Explore chapters and articles related to this topic
Cyber Security for Network of Things (NoTs) in Military Systems
Published in Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah, Al-Sakib Khan Pathan, Security Analytics for the Internet of Everything, 2020
Muhammad Imran Malik, Ian Noel McAteer, Peter Hannay, Ahmed Ibrahim, Zubair Baig, Guanglou Zheng
The picture portrayed above clearly indicates that adoption of NoTs in the short term will witness a significant influx in the military environment. NoTs, therefore in years to come, will proliferate in military equipment such as tanks, ships, submarines, and fighter jets, as well as various industrial systems and other non-combat military applications. This ecosystem will create its cyberspace with associated challenges/risks—security being the paramount challenge to broader IoT adoption across combat and non-combat systems. The situation becomes grave when commercial off-the-shelf (COTS) IoT devices and applications are used as NoT devices “as is” on the pretext of enabling faster technology acquisition and deployment in the military [1]. Arias et al. [9] argue that security of such NoT devices and applications has predominantly taken a backseat by their vendors in a rush to be first to the market with a new product. Consequently, security measures required for foolproof and attack-resistant devices remain largely unaddressed. The situation, therefore, demands that greater dependence on the use of NoT technology by military be dealt critically by analyzing the underlying architecture used in such devices and applications. Such scrutiny may include an analysis of protocols and encryption mechanisms as well as data collection, distribution, feedback, and analytical frameworks from a security perspective to better safeguard national interest of any sovereign state.
Summary of Experience in Radiation Litigation
Published in Kenneth L. Miller, of Radiation Protection Programs, 2020
Expert opinion is called upon when the information and facts are beyond the experience and knowledge of laymen on the jury. The expert witness has special status. Because of his special knowledge, his opinion based on such knowledge may be helpful to the court. First he will be called upon to recite his qualifications. If accepted by the court he may be asked to present his opinion and conclusions. These are not binding, the jury decides upon his credibility. In the adversary atmosphere of the courtroom, the expert witness will be subject to cross-examination. At the end of the cross-examination the expert witness is entitled to rehabilitation, which is the term for defense to impeachment. The witness must be given the opportunity to explain, mitigate, or deny.
Business Application Analytics and the Internet of Things: The Connecting Link
Published in Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma, New Age Analytics, 2020
Ankita Gupta, Ankit Srivastava, Rohit Anand, Tina Tomažič
The term BA has evolved over the years with different technological growth to witness a market boom. It has a long history of functions, operations, and applications re-defined through ages to help modernize the market with the tincture of technology in them (Duan et al., 2018). Technological growth is the determining factor in shaping business growth and providing the original stimulus for business modernization through enriching business operations, better customer services and upgrading products.
Intelligence in cyberspace: the road to cyber singularity
Published in Journal of Experimental & Theoretical Artificial Intelligence, 2021
Ishaani Priyadarshini, Chase Cotton
As technology progresses, there is more and more use of computers and human-computer interfaces. Data travels across the internet, thereby digitising technology. Artificial Intelligence finds heavy use due to the demand for ever-more sophisticated systems and services at reduced costs. One of the most popular realms of technology that witnesses Artificial Intelligence, Intelligence Amplification, Internet and Digital Gaia is the emerging field of Cybersecurity. Typically the environment in which communication over computer networks takes place is termed as cyberspace. Cyberspace is prone to cyber-attacks (I. Priyadarshini, 2019). According to the National Institute of Standards and Technology (NIST), Cybersecurity may be defined as the ability to protect or defend the use of cyberspace from cyber-attacks. Since Cybersecurity is entwined with four out of five fields (Vinge, 2008) argued that may lead to the possibility of Technological Singularity, it is very much possible that Cyberspace may witness its very own singularity, i.e., Cyber Singularity, a term we propose in this paper and whose possibility we validate through analysing several systems in this paper. It is important to analyse the existence of Intelligence in Cyberspace. The evolution of intelligence in cyberspace may lead to Cyber Singularity which will ultimately lead to Technological Singularity.
Play in the smart city context: exploring interactional, bodily, social and spatial aspects of situated media interfaces
Published in Behaviour & Information Technology, 2020
Andre G. Afonso, Ava Fatah gen Schieck
Within the context of smart cities, as we witness a new wave of implementations of situated urban media that run on a permanent or long-term basis, it seems necessary to engage in a much deeper and broader debate of the spatial and social implications of the urban media than those found in literature to date. In particular, it is fundamental to address the mechanisms whereby situated installations mediate an entire domain of urban experiences, with due attention to the role of the physical space as enabler and generator of individual and shared experiences and encounters. Previous research on urban media installations has already developed interaction frameworks that help to shed light on various aspects regarding the use and sharing of playful outdoor installations activated by digital technologies, and how this affects the surrounding physical space (Afonso, Ergin, and Fatah gen. Schieck 2019). A similar spatial concern informed the development of the ‘media architectural interface’ framework (Behrens, Fatah gen. Schieck, and Brumby 2015), which provides a synthesis of situated and shared interfaces.
An independent axiomatisation for free short-circuit logic
Published in Journal of Applied Non-Classical Logics, 2018
Alban Ponse, Daan J. C. Staudt
Observe that the first two decompositions have the property that Y is a subtree of and , respectively. Furthermore, observe that , and hence that this decomposition agrees with the definition of the function se. When we want to express that a certain decomposition has the property that Y is not a subtree of X, we say that is a strict decomposition. Finally observe that each of these decompositions satisfies the property that contains T or F, which is a general property of decompositions of -terms and a consequence of Lemma 3.1.3 (see below). The following lemma provides the -image of the rightmost -term in a -term as a witness.