scholarly journals Modeling the delivery of security advisories and CVEs

2017 ◽  
Vol 14 (2) ◽  
pp. 537-555 ◽  
Author(s):  
Jukka Ruohonen ◽  
Sami Hyrynsalmi ◽  
Ville Leppänen

This empirical paper models three structural factors that are hypothesized to affect the turnaround times between the publication of security advisories and Common Vulnerabilities and Exposures (CVEs). The three structural factors are: (i) software product age at the time of advisory release; (ii) severity of vulnerabilities coordinated; and (iii) amounts of CVEs referenced in advisories. Although all three factors are observed to provide only limited information for statistically predicting the turnaround times in a dataset comprised of Microsoft, openSUSE, and Ubuntu operating system products, the paper outlines new research directions for better understanding the current problems related to vulnerability coordination.

2018 ◽  
Vol 13 (Number 2) ◽  
pp. 1-11
Author(s):  
Muhammad Zulqarnain Arshad ◽  
Darwina Arshad

The small and medium-sized enterprises (SMEs) play a crucial part in county’s economic growth and a key contributor in country’s GDP. In Pakistan SMEs hold about 90 percent of the total businesses. The performance of SMEs depends upon many factors. The main aim for the research is to examine the relationship between Innovation Capability, Absorptive Capacity and Performance of SMEs in Pakistan. This conceptual paper also extends to the vague revelation on Business Strategy in which act as a moderator between Innovation Capability, Absorptive Capacity and SMEs Performance. Conclusively, this study proposes a new research directions and hypotheses development to examine the relationship among the variables in Pakistan’s SMEs context.


2019 ◽  
Vol 12 (1) ◽  
pp. 7-20
Author(s):  
Péter Telek ◽  
Béla Illés ◽  
Christian Landschützer ◽  
Fabian Schenk ◽  
Flavien Massi

Nowadays, the Industry 4.0 concept affects every area of the industrial, economic, social and personal sectors. The most significant changings are the automation and the digitalization. This is also true for the material handling processes, where the handling systems use more and more automated machines; planning, operation and optimization of different logistic processes are based on many digital data collected from the material flow process. However, new methods and devices require new solutions which define new research directions. In this paper we describe the state of the art of the material handling researches and draw the role of the UMi-TWINN partner institutes in these fields. As a result of this H2020 EU project, scientific excellence of the University of Miskolc can be increased and new research activities will be started.


Over roughly the last decade, there has been a notable rise in new research on historical German syntax in a generative perspective. This volume presents a state-of-the-art survey of this thriving new line of research by leading scholars in the field, combining it with new insights into the syntax of historical German. It is the first comprehensive and concise generative historical syntax of German covering numerous central aspects of clause structure and word order, tracing them throughout various historical stages. Each chapter combines a solid empirical basis and valid descriptive generalizations with reference also to the more traditional topological model of the German clause with a detailed discussion of theoretical analyses couched in the generative framework. The volume is divided into three parts according to the main parts of the clause: the left periphery dealing with verbal placement and the filling of the prefield (verb second, verb first, verb third orders) as well as adverbial connectives; the middle field including discussion of pronominal syntax, order of full NPs and the history of negation; and the right periphery with chapters on basic word order (OV/VO), prosodic and information-structural factors, and the verbal complex including the development of periphrastic verb forms and the phenomena of IPP (infinitivus pro participio) and ACI (accusativus cum infinitivo). This book thus provides a convenient overview of current research on the major issues concerning historical German clause structure both for scholars interested in more traditional description and for those interested in formal accounts of diachronic syntax.


2020 ◽  
Vol 21 (17) ◽  
pp. 6382 ◽  
Author(s):  
Stanislav Kurpe ◽  
Sergei Grishin ◽  
Alexey Surin ◽  
Olga Selivanova ◽  
Roman Fadeev ◽  
...  

Controlling the aggregation of vital bacterial proteins could be one of the new research directions and form the basis for the search and development of antibacterial drugs with targeted action. Such approach may be considered as an alternative one to antibiotics. Amyloidogenic regions can, like antibacterial peptides, interact with the “parent” protein, for example, ribosomal S1 protein (specific only for bacteria), and interfere with its functioning. The aim of the work was to search for peptides based on the ribosomal S1 protein from T. thermophilus, exhibiting both aggregation and antibacterial properties. The biological system of the response of Gram-negative bacteria T. thermophilus to the action of peptides was characterized. Among the seven studied peptides, designed based on the S1 protein sequence, the R23I (modified by the addition of HIV transcription factor fragment for bacterial cell penetration), R23T (modified), and V10I (unmodified) peptides have biological activity that inhibits the growth of T. thermophilus cells, that is, they have antimicrobial activity. But, only the R23I peptide had the most pronounced activity comparable with the commercial antibiotics. We have compared the proteome of peptide-treated and intact T. thermophilus cells. These important data indicate a decrease in the level of energy metabolism and anabolic processes, including the processes of biosynthesis of proteins and nucleic acids. Under the action of 20 and 50 μg/mL R23I, a decrease in the number of proteins in T. thermophilus cells was observed and S1 ribosomal protein was absent. The obtained results are important for understanding the mechanism of amyloidogenic peptides with antimicrobial activity and can be used to develop new and improved analogues.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Luis S. Luevano ◽  
Leonardo Chang ◽  
Heydi Mendez-Vazquez ◽  
Yoanna Martinez-Diaz ◽  
Miguel Gonzalez-Mendoza

2021 ◽  
pp. 097226292110225
Author(s):  
Ritu Srivastava ◽  
Diptiman Banerji ◽  
Priyanka Nema ◽  
Shubham Choudhary

Value creation, customer engagement and employee engagement have emerged as important organizational outcomes for continued success. At the turn of the new decade, it is imperative to identify new research directions for these outcomes to improve the marketing effectiveness of organizations while keeping people at the centre of this pursuit. The present study is propelled by this motivation. The study started with the exploration of the relationship of customer and employee engagement in value creation, while limiting the scope to services. The extant literature has not studied the three together. The second phase of the study dwelled on identifying common links among the three to develop a conceptual model that brought the concepts of customer engagement, employee engagement and value creation together. Perceived risk was identified as the underlying phenomenon that connected all three to be part of a social system. A conceptual framework has been proposed for connecting perceived risk to customer engagement and employee engagement that would create value in service organizations. The study identifies future research directions for theory building and practice.


Author(s):  
Saber Elsayed ◽  
Ruhul Sarker ◽  
Daryl Essam

Many infrastructures, such as those of finance and banking, transportation, military and telecommunications, are highly dependent on the Internet. However, as the Internet’s underlying structural protocols and governance can be disturbed by intruders, for its smooth operation, it is important to minimize such disturbances. Of the available techniques for achieving this, computational intelligence methodologies, such as evolutionary algorithms and swarm intelligence approaches, are popular and have been successfully applied to detect intrusions. In this paper, we present an overview of these techniques and related literature on intrusion detection, analyze their research contributions, compare their approaches and discuss new research directions which will provide useful insights for intrusion detection researchers and practitioners.


Sign in / Sign up

Export Citation Format

Share Document