Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailCyber bullying in Luxemburg: Aus nationaler Sicht
Steffgen, Georges UL

Presentation (2007, November)

Detailed reference viewed: 45 (1 UL)
Peer Reviewed
See detailCyber bullying: Current research findings
Steffgen, Georges UL

Scientific Conference (2009, April)

Detailed reference viewed: 25 (0 UL)
Peer Reviewed
See detailCyber bullying: The role of empathy
Steffgen, Georges UL

Scientific Conference (2009, April)

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailCyber bullying: The role of traditional bullying and empathy
Steffgen, Georges UL; König, Andreas UL

in Sapeo, B.; Haddon, L.; Mante-Meijer, E. (Eds.) et al The good, the bad and the challenging. Conference Proceedings (Vol. II) (2009)

Detailed reference viewed: 351 (2 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 191 (9 UL)
Full Text
Peer Reviewed
See detailCyber-attack detection based on controlled invariant sets
Rosich, Albert; Voos, Holger UL; Darouach, Mohamed

in European Control Conference (ECC), Strasbourg, France, 24-27 June 2014 (2014, June)

This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the ... [more ▼]

This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control laws and its vulnerability can be reduced by limiting its accessibility. Finally, a simple but significant example is presented in order to show the benefits and the flaws of the proposed methodology. [less ▲]

Detailed reference viewed: 136 (2 UL)
Full Text
Peer Reviewed
See detailCyberbullying as an act of revenge?
König, Andreas UL; Gollwitzer, Mario; Steffgen, Georges UL

in Australian Journal of Guidance & Counselling (2010), 20(2), 210-224

Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and ... [more ▼]

Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and retaliation as a motive to engage in acts of cyberbullying has not yet been examined systematically. As a first step, this study investigates whether and to what extent traditional victims, when they become cyberbullies, actually choose their former (traditional) perpetrators as targets of their own cyberbullying behavior. Furthermore, the impact of individual differences in relevant traits, such as vengefulness and justice sensitivity, on the choice of cybervictims is examined. Data from 473 students were collected via an online survey. Of these, 149 were identified as traditional victims/cyberbullies. Results show that traditionally bullied students indeed tend to choose their former perpetrators as cybervictims, and that individual differences play a role in the choice of their victims. Implications for further research, as well as for interventions and prevention programmes, are discussed. [less ▲]

Detailed reference viewed: 252 (0 UL)
Full Text
Peer Reviewed
See detailCyberbullying in the Benelux-Countries: First findings and ways to address the problem
Steffgen, Georges UL; Vandebosch, Heidi; Völlink, Trijntje et al

in Mora-Merchan, J.; Jäger, T. (Eds.) Cyberbullying: a cross-national comparison (2010)

Detailed reference viewed: 95 (3 UL)
See detailCyberbullying through the new media: Findings from an international network
Smith, Peter K.; Steffgen, Georges UL

Book published by Psychology Press (2013)

Detailed reference viewed: 411 (13 UL)
Full Text
See detailCyberbullying: Missbrauch mittels neuer elektronischer Medien
Steffgen, Georges UL

in Willems, Helmut; Ferring, Dieter (Eds.) Macht und Missbrauch in Institutionen (2014)

Detailed reference viewed: 335 (10 UL)
Full Text
Peer Reviewed
See detailCyberbullying: Recent Areas of Research, and the Work of COST IS0801
Smith, Peter K.; Steffgen, Georges UL

in Bulletin of the International Society for Research on Aggression (2013), 35(1), 20-23

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailLes cybercafés dans la France des années 1990, espaces médiatiques et médiatisés
Schafer, Valerie UL

in Le temps des médias (2017), 28

À la croisée de l’histoire de l’innovation et des entreprises, de celle des médias et des TIC et de la sociologie des usages, saisis via des archives audiovisuelles et de la presse, mais aussi celles du ... [more ▼]

À la croisée de l’histoire de l’innovation et des entreprises, de celle des médias et des TIC et de la sociologie des usages, saisis via des archives audiovisuelles et de la presse, mais aussi celles du Web et des Newsgroups, ces espaces intermédiaires que sont les cybercafés, à la fois médiatiques et médiatisés, incarnent tout à la fois les enjeux techniques, économiques, sociaux et culturels que pose l’arrivée du Web au cours de la seconde moitié de la décennie 1990 en France5 et témoignent des empreintes profondé- ment matérielles des mondes virtuels. [less ▲]

Detailed reference viewed: 86 (1 UL)
See detailCyberharcèlement - Quoi faire?
Steffgen, Georges UL

Presentation (2015, November 28)

Detailed reference viewed: 72 (4 UL)
Full Text
Peer Reviewed
See detailCybermenaces, enjeux et sécurité : entretien avec Stéphane Bortzmeyer et Mohsen Souissi (Afnic)
Schafer, Valerie UL

in Flux: Cahiers Scientifiques Internationaux Réseaux et Territoires (2020), 2019/4

Si les cyberattaques récentes au Moyen-Orient, menées via les noms de domaine, ont eu un vaste écho médiatique fin février 2019, tandis que la revue Défense et Sécurité Internationale consacrait un ... [more ▼]

Si les cyberattaques récentes au Moyen-Orient, menées via les noms de domaine, ont eu un vaste écho médiatique fin février 2019, tandis que la revue Défense et Sécurité Internationale consacrait un dossier spécial à la techno-guérilla, les menaces qui pèsent sur les réseaux informatiques ne sont pas nouvelles. L’Afnic – Association Française pour le Nommage Internet en Coopération –, gestionnaire historique du .fr, fait partie des acteurs français confrontés au quotidien aux enjeux de sécurité des réseaux Internet et veille notamment à la sécurité des noms de domaine et au bon fonctionnement du .fr, en terme de disponibilité mais aussi d’intégrité. Mohsen Souissi, alors Responsable des Sécurité des Sys- tèmes d’information (RSSI) à l’Afnic, qu’il a intégrée en 2000 et où il était précédemment responsable Recherche et développement (R&D) de 2007 à 2016, et Stéphane Bortzmeyer, auteur de Cyberstructure (C&F Éditions, 2018) et ingénieur à l’Afnic depuis seize ans, après avoir été administrateur pour plusieurs systèmes et réseaux universitaires et de centres de recherche, reviennent sur les cybermenaces et les enjeux de sécurité auxquels ils sont confrontés. [less ▲]

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailCybersecurity of Robotics and Autonomous Systems: Privacy and Safety
Rodriguez Lera, Francisco Javier UL; Llamas, Camino Fernández; Guerrero, Ángel Manuel et al

in Dekoulis, George (Ed.) Robotics - Legal, Ethical and Socioeconomic Impacts (2017)

Robots and autonomous systems in general are set to suffer similar cybersecurity problems that computers have been facing for decades. This is not only worrying for critical tasks such as those performed ... [more ▼]

Robots and autonomous systems in general are set to suffer similar cybersecurity problems that computers have been facing for decades. This is not only worrying for critical tasks such as those performed by surgical, or military robots but also for household robots such as vacuum cleaners or for teleconference robots compromise privacy and safety of their owners. What will happen if these robots are hacked? This study presents a survey on the cybersecurity attacks associated with service robots, and as a result, a taxonomy that classifies the risks faced by users when using service robots, distinguish ing between security and safety threads, is presented. We also present the robot software development phase as one the most relevant ones for the security of robots. [less ▲]

Detailed reference viewed: 131 (6 UL)
Full Text
Peer Reviewed
See detailA cyclic extension of the earthquake flow I
Bonsante, Francesco; Mondello, Gabriele; Schlenker, Jean-Marc UL

in Geometry & Topology (2013), 17(1), 157--234

Detailed reference viewed: 102 (4 UL)
Full Text
Peer Reviewed
See detailA cyclic extension of the earthquake flow II
Bonsante, Francesco; Mondello, Gabriele; Schlenker, Jean-Marc UL

in Annales Scientifiques de l'Ecole Normale Supérieure (2015), 48(4), 811859

Detailed reference viewed: 138 (15 UL)
Full Text
Peer Reviewed
See detailCyclooxygenase-2 contributes to the selective induction of cell death by the endocannabinoid 2-arachidonoyl glycerol in hepatic stellate cells.
Siegmund, S. V.; Wojtalla, A.; Schlosser, M. et al

in Biochemical and biophysical research communications (2016), 470(3), 678-84

The endogenous cannabinoid 2-arachidonoyl glycerol (2-AG) is an anti-fibrotic lipid mediator that induces apoptosis in hepatic stellate cells (HSCs), but not in hepatocytes. However, the exact molecular ... [more ▼]

The endogenous cannabinoid 2-arachidonoyl glycerol (2-AG) is an anti-fibrotic lipid mediator that induces apoptosis in hepatic stellate cells (HSCs), but not in hepatocytes. However, the exact molecular mechanisms of this selective induction of HSC death are still unresolved. Interestingly, the inducible isoform of cyclooxygenase, COX-2, can metabolize 2-AG to pro-apoptotic prostaglandin glycerol esters (PG-GEs). We analyzed the roles of COX-2 and endocannabinoid-derived PG-GEs in the differential susceptibility of primary activated HSCs and hepatocytes toward 2-AG-induced cell death. HSCs displayed significant COX-2 expression in contrast to hepatocytes. Similar to 2-AG, treatment of HSCs with PGD2-GE dose-dependently induced cell death independently from cannabinoid receptors that was accompanied by PARP- and caspase 3-cleavage. In contrast to 2-AG, PGD2-GE failed to induce significant ROS formation in HSCs, and depletion of membrane cholesterol did not rescue HSCs from PGD2-GE-induced apoptosis. These findings indicate differential engagement of initial intracellular signaling pathways by 2-AG and its COX-2-derived metabolite PGD2-GE, but similar final cell death pathways. Other PG-GEs, such as PGE2-or PGF2alpha-GE did not induce apoptosis in HSCs. Primary rat hepatocytes were mainly resistant against 2-AG- and PGD2-GE-induced apoptosis. HSCs, but not hepatocytes were able to metabolize 2-AG to PGD2-GE. As a proof of principle, HSCs from COX-2(-/-) mice lacked PDG2-GE production after 2-AG treatment. Accordingly, COX-2(-/-) HSCs were resistant against 2-AG-induced apoptosis. In conclusion, the divergent expression of COX-2 in HSCs and hepatocytes contributes to the different susceptibility of these cell types towards 2-AG-induced cell death due to the generation of pro-apoptotic PGD2-GE by COX-2 in HSCs. Modulation of COX-2-driven metabolization of 2-AG may provide a novel physiological concept allowing the specific targeting of HSCs in liver fibrosis. [less ▲]

Detailed reference viewed: 98 (1 UL)
Full Text
Peer Reviewed
See detailCyclophilin a binds to linear peptide motifs containing a consensus that is present in many human proteins
Piotukh, K.; Gu, Wei UL; Kofler, M. et al

in Journal of Biological Chemistry (2005), 280(25), 23668-23674

Cyclophilin A ( CypA) is a peptidyl-prolyl cis/trans-isomerase that is involved in multiple signaling events of eukaryotic cells. It might either act as a catalyst for prolyl bond isomerization, or it can ... [more ▼]

Cyclophilin A ( CypA) is a peptidyl-prolyl cis/trans-isomerase that is involved in multiple signaling events of eukaryotic cells. It might either act as a catalyst for prolyl bond isomerization, or it can form stoichiometric complexes with target proteins. We have investigated the linear sequence recognition code for CypA by phage display and found the consensus motif FGPXLp to be selected after five rounds of panning. The peptide FGP-DLPAGD showed inhibition of the isomerase reaction and NMR chemical shift mapping experiments highlight the CypA interaction epitope. Ligand docking suggests that the peptide was able to bind to CypA in the cis- and trans-conformation. Protein Data Bank searches reveal that many human proteins contain the consensus motif, and several of these protein motifs are shown to interact with CypA in vitro. These sequences represent putative target sites for binding of CypA to intracellular proteins. [less ▲]

Detailed reference viewed: 76 (0 UL)