Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailVulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso
Bissyande, Tegawendé François D Assise UL; Ouoba, Jonathan; Ahmat, Daouda et al

in 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries (2015, December)

Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens ... [more ▼]

Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens and their governments in developing countries. E-government is thus becoming a reality: in Burkina Faso, all government bodies are taking part in this movement with web portals dedicated to serving the public. Unfortunately, in this rush to promote government actions within this trend of digitization, little regards is given to the security of such web sites. In many cases, government highly critical web sites are simply produced in a product line fashion using Content Management Systems which the webmasters do not quite master. We discuss in this study our findings on empirically assessing the security of govern- ment websites in Burkina Faso. By systematically scanning these websites for simple and well-known vulnerabilities, we were able to discover issues that deserved urgent attention. As an example, we were able to crawl from temporary backup files in a government web site all information (hostname, login and password in clear) to read and write directly in the database and for impersonating the administrator of the website. We also found that around 50% of the government websites are built on top of platforms suffering from 14 publicly known vulnerabilities, and thus can be readily attacked by any hacker. [less ▲]

Detailed reference viewed: 169 (10 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems
Krüger, Kristin; Volp, Marcus UL; Fohler, Gerhard

in LIPIcs-Leibniz International Proceedings in Informatics (2018), 106

Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety ... [more ▼]

Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety in situations with no or a limited number of accidental faults. However, with increasing connectivity of real-time systems and a wide availability of increasingly sophisticated exploits, security and, in particular, the consequences of predictability on security become concerns of equal importance. Time-triggered scheduling with offline constructed tables provides determinism and simplifies timing inference, however, at the same time, time-triggered scheduling creates vulnerabilities by allowing attackers to target their attacks to specific, deterministically scheduled and possibly safety-critical tasks. In this paper, we analyze the severity of these vulnerabilities by assuming successful compromise of a subset of the tasks running in a real-time system and by investigating the attack potential that attackers gain from them. Moreover, we discuss two ways to mitigate direct attacks: slot-level online randomization of schedules, and offline schedule-diversification. We evaluate these mitigation strategies with a real-world case study to show their practicability for mitigating not only accidentally malicious behavior, but also malicious behavior triggered by attackers on purpose. [less ▲]

Detailed reference viewed: 88 (5 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 102 (7 UL)
Full Text
Peer Reviewed
See detailVulnerability analysis of network observability in link flow inference problems
Rinaldi, Marco UL; Viti, Francesco UL

Scientific Conference (2018, January)

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailVulnerability Prediction Models: A case study on the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016 (2016, October)

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at ... [more ▼]

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable components, in the context of the Linux Kernel, under different scenarios. To achieve the above-mentioned aims, we mined vulnerabilities reported in the National Vulnerability Database and created a large dataset with all vulnerable components of Linux from 2005 to 2016. Based on this, we then built and evaluated the prediction models. We observe that an approach based on the header files included and on function calls performs best when aiming at future vulnerabilities, while text mining is the best technique when aiming at random instances. We also found that models based on code metrics perform poorly. We show that in the context of the Linux kernel, vulnerability prediction models can be superior to random selection and relatively precise. Thus, we conclude that practitioners have a valuable tool for prioritizing their security inspection efforts. [less ▲]

Detailed reference viewed: 423 (30 UL)
Full Text
See detailVulnérables. Les patients psychiatriques en Belgique (1914-1918).
Majerus, Benoît UL; Roekens, Anne

Book published by Presses Universitaires de Namur (2018)

L'objectif de cet ouvrage sera de mettre au jour et en perspective les conditions de vie des patients pris en charge par les institutions psychiatriques belges pendant l'occupation de 1914-1918.00Derrière ... [more ▼]

L'objectif de cet ouvrage sera de mettre au jour et en perspective les conditions de vie des patients pris en charge par les institutions psychiatriques belges pendant l'occupation de 1914-1918.00Derrière l'image consensuelle d?une petite Belgique unie dans l?adversité du premier conflit mondial, se dessinent des réalités bien complexes. Un des angles morts de ces années de guerre réside dans le sort des patients psychiatriques. Internés dans des grandes structures, tributaires des rations officielles, ceux-ci sont touchés par une surmortalité hors norme. Sans que cela n'émeuve grand monde? L?ouvrage est consacré à l'analyse de ce processus de fragilisation, encore très peu étudié. Des chapitres thématiques alternent avec l'évocation d'une certaine Élise qui a vécu ces événements de l?intérieur. [less ▲]

Detailed reference viewed: 87 (9 UL)
Full Text
See detailVum Lëtzebuerger Musekerlexikon zu enger Lëtzebuerger Museksgeschicht
Sagrillo, Damien UL

Conference given outside the academic context (2017)

Wa mer iwwer eng Lëtzebuerger Museksgeschicht nodenke wëllen, musse mer fir d'éischt iwwer d'Leit schwatzen, déi des Geschicht duerch hiert musikalesch Wierken gepragt hunn. A mengem Virtrag kommen deemno ... [more ▼]

Wa mer iwwer eng Lëtzebuerger Museksgeschicht nodenke wëllen, musse mer fir d'éischt iwwer d'Leit schwatzen, déi des Geschicht duerch hiert musikalesch Wierken gepragt hunn. A mengem Virtrag kommen deemno niewe Musekerperséinlechkeeten an hire Wierker och Tendenzen zur Sprooch, déi mat der Hëllef vun dem Lexikon, den elo virleit, erausgeschafft kënne ginn. Niewe reng musekshistoresche Faite spillen och regionalgeschichtlech motivéiert soziologesch Tendenzen eng Roll. (Konferenz mat extraiten vun Musekstecker) op lëtzebuergesch. [less ▲]

Detailed reference viewed: 81 (0 UL)
Full Text
Peer Reviewed
See detailvVote: a Verifiable Voting System
Culnane, Chris; Ryan, Peter UL; Schneider, Steve et al

in Jets (2014)

The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a ... [more ▼]

The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a Voter to the idiosyncrasies of elections in the Australian state of Victoria. This technical report includes general background, user experience and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyse their security properties and explain how they tie in to other design decisions. We hope this will be an interesting case study on the application of end-to-end verifiable voting protocols to real elections. A preliminary version of this paper appeared as the 10th February 2014 version of "Draft Technical Report for VEC vVote System". This version augments that version with additional message sequence charts. The team involved in developing the vVote design described in this report were: Craig Burton, Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider and Vanessa Teague. [less ▲]

Detailed reference viewed: 209 (3 UL)
Peer Reviewed
See detailVygotskij in Harlem: The Barbara Taylor School.
Biesta, Gert UL; Miedema, S.

in Jeugd en samenleving : maandblad (1989), 19(9), 547-562

Detailed reference viewed: 93 (0 UL)
See detailVýkon pravomoci Evropské unie v oblasti ochrany přímých zahraničních investic
Lickova, Magdalena UL

Scientific Conference (2015, March 05)

Detailed reference viewed: 64 (23 UL)
Full Text
See detailVyužít zkušeností, vytvořit vědomosti
Borsig, Agnes; Kriszan, Michael; Sprenger, Birte UL

in Borsig, Agnes; Knappe, Elke; Kriszan, Michael (Eds.) Zprostředkování vědomosti - Využít zkušeností – Podněcování vývoje (2007)

This paper deals with networks for knowledge transfer in biomass and is seen as a first guideline for practitioners based on results of the INTERREG project REGIOSUSTAIN.

Detailed reference viewed: 44 (1 UL)
Full Text
See detailVzorová sada podpůrných nástrojů pro učitele
Scheuer, Claude UL; Heck, Sandra UL

E-print/Working paper (2020)

V rámci projektu BMC-EU (Základní pohybové kompetence v Evropě) byl na základě koncepce základních pohybových kompetencí a výsledků sběru dat vytvořen rámec podpory a vzorová sada nástrojů (výsledek první ... [more ▼]

V rámci projektu BMC-EU (Základní pohybové kompetence v Evropě) byl na základě koncepce základních pohybových kompetencí a výsledků sběru dat vytvořen rámec podpory a vzorová sada nástrojů (výsledek první fáze projektu – intelektuální výstup 3). Účelem této sady je nabídnout variabilní přístup k metodice tělesné výchovy. V první fázi projektu byl vytvořen podpůrný rámec pro diagnostiku základních pohybových kompetencí žáků, jejich silných a slabých stránek z pohledu základních pohybových způsobilostí. Na základě tohoto rámce byly vyvinuty podklady ve formě vzorové podpůrné sady (didaktických) materiálů, připravených k implementaci v konkrétních vzdělávacích situacích, jejichž účelem je rozvoj základních pohybových kompetencí diagnostikovaných žáků. Vzorová podpůrná sada nástrojů obsahuje pokyny pro interpretaci výsledků testů MOBAK (Motorische Basiskompetenzen), podpůrný rámec MOBAK, glosář a vzorovou podpůrnou sadu nástrojů s materiály pro učitele tělesné výchovy ve formě karet MOBAK. Karty MOBAK popisují činnosti a aktivity dle principů variace (rozličnosti podnětů) a jsou založeny na přístupu orientovaném na kompetence. [less ▲]

Detailed reference viewed: 6 (0 UL)
See detailV° Cautionnement, Gage, Hypothèque
Cuniberti, Gilles UL

in Menut, B. (Ed.) Le creancier et le recouvrement de sa creance (2003)

Detailed reference viewed: 34 (0 UL)
See detailV° Effets des titres étrangers en France
Cuniberti, Gilles UL

in Crocq, P.; Brenner, C. (Eds.) Lamy Droit de l'execution forcée (2012)

Detailed reference viewed: 39 (0 UL)
Peer Reviewed
See detailV° France, in Encyclopedia of Private International Law
Cuniberti, Gilles UL

in Basedow, Jurgen; Ruhl, Giesela; Ferrari, Franco (Eds.) et al Encyclopedia of Private International Law (2016)

Detailed reference viewed: 23 (0 UL)
Peer Reviewed
See detailV° Habeas Corpus
Cuniberti, Gilles UL

in Cadiet, Loic (Ed.) Dictionnaire de la justice (2004)

Detailed reference viewed: 10 (1 UL)
See detailV° Immunités d'exécution
Cuniberti, Gilles UL

in crocq, Pierre; Brenner, Claude (Eds.) Lamy droit de l'exécution forcée (2012)

Detailed reference viewed: 16 (0 UL)
See detailV° Mesures conservatoires – Droit international
Cuniberti, Gilles UL

in Cadiet, L. (Ed.) Dictionnaire de la Justice (2004)

Detailed reference viewed: 35 (0 UL)
See detailV° Mise en oeuvre des procédures civiles d'exécution
Cuniberti, Gilles UL

in Crocq, Pierre; Brenner, Claude (Eds.) Lamy Droit de l'execution forcée (2012)

Detailed reference viewed: 7 (0 UL)
Full Text
See detailLes vœux sur les oiseaux: Fortune littéraire d’un rite de cour: Usages politiques d’un motif littéraire
Margue, Michel UL

in Gaullier-Bougassas, Catherine (Ed.) Les "Vœux du Paon" de Jacques de Longuyon. Originalité et rayonnement (2011)

Detailed reference viewed: 40 (1 UL)