Searched for: +
(1 - 20 of 36)

Pages

document
Praus, Friedrich (author), Kastner, Wolfgang (author), Palensky, P. (author)
With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. These smart homes and buildings are implemented as decentralized systems, where embedded...
journal article 2016
document
van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi-...
journal article 2017
document
Alattas, A.F.M. (author), van Oosterom, P.J.M. (author), Zlatanova, S. (author), Hoeneveld, D. (author), Verbree, E. (author)
During an incident, many people that are located in indoor environments require to follow emergency evacuation procedures. The ‘emergency evacuation’ term has been defined as ‘a critical movement of people from a dangerous area due to the risk or an incident of a tragic event’ (Bonabeau, 2002). An emergency evacuation could be needed in a...
journal article 2018
document
Bullée, Jan Willem (author), Montoya Morales, A.L. (author), Junger, M. (author), Hartel, P.H. (author)
Purpose – When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study presents the results of a penetration test involving smart locks in the context of building security. We investigated how the amount of effort an employee has to invest in complying...
journal article 2018
document
Dabironezare, Shahab Oddin (author), Hassel, Juha (author), Gandini, E. (author), Grönberg, Leif (author), Sipola, Hannu (author), Vesterinen, V.I. (author), Llombart, Nuria (author)
Passive imaging cameras at sub-millimeter wavelengths with large format focal plane arrays are being developed as the next generation of security screening systems. In this contribution, a dual-band focal plane array (FPA) for security imagers at submillimeter wave frequencies is presented. The detectors are based on bolometric...
journal article 2018
document
Pan, K. (author), Teixeira, André (author), Cvetkovic, M. (author), Palensky, P. (author)
Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks against the power system state estimation. We compare the combined...
journal article 2018
document
Casson Moreno, Valeria (author), Reniers, G.L.L.M.E. (author), Salzano, Ernesto (author), Cozzani, Valerio (author)
Security threats are becoming an increasing concern for chemical sites and related infrastructures where relevant quantities of hazardous materials are processed, stored or transported. In the present study, security related events that affected chemical and process sites, and related infrastructures, were investigated. The aim of the study...
journal article 2018
document
Blokland, P.J. (author), Reniers, G.L.L.M.E. (author)
When discussing the concepts of risk, safety, and security, people have an intuitive understanding of what these concepts mean, and, to a certain level, this understanding is universal. However, when delving into the real meaning of these concepts, one is likely to fall into semantic debates and ontological discussions. In industrial parks,...
journal article 2019
document
Blokland, P.J. (author), Reniers, G.L.L.M.E. (author)
In the past one hundred years, concepts such as risk, safety and security have become ever more important and they represent a growing concern in our society. These concepts are also important subjects of study to enhance sustainability. During the past fifty years, safety science has gradually developed as an independent field of science. In...
journal article 2020
document
Janssen, S.A.M. (author), van den Berg, Arjan (author), Sharpanskykh, Alexei (author)
Despite enormous investments in airport security, terrorists have been able to find and exploit vulnerabilities at security checkpoints. Existing vulnerability assessment methodologies struggle with accounting for human behavior, and agent-based modelling forms a promising technique to overcome this limitation. This paper investigated how the...
journal article 2020
document
Nogal Macho, M. (author), Jiménez, Pilar (author)
When analysing the performance of bike-sharing scheme (BSS) stations, it is common to find stations that are located in specific points that capture the interest of users, whereas nearby stations are clearly underused. This uneven behaviour is not totally understood. This paper discusses the potential factors influencing station...
journal article 2020
document
Hayes, P.D. (author), van de Poel, I.R. (author), Steen, Marc (author)
This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology (not incorporated here are empirical and technical investigations). Here, we explicate and analyse the...
journal article 2020
document
de Wit, J.J. (author), Pieters, Wolter (author), Jansen, S.J.T. (author), van Gelder, P.H.A.J.M. (author)
Security professionals play a decisive role in security risk decision making, with important implications for security in organisations and society. Because of this subjective input in security understanding possible biases in this process is paramount. In this paper, well known biases as observed and described in prospect theory are studied in...
journal article 2021
document
Sas, Marlies (author), Ponnet, Koen (author), Reniers, G.L.L.M.E. (author), Hardyns, Wim (author)
As policy makers are developing new alternative strategies to prevent bicycle theft, a nudging approach could provide useful insights in this field. In the current study, two different nudges were implemented at a selection of bicycle parking facilities in the neighborhood of a Belgian university campus. To measure the effectiveness of the...
journal article 2021
document
Li, Jie (author), Goerlandt, Floris (author), van Nunen, K.L.L. (author), Reniers, G.L.L.M.E. (author)
Safety and security are often considered in complimentary or opposing terms. Discussions on their conceptual meaning have been put forward, and calls for an increased integration of these domains have been made. Nevertheless, there is currently no high-level empirical comparison of the development and contents of these research domains. In this...
journal article 2021
document
Smith, Marcus (author), Miller, S.R.M. (author)
Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association with artificial intelligence and has great potential to solve crime...
journal article 2021
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
E-commerce platforms incorporate reputation systems that allow customers to rate suppliers following financial transactions. Existing reputation systems cannot defend the centralized server against arbitrarily tampering with the supplier’s reputation. Furthermore, they do not offer reputation access across platforms. Rates are faced with privacy...
journal article 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
journal article 2021
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
Searched for: +
(1 - 20 of 36)

Pages