Software Security
Mostrando 1-12 de 101 artigos, teses e dissertações.
-
1. Homicídios dolosos, tráfico de drogas e indicadores sociais em Salvador, Bahia, Brasil
Resumo O objetivo deste artigo é verificar a associação entre homicídio doloso, tráfico de drogas e indicadores sociais em Salvador, Bahia, Brasil, no ano de 2010. Trata-se de estudo ecológico a partir dos casos de homicídios dolosos e de tráfico de drogas registrados pela Polícia Civil da Bahia com indicadores sociais. A análise entre o coeficient
Ciênc. saúde coletiva. Publicado em: 2019-02
-
2. A review of required features for a disaster response system on top of a multi-criteria decision: a Brazilian perspective
Abstract Paper aims The purpose of this paper is to analyze the current Brazilian Integrated Disaster Information System (S2iD), designed to qualify and give transparency to the disaster management in Brazil. Originality Providing an analysis of the system features and its prioritization, this paper can also serve as a reference for implementing software
Prod.. Publicado em: 02/07/2018
-
3. Electromyographic analysis of postural overload caused by bulletproof vests on public security professionals
Abstract Introduction Military police activity individuals performing operational activity remain 12 hours using mandatory safety equipment. This work aimed to verify the electromyographic response in operational military police officers before and after a cycle of two working days. Methods Forty-four male individuals were evaluated, with an average age of
Res. Biomed. Eng.. Publicado em: 17/08/2017
-
4. WHAT INFLUENCES INFORMATION SECURITY BEHAVIOR? A STUDY WITH BRAZILIAN USERS
ABSTRACT The popularization of software to mitigate Information Security threats can produce an exaggerated notion about its full effectiveness in the elimination of any threat. This situation can result reckless users behavior, increasing vulnerability. Based on behavioral theories, a theoretical model and hypotheses were developed to understand the extent
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2016-12
-
5. GPS-Dependent Systems: Vulnerabilities to Electromagnetic Attacks
ABSTRACT The GPS is a satellite navigation system that provides location and time information. Such a system currently supports critical applications for military, civil and commercial users worldwide and is accessible to any operator by using a single GPS receiver. However, although being too dependent on GPS signals, just a few of these applications presen
J. Aerosp. Technol. Manag.. Publicado em: 2016-12
-
6. A STRATEGIC ANALYSIS OF INFORMATION SHARING AMONG CYBER HACKERS
ABSTRACT We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2015-08
-
7. State of the art: integrating services for mega events
This paper describes the state of the art of a simplified model for integration of services in mega events. The project context, which was financed by the National Research Council – CNPq, is divided into six major areas or functional groups: Urban Mobility, Tourism, Airports, Security, Energy and Telecommunications. The proposal is described in layers, as
JISTEM J.Inf.Syst. Technol. Manag.. Publicado em: 2014-05
-
8. Optical cryptography through analog control of amplitude and delay of spectral slices: anlysis for NRZ and DQPSK signals. / Criptografia Ãptica mediante controle analÃgico da amplitude e do atraso de fatias espectrais: anÃlise para sinais NRZ e DQPSK.
This work investigates a technique to encrypt the optical signal for Transparent Optical Network, TON, in order to safeguard the confidentiality and guarantee the security of informations that are transmitted through the Telecommunications Network. The technique is assessed on the physical layer of the reference model for open systems interconnection, OSI, a
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 23/11/2012
-
9. Estudo de prevalência e caracterização do consumo de psicofármacos por pacientes internados em clínicas médica e cirúrgica de um hospital geral / Prevalence and characterization of psychotropic drug use by patients hospitalized in medical and surgical clinics of a general hospital
Atualmente os psicofármacos têm apresentado altas prevalências de consumo pela população. Visando fornecer subsídios para formulação de estratégias de gerenciamento de segurança no uso destes fármacos, o presente estudo teve como objetivos: identificar, entre pacientes internados em clínicas médica e cirúrgica de um hospital geral, a prevalênc
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 18/09/2012
-
10. Grid anywhere: an extensible desktop grid computing middleware / Grid Anywhere: Um middleware extensível para grades computacionais desktop
This PhD thesis presents investigations, models and implementations of a computational grid middleware named Grid Anywhere. This platform aims at allowing the build of computational grid systems, which enable the increase of the number of participants as consumers and resource providers. In order to do this, new solutions are presented to manage security pol
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 01/06/2012
-
11. Desenvolvimento de um método para levantamento de tecnologias de materiais empregados no trem de força automotivo (powertrain) a partir de patentes / Devolopment of a patent based method for surveying materials technologies used in automotive powertrain
This research approaches the study from patents of technologies for materials used in power train of motor vehicles, to provide additional information in order to support decision making in this universe, especially in the selection of materials and their processing. The powertrain is currently the most important subsystem in a car, being appointed as chief
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 27/05/2012
-
12. Um Mecanismo de SeguranÃa com AdaptaÃÃo DinÃmica em Tempo de ExecuÃÃo para Dispositivos MÃveis. / A Security Mechanism With Dynamic Adaptation For Mobile Device
A crescente utilizaÃÃo de dispositivos mÃveis, redes sem fio e aplicaÃÃes mÃveis evidencia a importÃncia da garantia de seguranÃa da informaÃÃo. Esta preocupaÃÃo surge devido aos riscos envolvidos no trÃfego de informaÃÃes sensÃveis por meio sem fio, uma vez que o meio nÃo limita os riscos de ataques, tal como nas redes convencionais. Adicio
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 07/10/2011