Health center data implicates a large scale of individual health records and is immensely concealment sensory. In the virtual era of large-size data, the increasingly different health informatization causes it important that health data... more
Today is the era of the Internet of Things (IoT). The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like... more
The usefulness of patterns to optimize the environmental impact of business processes and their infrastructure has already been described in literature. However, due to the abstract description of pattern solutions, the individual... more
The environmental impact of doing business becomes an increasingly relevant aspect for organizations, not only because of legal requirements but also because more customers care about environmental influences. Most organizations, however,... more
With the growing adoption of Cloud Computing, automated deployment and provisioning systems for Cloud applications are becoming more prevalent. They help to reduce the onboarding costs for new customers as well as the financial impact of... more
Active worms pose major security threats to the Internet. This is due to the ability of a ctive worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active w orms evolve during their... more
Automated ballistics imaging and analysis systems, such as the integrated ballistic identification system (IBIS), have advanced gun law enforcement operations by allowing images of gun crime evidence to be rapidly compared to a large... more
Spam has become a major issue in computer security because it is a channel for threats such as computer viruses, worms and phishing. Many solutions feature machine-learning algorithms trained using statistical representations of the terms... more
The use of mobile phones has increased in our lives because they offer nearly the same functionality as a personal computer. Besides, the number of applications available for Android-based mobile devices has increased. Google offers... more
The complexity of modern security systems requires comprehensive (holistic) research methods that not only reduce complexity but also maintain high diagnostic power. The author addresses the problem area of security system structures,... more
This study was based on data analysis of academic histories of civil engineering students at FACET-UNT. Our main objective was to determine the academic performance variables that have a significant impact on the dropout of the career. To... more
The security of information technology, specifically web applications, has become an area of concern today. Computer cybercrime is now a significant problem that affects more than just businesses and organizations. Higher education... more
This paper presents a study for modernization of the water supply system in Kriva Palanka, Macedonia. As main water sources the system uses the springs of Kalin Kamen and the alternative sources are Stanеchka reka and four wells in the... more
Recent disasters have not only pointed out to humanity how small we are compared to nature, but also showed us that terrorism has become a factor that we cannot ignore. We are being forced to handle crisis situations in the most efficient... more
In this paper we describe a disaster management system. It is assumed that each individual in the field is equipped with a PDA (Personal Digital Assistant) and that can communicate with other PDAs in the vicinity. Together the PDAs form... more
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and... more
I would also like to present gratitude to Mrs. Shruti Jaiswal (Research Scholar, Delhi Technological University) for providing me continuous support and guidance during this project. I would also like to thank every DTU faculty member and... more
Technology is the integration of technical skills, methods, processes and knowledge which are applied in streamlining the business operations with respect to products and services which are embedded in the business with computers,... more
Smart phones are very effective tools for increasing the productivity of business users. With their increasing computational power and storage capacity, smartphones allow end users to perform several tasks and be always updated while on... more
The advancement of artificial intelligence and the perception of international migration as a security issue by governments have led to the exploration of next-generation technologies in border security. Advanced technologies are being... more
In several application scenarios, like the case of structural monitoring, it is important to model and represent the Wireless Sensor Networks (WSN) to be deployed. To model the components and properties of entire WSN types of... more
A total of 3 orifice plates were observed -10-, 9-and 5-hole. With each orifice plate, 4 pressure profiles were compared -10, 7, 4 and 1 bar for each Pressure and Velocity Profiles were compared. Shnerr-Sauer Model was used in the ANSYS... more
Less Economically Developed Countries (LEDCs) struggle to meet the demand for affordable housing in their growing cities. There are several reasons for this, but a major constraint is the high cost of construction materials. In LEDCs,... more
The protocol for Quantitative Field Observations (QFOs) discussed here, termed the Baker-Rodrigo Observation Method Protocol (BROMP) 1.0, were initially developed by Ryan Baker and Ma. Mercedes T. Rodrigo . This method is used to record... more
While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the... more
Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate, and treat a patient using telecommunication technology. To diagnose and evaluate a patient, the healthcare professionals... more
Attacks on computer networks are increasingly common, often leading to severe economical and reputational damage to organisations. Subsequently, Intrusion Response Systems are recently an active area of research which seek to... more
Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little... more
With the development and deployment of IEC 61850 based smart substations, cybersecurity vulnerabilities of supervisory control and data acquisition (SCADA) systems are increasingly emerging. In response to the emergence of cybersecurity... more
Critical infrastructures and industrial control systems are complex Cyber-Physical Systems (CPS). To ensure reliable operations of such systems, comprehensive threat modeling during system design and validation is of paramount... more
Many critical industrial control systems integrate a mixture of state-of-the-art and legacy equipment. Legacy installations lack advanced, and often even basic security features, risking entire system security. Existing research primarily... more
Currently deployed legacy industrial systems were not designed with the future industry 4.0 vision in mind and lack advanced, and often even basic, security features. Further, the presence of legacy systems not only introduces security... more
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit... more
The mass integration and deployment of intelligent technologies within critical commercial, industrial and public environments have a significant impact on business operations and society as a whole. Though integration of these critical... more
With the rise in worth and popularity of cryptocurrencies, a new opportunity for criminal gain is being exploited and with little currently offered in the way of defence. The cost of mining (i.e. earning cryptocurrency through... more
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its... more
In this paper, we propose a malware categorization method that models malware behavior in terms of instructions using PageRank. PageRank computes ranks of web pages based on structural information and can also compute ranks of... more
Daily cyber-attacks on ships’ IT and OT systems are not a rare occurrence anymore. This has been taken into account in recent years and the IMO has issued directives and circulars with recommendations for increasing the cybersecurity of... more
In the last 6-7 years, there is a rapid growth in the development of Smart Grid Network on earth. Smart Grid (SG) is an advancement to the traditional power grid which integrates the power grid with Information and Communication... more
In the late twentieth century, the term "System of Systems" (SoS) became popular to describe a complex system made up of a combination of independent constituent systems. Since then, several studies have been conducted to support and... more
Within growing pervasive information systems, Systems of Systems (SoS) emerge as a new research frontier. A SoS is formed by a set of constituent systems that live on their own with well-established functionalities and requirements, and,... more
The increasing use of the Internet for social purposes enriches the data available online about all of us and promotes the concept of the Digital Persona. Actually, most of us are represented online by more than one identity, what we... more
Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behaviour in detecting deception . In the broadest definition, social engineering, in the... more