 Pinto et al
Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach
Software vulnerabilities, when actively exploited by malicious parties, can lead to catastrophic consequences. Proper handling of software vulnerabilities is essential in the industrial context, particularly when the software is deployed in critical infrastructures. Therefore, several industrial standards mandate secure coding guidelines and industrial software developers’ training, as software quality is a significant contributor to secure software. CyberSecurity Challenges (CSC) form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry. These cybersecurity awareness events have been used with success in industrial environments. However, until now, these coached events took place on-site. In the present work, we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online. The introduced cybersecurity awareness platform, which the authors call Sifu, performs automatic assessment of challenges in compliance to secure coding guidelines, and uses an artificial intelligence method to provide players with solution-guiding hints. Furthermore, due to its characteristics, the Sifu platform allows for remote (online) learning, in times of social distancing. The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events. We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.info:eu-repo/semantics/publishedVersio
Cybersecurity challenges: Serious games for awareness training in industrial environments
Awareness of cybersecurity topics, e.g., related to secure coding guidelines, enables software developers to write secure code. This awareness is vital in industrial environments for the products and services in critical infrastructures. In this work, we introduce and discuss a new serious game designed for software developers in the industry. This game addresses software developers’ needs and is shown to be well suited for raising secure coding awareness of software developers in the industry. Our work results from the experience of the authors gained in conducting more than ten CyberSecurity Challenges in the industry. The presented game design, which is shown to be well accepted by software developers, is a novel alternative to traditional classroom training. We hope to make a positive impact in the industry by improving the cybersecurity of products at their early production stages.info:eu-repo/semantics/acceptedVersio
Raising awareness about cloud security in industry through a board game
Today, many products and solutions are provided on the cloud; however, the amount and financial losses due to cloud security incidents illustrate the critical need to do more to protect cloud assets adequately. A gap lies in transferring what cloud and security standards recommend and require to industry practitioners working in the front line. It is of paramount importance to raise awareness about cloud security of these industrial practitioners. Under the guidance of design science paradigm, we introduce a serious game to help participants understand the inherent risks, understand the different roles, and encourage proactive defensive thinking in defending cloud assets. In our game, we designed and implemented an automated evaluator as a novel element. We invite the players to build defense plans and attack plans for which the evaluator calculates
success likelihoods. The primary target group is industry practitioners, whereas people with limited background knowledge about cloud security can also participate in and benefit from the game. We design the game and organize several trial runs in an industrial setting. Observations of the trial runs and collected feedback indicate that the game ideas and logic are useful and provide help in raising awareness of cloud security in industry. Our preliminary results share insight into the design of the serious game and are discussed in this paper.info:eu-repo/semantics/publishedVersio
Raising security awareness using cybersecurity challenges in embedded programming courses
Security bugs are errors in code that, when exploited, can lead to serious software vulnerabilities. These bugs could allow an attacker to take over an application and steal information. One of the ways to address this issue is by means of awareness training. The Sifu platform was developed in the industry, for the industry, with the aim to raise software developers' awareness of secure coding. This paper extends the Sifu platform with three challenges that specifically address embedded programming courses, and describes how to implement these challenges, while also evaluating the usefulness of these challenges to raise security awareness in an academic setting. Our work presents technical details on the detection mechanisms for software vulnerabilities and gives practical advice on how to implement them. The evaluation of the challenges is performed through two trial runs with a total of 16 participants. Our preliminary results show that the challenges are suitable for academia, and can even potentially be included in official teaching curricula. One major finding is an indicator of the lack of awareness of secure coding by undergraduates. Finally, we compare our results with previous work done in the industry and extract advice for practitioners.info:eu-repo/semantics/acceptedVersio
Recommended from our members
European storminess and associated circulation weather types: future changes deduced from a multi-model ensemble of GCM simulations
A range of possible changes in the frequency and characteristics of European wind storms under future climate conditions was investigated on the basis of a multi-model ensemble of 9 coupled global climate model (GCM) simulations for the 20th and 21st centuries following the IPCC SRES A1B scenario. A multi-model approach allowed an estimation of the (un)certainties of the climate change signals. General changes in large-scale atmospheric flow were analysed, the occurrence of wind storms was quantified, and atmospheric features associated with wind storm events were considered. Identified storm days were investigated according to atmospheric circulation, associated pressure patterns, cyclone tracks and wind speed patterns. Validation against reanalysis data revealed that the GCMs are in general capable of realistically reproducing characteristics of European circulation weather types (CWTs) and wind storms. Results are given with respect to frequency of occurrence, storm-associated flow conditions, cyclone tracks and specific wind speed patterns. Under anthropogenic climate change conditions (SRES A1B scenario), increased frequency of westerly flow during winter is detected over the central European investigation area. In the ensemble mean, the number of detected wind storm days increases between 19 and 33% for 2 different measures of storminess, only 1 GCM revealed less storm days. The increased number of storm days detected in most models is disproportionately high compared to the related CWT changes. The mean intensity of cyclones associated with storm days in the ensemble mean increases by about 10 (±10)% in the Eastern Atlantic, near the British Isles and in the North Sea. Accordingly, wind speeds associated with storm events increase significantly by about 5 (±5)% over large parts of central Europe, mainly on days with westerly flow. The basic conclusions of this work remain valid if different ensemble contructions are considered, leaving out an outlier model or including multiple runs of one particular model
Novel types of anti-ecloud surfaces
In high power RF devices for space, secondary electron emission appears as
the main parameter governing the multipactor effect and as well as the e-cloud
in large accelerators. Critical experimental activities included development of
coatings with low secondary electron emission yield (SEY) for steel (large
accelerators) and aluminium (space applications). Coatings with surface
roughness of high aspect ratio producing the so-call secondary emission
suppression effect appear as the selected strategy. In this work a detailed
study of the SEY of these technological coatings and also the experimental
deposition methods (PVD and electrochemical) are presented. The coating-design
approach selected for new low SEY coatings include rough metals (Ag, Au, Al),
rough alloys (NEG), particulated and magnetized surfaces, and also graphene
like coatings. It was found that surface roughness also mitigate the SEY
deterioration due to aging processes.Comment: 4 pages, contribution to the Joint INFN-CERN-EuCARD-AccNet Workshop
on Electron-Cloud Effects: ECLOUD'12; 5-9 Jun 2012, La Biodola, Isola d'Elba,
Italy; CERN Yellow Report CERN-2013-002, pp.153-15
Awareness of secure coding guidelines in the industry - A first data analysis
Software needs to be secure, in particular when deployed to critical infrastructures. Secure coding guidelines capture practices in industrial software engineering to ensure the security of code. This study aims at assessing the level of awareness of secure coding in industrial software engineering, the skills of software developers to spot weaknesses in software code, and avoid them, as well as the organizational support to adhere to coding guidelines. The approach draws not only on well-established theories of policy compliance, neutralization theory, and security-related stress but also on the authors’ many years of experience in industrial software engineering and on lessons identified from training secure coding in the industry. The paper presents the design of the questionnaire for the online survey and the first analysis of data from the pilot study.info:eu-repo/semantics/acceptedVersio
Raising awareness in the industry on secure code review practices
As products and services become increasingly digital and software increasingly complex, all aspects of an industrial software development lifecycle must contribute to quality. Code review serves as a means to address software quality and fosters knowledge exchange across teams. Nonetheless, code review practices require resources and often require more resources than planned, while the benefit of a code review to code quality is less tangible. In our work, we address the effectiveness and efficiency of code review practices and develop an understanding of what is a good and valuable code review practice as part of a software development lifecycle. Our focus is code reviews meant to identify and address security weaknesses in an industrial context. This work presents a design study on how to design a workshop on code review. We conducted and evaluated three workshops with 37 industrial software developers. The findings of our work reveal that presenting constructive code review practices can contribute to raising awareness of secure coding and software lifecycle practices among software development professionals. This contributes to the quality and, in particular, security of software.info:eu-repo/semantics/publishedVersio
- …