Exploració per títol
Ara es mostren els items 52968-52987 de 244457
-
Cyber-physical modelling of hot water installations for continuous commissioning
(Universitat Politècnica de Catalunya, 2023-06)
Projecte Final de Màster Oficial
Accés restringit per acord de confidencialitat
Realitzat a/amb: Danmarks tekniske universitet -
Cyber-physical systems for real-time management in the urban water cycle
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Text en actes de congrés
Accés restringit per política de l'editorialIn the last few decades, water systems management has been increasingly developed into cyber-physical systems. They are based on advanced intelligent systems embedded with controllers, sensors and actuators to enable ... -
Cyberinfrastructure programming with COMPSs
(Barcelona Supercomputing Center, 2019-05-07)
Text en actes de congrés
Accés obert -
Cybersecurity and privacy risk assessment of point-of-care systems in healthcare - a use case approach
(Multidisciplinary Digital Publishing Institute, 2021-07-21)
Article
Accés obertPoint-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy ... -
Cybersecurity in electric car's operational technology (OT)
(Universitat Politècnica de Catalunya, 2022-05-24)
Projecte Final de Màster Oficial
Accés obertOn average, OT devices inside an electric car generate over 2,000,000 events per day. What would happen if we tamper a message there? Could there be fatal consequences? Cybersecurity in OT must be reshaped to ensure that ... -
Cybersecurity in ict supply chains: Key challenges and a relevant architecture
(2021-09-01)
Article
Accés obertThe specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, ... -
Cybersecurity in smart grids: development of an SDN-enabler to integrate RTUs in SDN network
(Universitat Politècnica de Catalunya, 2023-07-14)
Projecte Final de Màster Oficial
Accés obertThe objective of this project is to design an SDN-enabler that integrates Remote Terminal Units into an SDN network aiming to improve the resilience and security of Smart Grids. The SDN-enabler device is an OvS switch ... -
Cybersecurity in supply chain systems: the farm-to-fork use case
(2024-01-03)
Article
Accés obertModern supply chains comprise an increasing number of actors which deploy different information technology systems that capture information of a diverse nature and diverse sources (from sensors to order information). While ... -
Cybersecurity Incident Response in eHealth
(Universitat Politècnica de Catalunya, 2023-06-22)
Projecte Final de Màster Oficial
Accés obertThe thesis highlights the concept of Cybersecurity Incident Response, which involves preparing for and responding to cybersecurity breaches or attacks. It emphasizes the importance of timely and effective response to ... -
Cybersecurity threats and mitigation in web applications
(Universitat Politècnica de Catalunya, 2022-07-06)
Treball Final de Grau
Accés obertEvery day IoT is being used more and more, they connect from our fridge to our security cameras. Recent studies have shown that they is a huge security hole, especially with the web interfaces. Web interfaces are really ... -
Cybersecurity training awareness application
(Universitat Politècnica de Catalunya, 2021-06-24)
Treball Final de Grau
Accés restringit per decisió de l'autorLa societat ha entrat de ple a l'era de la informació, concentrada en la seva majoria a Internet, i les nostres dades són susceptibles de ser atacades per tal de cometre delictes en el nostre nom. Cada vegada es denuncien ... -
Cybersecurity, an approach via Pentesting; Ciberseguretat, una aproximació via Pentesting
(Universitat Politècnica de Catalunya, 2022-06-22)
Treball Final de Grau
Accés obertThis work is an approach to pentesting, an area of cybersecurity that consists of attacking computer environments to discover and exploit vulnerabilities, with the ultimate goal of documenting the attack and being able ... -
Cyberseguretat, IA i computació quàntica, estarem mai més en un entorn mínimament segur?
(2023-11-21)
Audiovisual
Accés obertAquest Research Café, dirigit a estudiants, professorat i personal investigador, tractarà sobre la intel·ligència artificial des de diferents àmbits, abordant aspectes com la seguretat, l’educació i el coneixement. -
El Cyborg, la momia, el arquitecto : la explosión de los modelos antropocéntricos en arquitectura
(Edicions UPC, 2001-09)
Article
Accés obert -
Cycle codes of graphs and MDS array codes
(2009-07-30)
Article
Accés restringit per política de l'editorialWe investigate how to colour edges of graph so that any two colours make up a spanning tree. This problem is equivalent to transforming the cycle code of a graph into a Maximum Distance Separable (MDS) array code. Adopting ... -
Cycle-magic graphs
(2007-09)
Article
Accés restringit per política de l'editorialA simple graph G=(V,E) admits a cycle-covering if every edge in E belongs at least to one subgraph of G isomorphic to a given cycle C. Then the graph G is C-magic if there exists a total labelling f : V ∪ E → {1, 2, . . ... -
Cycles in the cycle prefix digraph
(2000)
Article
Accés obertCycle prefix digraphs are a class of Cayley coset graphs with many remarkable properties such as symmetry, large number of nodes for a given degree and diameter, simple shortest path routing, Hamiltonicity, optimal ... -
Cycles of given lengths in unicyclic components in sparse random graphs
(Elsevier, 2021-04-01)
Article
Accés obertLet L be subset of {3,4,…} and let Xn,M(L) be the number of cycles belonging to unicyclic components whose length is in L in the random graph G(n,M). We find the limiting distribution of Xn,M(L) in the subcritical regime ... -
Cyclic azapeptide integrin ligand synthesis and biological activity
(2012)
Article
Accés restringit per política de l'editorialAza-peptides are obtained by replacement of the α-C-atom of one or more amino acids by a nitrogen atom in a peptide sequence. Introduction of aza-residues into peptide sequences may result in unique structural and ... -
Cyclic codes as hyperinvariant subspaces
(2013)
Text en actes de congrés
Accés obertIt is known the relationship between cyclic codes and invariant subspaces. We present in this work some codes which are obtained from invariant and hyperinvariant subspaces of the linear maps having associated matrices, ...