Search results

1 – 10 of over 4000
Article
Publication date: 1 February 2006

Yang Xiang and Wanlei Zhou

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high‐profile government and commercial websites have made…

Abstract

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high‐profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment mixture of sub‐systems to protect web applications from DDoS attacks. According to the simulation experiments, this system is effective in that it is able to defend web applications against attacks. It can avoid overall network congestion and provide more resources to legitimate web users.

Details

International Journal of Web Information Systems, vol. 2 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 21 July 2020

Mohammad Moradi and Qi Li

Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an…

Abstract

Purpose

Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials (in the form of crowdsourcing) as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects.

Design/methodology/approach

To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced.

Findings

Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies (and addressed scenarios) for such human-mediated attacks can shed light on the way of identifying and confronting such threats.

Originality/value

To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.

Details

Journal of Information, Communication and Ethics in Society, vol. 19 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 June 2000

George K. Chako

Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in…

7240

Abstract

Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in their efforts to develop and market new products. Looks at the issues from different strategic levels such as corporate, international, military and economic. Presents 31 case studies, including the success of Japan in microchips to the failure of Xerox to sell its invention of the Alto personal computer 3 years before Apple: from the success in DNA and Superconductor research to the success of Sunbeam in inventing and marketing food processors: and from the daring invention and production of atomic energy for survival to the successes of sewing machine inventor Howe in co‐operating on patents to compete in markets. Includes 306 questions and answers in order to qualify concepts introduced.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 12 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 8 November 2019

Peter Simon Sapaty

Abstract

Details

Complexity in International Security
Type: Book
ISBN: 978-1-78973-716-5

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Book part
Publication date: 30 January 2023

Peter Simon Sapaty

Abstract

Details

The Spatial Grasp Model
Type: Book
ISBN: 978-1-80455-574-3

Article
Publication date: 1 January 1976

The Howard Shuttering Contractors case throws considerable light on the importance which the tribunals attach to warnings before dismissing an employee. In this case the tribunal…

Abstract

The Howard Shuttering Contractors case throws considerable light on the importance which the tribunals attach to warnings before dismissing an employee. In this case the tribunal took great pains to interpret the intention of the parties to the different site agreements, and it came to the conclusion that the agreed procedure was not followed. One other matter, which must be particularly noted by employers, is that where a final warning is required, this final warning must be “a warning”, and not the actual dismissal. So that where, for example, three warnings are to be given, the third must be a “warning”. It is after the employee has misconducted himself thereafter that the employer may dismiss.

Details

Managerial Law, vol. 19 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…

3740

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 8 November 2019

Peter Simon Sapaty

In this chapter, different security-related examples are shown in SGL dealing with discovery, tracing and analysis of multiple mobile objects, technical or human, in distributed

Abstract

In this chapter, different security-related examples are shown in SGL dealing with discovery, tracing and analysis of multiple mobile objects, technical or human, in distributed environments. Starting from how overall command and control of a hypothetical missile defence can be automatically managed in SGL by following and supervising the movement of multiple ballistic missiles on their full path from discovery to elimination. Other case is dealing with fully distributed tracing of cruise missiles with complex and tricky routes, which can be effectively chased, analysed and controlled by mobile spatial intelligence spreading through intelligent sensor network. Another one is providing high-level simulation and tracing of multiple objects in outer space to avoid collisions for new vehicles launched, with engagement of scattered space observation sensors integrated under SGT. The chapter also shows how to organize distributed simulation, assistance and control of flow of refugees through international borders.

Details

Complexity in International Security
Type: Book
ISBN: 978-1-78973-716-5

Article
Publication date: 18 January 2016

Dan Xiong, Junhao Xiao, Huimin Lu, Zhiwen Zeng, Qinghua Yu, Kaihong Huang, Xiaodong Yi and Zhiqiang Zheng

The purpose of this paper is to design intelligent robots operating in such dynamic environments like the RoboCup Middle-Size League (MSL). In the RoboCup MSL, two teams of five…

Abstract

Purpose

The purpose of this paper is to design intelligent robots operating in such dynamic environments like the RoboCup Middle-Size League (MSL). In the RoboCup MSL, two teams of five autonomous robots play on an 18- × 12-m field. Equipped with sensors and on-board computers, each robot should be able to perceive the environment, make decision and control itself to play the soccer game autonomously.

Design/methodology/approach

This paper presents the design of our soccer robots, participating in RoboCup MSL. The mechanical platform, electrical architecture and software framework are discussed separately. The mechanical platform is designed modularly, so easy maintainability is achieved; the electronic architecture is built on industrial standards using PC-based control technique, which results in high robustness and reliability during the intensive and fierce MSL games; the software is developed upon the open-source Robot Operating System (ROS); thus, the advantages of ROS such as modularity, portability and expansibility are inherited.

Findings

Based on this paper and the open-source hardware and software, the MSL robots can be re-developed easily to participate in the RoboCup MSL. The robots can also be used in other research and education fields, especially for multi-robot systems and distributed artificial intelligence. Furthermore, the main designing ideas proposed in the paper, i.e. using a modular mechanical structure, an industrial electronic system and ROS-based software, provide a common solution for designing general intelligent robots.

Originality/value

The methodology of the intelligent robot design for highly competitive and dynamic RoboCup MSL environments is proposed.

Details

Industrial Robot: An International Journal, vol. 43 no. 1
Type: Research Article
ISSN: 0143-991X

Keywords

1 – 10 of over 4000