15 research outputs found

    Un algorithme Quasi-Newton dans le domaine fréquentiel pour l'égalisation de transmission en salves

    Get PDF
    Dans ce papier, nous proposons un nouveau type d'égaliseur qui appartient à la famille des algorithmes Quasi-Newton (QN).Nous présentons un Egaliseur Linéaire Transverse et un Egaliseur à Retour de Décisions. Dans le premier cas, le Hessien est approché par un développement en série de matrices de Toeplitz. Cette formulation nous permet de développer un algorithme performant dans le domaine fréquentiel (DF). Cette même approche est utilisée pour l'algorithme d'adaptation du filtre direct de l'ERD. L'algorithme obtenu ainsi offre à la fois les avantages de vitesse de convergence des algorithmes QN et de moindre complexité due à la formulation dans le DF

    Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

    Get PDF
    Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats

    Remarks on KRA key recovery block format

    No full text

    A step-by-step quasi-newton algorithm in the frequency domain and its application to adaptative channel equalization

    No full text
    International audienc

    DSAPE – Dynamic Security Awareness Program Evaluation

    No full text

    Policy-Based Access Control for Body Sensor Networks

    No full text
    Part 5: Short PapersInternational audienceSensor nodes and actuators are becoming ubiquitous and research efforts focus on addressing the various issues stemming from resources constraints and other intrinsic characteristics typically associated with such devices and their applications. In the case of wearable nodes, and especially in the context of e-Health applications, the security issues are exacerbated by the direct interaction with the human body and the associated safety and privacy concerns. This work presents a policy-based, unified, cross-platform and flexible access control framework. It adopts a web services-compliant approach to enable secure and authorized fine-grained access control to body sensor network resources and services. The proposed scheme specifically considers the very limited resources of so-called nano nodes that are anticipated to be used in such an environment. A proof-of-concept implementation is developed and a preliminary performance evaluation is presented

    DEFeND DSM: a data scope management service for model-based privacy by design GDPR compliance.

    Get PDF
    The introduction of the European General Data Protection Regulation (GDPR) has brought significant benefits to citizens, but it has also created challenges for organisations, which are facing with difficulties interpreting it and properly applying it. An important challenge is compliance with the Privacy by Design and by default (PbD) principles, which require that data protection is integrated into processing activities and business practices from the design stage. Recently, the European Data Protection Board (EDPB) released an official document with PbD guidelines, and there are various efforts to provide approaches to support these. However, organizations are still facing difficulties in identifying a flow for executing, in a coherent, linear and effective way, these activities, and a complete toolkit for supporting this. In this paper, we: (i) identify the most important PbD activities and strategies, (ii) design a coherent, linear and effective flow for them, and (iii) describe our comprehensive supporting toolkit, as part of the DEFeND EU Project platform. Specifically, within DEFeND, we identified candidate tools, fulfilling specific GDPR aspects, and integrated them in a comprehensive toolkit: the DEFeND Data Scope Management service (DSM). The aim of DSM is to support organizations for continuous GDPR compliance through Model-Based Privacy by Design analysis. Here, we present important PbD activities and strategies individuated, then describe DSM, its design, flow, and a preliminary case study and evaluation performed with pilots from the healthcare, banking, public administration and energy sectors

    In-cell architecture of the nuclear pore and snapshots of its turnover

    No full text
    Nuclear pore complexes (NPCs) fuse the inner and outer membranes of the nuclear envelope. They comprise hundreds of nucleoporins (Nups) that assemble into multiple subcomplexes and form large central channels for nucleocytoplasmic exchange1,2. How this architecture facilitates messenger RNA export, NPC biogenesis and turnover remains poorly understood. Here we combine in situ structural biology and integrative modelling with correlative light and electron microscopy and molecular perturbation to structurally analyse NPCs in intact Saccharomyces cerevisiae cells within the context of nuclear envelope remodelling. We find an in situ conformation and configuration of the Nup subcomplexes that was unexpected from the results of previous in vitro analyses. The configuration of the Nup159 complex appears critical to spatially accommodate its function as an mRNA export platform, and as a mediator of NPC turnover. The omega-shaped nuclear envelope herniae that accumulate in nup116Δ cells3 conceal partially assembled NPCs lacking multiple subcomplexes, including the Nup159 complex. Under conditions of starvation, herniae of a second type are formed that cytoplasmically expose NPCs. These results point to a model of NPC turnover in which NPC-containing vesicles bud off from the nuclear envelope before degradation by the autophagy machinery. Our study emphasizes the importance of investigating the structure-function relationship of macromolecular complexes in their cellular context
    corecore