Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
See detailVotre passeport, s'il vous plaît!
Scuto, Denis UL

Article for general public (2015)

Weekly column on contemporary history ("L'histoire du temps présent") in Luxembourg newspaper Tageblatt, here on history of passport and identification

Detailed reference viewed: 59 (1 UL)
Full Text
See detail"Vouloir, connaître, agir"
Danescu, Elena UL

Article for general public (2020)

Au sein de l’Union européenne, le Luxembourg est le pays qui peut se targuer de la plus longue expérience d’intégration économique et politique – 170 ans. Au sortir de la Seconde Guerre mondiale ... [more ▼]

Au sein de l’Union européenne, le Luxembourg est le pays qui peut se targuer de la plus longue expérience d’intégration économique et politique – 170 ans. Au sortir de la Seconde Guerre mondiale, l’implication active du Grand-Duché dans ce processus fut le fruit d’un choix délibéré, motivé par sa situation géopolitique et économique, par sa nature de petit État et par une conviction profonde. Effectivement, le Luxembourg s’est toujours illustré comme médiateur et force de proposition pour l’Europe unie, que ce soit en tant qu’État, à travers ses personnalités, ou par l’action de diverses associations, dont la Fondation du Mérite Européen occupe une place de choix depuis un demi-siècle. [less ▲]

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailVous avez dit procédure civile ?
Menetrey, Séverine UL

in Guillemard, Sylvette (Ed.) Le Code de procédure civile, quelles nouveautés ? (2016)

Detailed reference viewed: 53 (3 UL)
See detailLe voyage comme engagement
Roelens, Nathalie UL

Speeches/Talks (2013)

Detailed reference viewed: 55 (4 UL)
See detailVoyage dans le complot judéo-maçonnique en cinq pas
Meyers, Christian UL

Conference given outside the academic context (2019)

Detailed reference viewed: 27 (0 UL)
Full Text
See detailLe voyage des bénéficiaires de la protection internationale dans leur pays d'origine: défis, politiques et pratiques au Luxembourg
Jacobs, Sarah UL; Sommarribas, Adolfo UL; Coda, Nicolas UL et al

Article for general public (2019)

Cette note de synthèse présente les principaux résultats de l’étude réalisée en 2018 par le point de contact luxembourgeois du Réseau européen des migrations intitulée « Les bénéficiaires de la protection ... [more ▼]

Cette note de synthèse présente les principaux résultats de l’étude réalisée en 2018 par le point de contact luxembourgeois du Réseau européen des migrations intitulée « Les bénéficiaires de la protection internationale qui voyagent dans leur pays d’origine: défis, politiques et pratiques ». Dans plusieurs Etats membres de l’Union européenne, les autorités ont détecté des bénéficiaires de protection internationale (ci-après bpi) ayant voyagé dans leur pays d’origine ou demandé un passeport à l’ambassade ou consulat de leur pays d’origine. Si ces actes ne représentent pas nécessairement un abus du droit à la protection internationale, ils pourraient, dans certains cas et dans certaines circonstances, amener les autorités à considérer que les raisons d’octroi de la protection internationale ont cessé d’exister : à savoir la crainte fondée de persécution dans le pays d’origine pour le réfugié ou le risque réel d’y subir des atteintes graves pour le bénéficiaire de la protection subsidiaire. L’étude vise à apporter un éclairage sur les défis liés à la détection de ce phénomène et s’intéresse aux éventuelles conséquences de ces actes sur le statut de protection internationale, en particulier la cessation du statut qui pourrait en résulter. [less ▲]

Detailed reference viewed: 97 (17 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 181 (46 UL)
Full Text
Peer Reviewed
See detailVPML: an approach to detect design patterns of MOF-based modeling languages
Elaasar, Maged; Briand, Lionel UL; Labiche, Yvan

in Software & Systems Modeling (2013)

Detailed reference viewed: 306 (19 UL)
Full Text
Peer Reviewed
See detailVRMLGen: An R package for 3D Data Visualization on the Web
Glaab, Enrico UL; Garibaldi, Jonathan M.; Krasnogor, Natalio

in Journal of Statistical Software (2010), 36(8), 1-18

The 3-dimensional representation and inspection of complex data is a frequently used strategy in many data analysis domains. Existing data mining software often lacks functionality that would enable users ... [more ▼]

The 3-dimensional representation and inspection of complex data is a frequently used strategy in many data analysis domains. Existing data mining software often lacks functionality that would enable users to explore 3D data interactively, especially if one wishes to make dynamic graphical representations directly viewable on the web. In this paper we present vrmlgen, a software package for the statistical programming language R to create 3D data visualizations in web formats like the Virtual Reality Markup Language (VRML) and LiveGraphics3D. vrmlgen can be used to generate 3D charts and bar plots, scatter plots with density estimation contour surfaces, and visualizations of height maps, 3D object models and parametric functions. For greater flexibility, the user can also access low-level plotting methods through a unified interface and freely group different function calls together to create new higher-level plotting methods. Additionally, we present a web tool allowing users to visualize 3D data online and test some of vrmlgen's features without the need to install any software on their computer. [less ▲]

Detailed reference viewed: 129 (5 UL)
Full Text
Peer Reviewed
See detailVSOC - A Virtual Security Operating Center
Falk, Eric UL; Fiz Pontiveros, Beltran UL; Repcek, Stefan et al

in Global Communications (2017)

Security in virtualised environments is becoming increasingly important for institutions, not only for a firm’s own on-site servers and network but also for data and sites that are hosted in the cloud ... [more ▼]

Security in virtualised environments is becoming increasingly important for institutions, not only for a firm’s own on-site servers and network but also for data and sites that are hosted in the cloud. Today, security is either handled globally by the cloud provider, or each customer needs to invest in its own security infrastructure. This paper proposes a Virtual Security Operation Center (VSOC) that allows to collect, analyse and visualize security related data from multiple sources. For instance, a user can forward log data from its firewalls, applications and routers in order to check for anomalies and other suspicious activities. The security analytics provided by the VSOC are comparable to those of commercial security incident and event management (SIEM) solutions, but are deployed as a cloud-based solution with the additional benefit of using big data processing tools to handle large volumes of data. This allows us to detect more complex attacks that cannot be detected with todays signature-based (i.e. rules) SIEM solutions. [less ▲]

Detailed reference viewed: 146 (9 UL)
See detailVue sur la scène politique: "House of Cards"
Kohns, Oliver UL

Conference given outside the academic context (2018)

Detailed reference viewed: 39 (1 UL)
Full Text
See detailLa vulnérabilité dans la jurisprudence constitutionnelle tchèque
Lickova, Magdalena UL

in Burgorgue-Larsen, Laurence (Ed.) Vulnérabilité saisie par les juges en Europe (2014)

Le terme de vulnérabilité (zranitelnost) n’apparaît ni dans la jurisprudence de la Cour constitutionnelle (Ústavní soud) de la République tchèque (« Cour constitutionnelle ») ni dans les actes juridiques ... [more ▼]

Le terme de vulnérabilité (zranitelnost) n’apparaît ni dans la jurisprudence de la Cour constitutionnelle (Ústavní soud) de la République tchèque (« Cour constitutionnelle ») ni dans les actes juridiques formant l’ordre constitutionnel de cette dernière. Ceci étant, la prise en compte de la vulnérabilité transparaît à travers l’ensemble du corps juridique dans la mesure où il s’agit d’une propriété qui est consubstantielle à l’homme et qui l’accompagne donc dans l’ensemble de son activité. En effet, être vulnérable c’est être susceptible « de subir des blessures », que ce soit sur le plan physique, psychologique ou social. Puisque le droit protège l’intégrité physique, psychologique et sociale de l’homme de différentes façons, l’analyse de la protection constitutionnelle de la vulnérabilité de ce dernier devrait couvrir le champ matériel très vaste qu’occupent la législation et la jurisprudence en la matière. De plus, lorsqu’il se penche, notamment, sur le travail du juge « ordinaire », le juge constitutionnel est souvent sollicité afin d’examiner la constitutionnalité de ce travail pour des raisons détachées de la préoccupation matérielle à l’origine du litige donné, ce qui rend la recherche en ce domaine particulièrement complexe. Il nous semble donc plus intéressant de concentrer notre étude sur ce qui constitue, selon nous, l’apport spécifique du juge constitutionnel à la protection juridique de la vulnérabilité, à savoir la prise en compte de la vulnérabilité découlant d’une inégalité. A cet égard, l’ordre constitutionnel et la jurisprudence constitutionnelle tchèques consacrent, sous diverses expressions, l’objectif de protection juridique des personnes dont les dispositions naturelles (capacités physiques, facultés psychologiques) ou opportunités sociales sont, à titre temporaire ou permanent, amoindries, ce qui les expose à des « blessures » (physiques, psychologique ou sociales) résultant d’abus de la part d’autrui ou de l’inadaptation du milieu environnant. Les sources de droit constitutionnel tchèque nous enseignent, en effet, que les causes productrices d’une vulnérabilité « naturelle » sont notamment celles liées à l’âge (mineur, personne âgée), à l’état de santé (personne handicapée, personne malade) ou sexe des personnes (femme) tandis que les limites qui s’imposent à un individu du fait de ses opportunités sociales peuvent avoir pour origine sa situation financière (personnes ayant droit à l’aide juridique), sa sous-représentation politique (minorité), son statut professionnel (salarié), son inexpérience professionnelle (consommateur) ou encore un déséquilibre de l’offre et de la demande sur un marché important pour la vie de chacun (locataire). Si certains des exemples précités ont été entièrement forgés dans le prétoire du juge constitutionnel, d’autres disposent d’un ancrage constitutionnel textuel sans avoir nécessairement fait l’objet d’une spécification judiciaire. Il s’agira donc pour nous d’examiner le raisonnement par lequel ce dernier décide, ou refuse, de compenser une vulnérabilité caractérisée par une inégalité réexistante. [less ▲]

Detailed reference viewed: 105 (5 UL)
Full Text
Peer Reviewed
See detailVulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso
Bissyande, Tegawendé François D Assise UL; Ouoba, Jonathan; Ahmat, Daouda et al

in 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries (2015, December)

Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens ... [more ▼]

Slowly, but consistently, the digital gap between developing and developed countries is being closed. Everyday, there are initiatives towards relying on ICT to simplify the interaction between citizens and their governments in developing countries. E-government is thus becoming a reality: in Burkina Faso, all government bodies are taking part in this movement with web portals dedicated to serving the public. Unfortunately, in this rush to promote government actions within this trend of digitization, little regards is given to the security of such web sites. In many cases, government highly critical web sites are simply produced in a product line fashion using Content Management Systems which the webmasters do not quite master. We discuss in this study our findings on empirically assessing the security of govern- ment websites in Burkina Faso. By systematically scanning these websites for simple and well-known vulnerabilities, we were able to discover issues that deserved urgent attention. As an example, we were able to crawl from temporary backup files in a government web site all information (hostname, login and password in clear) to read and write directly in the database and for impersonating the administrator of the website. We also found that around 50% of the government websites are built on top of platforms suffering from 14 publicly known vulnerabilities, and thus can be readily attacked by any hacker. [less ▲]

Detailed reference viewed: 173 (10 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems
Krüger, Kristin; Volp, Marcus UL; Fohler, Gerhard

in LIPIcs-Leibniz International Proceedings in Informatics (2018), 106

Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety ... [more ▼]

Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety in situations with no or a limited number of accidental faults. However, with increasing connectivity of real-time systems and a wide availability of increasingly sophisticated exploits, security and, in particular, the consequences of predictability on security become concerns of equal importance. Time-triggered scheduling with offline constructed tables provides determinism and simplifies timing inference, however, at the same time, time-triggered scheduling creates vulnerabilities by allowing attackers to target their attacks to specific, deterministically scheduled and possibly safety-critical tasks. In this paper, we analyze the severity of these vulnerabilities by assuming successful compromise of a subset of the tasks running in a real-time system and by investigating the attack potential that attackers gain from them. Moreover, we discuss two ways to mitigate direct attacks: slot-level online randomization of schedules, and offline schedule-diversification. We evaluate these mitigation strategies with a real-world case study to show their practicability for mitigating not only accidentally malicious behavior, but also malicious behavior triggered by attackers on purpose. [less ▲]

Detailed reference viewed: 93 (7 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 105 (7 UL)
Full Text
Peer Reviewed
See detailVulnerability analysis of network observability in link flow inference problems
Rinaldi, Marco UL; Viti, Francesco UL

Scientific Conference (2018, January)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailVulnerability Prediction Models: A case study on the Linux Kernel
Jimenez, Matthieu UL; Papadakis, Mike UL; Le Traon, Yves UL

in 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016 (2016, October)

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at ... [more ▼]

To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable components, in the context of the Linux Kernel, under different scenarios. To achieve the above-mentioned aims, we mined vulnerabilities reported in the National Vulnerability Database and created a large dataset with all vulnerable components of Linux from 2005 to 2016. Based on this, we then built and evaluated the prediction models. We observe that an approach based on the header files included and on function calls performs best when aiming at future vulnerabilities, while text mining is the best technique when aiming at random instances. We also found that models based on code metrics perform poorly. We show that in the context of the Linux kernel, vulnerability prediction models can be superior to random selection and relatively precise. Thus, we conclude that practitioners have a valuable tool for prioritizing their security inspection efforts. [less ▲]

Detailed reference viewed: 425 (30 UL)
Full Text
See detailVulnérables. Les patients psychiatriques en Belgique (1914-1918).
Majerus, Benoît UL; Roekens, Anne

Book published by Presses Universitaires de Namur (2018)

L'objectif de cet ouvrage sera de mettre au jour et en perspective les conditions de vie des patients pris en charge par les institutions psychiatriques belges pendant l'occupation de 1914-1918.00Derrière ... [more ▼]

L'objectif de cet ouvrage sera de mettre au jour et en perspective les conditions de vie des patients pris en charge par les institutions psychiatriques belges pendant l'occupation de 1914-1918.00Derrière l'image consensuelle d?une petite Belgique unie dans l?adversité du premier conflit mondial, se dessinent des réalités bien complexes. Un des angles morts de ces années de guerre réside dans le sort des patients psychiatriques. Internés dans des grandes structures, tributaires des rations officielles, ceux-ci sont touchés par une surmortalité hors norme. Sans que cela n'émeuve grand monde? L?ouvrage est consacré à l'analyse de ce processus de fragilisation, encore très peu étudié. Des chapitres thématiques alternent avec l'évocation d'une certaine Élise qui a vécu ces événements de l?intérieur. [less ▲]

Detailed reference viewed: 98 (9 UL)