CINXE.COM

Search results for: countermeasures

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: countermeasures</title> <meta name="description" content="Search results for: countermeasures"> <meta name="keywords" content="countermeasures"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="countermeasures" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="countermeasures"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 100</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: countermeasures</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">100</span> Development of the Structure of the Knowledgebase for Countermeasures in the Knowledge Acquisition Process for Trouble Prediction in Healthcare Processes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shogo%20Kato">Shogo Kato</a>, <a href="https://publications.waset.org/abstracts/search?q=Daisuke%20Okamoto"> Daisuke Okamoto</a>, <a href="https://publications.waset.org/abstracts/search?q=Satoko%20Tsuru"> Satoko Tsuru</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoshinori%20Iizuka"> Yoshinori Iizuka</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryoko%20Shimono"> Ryoko Shimono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Healthcare safety has been perceived important. It is essential to prevent troubles in healthcare processes for healthcare safety. Trouble prevention is based on trouble prediction using accumulated knowledge on processes, troubles, and countermeasures. However, information on troubles has not been accumulated in hospitals in the appropriate structure, and it has not been utilized effectively to prevent troubles. In the previous study, though a detailed knowledge acquisition process for trouble prediction was proposed, the knowledgebase for countermeasures was not involved. In this paper, we aim to propose the structure of the knowledgebase for countermeasures in the knowledge acquisition process for trouble prediction in healthcare process. We first design the structure of countermeasures and propose the knowledge representation form on countermeasures. Then, we evaluate the validity of the proposal, by applying it into an actual hospital. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trouble%20prevention" title="trouble prevention">trouble prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20structure" title=" knowledge structure"> knowledge structure</a>, <a href="https://publications.waset.org/abstracts/search?q=structured%20knowledge" title=" structured knowledge"> structured knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=reusable%20knowledge" title=" reusable knowledge"> reusable knowledge</a> </p> <a href="https://publications.waset.org/abstracts/37281/development-of-the-structure-of-the-knowledgebase-for-countermeasures-in-the-knowledge-acquisition-process-for-trouble-prediction-in-healthcare-processes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37281.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">367</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">99</span> A Survey on Countermeasures of Cache-Timing Attack on AES Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Settana%20M.%20Abdulh">Settana M. Abdulh</a>, <a href="https://publications.waset.org/abstracts/search?q=Naila%20A.%20Sadalla"> Naila A. Sadalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Yaseen%20H.%20Taha"> Yaseen H. Taha</a>, <a href="https://publications.waset.org/abstracts/search?q=Howaida%20Elshoush"> Howaida Elshoush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES%20algorithm" title="AES algorithm">AES algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack" title=" side channel attack"> side channel attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20attack" title=" cache timing attack"> cache timing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20countermeasure" title=" cache timing countermeasure"> cache timing countermeasure</a> </p> <a href="https://publications.waset.org/abstracts/17652/a-survey-on-countermeasures-of-cache-timing-attack-on-aes-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">98</span> Calibrating Risk Factors for Road Safety in Low Income Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Atheer%20Al-Nuaimi">Atheer Al-Nuaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Harry%20Evdorides"> Harry Evdorides</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Daily, many individuals die or get harmed on streets around the globe, which requires more particular solutions for transport safety issues. International road assessment program (iRAP) is one of the models that are considering many variables which influence road user’s safety. In iRAP, roads have been partitioned into five-star ratings from 1 star (the most reduced level) to 5 star (the most noteworthy level). These levels are calculated from risk factors which represent the effect of the geometric and traffic conditions on rod safety. The result of iRAP philosophy are the countermeasures that can be utilized to enhance safety levels and lessen fatalities numbers. These countermeasures can be utilized independently as a single treatment or in combination with other countermeasures for a section or an entire road. There is a general understanding that the efficiency of a countermeasure is liable to reduction when it is used in combination with various countermeasures. That is, crash diminishment estimations of single countermeasures cannot be summed easily. In the iRAP model, the fatalities estimations are calculated using a specific methodology. However, this methodology suffers overestimations. Therefore, this study has developed a calibration method to estimate fatalities numbers more accurately. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crash%20risk%20factors" title="crash risk factors">crash risk factors</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20road%20assessment%20program" title=" international road assessment program"> international road assessment program</a>, <a href="https://publications.waset.org/abstracts/search?q=low-income%20countries" title=" low-income countries"> low-income countries</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20safety" title=" road safety"> road safety</a> </p> <a href="https://publications.waset.org/abstracts/106648/calibrating-risk-factors-for-road-safety-in-low-income-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">97</span> Biomedical Countermeasures to Category a Biological Agents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20Cochrane">Laura Cochrane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The United States Centers for Disease Control and Prevention has established three categories of biological agents based on their ease of spread and the severity of the disease they cause. Category A biological agents are the highest priority because of their high degree of morbidity and mortality, ease of dissemination, the potential to cause social disruption and panic, special requirements for public health preparedness, and past use as a biological weapon. Despite the threat of Category A biological agents, opportunities for medical intervention exist. This work summarizes public information, consolidated and reviewed across the situational usefulness and disease awareness to offer discussion to three specific Category A agents: anthrax (Bacillus anthracis), botulism (Clostridium botulinum toxin), and smallpox (variola major), and provides an overview on the management of medical countermeasures available to treat these three (3) different types of pathogens. The medical countermeasures are discussed in the setting of pre-exposure prophylaxis, post-exposure prophylaxis, and therapeutic treatments to provide a framework for requirements in public health preparedness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anthrax" title="anthrax">anthrax</a>, <a href="https://publications.waset.org/abstracts/search?q=botulism" title=" botulism"> botulism</a>, <a href="https://publications.waset.org/abstracts/search?q=smallpox" title=" smallpox"> smallpox</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20countermeasures" title=" medical countermeasures"> medical countermeasures</a> </p> <a href="https://publications.waset.org/abstracts/146987/biomedical-countermeasures-to-category-a-biological-agents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146987.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">96</span> Exploration and Evaluation of the Effect of Multiple Countermeasures on Road Safety</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Atheer%20Al-Nuaimi">Atheer Al-Nuaimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Harry%20Evdorides"> Harry Evdorides</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every day many people die or get disabled or injured on roads around the world, which necessitates more specific treatments for transportation safety issues. International road assessment program (iRAP) model is one of the comprehensive road safety models which accounting for many factors that affect road safety in a cost-effective way in low and middle income countries. In iRAP model road safety has been divided into five star ratings from 1 star (the lowest level) to 5 star (the highest level). These star ratings are based on star rating score which is calculated by iRAP methodology depending on road attributes, traffic volumes and operating speeds. The outcome of iRAP methodology are the treatments that can be used to improve road safety and reduce fatalities and serious injuries (FSI) numbers. These countermeasures can be used separately as a single countermeasure or mix as multiple countermeasures for a location. There is general agreement that the adequacy of a countermeasure is liable to consistent losses when it is utilized as a part of mix with different countermeasures. That is, accident diminishment appraisals of individual countermeasures cannot be easily added together. The iRAP model philosophy makes utilization of a multiple countermeasure adjustment factors to predict diminishments in the effectiveness of road safety countermeasures when more than one countermeasure is chosen. A multiple countermeasure correction factors are figured for every 100-meter segment and for every accident type. However, restrictions of this methodology incorporate a presumable over-estimation in the predicted crash reduction. This study aims to adjust this correction factor by developing new models to calculate the effect of using multiple countermeasures on the number of fatalities for a location or an entire road. Regression models have been used to establish relationships between crash frequencies and the factors that affect their rates. Multiple linear regression, negative binomial regression, and Poisson regression techniques were used to develop models that can address the effectiveness of using multiple countermeasures. Analyses are conducted using The R Project for Statistical Computing showed that a model developed by negative binomial regression technique could give more reliable results of the predicted number of fatalities after the implementation of road safety multiple countermeasures than the results from iRAP model. The results also showed that the negative binomial regression approach gives more precise results in comparison with multiple linear and Poisson regression techniques because of the overdispersion and standard error issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20road%20assessment%20program" title="international road assessment program">international road assessment program</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20binomial" title=" negative binomial"> negative binomial</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20multiple%20countermeasures" title=" road multiple countermeasures"> road multiple countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20safety" title=" road safety"> road safety</a> </p> <a href="https://publications.waset.org/abstracts/63990/exploration-and-evaluation-of-the-effect-of-multiple-countermeasures-on-road-safety" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63990.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">240</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">95</span> Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yinan%20Cao">Yinan Cao</a>, <a href="https://publications.waset.org/abstracts/search?q=Francine%20Herrmann"> Francine Herrmann</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automation" title="automation">automation</a>, <a href="https://publications.waset.org/abstracts/search?q=adversary%20emulation" title=" adversary emulation"> adversary emulation</a>, <a href="https://publications.waset.org/abstracts/search?q=CALDERA" title=" CALDERA"> CALDERA</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasures" title=" countermeasures"> countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=MITRE%20ATT%26CK" title=" MITRE ATT&amp;CK"> MITRE ATT&amp;CK</a> </p> <a href="https://publications.waset.org/abstracts/130552/adversary-emulation-implementation-of-automated-countermeasure-in-caldera-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130552.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">94</span> A Study on the Difficulties and Countermeasures of Uyghur Students’ English Learning in Hotan District, Xinjiang</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tingting%20Zou">Tingting Zou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper firstly presents an overview of the situation of Xinjiang and Hotan, and describes the current status and features of Uyghur students’ English education. Then it summarizes the research on the theories of Third Language Acquisition and Foreign Language Learning Motivation at home and abroad. Further, through the data collected by the questionnaire, the paper points out the three main problems and causes of Uyghur students’ English learning in Hotan, Xinjiang. Finally, the paper draws a conclusion and puts forward some suggestions on how to improve their English learning quality based on the theory of Foreign Language Learning Motivation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=countermeasures%20and%20difficulties" title="countermeasures and difficulties">countermeasures and difficulties</a>, <a href="https://publications.waset.org/abstracts/search?q=English%20learning" title=" English learning"> English learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Hotan%20Xinjiang" title=" Hotan Xinjiang"> Hotan Xinjiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Uyghur%20students" title=" Uyghur students"> Uyghur students</a> </p> <a href="https://publications.waset.org/abstracts/156508/a-study-on-the-difficulties-and-countermeasures-of-uyghur-students-english-learning-in-hotan-district-xinjiang" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156508.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">93</span> I Don’t Want to Have to Wait: A Study Into the Origins of Rule Violations at Rail Pedestrian Level Crossings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=James%20Freeman">James Freeman</a>, <a href="https://publications.waset.org/abstracts/search?q=Andry%20Rakotonirainy"> Andry Rakotonirainy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Train pedestrian collisions are common and are the most likely to result in severe injuries and fatalities when compared to other types of rail crossing accidents. However, there is limited research that has focused on understanding the reasons why some pedestrians’ break level crossings rules, which limits the development of effective countermeasures. As a result, this study undertook a deeper exploration into the origins of risky pedestrian behaviour through structured interviews. A total of 40 pedestrians who admitted to either intentionally breaking crossing rules or making crossing errors participated in an in-depth telephone interview. Qualitative analysis was undertaken via thematic analysis that revealed participants were more likely to report deliberately breaking rules (rather than make errors), particular after the train had passed the crossing as compared to before it arrives. Predominant reasons for such behaviours were identified to be: calculated risk taking, impatience, poor knowledge of rules and low likelihood of detection. The findings have direct implications for the development of effective countermeasures to improve crossing safety (and managing risk) such as increasing surveillance and transit officer presence, as well as installing appropriate barriers that either deter or incapacitate pedestrians from violating crossing rules. This paper will further outline the study findings in regards to the development of countermeasures as well as provide direction for future research efforts in this area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crossings" title="crossings">crossings</a>, <a href="https://publications.waset.org/abstracts/search?q=mistakes" title=" mistakes"> mistakes</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=violations" title=" violations"> violations</a> </p> <a href="https://publications.waset.org/abstracts/24980/i-dont-want-to-have-to-wait-a-study-into-the-origins-of-rule-violations-at-rail-pedestrian-level-crossings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24980.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">92</span> Engineering the Human Mind: Social Engineering Attack Using Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joy%20Winston%20James">Joy Winston James</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Kadher%20Jilani"> Abdul Kadher Jilani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pen%20testing" title="pen testing">pen testing</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Kali%20Linux" title=" Kali Linux"> Kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/166413/engineering-the-human-mind-social-engineering-attack-using-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166413.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">91</span> A Preliminary Investigation on Factors that Influence Road Users Speeding Behaviors in Selected Roads of Peninsular Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farah%20Fazlinda%20Binti%20Mohamad">Farah Fazlinda Binti Mohamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Hikmah%20Binti%20Musthar"> Siti Hikmah Binti Musthar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Saifizul%20Bin%20Abdullah"> Ahmad Saifizul Bin Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Jamilah%20Mohamad"> Jamilah Mohamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Rehan%20Karim"> Mohamed Rehan Karim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Road safety is intolerable issue. It affects and impinges on everyone's life as the roads shared by everyone. The most vulnerable victims were the road users who cater the roads every day. It is an appalling when World Health Organization reported that Malaysian road users were ranked worst in Asian countries with 23 deaths for every 100,000 of population over the span of 12 years (World Health Organization, 2009). From this report, it is found that speeding has contributed to 60% of all accidents in the country. Therefore, this study aims to elucidate on speeding matter that occur among road users in selected roads of Peninsular Malaysia. This study on the other hand, provides an insight understanding on the factors affecting behaviour of road users to speeding in selected roads of Peninsular Malaysia. To answer the study aims, 500 sets of questionnaires were distributed among 500 respondents in selected roads of Peninsular Malaysia to obtain their opinions on the matter. The respondents were from different demographics backgrounds to have fair explanation on the issue. The answers have been analysed using descriptive analysis. The results indicated psychological factors of road users appeared to be prominent in explaining road users’ behaviour to speeding. Male road users were also found dominant in speeding compared to female. Thus, this has increased their vulnerability to road injuries and deaths. These findings are very useful in order for us to improve our driving behaviour. Relevant authorities should also revise the existing countermeasures as well as designing the new countermeasures for the road users. It is nevertheless important to comprehend this speeding issue and factors associating it. This matter should be taken seriously and responsibly by each road users as road safety is a responsible of all. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=road%20safety" title="road safety">road safety</a>, <a href="https://publications.waset.org/abstracts/search?q=speeding" title=" speeding"> speeding</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasures" title=" countermeasures"> countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=accidents" title=" accidents"> accidents</a> </p> <a href="https://publications.waset.org/abstracts/29865/a-preliminary-investigation-on-factors-that-influence-road-users-speeding-behaviors-in-selected-roads-of-peninsular-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29865.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">90</span> Application of Public Access Two-Dimensional Hydrodynamic and Distributed Hydrological Models for Flood Forecasting in Ungauged Basins</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Shayeq%20Azizi">Ahmad Shayeq Azizi</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuji%20Toda"> Yuji Toda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Afghanistan, floods are the most frequent and recurrent events among other natural disasters. On the other hand, lack of monitoring data is a severe problem, which increases the difficulty of making the appropriate flood countermeasures of flood forecasting. This study is carried out to simulate the flood inundation in Harirud River Basin by application of distributed hydrological model, Integrated Flood Analysis System (IFAS) and 2D hydrodynamic model, International River Interface Cooperative (iRIC) based on satellite rainfall combined with historical peak discharge and global accessed data. The results of the simulation can predict the inundation area, depth and velocity, and the hardware countermeasures such as the impact of levee installation can be discussed by using the present method. The methodology proposed in this study is suitable for the area where hydrological and geographical data including river survey data are poorly observed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20hydrological%20model" title="distributed hydrological model">distributed hydrological model</a>, <a href="https://publications.waset.org/abstracts/search?q=flood%20inundation" title=" flood inundation"> flood inundation</a>, <a href="https://publications.waset.org/abstracts/search?q=hydrodynamic%20model" title=" hydrodynamic model"> hydrodynamic model</a>, <a href="https://publications.waset.org/abstracts/search?q=ungauged%20basins" title=" ungauged basins"> ungauged basins</a> </p> <a href="https://publications.waset.org/abstracts/91132/application-of-public-access-two-dimensional-hydrodynamic-and-distributed-hydrological-models-for-flood-forecasting-in-ungauged-basins" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91132.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">89</span> Relationship between Driving under the Influence and Traffic Safety</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eun%20Hak%20Lee">Eun Hak Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Young-Hyun%20Seo"> Young-Hyun Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=Hosuk%20Shin"> Hosuk Shin</a>, <a href="https://publications.waset.org/abstracts/search?q=Seung-Young%20Kho"> Seung-Young Kho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Among traffic crashes, driving under the influence (DUI) of alcohol is the most dangerous behavior in Seoul, South Korea. In 2016 alone 40 deaths occurred on of 2,857 cases of DUI. Since DUI is one of the major factors in increasing the severity of crashes, the intensive management of DUI required to reduce traffic crash deaths and the crash damages. This study aims to investigate the relationship between DUI and traffic safety in order to establish countermeasures for traffic safety improvement. The analysis was conducted on the habitual drivers who drove under the influence. Information of habitual drivers is matched to crash data and fine data. The descriptive statistics on data used in this study, which consists of driver license acquisition, traffic fine, and crash data provided by the Korean National Police Agency, are described. The drivers under the influence are classified by statistically significant criteria, such as driver’s age, license type, driving experience, and crash reasons. With the results of the analysis, we propose some countermeasures to enhance traffic safety. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=driving%20under%20influence" title="driving under influence">driving under influence</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20safety" title=" traffic safety"> traffic safety</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20crash" title=" traffic crash"> traffic crash</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20fine" title=" traffic fine"> traffic fine</a> </p> <a href="https://publications.waset.org/abstracts/85925/relationship-between-driving-under-the-influence-and-traffic-safety" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85925.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">88</span> Flight Safety Hazard: An Investigation into Bird Strike Prevention in the Vicinity of Suvarnabhumi Airport, Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chantarat%20Manvichien">Chantarat Manvichien</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this research paper was aimed to examine the bird strike prevention in the vicinity of Suvarnabhumi Airport, Thailand. A bird strike event occurs when a bird or a flock of birds collide with an operating airplane and results in flight interruption. This is the reason why International Civil Aviation Organization (ICAO), a part of the United Nations, has an assumption that birds, including other wildlife, are a serious hazard to aircraft and attempts should be accomplished to overcome this hazard. ICAO requires all airports worldwide to set up proactive countermeasures in order to reduce the risk from bird strike and wildlife hazard. In Thailand, the Airports of Thailand Public Company Limited which manages Suvarnabhumi Airport, also known as Bangkok International Airport, responds to the requirements and spends a lot of effort to ensure this hazard is manageable. An intensive study on the countermeasures to prevent aircraft accident from bird strike and other wildlife have been continuously executed since the early construction of the Airport until nowadays. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bird%20strike" title="bird strike">bird strike</a>, <a href="https://publications.waset.org/abstracts/search?q=flight%20safety" title=" flight safety"> flight safety</a>, <a href="https://publications.waset.org/abstracts/search?q=wildlife%20hazard" title=" wildlife hazard"> wildlife hazard</a>, <a href="https://publications.waset.org/abstracts/search?q=Suvarnabhumi%20airport" title=" Suvarnabhumi airport"> Suvarnabhumi airport</a> </p> <a href="https://publications.waset.org/abstracts/82545/flight-safety-hazard-an-investigation-into-bird-strike-prevention-in-the-vicinity-of-suvarnabhumi-airport-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82545.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">87</span> Analysis of the CO2 Emissions of Public Passenger Transport in Tianjin City of China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tao%20Zhao">Tao Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Xianshuo%20Xu"> Xianshuo Xu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Low-carbon public passenger transport is an important part of low carbon city. The CO<sub>2</sub> emissions of public passenger transport in Tianjin from 1995 to 2010 are estimated with IPCC CO<sub>2</sub> counting method, which shows that the total CO<sub>2</sub> emissions of Tianjin public passenger transport have gradually become stable at 1,425.1 thousand tons. And then the CO<sub>2</sub> emissions of the buses, taxies, and rail transits are calculated respectively. A CO<sub>2</sub> emission of 829.9 thousand tons makes taxies become the largest CO<sub>2</sub> emissions source among the public passenger transport in Tianjin. Combining with passenger volume, this paper analyzes the CO<sub>2</sub> emissions proportion of the buses, taxies, and rail transits compare the passenger transport rate with the proportion of CO<sub>2</sub> emissions, as well as the CO<sub>2</sub> emissions change of per 10,000 people. The passenger volume proportion of bus among the three public means of transport is 72.62% which is much higher than its CO<sub>2</sub> emissions proportion of 36.01%, with the minimum number of CO<sub>2</sub> emissions per 10,000 people of 4.90 tons. The countermeasures to reduce CO<sub>2</sub> emissions of public passenger transport in Tianjin are to develop rail transit, update vehicles and use alternative fuel vehicles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20passenger%20transport" title="public passenger transport">public passenger transport</a>, <a href="https://publications.waset.org/abstracts/search?q=carbon%20emissions" title=" carbon emissions"> carbon emissions</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasures" title=" countermeasures"> countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a> </p> <a href="https://publications.waset.org/abstracts/26131/analysis-of-the-co2-emissions-of-public-passenger-transport-in-tianjin-city-of-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26131.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">86</span> Research on the Status Quo and Countermeasures of Professional Development of Engineering Teachers in China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wang%20Xiu%20Xiu">Wang Xiu Xiu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The professional development of engineering teachers in universities is the key to the construction of outstanding engineers in China, which is related to the quality and prospects of the entire engineering education. This study investigated 2789 teachers' professional development in different regions of China, which outlines the current situation of the professional development of engineering teachers from three perspectives: professional development needs, professional development methods and professional development effects. Data results show that engineering teachers have the strongest demand for the improvement of subject knowledge and teaching ability. Engineering faculty with 0-5 years of teaching experience, under 35 years of age and a doctorate degree have the strongest demand for development. The frequency of engineering teachers' participation in various professional development activities is low, especially in school-enterprise cooperation-related activities. There are significant differences in the participation frequency of professional development activities among engineering faculty with different teaching ages, ages, professional titles, degrees and administrative positions in schools. The professional development of engineering faculty has been improved to a certain extent and is positively affected by professional development needs and participation in professional development. In this regard, we can constantly improve the professional development system of engineering teachers from three aspects: training on demand, stimulating motivation, and optimizing resource allocation, to enhance the professional development level of engineering teachers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=engineering%20teachers%20in%20universities" title="engineering teachers in universities">engineering teachers in universities</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20development" title=" professional development"> professional development</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo" title=" status quo"> status quo</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasures" title=" countermeasures"> countermeasures</a> </p> <a href="https://publications.waset.org/abstracts/192518/research-on-the-status-quo-and-countermeasures-of-professional-development-of-engineering-teachers-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192518.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">17</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">85</span> Feasibility of Iron Scrap Recycling with Considering Demand-Supply Balance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reina%20Kawase">Reina Kawase</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuzuru%20Matsuoka"> Yuzuru Matsuoka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To mitigate climate change, to reduce CO2 emission from steel sector, energy intensive sector, is essential. One of the effective countermeasure is recycling of iron scrap and shifting to electric arc furnace. This research analyzes the feasibility of iron scrap recycling with considering demand-supply balance and quantifies the effective by CO2 emission reduction. Generally, the quality of steel made from iron scrap is lower than the quality of steel made from basic oxygen furnace. So, the constraint of demand side is goods-wise steel demand and that of supply side is generation of iron scap. Material Stock and Flow Model (MSFM_demand) was developed to estimate goods-wise steel demand and generation of iron scrap and was applied to 35 regions which aggregated countries in the world for 2005-2050. The crude steel production was estimated under two case; BaU case (No countermeasures) and CM case (With countermeasures). For all the estimation periods, crude steel production is greater than generation of iron scrap. This makes it impossible to substitute electric arc furnaces for all the basic oxygen furnaces. Even though 100% recycling rate of iron scrap, under BaU case, CO2 emission in 2050 increases by 12% compared to that in 2005. With same condition, 32% of CO2 emission reduction is achieved in CM case. With a constraint from demand side, the reduction potential is 6% (CM case). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=iron%20scrap%20recycling" title="iron scrap recycling">iron scrap recycling</a>, <a href="https://publications.waset.org/abstracts/search?q=CO2%20emission%20reduction" title=" CO2 emission reduction"> CO2 emission reduction</a>, <a href="https://publications.waset.org/abstracts/search?q=steel%20demand" title=" steel demand"> steel demand</a>, <a href="https://publications.waset.org/abstracts/search?q=MSFM%20demand" title=" MSFM demand"> MSFM demand</a> </p> <a href="https://publications.waset.org/abstracts/21060/feasibility-of-iron-scrap-recycling-with-considering-demand-supply-balance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">552</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">84</span> Marketing Strategy Adjustment of Multinational Companines in China in the New Period</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xue%20Junwei">Xue Junwei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid economic development of China has made it a critical global market. Multinational companies operating in China face evolving challenges, necessitating adjustments in their marketing strategies. This study uses SWOT analysis and qualitative research methods to explore the trends and countermeasures for adjusting the marketing strategies of multinational companies in China. The research employs the SWOT analysis, quantitative as well as qualitative research techniques to investigate the marketing strategy adjustments of multinational companies in China. The study reveals emerging trends and proposes strategic countermeasures for multinational companies to adapt their marketing strategies in the Chinese market. This research contributes to the existing literature by providing insights into the dynamic environment of multinational companies in China and offering practical recommendations for strategy adjustments. Data were collected using qualitative research methods, including interviews and case studies, and quantitative research methods, such as questionnaires to study multinational companies in China. The collected data were analyzed using SWOT analysis to identify the strengths, weaknesses, opportunities, and threats faced by multinational companies in China, guiding the formulation of effective marketing strategies. This study addresses the challenges faced by multinational companies in China, the need for strategic adjustments, and the potential approaches to enhancing marketing effectiveness in this market. The study emphasizes the significance of adapting marketing strategies to align with the changing landscape of the Chinese market. It provides actionable recommendations for multinational companies to thrive in this environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multinational%20company" title="multinational company">multinational company</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20strategies" title=" marketing strategies"> marketing strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20market" title=" Chinese market"> Chinese market</a>, <a href="https://publications.waset.org/abstracts/search?q=SWOT" title=" SWOT"> SWOT</a> </p> <a href="https://publications.waset.org/abstracts/194161/marketing-strategy-adjustment-of-multinational-companines-in-china-in-the-new-period" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">6</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">83</span> Mercury Contamination of Wetland Caused by Wastewater from Chlor-Alkali Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mitsuo%20Yoshida">Mitsuo Yoshida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A significant mercury contamination of soil/sediment was unveiled by an environmental monitoring program in a wetland along La Plata River, west to Montevideo City, Uruguay. The mercury contamination was caused by industrial wastewater discharged from a chlor-alkali plant using a mercury-cell process. The contamination level is above 60 mg/kg in soil/sediment. Most of mercury (Hg) in the environment is inorganic, but some fractions are converted by bacteria to methylmercury (MeHg), a toxic organic compound. MeHg biologically accumulates through a food-chain and become serious public health risk. In order to clarify the contaminated part for countermeasure operation, an intervention value of mercury contamination of sediment/soil was defined as 15 mg/kg (total Hg) by the authority. According to the intervention value, mercury contaminated area in the La Plata site is approximately 48,280 m² and estimated total volume of contaminated sediments/soils was around 18,750 m³. The countermeasures to contaminated zone were proposed in two stages; (i) mitigation of risks for public health and (ii) site remediation. The first stage is an installation of fens and net around the contamination zone, for mitigating risks of exposure, inhalation, and intake. The food chain among wetland-river ecosystem was also interrupted by the installation of net and fens. The state of mercury contamination in La Plata site and plan of countermeasure was disclosed to local people and the public, and consensus on setting off-limit area was successfully achieved. Mass media also contribute to share the information on the contamination site. The cost for countermeasures was borne by the industry under the polluter-pay-principle. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chlor-alkali%20plant" title="chlor-alkali plant">chlor-alkali plant</a>, <a href="https://publications.waset.org/abstracts/search?q=mercury%20contamination" title=" mercury contamination"> mercury contamination</a>, <a href="https://publications.waset.org/abstracts/search?q=polluter%20pay%20principle" title=" polluter pay principle"> polluter pay principle</a>, <a href="https://publications.waset.org/abstracts/search?q=Uruguay" title=" Uruguay"> Uruguay</a>, <a href="https://publications.waset.org/abstracts/search?q=wetland" title=" wetland"> wetland</a> </p> <a href="https://publications.waset.org/abstracts/102082/mercury-contamination-of-wetland-caused-by-wastewater-from-chlor-alkali-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102082.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">82</span> A Preliminary Investigation on Factors That Influence Road Users&#039; Speeding Behaviour on Selected Roads in Peninsular Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farah%20Fazlinda%20Binti%20Mohamad">Farah Fazlinda Binti Mohamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Saifizul%20Abdullah"> Ahmad Saifizul Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Rehan%20Karim"> Mohamed Rehan Karim </a>, <a href="https://publications.waset.org/abstracts/search?q=Jamilah%20Mohamad"> Jamilah Mohamad</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Hikmah%20Musthar"> Siti Hikmah Musthar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Road safety is an important issue in Malaysia. It become important as it is discussed widely throughout printed and electronic media. Most of the news portrays on road accident and fatalities have increased the concern of everyone. This issue affects everyone's life as everyone shares the roads. The most vulnerable victims are the road user who uses the roads every day. It is appalling when World Health Organization (WHO) reported that in every 100,000 of population in Malaysia, 23 fatalities recorded due to road accident alone. This figure is quite alarming and requires serious attention. Furthermore, research by Malaysian Institute of Road Safety Research concluded that that speeding has contributed to 60% of all road accident in the country. Therefore, this study aims to elucidate the factors that influence road users’ speeding behaviour on selected roads in Peninsular Malaysia. To achieve this, set of questionnaires has distributed to 500 respondents on selected roads in Peninsular Malaysia. The respondents came from various demographic backgrounds in order to have a fair opinion on the issue. Using descriptive analysis, the results have indicated that psychological factors such as emotion and attitude of road user are the prominent factors that influence the road user’s speeding behaviour. Furthermore, the results have shown that male road users were dominant in speeding compared to female, which led to increased vulnerability to road injuries and fatalities. These findings are very useful in order for us to understand road users’ driving behaviour. Relevant authorities should also revise the existing countermeasures and find ways to reduce road accident. Engineers and road experts could cooperate in designing new road specifications for the road user. Nevertheless, it is important to comprehend this speeding issue and factors associated with it. Each road user should take this matter seriously and responsibly as road safety is a responsibility of all. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=countermeasures" title="countermeasures">countermeasures</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological" title=" psychological"> psychological</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20safety" title=" road safety"> road safety</a>, <a href="https://publications.waset.org/abstracts/search?q=speeding" title=" speeding"> speeding</a> </p> <a href="https://publications.waset.org/abstracts/35364/a-preliminary-investigation-on-factors-that-influence-road-users-speeding-behaviour-on-selected-roads-in-peninsular-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">527</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">81</span> Modelling Insider Attacks in Public Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roman%20Kulikov">Roman Kulikov</a>, <a href="https://publications.waset.org/abstracts/search?q=Svetlana%20Kolesnikova"> Svetlana Kolesnikova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insider%20attack" title="insider attack">insider attack</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20cloud" title=" public cloud"> public cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=hypervisor" title=" hypervisor"> hypervisor</a> </p> <a href="https://publications.waset.org/abstracts/35628/modelling-insider-attacks-in-public-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35628.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">80</span> Human Factors Issues and Measures in Advanced NPPs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jun%20Su%20Ha">Jun Su Ha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Various advanced technologies will be adopted in Advanced Control Rooms (ACRs) of advanced Nuclear Power Plants (NPPs), which is thought to increase operators’ performance. However, potential human factors issues coupled with digital technologies might be troublesome. Human factors issues in ACRs are identified and strategies (or countermeasures) for evaluating and analyzing each of issues are addressed in this study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advanced%20control%20room" title="advanced control room">advanced control room</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20factor%20issues" title=" human factor issues"> human factor issues</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20performance" title=" human performance"> human performance</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20error" title=" human error"> human error</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20power%20plant" title=" nuclear power plant "> nuclear power plant </a> </p> <a href="https://publications.waset.org/abstracts/1489/human-factors-issues-and-measures-in-advanced-npps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1489.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">470</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">79</span> Security Threats on Wireless Sensor Network Protocols</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Gorine">H. Gorine</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Ramadan%20Elmezughi"> M. Ramadan Elmezughi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title="wireless sensor networks">wireless sensor networks</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=light%20weight%20encryption" title=" light weight encryption"> light weight encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a> </p> <a href="https://publications.waset.org/abstracts/51644/security-threats-on-wireless-sensor-network-protocols" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51644.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">526</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">78</span> Status Report of the Express Delivery Industry in China</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ying%20Bo%20Xie">Ying Bo Xie</a>, <a href="https://publications.waset.org/abstracts/search?q=Hisa%20Yuki%20Kurokawa"> Hisa Yuki Kurokawa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the fast development, China's express delivery industry has involved in a dilemma that the service quality are keeping decreasing while the construction rate of delivery network cannot meet the customers’ demand. In order to get out of this dilemma and enjoy a succession development rate, it is necessary to understand the current situation of China's express delivery industry. Firstly, the evolution of China's express delivery industry was systematical presented. Secondly, according to the number of companies and the amount of parcels they has dealt each year, the merits and faults of tow kind of operating pattern was analyzed. Finally, based on the characteristics of these express companies, the problems of China's express delivery industry was divided into several types and the countermeasures were given out respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=China" title="China">China</a>, <a href="https://publications.waset.org/abstracts/search?q=express%20delivery%20industry" title=" express delivery industry"> express delivery industry</a>, <a href="https://publications.waset.org/abstracts/search?q=status" title=" status"> status</a>, <a href="https://publications.waset.org/abstracts/search?q=problem" title=" problem"> problem</a> </p> <a href="https://publications.waset.org/abstracts/31014/status-report-of-the-express-delivery-industry-in-china" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31014.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">77</span> Calculation of Lungs Physiological Lung Motion in External Lung Irradiation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yousif%20Mohamed%20Y.%20Abdallah">Yousif Mohamed Y. Abdallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Khalid%20H.%20Eltom"> Khalid H. Eltom</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This is an experimental study deals with measurement of the periodic physiological organ motion during lung external irradiation in order to reduce the exposure of healthy tissue during radiation treatments. The results showed for left lung displacement reading (4.52+1.99 mm) and right lung is (8.21+3.77 mm) which the radiotherapy physician should take suitable countermeasures in case of significant errors. The motion ranged between 2.13 mm and 12.2 mm (low and high). In conclusion, the calculation of tumour mobility can improve the accuracy of target areas definition in patients undergo Sterostatic RT for stage I, II and III lung cancer (NSCLC). Definition of the target volume based on a high resolution CT scan with a margin of 3-5 mm is appropriate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=physiological%20motion" title="physiological motion">physiological motion</a>, <a href="https://publications.waset.org/abstracts/search?q=lung" title=" lung"> lung</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20irradiation" title=" external irradiation"> external irradiation</a>, <a href="https://publications.waset.org/abstracts/search?q=radiation%20medicine" title=" radiation medicine"> radiation medicine</a> </p> <a href="https://publications.waset.org/abstracts/6078/calculation-of-lungs-physiological-lung-motion-in-external-lung-irradiation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">418</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">76</span> Accelerating Side Channel Analysis with Distributed and Parallelized Processing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyunghee%20Oh">Kyunghee Oh</a>, <a href="https://publications.waset.org/abstracts/search?q=Dooho%20Choi"> Dooho Choi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DPA" title="DPA">DPA</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=parallelized%20processing" title=" parallelized processing"> parallelized processing</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20analysis" title=" side channel analysis"> side channel analysis</a> </p> <a href="https://publications.waset.org/abstracts/9204/accelerating-side-channel-analysis-with-distributed-and-parallelized-processing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9204.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">75</span> Examining Cyber Crime and Its Impacts on E-Banking in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Auwal%20Nata%27ala">Auwal Nata&#039;ala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20crimes" title="cyber crimes">cyber crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=e-banking" title=" e-banking"> e-banking</a>, <a href="https://publications.waset.org/abstracts/search?q=policies" title=" policies"> policies</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT" title=" ICT"> ICT</a> </p> <a href="https://publications.waset.org/abstracts/18051/examining-cyber-crime-and-its-impacts-on-e-banking-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18051.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">74</span> SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Sobati%20Moghadam">Somayeh Sobati Moghadam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business&rsquo;s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BPMN" title="BPMN">BPMN</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20threats" title=" security threats"> security threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20processes%20outsourcing" title=" business processes outsourcing"> business processes outsourcing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/97274/secloudbpmn-a-lightweight-extension-for-bpmn-considering-security-threats-in-the-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97274.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">73</span> Taxonomy of Threats and Vulnerabilities in Smart Grid Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faisal%20Al%20Yahmadi">Faisal Al Yahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20R.%20Ahmed"> Muhammad R. Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electric power is a fundamental necessity in the 21<sup>st</sup> century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid%20network" title="smart grid network">smart grid network</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerabilities" title=" vulnerabilities"> vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/135866/taxonomy-of-threats-and-vulnerabilities-in-smart-grid-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135866.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">72</span> Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20Sellami">L. Sellami</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Idoughi"> D. Idoughi</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20F.%20Tiako"> P. F. Tiako</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system" title=" intrusion detection system"> intrusion detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/63446/detection-of-new-attacks-on-ubiquitous-services-in-cloud-computing-and-countermeasures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63446.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">323</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">71</span> Modeling of Traffic Turning Movement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Tilahun%20Mulugeta">Michael Tilahun Mulugeta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Pedestrians are the most vulnerable road users as they are more exposed to the risk of collusion. Pedestrian safety at road intersections still remains the most vital and yet unsolved issue in Addis Ababa, Ethiopia. One of the critical points in pedestrian safety is the occurrence of conflict between turning vehicle and pedestrians at un-signalized intersection. However, a better understanding of the factors that affect the likelihood of the conflicts would help provide direction for countermeasures aimed at reducing the number of crashes. This paper has sorted to explore a model to describe the relation between traffic conflicts and influencing factors using Multiple Linear regression methodology. In this research the main focus is to study the interaction of turning (left & right) vehicle with pedestrian at unsignalized intersections. The specific objectives also to determine factors that affect the number of potential conflicts and develop a model of potential conflict. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=potential" title="potential">potential</a>, <a href="https://publications.waset.org/abstracts/search?q=regression%20analysis" title=" regression analysis"> regression analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=pedestrian" title=" pedestrian"> pedestrian</a>, <a href="https://publications.waset.org/abstracts/search?q=conflicts" title=" conflicts"> conflicts</a> </p> <a href="https://publications.waset.org/abstracts/183192/modeling-of-traffic-turning-movement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183192.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=countermeasures&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=countermeasures&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=countermeasures&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=countermeasures&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10