Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study

Author(s):  
Matthew Swann ◽  
Joseph Rose ◽  
Gueltoum Bendiab ◽  
Stavros Shiaeles ◽  
Fudong Li
Author(s):  
Amine V. Bitar ◽  
Antoine M. Melki

Social computing systems such as Social Network Sites have become more powerful. In some universities, SNSs have been adopted as a communication method between teachers and students. In addition, educational institutions have started the initiative of using open source social networking application. This chapter discusses the benefits of adopting open source SNS in education. It is organized as follows: 1) a literature review to properly define the terms, 2) a discussion of the effect of open source social networking technologies on education systems, 3) an overview of Elgg, followed by a comparison with different social learning platforms, 4) a case study of implementing Elgg at the Computer Science Department at the University of Balamand, 5) an exhibition of the requirements for the Next Generation SCORM, 6) a case study using Tin Can API with open source SNSs (Elgg), and 7) a conclusion wrapping up the chapter.


Author(s):  
Faried Effendy ◽  
Taufik ◽  
Bramantyo Adhilaksono

: Substantial research has been conducted to compare web servers or to compare databases, but very limited research combines the two. Node.js and Golang (Go) are popular platforms for both web and mobile application back-ends, whereas MySQL and Go are among the best open source databases with different characters. Using MySQL and MongoDB as databases, this study aims to compare the performance of Go and Node.js as web applications back-end regarding response time, CPU utilization, and memory usage. To simulate the actual web server workload, the flow of data traffic on the server follows the Poisson distribution. The result shows that the combination of Go and MySQL is superior in CPU utilization and memory usage, while the Node.js and MySQL combination is superior in response time.


Energies ◽  
2021 ◽  
Vol 14 (14) ◽  
pp. 4349
Author(s):  
Niklas Wulff ◽  
Fabia Miorelli ◽  
Hans Christian Gils ◽  
Patrick Jochem

As electric vehicle fleets grow, rising electric loads necessitate energy systems models to incorporate their respective demand and potential flexibility. Recently, a small number of tools for electric vehicle demand and flexibility modeling have been released under open source licenses. These usually sample discrete trips based on aggregate mobility statistics. However, the full range of variables of travel surveys cannot be accessed in this way and sub-national mobility patterns cannot be modeled. Therefore, a tool is proposed to estimate future electric vehicle fleet charging flexibility while being able to directly access detailed survey results. The framework is applied in a case study involving two recent German national travel surveys (from the years 2008 and 2017) to exemplify the implications of different mobility patterns of motorized individual vehicles on load shifting potential of electric vehicle fleets. The results show that different mobility patterns, have a significant impact on the resulting load flexibilites. Most obviously, an increased daily mileage results in higher electricty demand. A reduced number of trips per day, on the other hand, leads to correspondingly higher grid connectivity of the vehicle fleet. VencoPy is an open source, well-documented and maintained tool, capable of assessing electric vehicle fleet scenarios based on national travel surveys. To scrutinize the tool, a validation of the simulated charging by empirically observed electric vehicle fleet charging is advised.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


2021 ◽  
Vol 113 ◽  
pp. 101604
Author(s):  
Pablo Gutiérrez ◽  
Ary Rivillas ◽  
Daniel Tejada ◽  
Susana Giraldo ◽  
Andrea Restrepo ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1791
Author(s):  
Carmen Fattore ◽  
Nicodemo Abate ◽  
Farid Faridani ◽  
Nicola Masini ◽  
Rosa Lasaponara

In recent years, the impact of Climate change, anthropogenic and natural hazards (such as earthquakes, landslides, floods, tsunamis, fires) has dramatically increased and adversely affected modern and past human buildings including outstanding cultural properties and UNESCO heritage sites. Research about protection/monitoring of cultural heritage is crucial to preserve our cultural properties and (with them also) our history and identity. This paper is focused on the use of the open-source Google Earth Engine tool herein used to analyze flood and fire events which affected the area of Metaponto (southern Italy), near the homonymous Greek-Roman archaeological site. The use of the Google Earth Engine has allowed the supervised and unsupervised classification of areas affected by flooding (2013–2020) and fire (2017) in the past years, obtaining remarkable results and useful information for setting up strategies to mitigate damage and support the preservation of areas and landscape rich in cultural and natural heritage.


Sign in / Sign up

Export Citation Format

Share Document