1,694 research outputs found

    Synergistic relationships among remote-sensing and geophysical media: Geological and hydrological applications

    Get PDF
    The synergistic relationships among LANDSAT imagery, Skylab photographs, and aerial photographs were useful for establishing areas of near surface bedrock. Lineaments were located on LANDSAT imagery and aerial photographs during 1978 and near surface water tables were to be located during 1980. Both of these subjects can be identified by remote sensing methods more reliably than individual outcrops, which are small and occur in a wide variety of environments with a wide range of responses. Bedrock outcrops themselves could not be resolved by any of the data sources used, nor did any combination of data sources specifically identify rock at the ground surface. The data sources could not simply be combined mathematically to produce a visual image of probable areas of near surface bedrock. Outcrops and near surface bedrock had to be verified visually at the site. Despite these drawbacks, a procedure for locating areas of near surface bedrock within which actual surface outcrops may occur was developed

    Prevention of information harvesting in a cloud services environment

    Full text link
    We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data

    Function length as a tool for malware classification

    Full text link
    The proliferation of malware is a serious threat to computer and information systems throughout the world. Antimalware companies are continually challenged to identify and counter new malware as it is released into the wild. In attempts to speed up this identification and response, many researchers have examined ways to efficiently automate classification of malware as it appears in the environment. In this paper, we present a fast, simple and scalable method of classifying Trojans based only on the lengths of their functions. Our results indicate that function length may play a significant role in classifying malware, and, combined with other features, may result in a fast, inexpensive and scalable method of malware classification.<br /

    Theory Summary and Future Directions

    Full text link
    Summary talk at the Lepton-Photon Symposium, Cornell University, Aug. 10-15, 1993.Comment: (Talk presented at the Lepton-Photon Symposium, Cornell University, Aug. 10-15, 1993.) 19 page

    Fast recovery from node compromise in wireless sensor networks

    Full text link
    Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.<br /

    Towards a climate change adaptation strategy for national parks: Adaptive management pathways under dynamic risk

    Full text link
    © 2018 Elsevier Ltd Government seeks to manage public protected areas, such as national parks, to conserve high-quality wildlife habitats and provide essential ecosystems services at risk of permanent damage or extinction from climate change. The complexity of the organizational structure required to deliver this breadth of functions, coupled to uncertainty surrounding the onset and severity of climate impacts at local scale, impedes planning for climate change. This paper describes the development of an adaptation planning tool and its application in a pilot planning process for the National Parks and Wildlife Service, the agency of the New South Wales (NSW) Government (Australia) responsible for management of national parks and public conservation reserves. The process involved close engagement in knowledge co-production in participatory workshops, and employed two complementary techniques, adaptive pathways and risk assessment. It successfully elicited tacit knowledge of agency staff about the range of interventions available, the need for management practices to evolve, and of discontinuities in management pathways in a dynamic risk environment. Findings suggest that management effort across the NSW reserve system will increase as climate risk rises. Consequently, government will need to respond to increased demand for resources, for better targeting of those resources, and for management innovation in how resources are deployed to support adaptation that is both anticipatory and transformative
    corecore