scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2021"


Journal ArticleDOI
TL;DR: In this paper, a train derailment can cause not only damage to the train itself but also secondary damage to surrounding structures, and guard rails are commonly used to prevent secondary damage caused by derailment.
Abstract: Train derailment can cause not only damage to the train itself but also secondary damage to surrounding structures. For this reason, guard rails are commonly used to prevent secondary damage caused...

12 citations


Book
21 Nov 2021
TL;DR: In this paper, the authors describe the current limitations and deficiencies inherent in the separate structures of the Army's three disparate components and find the roots of many of the reserves' problems in their strong ties to tradition and politics.
Abstract: One of the most significant post-Cold War issues being debated in Congress is the future of the U.S. Army's reserve components. Although National Guard and Army Reserve units fought well in the Persian Gulf war, Jeffrey Jacobs warns that Americans should not be sanguine about their ability to perform effectively in future conflicts. Having served in the active Army as well as both the Guard and the Reserve, Jacobs offers a unique perspective on the current missions, structure, and policies of the Army and the impact of the reserve system on its readiness for combat. From both active and reserve points of view, Jacobs describes the current limitations and deficiencies inherent in the separate structures of the Army's three disparate components. He finds the roots of many of the reserves' problems in their strong ties to tradition and politics. The solutions he proposes focus on integrating the three components into a true Total Army - in fact as well as in rhetoric. Such reforms will affect several sacred cows, including state control of the National Guard, the weekend drill system, and the geography-based reserve system. Much has been written about the reserves, but few recent writers have proposed such far-reaching reforms. Jacobs's controversial proposals will interest those who make, influence, and study military policy. Here is a stimulating and thought-provoking consideration of a vital aspect of America's defense posture.

12 citations


Journal ArticleDOI
TL;DR: In this paper, the authors combine the tools of queuing theory and stochastic geometry to develop a mathematical framework for capturing the joint operation of multiconnectivity and guard capacity mechanisms as well as the features of mmWave radio propagation.
Abstract: The intermittent nature of millimeter wave (mmWave) links caused by human-body blockage is an intrinsic property of the 5G New Radio (NR) technology that may cause drops of sessions already accepted for service. To improve the session continuity, multiconnectivity and guard capacity mechanisms have been proposed recently. Multiconnectivity enables dynamic handover between multiple pre-established spatially-diverse links, while guard capacity reserves a fraction of radio resources for the already accepted sessions by ensuring that they will have sufficient provisions in case of link blockage. In this study, we combine the tools of queuing theory and stochastic geometry to develop a mathematical framework for capturing the joint operation of these two schemes as well as the features of mmWave radio propagation. The metrics are related to user- and system-centric performance including the system resource utilization and the new and ongoing session drop probabilities. Our results show that multiconnectivity benefits all of the considered parameters. However, the range of performance boost remains limited by the deployment density and the maximum supported degree of multiconnectivity. In its turn, guard capacity allows to further decrease the ongoing session drop probability at the expense of the new session drop probability and the system resource utilization. When implemented jointly with multiconnectivity, guard capacity does not produce noticeable negative effects on the system resource utilization as compared to its standalone use. Hence, one may prefer a joint implementation of these mechanisms for preserving the session continuity of users without compromising the resource utilization.

11 citations


Journal ArticleDOI
TL;DR: In this paper, the authors administered 501 questionnaires to correctional officers and found that some end their careers in disgrace when they engage in acts of cruelty against the very inmates they were paid to protect.
Abstract: Some correctional officers end their careers in disgrace when they engage in acts of cruelty against the very inmates they are paid to protect. In the present study, we administered 501 questionnai...

11 citations



Book
10 May 2021
TL;DR: In this paper, the authors make the ethical case for a volunteer Citizen-Soldier military in a democratic republic using Immanuel Kant's (1724-1804) Categorical Imperative as justification.
Abstract: This thesis makes the ethical case for a volunteer Citizen-Soldier military in a democratic republic using Immanuel Kant’s (1724-1804) Categorical Imperative as justification. An Enlightenment theory, Kant’s Categorical Imperative represents a higher moral duty free from reliance upon consequence. The Categorical Imperative directs that a moral law fit three requirements: the action must be universally applicable, deemed as fair by all parties, and not use men as a means to an end. By reviewing the history of the National Guard of the United States, I draw the reader away from a traditional Utilitarian argument of cost/benefit and demonstrate that the Deontological argument is equally applicable. Beginning with the first legislated Muster in 1636, preEnlightenment village bands protected the tiny, immigrant communities, today volunteer Citizen-Soldiers stand shoulder-to-shoulder with their career counterparts in both domestic and foreign theaters. While the Utilitarian-based cost/benefit analysis changes over time, I demonstrate that the Categorical Imperative applies throughout the National Guard’s long, complicated history. The procedure used to make the argument follows the history of the United States in chronological order. In each chapter, a significant leader is regarded in light of the

9 citations



Journal ArticleDOI
22 Sep 2021
TL;DR: In this article, the authors investigate the role of social robots when interacting with people in everyday settings, some of which may be authoritative, such as a nurse, teacher, or guard, and propose a method to investigate how social robots perform these roles.
Abstract: Social robots must take on many roles when interacting with people in everyday settings, some of which may be authoritative, such as a nurse, teacher, or guard. It is important to investigate wheth...

9 citations


Journal ArticleDOI
TL;DR: It is shown that the defender can achieve the same optimal detection probability by carefully spreading out the patrollers probabilistically against a learning attacker.
Abstract: A defender dispatches patrollers to circumambulate a perimeter to guard against potential attacks. The defender decides on the time points to dispatch patrollers and each patroller’s direction and ...

9 citations



Journal ArticleDOI
Terry K. Park1
03 Apr 2021
TL;DR: On 31 August 1949, the National Security Council prepared an internal draft that would later inform the USs' foreign policy towards Cold War Asia as mentioned in this paper, which was later used by the United States during the 1950-53 Korean War.
Abstract: On 31 August 1949, the National Security Council prepared an internal draft that would later inform the USs' foreign policy towards Cold War Asia. About a decade later, after the 1950–53 Korean War...

Book ChapterDOI
21 Jun 2021
TL;DR: SnakeGX as mentioned in this paper is a framework to implant a persistent backdoor in legitimate enclaves, which is a new architecture specifically designed to overcome the challenges SGX environments pose, while preserving their integrity and functionality.
Abstract: Intel Software Guard eXtension (SGX) is a technology to create enclaves (i.e., trusted memory regions) hardware isolated from a compromised operating system. Recently, researchers showed that unprivileged adversaries can mount code-reuse attacks to steal secrets from enclaves. However, modern operating systems can use memory-forensic techniques to detect their traces. To this end, we propose SnakeGX, an approach that allows stealthier attacks with a minimal footprint; SnakeGX is a framework to implant a persistent backdoor in legitimate enclaves. Our solution encompasses a new architecture specifically designed to overcome the challenges SGX environments pose, while preserving their integrity and functionality. We thoroughly evaluate SnakeGX against StealthDB, which demonstrates the feasibility of our approach.

Journal ArticleDOI
01 Jun 2021
TL;DR: In this article, a defense survey of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the development strategy of the state border guard service of Ukraine and increasing the level of operational and service activities planning within the system of national security.
Abstract: The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security. The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. Doi: 10.28991/esj-2021-01280 Full Text: PDF

Proceedings ArticleDOI
05 Mar 2021
TL;DR: A new password manager with PWNING check is introduced in this article which helps to every organisation to keep the user-account data safe. But it is a hectic task for a company or to a user to keep an eye on their sensitive data every second.
Abstract: This digital world is full of attacks every day on every account, and on every organisation. It is a hectic task for a company or to a user to keep an eye on their sensitive data every second. To be on a safer side, every internet user should be aware of all the pros and cons of the internet. A lot of organisations are becoming one of the victims of the data breaches and many of the student’s and official accounts are getting exposed. So, we authors worked on-How to deal with the Data Breaches and what are the measures to take to tackle the data breach are all discussed in this paper. This article will enlighten the wisdom of every internet user and acts as guard. We also discussed about mathematical password size calculation with 8 and 12 characteristic length passwords by considering four cases. And made a complexity comparison with two different length passwords. By using Network lab, we authors conducted experiments on the Internet-WI-FI signals and found some solutions to the existed problems. Also, a New Password manager with PWNING check is introduced in this paper which helps to every organisation to keep the user-account data safe. At the end, safety information related to Wi-Fi-router is epitomized and presented inside the article.

Journal ArticleDOI
TL;DR: Port state control inspections serve to guard maritime safety and the marine environment with limited resources and can be improved if the resources are improved.
Abstract: Port state control (PSC) inspections serve to guard maritime safety and the marine environment. Because port inspection resources are limited, inspection efficiency can be improved if the resources...

Book
31 May 2021
TL;DR: Introduction Foreign Policy Under President Clinton Clintons China Policy The New Taiwan Clintons Taiwan Policy Taiwans Security Environment The PRC Threat to Taiwan U.S. Interests in the Security of Taiwan Conclusion.
Abstract: Introduction Foreign Policy Under President Clinton Clintons China Policy The New Taiwan Clintons Taiwan Policy Taiwans Security Environment The PRC Threat to Taiwan U.S. Interests in the Security of Taiwan Conclusion.

Journal ArticleDOI
01 Mar 2021
TL;DR: A high-performance and low-cost ARM firewall that can guard computers under public network conditions and make public information more secure in today’s information age is implemented.
Abstract: This article implements a high-performance and low-cost ARM firewall, whi ch can guard computers under public network conditions and make public information more secure in today's information age The designed firewall operates at the network l ayer to monitor the normal communication between the internal LAN and the external Internet, while resisting external network intrusions The firewall can be configured to control whether internal hosts can access the Internet When malicious Internet intrusio n is detected, the firewall prevents data packets from flowing into the intranet

Journal ArticleDOI
07 Jun 2021
TL;DR: The House of Representatives was the main scene of political battles during dualism, a place that was mentioned as an “arena” by publicists as mentioned in this paper, a reference was not that far from reality, because violence within the House moved on a wide scale, from verbal aggression to physical violence.
Abstract: The House of Representatives was the main scene of political battles during dualism, a place that was mentioned as an “arena” by publicists. This reference was not that far from reality, because – especially in the last decade of the era – violence within the House moved on a wide scale, from verbal aggression to physical violence. To solve this problem, the idea of an independent Guard was born, which started operating in 1913, and formed in political andother battles. After the establishment, the Guard of the House of Representatives became one of the most important corps of the contemporary law enforcement, the traditions of which were also used by the post-millennial law enforcement.

Journal ArticleDOI
15 Jun 2021
TL;DR: In the early years of the Italian Republic, the use of words, images and rituals to reinforce the militarization of the Public Security Guard (Corpo delle Guardie di Pu... as mentioned in this paper.
Abstract: The article analyses the employment of words, images and rituals, in the early years of the Italian Republic, to reinforce the militarization of the Public Security Guard (Corpo delle Guardie di Pu...

Journal ArticleDOI
TL;DR: This study considers the face guard jack as a flexible spring and establishes a rigid-flexible coupling analysis model of the face Guard mechanism and provides theoretical support for the design and optimization of theFace Guard mechanism.
Abstract: With the increase of mining height, the problem of coal wall spalling in the working face gradually worsens. Hydraulic support and its face guard structure are the key pieces of equipment to restrain the coal wall spalling. However, at present, the hydraulic jack is mostly considered as rigid in the analysis of protection mechanism. This simplification cannot effectively reflect the true bearing state of the face guard. In order to improve the accuracy of analysis, this study considers the face guard jack as a flexible spring and establishes a rigid-flexible coupling analysis model of the face guard mechanism. First, based upon the multibody dynamics software ADAMS®, the multibody numerical model of the face guard of the hydraulic support was established. The influence of the two kinds of structures on the coal wall disturbance was analyzed and compared. Then, the rigid model was meshed. The hydraulic jacks were equivalent to the spring system, and the rigid-flexible coupling model was established. Based upon the application load on different positions of the rigid-flexible model, the load-bearing characteristics and hinge point force transfer characteristics of the two face guards were analyzed. The results show that the support efficiency of the integral type was higher than that of the split type. In the vertical support attitude, the dynamic disturbance of the coal wall, produced by the two kinds of face guards, was small. The four-bar linkage effectively improved the ultimate bearing capacity of the integral face guard. The results provide theoretical support for the design and optimization of the face guard.


Book ChapterDOI
01 Jan 2021
TL;DR: In this article, the technique involved in optimizing the performance of a captcha breaking model and also providing a moot that can help to withstand the guard of captchas is discussed. And the moot can be used to improve the security of web bots.
Abstract: With the increasing dependency of people and evolving technology, security has become an issue on online platforms. Earlier days CAPTCHA was introduced to provide protection and security in web but lately due to the new bulk of web bots, now security becomes a major concern as it could be easily breached. This paper discusses about the technique involved that can help in optimizing the performance of a captcha breaking model and also provide a moot that can help to withstand the guard of captchas.

Journal ArticleDOI
TL;DR: In this paper, the authors deal with the views of psychologists on the relevance of use of the religious faith potential in the context of individual mental health maintaining and the state and problematic issues that arise during the introduction of the institute of military chaplaincy in the State Border Guard Service of Ukraine are considered.
Abstract: The article deals with the views of psychologists on the relevance of use of the religious faith potential in the context of the individual mental health maintaining. The state and problematic issues that arise during the introduction of the institute of military chaplaincy in the State Border Guard Service of Ukraine are considered. The need for involvement of Border Guard military chaplains and military psychologists in the psychological support of professional activity of the border guards of joint actions during psychoprophylactic, psychohygienic, psychotherapeutic, psychocorrectional measures is defined. Key words: mental health, religion, military chaplain, border guard, psychological support.

Journal ArticleDOI
28 May 2021
TL;DR: In this article, the authors explore the scientific literature on the current research results, methodologies, approaches and best practices on developing e-learning systems in educational contexts during Covid-19.
Abstract: Due to Covid-19 the use of educational technologies, efficient and meaningful implementation of digital learning possibilities have become particularly important topics in order to develop border guards training. Issues related to training online, communication via several platforms, possibilities do develop interactive training content, need to use the potential of e-learning opportunities have become routine topics of discussion and ongoing research. Trainers of border guard training institutions have to tackle unexpected, unexplored, challenges and tasks related to border guards training due to Covid-19. Digital competence is particularly important to implement efficient online communication environment. To find out training and learning outcomes and define further necessities of e-learning development during emergency situations the authors of this research explore the scientific literature on the current research results, methodologies, approaches and best practices on developing e-learning systems in educational contexts during Covid-19. Survey results on attitudes, experiences and suggestions of border guards’ trainers in Latvia, Lithuania, Estonia and Finland have been analysed to put forward suggestions for further border guard training development particularly in e-learning context during emergency situations.

Journal ArticleDOI
23 Mar 2021
TL;DR: In this paper, the authors argue that the security of judges in Indonesia needs special police force to guard and secure them, and they concluded that it is required to change the Law regarding Judicial Power especially in the part concerning judge's safety and security.
Abstract: Special police force is not something new in Indonesia. At least there are four special police force in Indonesia namely Prison Guard, Railway Police, Civil Service Police, and Forestry Special Police. Those police force are separated from, but hand in hand with Indonesian Police Force in securing civil society in Indonesia. In regards with the security of judges in Indonesia, this paper tries to argue that they need special police force to guard and secure them. In this paper, it is concluded that it is required to change the Law regarding Judicial Power especially in the part concerning judge’s safety and security. If it is not probable, then creating a special police force in court is a must.

DOI
10 Mar 2021
TL;DR: In this article, the effectiveness of performance of Grobogan District Attorney in the context of preventing criminal acts of corruption after the dissolution of Regional Government and Regional Development Guards and Security Team (TP4D) in the construction of legal system was analyzed.
Abstract: The objectives of this study are: 1 To find out and analyze the effectiveness of performance of Grobogan District Attorney in the context of preventing criminal acts of corruption after the dissolution of Regional Government and Regional Development Guards and Security Team (TP4D) in the construction of legal system 2 To find out and analyze the obstacles faced by the Grobogan District Attorney in the context of preventing criminal acts of corruption after the dissolution of Regional Government and Regional Development Guards and Security Team (TP4D) and their solutions The research method used is juridical sociology, which is an approach that studies social phenomena in society with legal aspects Based on the research, it is concluded that as the implementation of duties of Guards Team, Government Security and Regional Development (TP4D), the Grobogan District Prosecutor's Office remains professional in carrying out its duties in the context of preventing criminal acts of corruption after the dissolution of guard and security team for government and regional development (TP4D) in the construction of a legal system that is right in a period of 3 (three) years, starting in 2016, 2017, 2018 and 2019, the Team of Guards, Safeguards for Government and Regional Development (TP4D) of Grobogan District Prosecutor's Office has handled corruption crimes, showing an achievement from one of roles The Attorney General's Office in optimizing the prevention of criminal acts of corruption through the Regional Government and Development Guard and Security Team (TP4D)

Journal ArticleDOI
TL;DR: In this article, the performance of an existing log truck cab guard subject to impact from the load of logs shifting forward during sudden truck deceleration was examined and modifications to the guard were considered.
Abstract: This article examines the performance of an existing log truck cab guard subject to impact from the load of logs shifting forward during sudden truck deceleration, and considers modifications to th...

Journal ArticleDOI
08 Jul 2021
TL;DR: In this article, the authors present the analysis of the existing practice of vigilantes training at law enforcement agencies, and identify deficiencies and contradictions in the level of expertise of their expertise.
Abstract: The relevance of the subject matter of the article is determined by the increasing spread of volunteering in our country, in particular, the formation of voluntary people’s guards that are intended to assist all state authorities includinglaw enforcement agencies. The legal basis for cooperation between the police and the public is fixed in the corresponding statutory documents. The performanceof voluntary people’s patrol depends considerably on the level oflegal, moral and psychological competenceof its members allowing to interact withlaw enforcement officers. Vigilantesshould understand the specifics of human rights practices and law enforcement activities. The decrees of the Ministry of Internal Affairs of Russia define the procedure ofvigilante groupstraining, but their implementation requires the development of policy and methodological documentation. The article presents the analysis of the existing practice of vigilantes training atlaw enforcement agencies, and identifies deficiencies and contradictions in thelevel of their expertise. The article discusses the specific features of such training: its short-term duration, as well as the heterogeneous composition of thevigilante groups as to age and profession. The authorpresents experience in implementing specially developed program forvigilantestraining that is unique both in content and in methods used. The content is presented on the basis of classification of representative tasksthat have to be solved by voluntary people’s patrol in joint activities with police officers. These tasks formed the basis for the three training modules reviewed in the article («Minors», «Foreigners», «Maintenance of order»). Practice-oriented training methods include analysis of real situations that are presented in the classroom in various aspects and forms. Test and situational materials developedon their basis can be used in the process of training as well as for monitoring the effectiveness of the work performed. In conclusionthe author presentsthe analysis of the effectiveness of the suggested training program for vigilante groupas compared to the control group.

Journal ArticleDOI
20 Jun 2021
TL;DR: In this paper, a review of the situation based on the analysis of strengths, weaknesses, opportunities and threats (SWOT), which is the basis for determining the main directions of the State Border Guard Service of Ukraine is presented.
Abstract: The State Border Guard Service of Ukraine is a component of the security and defense sector and with changing conditions and further development there is a need to conduct a review of the situation based on the analysis of strengths, weaknesses, opportunities and threats (SWOT), which is the basis for determining the main directions of the State Border Guard Service. Of Ukraine. The initial data are the existing legal framework, scenarios and situations of development of the military-political situation, functions and responsibilities of the border agency. The importance of the main parameters was determined by the method of expert assessment and with the help of SWOT analysis in the conditions of daily activity, in the conditions of complication of the situation and in the conditions of military character, opportunities and threats, the directions of further development of the State Border Guard Service of Ukraine were substantiated. . SWOT - analysis is an adequate method for conducting strategic analysis, which allows to determine the directions of development of units and subdivisions of the State Border Guard Service of Ukraine and substantiation of their tasks. Thus, the analysis identifies the strengths and weaknesses of the border agency, opportunities and threats in the day-to-day, in a difficult situation and in a military nature, which can be further used in providing proposals to determine the main activities and further development of the State. Border Guard Service of Ukraine, as well as taken into account when submitting proposals on the content of the draft Strategy of Public Safety and Civil Protection of Ukraine.

Journal ArticleDOI
TL;DR: The importance of continuous training in the professional path of the military of the Republican National Guard, associated with the potential of using new technologies is the core of the investigation in this article, which aims to determine the importance of the e-learning tool for the continuous training of the soldiers of the National Republican Guard.
Abstract: The training needs felt in the professional path of the military of the Republican National Guard, associated with the potential of using new technologies is the core of this investigation. Training is one of the great challenges that organizations currently face and, in the National Republican Guard, it plays a fundamental role in the service provided by the Institution, making it clear the high importance of acquiring and maintaining knowledge and skills for the performance on several roles in the organization. The present investigation aims to determine the importance of the e-Learning tool for the continuous training of the soldiers of the National Republican Guard. In this context, it is intended to characterize the importance of continuous training whose objective is to identify and analyze the consequences of the tool, as well as to identify the impact of the use of new technologies in the training of the institution's military, according to a case study in the Lisbon Territorial Command. The method that supports the investigation is the deductive method, which is based on a logic from the general to the particular. In order to achieve the defined objectives, we opted for interviews and a questionnaire survey, complemented with a documentary analysis resulting from bibliographic research and institutional documents. Thus, it appears that continuous training has a high importance for the professional development of the military, since it promotes quality in the service provided, positively affecting the daily activities of the military, increasing individual success and, consequently, organizational success . It is concluded that e-Learning represents an asset for continuous training, since it is a catalyst for the potential of the institution's human resources.