Networks Security
Mostrando 1-12 de 113 artigos, teses e dissertações.
-
1. Antecedent factors of violation of information security rules
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived penalty, negative experiences and turnover intention on the intention to violate the established security rules. Design/methodology/approach The method used involves two stages of analysis, using techniques of structural equation modeling and artificial intellig
RAUSP Management Journal. Publicado em: 2022
-
2. Computational algorithm for stability analysis of distribution networks with distributed generation
Abstract With the insertion of distributed generation in distribution networks, security analysis becomes crucial, in islanded operation or when the system is connected to the grid. Dynamic stability analyses are necessary in order to achieve minimum levels of security and reliability. Such analyses are obtained through the solution of the algebraic-differen
Braz. arch. biol. technol.. Publicado em: 25/11/2019
-
3. Associação interna como forma de integração dos presídios às redes externas do tráfico: a percepção dos agentes territoriais da segurança pública no estado do Pará
Resumo Este artigo busca compreender a estratégia de estabelecimento e manutenção de redes ou relações entre os agentes sintagmáticos internos ao cárcere como forma de integração dos presídios às redes territoriais externas do tráfico de drogas, a partir da percepção de agentes territoriais da segurança pública no estado do Pará. Pautado em
Rev. direito GV. Publicado em: 02/09/2019
-
4. (Re)conhecendo suas casas: narrativas sobre a desospitalização de crianças com doenças de longa duração
Resumo Focalizamos as narrativas dos familiares de crianças com adoecimentos de longa duração sobre o processo de desospitalização por eles vivenciado, privilegiando espaços do cotidiano de duas famílias. As mulheres continuam sendo as principais cuidadoras das crianças, e se sentem sobrecarregadas, sem conseguir identificar apoios e redes de suporte
Physis. Publicado em: 14/01/2019
-
5. Managing Security in a Zone of Peace: Brazil´s Soft Approach to Regional Governance
Abstract Given Brazil’s regional prevalence, its low, late and soft investment in regional security governance appears puzzling. We approach the puzzle through an analysis of contextual features, institutional overlap and policy networks, especially regarding nuclear energy and the environment. Our findings show that Brazil’s behavior is explained by a c
Rev. bras. polít. int.. Publicado em: 27/04/2017
-
6. Quality of life and informal labor among elderly persons in an intermediate Colombian city, 2012-2013
Abstract Objective: Describe the quality of life of elderly informal workers in an intermediate Colombian city. Method: A descriptive study of 320 randomly selected informal workers aged older than 18 from Manizales was performed. A sub-sample of 153 people aged older than 50, representing 47.8 percent of the study population, was performed. Two instrume
Rev. bras. geriatr. gerontol.. Publicado em: 2016-06
-
7. All-optical cryptography through spectral amplitude and delay encoding
All-optical data encryption is a promising technology that could lead communication systems to an unprecedented degree of security. In this paper we use computer simulations to systematically investigate a new all-optical cryptography technique that is bit-rate independent and transparent to modulation formats. Encryption encompasses signal spectral slicing
J. Microw. Optoelectron. Electromagn. Appl.. Publicado em: 2013-12
-
8. Optical cryptography through analog control of amplitude and delay of spectral slices: anlysis for NRZ and DQPSK signals. / Criptografia Ãptica mediante controle analÃgico da amplitude e do atraso de fatias espectrais: anÃlise para sinais NRZ e DQPSK.
This work investigates a technique to encrypt the optical signal for Transparent Optical Network, TON, in order to safeguard the confidentiality and guarantee the security of informations that are transmitted through the Telecommunications Network. The technique is assessed on the physical layer of the reference model for open systems interconnection, OSI, a
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 23/11/2012
-
9. Período pós-parto: práticas de cuidado adotadas pela puérpera / Postpartum period: care practices adopted by the woman in the puerperium
Puerperium is considered a phase with biological, social and cultural changes often not correctly understood by women, the main reason why requires special attention from professionals, and caregivers networks involved on the care. Literature and professional practice shows that beliefs about postpartum care has a strong relevance in a womans routine and oft
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 08/11/2012
-
10. Distributed generators performance during short-circuits considering fault ride-through requirements / Desempenho de geradores distribuídos durante curtos-circuitos considerando requisitos de suportabilidade a afundamentos de tensão = : Distributed generators performance during short-circuits considering fault ride-through requirements
The increase of distributed generation penetration in distribution systems not only helps to diversify the electrical matrix but also brings both technical and economic benefits. Yet, it also raises worries related to energy supply reliability. For wind power plants into the medium and high voltage networks there are the grid codes for "Fault Ride-Through" w
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 03/08/2012
-
11. HoneypotLabsac: um Framework de Honeypot Virtual para o Android / HoneypotLabsac: a Framework of Virtual Honeypot for Android
Mobile devices such as Smartphones, have become indispensable nowadays, due their increased processing power, more room for data storage, batteries with greater time autonomy, connection to wireless networks and 3G networks. . The Android Operating System is a complete platform for mobile devices principally for Smartphones developed by Google in 2008. It is
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 26/06/2012
-
12. Análise do mecanismo de segurança da arquitetura IMS / Analysis of the security mechanism in the IMS architecture
Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integração completa das redes e serviços. O IMS define uma arquitetura completa e framework que habilita a c
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 25/05/2012