scholarly journals Dispositivos de cuidado y medidas de seguridad en el contexto jurídico-penal argentino [Care Devices and Security Measures in Argentinean Criminal-Legal Context]

Portularia ◽  
2014 ◽  
Vol 14 (1) ◽  
pp. 97-105
Author(s):  
Andrea-Natalia Lombraña
2009 ◽  
Author(s):  
Steven M. Smith ◽  
Veronica Stinson ◽  
Marc W. Patry

2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

2003 ◽  
pp. 66-76
Author(s):  
I. Dezhina ◽  
I. Leonov

The article is devoted to the analysis of the changes in economic and legal context for commercial application of intellectual property created under federal budgetary financing. Special attention is given to the role of the state and to comparison of key elements of mechanisms for commercial application of intellectual property that are currently under implementation in Russia and in the West. A number of practical suggestions are presented aimed at improving government stimuli to commercialization of intellectual property created at budgetary expense.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2018 ◽  
Vol 14 (63) ◽  
pp. 216
Author(s):  
O. Sovgyria ◽  
A. Yanchuk

Sign in / Sign up

Export Citation Format

Share Document