SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Amorim Joni) "

Sökning: WFRF:(Amorim Joni)

  • Resultat 1-10 av 12
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Amorim, Joni A., et al. (författare)
  • Augmented Reality and Mixed Reality Technologies : Enhancing Training and Mission Preparation with Simulations
  • 2013
  • Konferensbidrag (refereegranskat)abstract
    • The Instruction Centre for Operations on Law and Order Assurance (CIOpGLO) is a Brazilian Army facility created in March 2005 in Campinas, Brazil. The mission of this centre involves the offering of training in different perspectives, which includes the preparation of soldiers to enter in slums areas in Rio de Janeiro and other cities to arrest criminals, whenever a federal intervention is required. This centre is involved in training to guarantee law and order and, at the same time, prepare officers and soldiers for interventions even in urban areas. To allow such training, this facility counts with physical built sites to allow soldiers to train how to get inside houses, how to shoot at short ranges (from 0 to 30 meters), how to move and shelter while going up in a hill with many houses and corridors on the way, and so on. The Brazilian Army, in the last few years, started operating in slums like the ones of the "Alemão" and the "Penha" complex in Rio de Janeiro. The Army is also participating in operations out of Brazil in countries like Haiti. In situations like this, the armed forces take over the coordination of public security temporarily to recover the control of certain areas. Since the armed forces were not originally created to act in situations like this, there is a need to train all military stakeholders involved so that the operations are successful. Additionally, major events like the Confederations Cup, the World Cup in 2014 and the Olympics in 2016, generate additional demands for the armed forces, which are likely to be called to act at specific times. Moreover, it is noteworthy that there is a growing trend in which conflicts around the world occur, more than ever, inside the cities, where civilians take great risk and suffer many casualties, something called as “collateral damage” of the urban warfare. Recent examples include Afghanistan and Iraq. In this work, the preparation of soldiers at CIOpGLO is discussed while the possibility of using new approaches based on augmented reality and mixed reality technologies are considered. As a way to enhance training and mission preparation with simulations, this research focus on augmented reality (AR) supported by head-mounted displays (HMDs). HDMs may have many shapes, which include pairs of glasses with lenses that present AR with superposed images, enabling its wearer a total immersion in the simulation. The method used in this work involves a literature review on AR and HMDs, assessment of training needs at the Brazilian Army and an evaluation of emerging technologies from the ICT sector. The technologies to be considered are the HDMs, in this specific case the available programming languages, software and hardware from suppliers of commercial off-the-shelf (COTS) and military off-the-shelf (MOTS). The main contribution of this work is the comparative study of the main solutions for HDM. This study represents an essential step for concept development and for the experimentation to exploit and evaluate the use of simulations. The research presented suggests that the approach is effective and that future work should be on both development of new applications and its evaluation in real training sets in Brazil.
  •  
2.
  • Amorim, Joni A., et al. (författare)
  • Awareness and training : Identification of relevant security skills and competencies
  • 2014
  • Ingår i: Engineering Education in a Technology-Dependent World. - Guimarães : INTERTECH. - 9788565992282 - 9788566680287 ; , s. 37-
  • Konferensbidrag (refereegranskat)abstract
    • In order to identify needed skills and competencies for privacy and security, we propose a systematic process that maps privacy and security threats to related controls that are required to prevent, detect or remove such threats. This work suggests how to apply the process, while discussing how games and simulations can be used both to develop the desired behavior and to monitor the current competency level.
  •  
3.
  •  
4.
  • Amorim, Joni A., et al. (författare)
  • Cyber Security Training Perspectives
  • 2013
  • Konferensbidrag (refereegranskat)abstract
    • Building comprehensive cyber security strategies to protect people, infrastructure and assets demands research on methods and practices to reduce risks. Once the methods and practices are identified, there is a need to develop training for the manystakeholders involved, from security experts to the end user. In thispaper, we discuss new approaches for training, which includes the development of serious games for training on cyber security. The identification of the theoretical framework to be used for situation and threat assessment receives special consideration.
  •  
5.
  •  
6.
  • Amorim, Joni A., et al. (författare)
  • Privacy and Security in Cyberspace : Training Perspectives on the Personal Data Ecosystem
  • 2013
  • Ingår i: European Intelligence and Security Informatics Conference (EISIC), Proceedings CD. - : IEEE conference proceedings. - 9780769550626 ; , s. 139-142
  • Konferensbidrag (refereegranskat)abstract
    • There is a growing understanding that privacy is an essential component of security. In order to decrease the probability of having data breaches, the design of information systems,  processes  and  architectures  should  incorporate considerations  related  to  both  privacy  and  security.  This incorporation may benefit from the offering of appropriate training. In this way, this paper intends to discuss how to better offer training while considering new developments that involve both multimedia production and the “gamification” of training. The paper suggests the use in conjunction of two frameworks: the EduPMO Framework, useful for the management of large scale projects  that  may  involve  a  consortium  of  organizations developing multimedia for the offering of training, and the Game Development Framework, useful for the identification of the main components of the serious game for training on privacy by design to be developed as part of the training offering.
  •  
7.
  •  
8.
  • Bhatt, Parth, et al. (författare)
  • A Cyber Security Situational Awareness Framework to Track and Project Multistage Cyber Attacks
  • 2014
  • Ingår i: Proceedings of the 9Th International Conference on Cyber Warfare and Security (ICCWS-2014). - Reading : Academic Conferences Limited. - 9781909507111 - 9781632660626 - 9781909507050 ; , s. 356-360
  • Konferensbidrag (refereegranskat)abstract
    • In Security Operations Center there is a need to perceive, comprehend and project cyber activities. Therefore it requires developing Cyber Situational Awareness (CSA) capability that involves perception of different security events, comprehension of the meaning of the current cyber security situation in the organization, and the projection of future status in order to select better positioning of security mechanisms. Current techniques of CSA are limited by the high speed of events generation, large volume of information from multiple sensors, and the complexity of interactions of highly automated services that shape the Cyberspace. This study presents a framework to track and project multistage cyber-attacks supporting CSA activities and enables a faster correlation of event logs using Big Data Technologies.
  •  
9.
  • Colonese, Emilia, et al. (författare)
  • Cyber Security for Middleware System Architectures
  • 2014
  • Ingår i: Proceedings of the 9th International Conference on Cyber Warfare & Security. - : Academic Conferences Limited. - 9781909507050
  • Konferensbidrag (refereegranskat)
  •  
10.
  • Colonese, Emilia, et al. (författare)
  • Cyber Security for Middleware System Architectures
  • 2014
  • Ingår i: Proceedings of the 9Th International Conference on Cyber Warfare and Security (ICCWS-2014). - Reading : Academic Conferences Limited. - 9781909507111 - 9781632660626 - 9781909507050 ; , s. 361-365
  • Konferensbidrag (refereegranskat)abstract
    • This work‐in‐progress paper presents a proposal on how to consider cyber security for the middleware system architecture. The text discusses the steps needed to incorporate cyber security aspects to the Interoperability Reference Model Architecture. The Interoperability Reference Model Architecture was chosen since it provides an effective communication process among components of distributed Real‐Time Systems. The process reduces architectural layers and the development effort due to the formalized reference model design. Also, it may be pointed that the decision for the selection of this framework benefits from a previous research in which the Interoperability Reference Model Architecture was applied in a Real‐Time System prototype to test and validate it. In this research, the focus will be the incorporation of cyber security aspects to Interoperability Reference Model Architecture.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 12

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy