Ara es mostren els items 52968-52987 de 244457

    • Cyber-physical modelling of hot water installations for continuous commissioning 

      Sol Vilaplana, Eloi (Universitat Politècnica de Catalunya, 2023-06)
      Projecte Final de Màster Oficial
      Accés restringit per acord de confidencialitat
      Realitzat a/amb:   Danmarks tekniske universitet
    • Cyber-physical systems for real-time management in the urban water cycle 

      Sun, Congcong; Cembrano Gennari, Gabriela; Puig Cayuela, Vicenç; Meseguer Amela, Jordi (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In the last few decades, water systems management has been increasingly developed into cyber-physical systems. They are based on advanced intelligent systems embedded with controllers, sensors and actuators to enable ...
    • Cyberinfrastructure programming with COMPSs 

      Lordan Gomis, Francesc-Josep; Lezzi, Daniele; Badia Sala, Rosa Maria (Barcelona Supercomputing Center, 2019-05-07)
      Text en actes de congrés
      Accés obert
    • Cybersecurity and privacy risk assessment of point-of-care systems in healthcare - a use case approach 

      Jofre Cruanyes, Marc; Navarro Llobet, Diana; Agulló, Ramon; Puig Domingo, Jordi; González Granadillo, Gustavo; Mora Zamorano, Juan; Romeu, Ramon (Multidisciplinary Digital Publishing Institute, 2021-07-21)
      Article
      Accés obert
      Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy ...
    • Cybersecurity in electric car's operational technology (OT) 

      Francés Falip, Javier (Universitat Politècnica de Catalunya, 2022-05-24)
      Projecte Final de Màster Oficial
      Accés obert
      On average, OT devices inside an electric car generate over 2,000,000 events per day. What would happen if we tamper a message there? Could there be fatal consequences? Cybersecurity in OT must be reshaped to ensure that ...
    • Cybersecurity in ict supply chains: Key challenges and a relevant architecture 

      Masip Bruin, Xavier; Marín Tordera, Eva; Ruiz Jiménez, Francisco José; Jukan, Admela; Trakadas, Panagiotis; Cernivec, Ales; Lioy, Antonio; Lopez, Diego; Santos, Henrique; Gonos, Antonis; Silva, Ana; Soriano Díaz, José; Kalogiannis, Grigorios (2021-09-01)
      Article
      Accés obert
      The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, ...
    • Cybersecurity in smart grids: development of an SDN-enabler to integrate RTUs in SDN network 

      Tsagiopoulou, Sofia (Universitat Politècnica de Catalunya, 2023-07-14)
      Projecte Final de Màster Oficial
      Accés obert
      The objective of this project is to design an SDN-enabler that integrates Remote Terminal Units into an SDN network aiming to improve the resilience and security of Smart Grids. The SDN-enabler device is an OvS switch ...
    • Cybersecurity in supply chain systems: the farm-to-fork use case 

      Leligou, Helen C.; Lakka, Alexandra; Karkazis, Panagiotis; Pita Costa, Joao; Marín Tordera, Eva; Dinis Santos, Henrique Manuel; Alvarez Romero, Antonio (2024-01-03)
      Article
      Accés obert
      Modern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While ...
    • Cybersecurity Incident Response in eHealth 

      Donadoni Santos, Diogo (Universitat Politècnica de Catalunya, 2023-06-22)
      Projecte Final de Màster Oficial
      Accés obert
      The thesis highlights the concept of Cybersecurity Incident Response, which involves preparing for and responding to cybersecurity breaches or attacks. It emphasizes the importance of timely and effective response to ...
    • Cybersecurity threats and mitigation in web applications 

      Solina Pérez, Anna (Universitat Politècnica de Catalunya, 2022-07-06)
      Treball Final de Grau
      Accés obert
      Every day IoT is being used more and more, they connect from our fridge to our security cameras. Recent studies have shown that they is a huge security hole, especially with the web interfaces. Web interfaces are really ...
    • Cybersecurity training awareness application 

      Vila Prieto, Coral (Universitat Politècnica de Catalunya, 2021-06-24)
      Treball Final de Grau
      Accés restringit per decisió de l'autor
      La societat ha entrat de ple a l'era de la informació, concentrada en la seva majoria a Internet, i les nostres dades són susceptibles de ser atacades per tal de cometre delictes en el nostre nom. Cada vegada es denuncien ...
    • Cybersecurity, an approach via Pentesting; Ciberseguretat, una aproximació via Pentesting 

      Chamero De La Rosa, Ivan (Universitat Politècnica de Catalunya, 2022-06-22)
      Treball Final de Grau
      Accés obert
      This work is an approach to pentesting, an area of cybersecurity that consists of attacking computer environments to discover and exploit vulnerabilities, with the ultimate goal of documenting the attack and being able ...
    • Cyberseguretat, IA i computació quàntica, estarem mai més en un entorn mínimament segur? 

      Masip Bruin, Xavier (2023-11-21)
      Audiovisual
      Accés obert
      Aquest Research Café, dirigit a estudiants, professorat i personal investigador, tractarà sobre la intel·ligència artificial des de diferents àmbits, abordant aspectes com la seguretat, l’educació i el coneixement.
    • El Cyborg, la momia, el arquitecto : la explosión de los modelos antropocéntricos en arquitectura 

      De la Puente, José Manuel (Edicions UPC, 2001-09)
      Article
      Accés obert
    • Cycle codes of graphs and MDS array codes 

      Serra Albó, Oriol; Zemor, Gilles (2009-07-30)
      Article
      Accés restringit per política de l'editorial
      We investigate how to colour edges of graph so that any two colours make up a spanning tree. This problem is equivalent to transforming the cycle code of a graph into a Maximum Distance Separable (MDS) array code. Adopting ...
    • Cycle-magic graphs 

      Lladó Sánchez, Ana M.; Moragas, J (2007-09)
      Article
      Accés restringit per política de l'editorial
      A simple graph G=(V,E) admits a cycle-covering if every edge in E belongs at least to one subgraph of G isomorphic to a given cycle C. Then the graph G is C-magic if there exists a total labelling f : V ∪ E → {1, 2, . . ...
    • Cycles in the cycle prefix digraph 

      Comellas Padró, Francesc de Paula; Mitjana Riera, Margarida (2000)
      Article
      Accés obert
      Cycle prefix digraphs are a class of Cayley coset graphs with many remarkable properties such as symmetry, large number of nodes for a given degree and diameter, simple shortest path routing, Hamiltonicity, optimal ...
    • Cycles of given lengths in unicyclic components in sparse random graphs 

      Noy Serrano, Marcos; Rasendrahasina, Vonjy; Ravelomanana, Vlady; Rué Perna, Juan José (Elsevier, 2021-04-01)
      Article
      Accés obert
      Let L be subset of {3,4,…} and let Xn,M(L) be the number of cycles belonging to unicyclic components whose length is in L in the random graph G(n,M). We find the limiting distribution of Xn,M(L) in the subcritical regime ...
    • Cyclic azapeptide integrin ligand synthesis and biological activity 

      Spiegel, J.; Mas Moruno, Carlos; Kessler, H.; Lubell, W.D. (2012)
      Article
      Accés restringit per política de l'editorial
      Aza-peptides are obtained by replacement of the α-C-atom of one or more amino acids by a nitrogen atom in a peptide sequence. Introduction of aza-residues into peptide sequences may result in unique structural and ...
    • Cyclic codes as hyperinvariant subspaces 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors; Montoro López, Maria Eulalia (2013)
      Text en actes de congrés
      Accés obert
      It is known the relationship between cyclic codes and invariant subspaces. We present in this work some codes which are obtained from invariant and hyperinvariant subspaces of the linear maps having associated matrices, ...