Searched for: +
(21 - 36 of 36)

Pages

document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Kumar, Gulshan (author), Saha, Rahul (author), Lal, C. (author), Conti, M. (author)
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic framework for IoT which provides distributed computing, decentralization...
journal article 2021
document
Sas, Marlies (author), Ponnet, Koen (author), Reniers, G.L.L.M.E. (author), Hardyns, Wim (author)
As policy makers are developing new alternative strategies to prevent bicycle theft, a nudging approach could provide useful insights in this field. In the current study, two different nudges were implemented at a selection of bicycle parking facilities in the neighborhood of a Belgian university campus. To measure the effectiveness of the...
journal article 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Hayes, P.D. (author), van de Poel, I.R. (author), Steen, Marc (author)
This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology (not incorporated here are empirical and technical investigations). Here, we explicate and analyse the...
journal article 2020
document
Blokland, P.J. (author), Reniers, G.L.L.M.E. (author)
In the past one hundred years, concepts such as risk, safety and security have become ever more important and they represent a growing concern in our society. These concepts are also important subjects of study to enhance sustainability. During the past fifty years, safety science has gradually developed as an independent field of science. In...
journal article 2020
document
Janssen, S.A.M. (author), van den Berg, Arjan (author), Sharpanskykh, Alexei (author)
Despite enormous investments in airport security, terrorists have been able to find and exploit vulnerabilities at security checkpoints. Existing vulnerability assessment methodologies struggle with accounting for human behavior, and agent-based modelling forms a promising technique to overcome this limitation. This paper investigated how the...
journal article 2020
document
Nogal Macho, M. (author), Jiménez, Pilar (author)
When analysing the performance of bike-sharing scheme (BSS) stations, it is common to find stations that are located in specific points that capture the interest of users, whereas nearby stations are clearly underused. This uneven behaviour is not totally understood. This paper discusses the potential factors influencing station...
journal article 2020
document
Blokland, P.J. (author), Reniers, G.L.L.M.E. (author)
When discussing the concepts of risk, safety, and security, people have an intuitive understanding of what these concepts mean, and, to a certain level, this understanding is universal. However, when delving into the real meaning of these concepts, one is likely to fall into semantic debates and ontological discussions. In industrial parks,...
journal article 2019
document
Alattas, A.F.M. (author), van Oosterom, P.J.M. (author), Zlatanova, S. (author), Hoeneveld, D. (author), Verbree, E. (author)
During an incident, many people that are located in indoor environments require to follow emergency evacuation procedures. The ‘emergency evacuation’ term has been defined as ‘a critical movement of people from a dangerous area due to the risk or an incident of a tragic event’ (Bonabeau, 2002). An emergency evacuation could be needed in a...
journal article 2018
document
Bullée, Jan Willem (author), Montoya Morales, A.L. (author), Junger, M. (author), Hartel, P.H. (author)
Purpose – When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study presents the results of a penetration test involving smart locks in the context of building security. We investigated how the amount of effort an employee has to invest in complying...
journal article 2018
document
Dabironezare, Shahab Oddin (author), Hassel, Juha (author), Gandini, E. (author), Grönberg, Leif (author), Sipola, Hannu (author), Vesterinen, V.I. (author), Llombart, Nuria (author)
Passive imaging cameras at sub-millimeter wavelengths with large format focal plane arrays are being developed as the next generation of security screening systems. In this contribution, a dual-band focal plane array (FPA) for security imagers at submillimeter wave frequencies is presented. The detectors are based on bolometric...
journal article 2018
document
Pan, K. (author), Teixeira, André (author), Cvetkovic, M. (author), Palensky, P. (author)
Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks against the power system state estimation. We compare the combined...
journal article 2018
document
Casson Moreno, Valeria (author), Reniers, G.L.L.M.E. (author), Salzano, Ernesto (author), Cozzani, Valerio (author)
Security threats are becoming an increasing concern for chemical sites and related infrastructures where relevant quantities of hazardous materials are processed, stored or transported. In the present study, security related events that affected chemical and process sites, and related infrastructures, were investigated. The aim of the study...
journal article 2018
document
van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi-...
journal article 2017
document
Praus, Friedrich (author), Kastner, Wolfgang (author), Palensky, P. (author)
With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. These smart homes and buildings are implemented as decentralized systems, where embedded...
journal article 2016
Searched for: +
(21 - 36 of 36)

Pages