Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailVPML: an approach to detect design patterns of MOF-based modeling languages
Elaasar, Maged; Briand, Lionel UL; Labiche, Yvan

in Software & Systems Modeling (2013)

Detailed reference viewed: 298 (19 UL)
Full Text
Peer Reviewed
See detailVRMLGen: An R package for 3D Data Visualization on the Web
Glaab, Enrico UL; Garibaldi, Jonathan M.; Krasnogor, Natalio

in Journal of Statistical Software (2010), 36(8), 1-18

The 3-dimensional representation and inspection of complex data is a frequently used strategy in many data analysis domains. Existing data mining software often lacks functionality that would enable users ... [more ▼]

The 3-dimensional representation and inspection of complex data is a frequently used strategy in many data analysis domains. Existing data mining software often lacks functionality that would enable users to explore 3D data interactively, especially if one wishes to make dynamic graphical representations directly viewable on the web. In this paper we present vrmlgen, a software package for the statistical programming language R to create 3D data visualizations in web formats like the Virtual Reality Markup Language (VRML) and LiveGraphics3D. vrmlgen can be used to generate 3D charts and bar plots, scatter plots with density estimation contour surfaces, and visualizations of height maps, 3D object models and parametric functions. For greater flexibility, the user can also access low-level plotting methods through a unified interface and freely group different function calls together to create new higher-level plotting methods. Additionally, we present a web tool allowing users to visualize 3D data online and test some of vrmlgen's features without the need to install any software on their computer. [less ▲]

Detailed reference viewed: 125 (5 UL)
Full Text
Peer Reviewed
See detailVSOC - A Virtual Security Operating Center
Falk, Eric UL; Fiz Pontiveros, Beltran UL; Repcek, Stefan et al

in Global Communications (2017)

Security in virtualised environments is becoming increasingly important for institutions, not only for a firm’s own on-site servers and network but also for data and sites that are hosted in the cloud ... [more ▼]

Security in virtualised environments is becoming increasingly important for institutions, not only for a firm’s own on-site servers and network but also for data and sites that are hosted in the cloud. Today, security is either handled globally by the cloud provider, or each customer needs to invest in its own security infrastructure. This paper proposes a Virtual Security Operation Center (VSOC) that allows to collect, analyse and visualize security related data from multiple sources. For instance, a user can forward log data from its firewalls, applications and routers in order to check for anomalies and other suspicious activities. The security analytics provided by the VSOC are comparable to those of commercial security incident and event management (SIEM) solutions, but are deployed as a cloud-based solution with the additional benefit of using big data processing tools to handle large volumes of data. This allows us to detect more complex attacks that cannot be detected with todays signature-based (i.e. rules) SIEM solutions. [less ▲]

Detailed reference viewed: 144 (9 UL)
See detailVue sur la scène politique: "House of Cards"
Kohns, Oliver UL

Conference given outside the academic context (2018)

Detailed reference viewed: 36 (1 UL)
Full Text
See detailLa vulnérabilité dans la jurisprudence constitutionnelle tchèque
Lickova, Magdalena UL

in Burgorgue-Larsen, Laurence (Ed.) Vulnérabilité saisie par les juges en Europe (2014)

Le terme de vulnérabilité (zranitelnost) n’apparaît ni dans la jurisprudence de la Cour constitutionnelle (Ústavní soud) de la République tchèque (« Cour constitutionnelle ») ni dans les actes juridiques ... [more ▼]

Le terme de vulnérabilité (zranitelnost) n’apparaît ni dans la jurisprudence de la Cour constitutionnelle (Ústavní soud) de la République tchèque (« Cour constitutionnelle ») ni dans les actes juridiques formant l’ordre constitutionnel de cette dernière. Ceci étant, la prise en compte de la vulnérabilité transparaît à travers l’ensemble du corps juridique dans la mesure où il s’agit d’une propriété qui est consubstantielle à l’homme et qui l’accompagne donc dans l’ensemble de son activité. En effet, être vulnérable c’est être susceptible « de subir des blessures », que ce soit sur le plan physique, psychologique ou social. Puisque le droit protège l’intégrité physique, psychologique et sociale de l’homme de différentes façons, l’analyse de la protection constitutionnelle de la vulnérabilité de ce dernier devrait couvrir le champ matériel très vaste qu’occupent la législation et la jurisprudence en la matière. De plus, lorsqu’il se penche, notamment, sur le travail du juge « ordinaire », le juge constitutionnel est souvent sollicité afin d’examiner la constitutionnalité de ce travail pour des raisons détachées de la préoccupation matérielle à l’origine du litige donné, ce qui rend la recherche en ce domaine particulièrement complexe. Il nous semble donc plus intéressant de concentrer notre étude sur ce qui constitue, selon nous, l’apport spécifique du juge constitutionnel à la protection juridique de la vulnérabilité, à savoir la prise en compte de la vulnérabilité découlant d’une inégalité. A cet égard, l’ordre constitutionnel et la jurisprudence constitutionnelle tchèques consacrent, sous diverses expressions, l’objectif de protection juridique des personnes dont les dispositions naturelles (capacités physiques, facultés psychologiques) ou opportunités sociales sont, à titre temporaire ou permanent, amoindries, ce qui les expose à des « blessures » (physiques, psychologique ou sociales) résultant d’abus de la part d’autrui ou de l’inadaptation du milieu environnant. Les sources de droit constitutionnel tchèque nous enseignent, en effet, que les causes productrices d’une vulnérabilité « naturelle » sont notamment celles liées à l’âge (mineur, personne âgée), à l’état de santé (personne handicapée, personne malade) ou sexe des personnes (femme) tandis que les limites qui s’imposent à un individu du fait de ses opportunités sociales peuvent avoir pour origine sa situation financière (personnes ayant droit à l’aide juridique), sa sous-représentation politique (minorité), son statut professionnel (salarié), son inexpérience professionnelle (consommateur) ou encore un déséquilibre de l’offre et de la demande sur un marché important pour la vie de chacun (locataire). Si certains des exemples précités ont été entièrement forgés dans le prétoire du juge constitutionnel, d’autres disposent d’un ancrage constitutionnel textuel sans avoir nécessairement fait l’objet d’une spécification judiciaire. Il s’agira donc pour nous d’examiner le raisonnement par lequel ce dernier décide, ou refuse, de compenser une vulnérabilité caractérisée par une inégalité réexistante. [less ▲]

Detailed reference viewed: 99 (5 UL)
Full Text
Peer Reviewed
See detailVulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso
Bissyande, Tegawendé François D Assise UL; Ouoba, Jonathan; Ahmat, Daouda et al

in 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries (2015, December)

Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens ... [more ▼]

Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens and their governments in developing countries. E-government is thus becoming a reality: in Burkina Faso, all government bodies are taking part in this movement with web portals dedicated to serving the public. Unfortunately, in this rush to promote government actions within this trend of digitization, little regards is given to the security of such web sites. In many cases, government highly critical web sites are simply produced in a product line fashion using Content Management Systems which the webmasters do not quite master. We discuss in this study our findings on empirically assessing the security of govern- ment websites in Burkina Faso. By systematically scanning these websites for simple and well-known vulnerabilities, we were able to discover issues that deserved urgent attention. As an example, we were able to crawl from temporary backup files in a government web site all information (hostname, login and password in clear) to read and write directly in the database and for impersonating the administrator of the website. We also found that around 50% of the government websites are built on top of platforms suffering from 14 publicly known vulnerabilities, and thus can be readily attacked by any hacker. [less ▲]

Detailed reference viewed: 168 (10 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems
Krüger, Kristin; Volp, Marcus UL; Fohler, Gerhard

in LIPIcs-Leibniz International Proceedings in Informatics (2018), 106

Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety ... [more ▼]

Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety in situations with no or a limited number of accidental faults. However, with increasing connectivity of real-time systems and a wide availability of increasingly sophisticated exploits, security and, in particular, the consequences of predictability on security become concerns of equal importance. Time-triggered scheduling with offline constructed tables provides determinism and simplifies timing inference, however, at the same time, time-triggered scheduling creates vulnerabilities by allowing attackers to target their attacks to specific, deterministically scheduled and possibly safety-critical tasks. In this paper, we analyze the severity of these vulnerabilities by assuming successful compromise of a subset of the tasks running in a real-time system and by investigating the attack potential that attackers gain from them. Moreover, we discuss two ways to mitigate direct attacks: slot-level online randomization of schedules, and offline schedule-diversification. We evaluate these mitigation strategies with a real-world case study to show their practicability for mitigating not only accidentally malicious behavior, but also malicious behavior triggered by attackers on purpose. [less ▲]

Detailed reference viewed: 86 (4 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 102 (7 UL)
Full Text
Peer Reviewed
See detailVulnerability analysis of network observability in link flow inference problems
Rinaldi, Marco UL; Viti, Francesco UL

Scientific Conference (2018, January)

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailVulnerability Prediction Models: A case study on the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016 (2016, October)

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at ... [more ▼]

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable components, in the context of the Linux Kernel, under different scenarios. To achieve the above-mentioned aims, we mined vulnerabilities reported in the National Vulnerability Database and created a large dataset with all vulnerable components of Linux from 2005 to 2016. Based on this, we then built and evaluated the prediction models. We observe that an approach based on the header files included and on function calls performs best when aiming at future vulnerabilities, while text mining is the best technique when aiming at random instances. We also found that models based on code metrics perform poorly. We show that in the context of the Linux kernel, vulnerability prediction models can be superior to random selection and relatively precise. Thus, we conclude that practitioners have a valuable tool for prioritizing their security inspection efforts. [less ▲]

Detailed reference viewed: 421 (30 UL)
Full Text
See detailVulnérables. Les patients psychiatriques en Belgique (1914-1918).
Majerus, Benoît UL; Roekens, Anne

Book published by Presses Universitaires de Namur (2018)

L'objectif de cet ouvrage sera de mettre au jour et en perspective les conditions de vie des patients pris en charge par les institutions psychiatriques belges pendant l'occupation de 1914-1918.00Derrière ... [more ▼]

L'objectif de cet ouvrage sera de mettre au jour et en perspective les conditions de vie des patients pris en charge par les institutions psychiatriques belges pendant l'occupation de 1914-1918.00Derrière l'image consensuelle d?une petite Belgique unie dans l?adversité du premier conflit mondial, se dessinent des réalités bien complexes. Un des angles morts de ces années de guerre réside dans le sort des patients psychiatriques. Internés dans des grandes structures, tributaires des rations officielles, ceux-ci sont touchés par une surmortalité hors norme. Sans que cela n'émeuve grand monde? L?ouvrage est consacré à l'analyse de ce processus de fragilisation, encore très peu étudié. Des chapitres thématiques alternent avec l'évocation d'une certaine Élise qui a vécu ces événements de l?intérieur. [less ▲]

Detailed reference viewed: 83 (9 UL)
Full Text
See detailVum Lëtzebuerger Musekerlexikon zu enger Lëtzebuerger Museksgeschicht
Sagrillo, Damien UL

Conference given outside the academic context (2017)

Wa mer iwwer eng Lëtzebuerger Museksgeschicht nodenke wëllen, musse mer fir d'éischt iwwer d'Leit schwatzen, déi des Geschicht duerch hiert musikalesch Wierken gepragt hunn. A mengem Virtrag kommen deemno ... [more ▼]

Wa mer iwwer eng Lëtzebuerger Museksgeschicht nodenke wëllen, musse mer fir d'éischt iwwer d'Leit schwatzen, déi des Geschicht duerch hiert musikalesch Wierken gepragt hunn. A mengem Virtrag kommen deemno niewe Musekerperséinlechkeeten an hire Wierker och Tendenzen zur Sprooch, déi mat der Hëllef vun dem Lexikon, den elo virleit, erausgeschafft kënne ginn. Niewe reng musekshistoresche Faite spillen och regionalgeschichtlech motivéiert soziologesch Tendenzen eng Roll. (Konferenz mat extraiten vun Musekstecker) op lëtzebuergesch. [less ▲]

Detailed reference viewed: 81 (0 UL)
Full Text
Peer Reviewed
See detailvVote: a Verifiable Voting System
Culnane, Chris; Ryan, Peter UL; Schneider, Steve et al

in Jets (2014)

The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a ... [more ▼]

The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a Voter to the idiosyncrasies of elections in the Australian state of Victoria. This technical report includes general background, user experience and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyse their security properties and explain how they tie in to other design decisions. We hope this will be an interesting case study on the application of end-to-end verifiable voting protocols to real elections. A preliminary version of this paper appeared as the 10th February 2014 version of "Draft Technical Report for VEC vVote System". This version augments that version with additional message sequence charts. The team involved in developing the vVote design described in this report were: Craig Burton, Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider and Vanessa Teague. [less ▲]

Detailed reference viewed: 209 (3 UL)
Peer Reviewed
See detailVygotskij in Harlem: The Barbara Taylor School.
Biesta, Gert UL; Miedema, S.

in Jeugd en samenleving : maandblad (1989), 19(9), 547-562

Detailed reference viewed: 92 (0 UL)
See detailVýkon pravomoci Evropské unie v oblasti ochrany přímých zahraničních investic
Lickova, Magdalena UL

Scientific Conference (2015, March 05)

Detailed reference viewed: 64 (23 UL)
Full Text
See detailVyužít zkušeností, vytvořit vědomosti
Borsig, Agnes; Kriszan, Michael; Sprenger, Birte UL

in Borsig, Agnes; Knappe, Elke; Kriszan, Michael (Eds.) Zprostředkování vědomosti - Využít zkušeností – Podněcování vývoje (2007)

This paper deals with networks for knowledge transfer in biomass and is seen as a first guideline for practitioners based on results of the INTERREG project REGIOSUSTAIN.

Detailed reference viewed: 44 (1 UL)
Full Text
See detailVzorová sada podpůrných nástrojů pro učitele
Scheuer, Claude UL; Heck, Sandra UL

E-print/Working paper (2020)

V rámci projektu BMC-EU (Základní pohybové kompetence v Evropě) byl na základě koncepce základních pohybových kompetencí a výsledků sběru dat vytvořen rámec podpory a vzorová sada nástrojů (výsledek první ... [more ▼]

V rámci projektu BMC-EU (Základní pohybové kompetence v Evropě) byl na základě koncepce základních pohybových kompetencí a výsledků sběru dat vytvořen rámec podpory a vzorová sada nástrojů (výsledek první fáze projektu – intelektuální výstup 3). Účelem této sady je nabídnout variabilní přístup k metodice tělesné výchovy. V první fázi projektu byl vytvořen podpůrný rámec pro diagnostiku základních pohybových kompetencí žáků, jejich silných a slabých stránek z pohledu základních pohybových způsobilostí. Na základě tohoto rámce byly vyvinuty podklady ve formě vzorové podpůrné sady (didaktických) materiálů, připravených k implementaci v konkrétních vzdělávacích situacích, jejichž účelem je rozvoj základních pohybových kompetencí diagnostikovaných žáků. Vzorová podpůrná sada nástrojů obsahuje pokyny pro interpretaci výsledků testů MOBAK (Motorische Basiskompetenzen), podpůrný rámec MOBAK, glosář a vzorovou podpůrnou sadu nástrojů s materiály pro učitele tělesné výchovy ve formě karet MOBAK. Karty MOBAK popisují činnosti a aktivity dle principů variace (rozličnosti podnětů) a jsou založeny na přístupu orientovaném na kompetence. [less ▲]

Detailed reference viewed: 6 (0 UL)
See detailV° Cautionnement, Gage, Hypothèque
Cuniberti, Gilles UL

in Menut, B. (Ed.) Le creancier et le recouvrement de sa creance (2003)

Detailed reference viewed: 34 (0 UL)
See detailV° Effets des titres étrangers en France
Cuniberti, Gilles UL

in Crocq, P.; Brenner, C. (Eds.) Lamy Droit de l'execution forcée (2012)

Detailed reference viewed: 39 (0 UL)