Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Defense and Security Studies (3)
- Engineering (3)
- International Relations (3)
- Nuclear (3)
- Physics (3)
-
- Political Science (3)
- Public Affairs, Public Policy and Public Administration (3)
- Social and Behavioral Sciences (3)
- Business (2)
- Engineering Education (2)
- Human Resources Management (2)
- Law (2)
- National Security Law (2)
- Nuclear Engineering (2)
- Training and Development (2)
- Asian Studies (1)
- Chemistry (1)
- Computer Engineering (1)
- Computer Sciences (1)
- Education (1)
- Educational Methods (1)
- Electrical and Computer Engineering (1)
- Higher Education and Teaching (1)
- International and Area Studies (1)
- Radiochemistry (1)
- Teacher Education and Professional Development (1)
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
International Journal of Nuclear Security
The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
International Journal of Nuclear Security
In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …
Behavior-Based Detection Of Application Layer Distributed Denial Of Service Attacks During Flash Events, Renukadevi Saravanan, Saraswathi Shanmuganathan, Yogesh Palanichamy
Behavior-Based Detection Of Application Layer Distributed Denial Of Service Attacks During Flash Events, Renukadevi Saravanan, Saraswathi Shanmuganathan, Yogesh Palanichamy
Turkish Journal of Electrical Engineering and Computer Sciences
Distributed denial of service (DDoS) attacks are ever threatening to the developers and users of the Internet. DDoS attacks targeted at the application layer are especially difficult to be detected since they mimic the legitimate users' requests. The situation becomes more serious when they occur during flash events. A more sophisticated algorithm is required to detect such attacks during a flash crowd. A few existing works make use of flow similarity for differentiating flash crowds and DDoS, but flow characteristics alone cannot be used for effective detection. In this paper, we propose a novel mechanism for discriminating DDoS and flash …