Natural disasters, population growth, social conflicts, and political or structural crises give rise to forced migrations, which can lead to humanitarian emergencies. According to the “UNHCR annual global trends report”, 65.6 million people were displaced ...
The advent of the Web reshaped the way in which humans memorize information, arguably unlike any other technological advance of the last decades. Rather than remembering the information itself, people are primed to find the needed information through Web s ...
IRGC organised in 2016 an expert workshop on 'Governing Cybersecurity Risks and Benefits in the Internet of Things (IoT), applied to connected vehicles and medical devices. In those sectors, connectivity improves both safety and vulnerability, but cybersec ...
Several technologies, such as WiFi, Ethernet and power-line communications (PLC), can be used to build residential and enterprise networks. These technologies often co-exist; most networks use WiFi, and buildings are readily equipped with electrical wires ...
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic Filtering ...
The Swiss Federal Institute of Technology in Lausanne (EPFL) has introduced the Moodle Learning Management System (LMS) in 2005. Since then, the number of teachers and users has increased rapidly. With more than 350 active courses hosted on Moodle for this ...
About 20% of the world's population uses the web, and a large majority thereof uses web search engines to find information. As a result many web researchers are devoting much effort to improving the speed and capabilitiy of search technology. ...
American Association for the Advancement of Science2007