Littérature scientifique sur le sujet « Canadian Security Intelligence Service (Proposed) »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Canadian Security Intelligence Service (Proposed) ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Canadian Security Intelligence Service (Proposed)"

1

Weller, Geoffrey R. « The Canadian Security Intelligence Service under stress ». Canadian Public Administration/Administration publique du Canada 31, no 2 (juillet 1988) : 279–302. http://dx.doi.org/10.1111/j.1754-7121.1988.tb01318.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Rankin, Murray. « National Security : Information, Accountability, and the Canadian Security Intelligence Service ». University of Toronto Law Journal 36, no 3 (1986) : 249. http://dx.doi.org/10.2307/825575.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Senior CSIS Executive. « THREE ASPECTS OF ACCOUNTABILITY FOR THE CANADIAN INTELLIGENCE PUBLIC SERVICE ». Journal of Intelligence, Conflict, and Warfare 6, no 3 (31 janvier 2024) : 243–46. http://dx.doi.org/10.21810/jicw.v6i3.6406.

Texte intégral
Résumé :
On November 17, 2023, a Senior CSIS Executive presented Three Aspects of Accountability for the Canadian Public Service for this year’s West Coast Security Conference. The presentation was followed by a question-and-answer period with questions from the audience and CASIS Vancouver Executives. The key points discussed were the themes of accountability in the Canadian Security Intelligence Service in relation to the federal court, to Canadian citizens, and within the governmental and academic spheres. Received: 01-07-2024 Revised: 01-30-2024
Styles APA, Harvard, Vancouver, ISO, etc.
4

Hewitt, Steve. « Intelligence at the Learneds : The RCMP, the Learneds, and the Canadian Historical Association ». Ottawa 1998 9, no 1 (9 février 2006) : 267–86. http://dx.doi.org/10.7202/030501ar.

Texte intégral
Résumé :
Abstract Much of the history of Royal Canadian Mounted Police's (RCMP) security intelligence role has ignored domestic counter-subversion work in favour of more glamorous counter-espionage operations. “Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association” examines one small part of that neglected counter-subversion past. For nearly twenty-five years, from 1960 to 1983, members of the RCMP secretly covered and reported upon various meetings of the Learned Societies. Initially attracted by the presence of communists, by the 1970s the RCMP had changed its focus to members of the so-called New Left. Hounded by criticism in the aftermath of the McDonald Commission's final report in 1981, Mounties returned to monitoring communists. Mounted Police coverage ended in 1984, when the Canadian Security Intelligence Service (CSIS) replaced the Security Service. The paper concludes with a suggestion that CSIS may not be as free from its RCMP ancestor as some would suggest.
Styles APA, Harvard, Vancouver, ISO, etc.
5

West, Leah, et Craig Forcese. « Twisted into knots : Canada’s challenges in lawful access to encrypted communications ». Common Law World Review 49, no 3-4 (22 janvier 2020) : 182–98. http://dx.doi.org/10.1177/1473779519891597.

Texte intégral
Résumé :
This article addresses the Canadian law governing ‘lawful access’ to potentially encrypted data-in-motion; that is, communications done through electronic means. This article begins by outlining the core agencies responsible for counterterrorism investigations in Canada, and the recent public debate and government consultation on encryption. Next, we identify how older laws designed for a different era may be leveraged to force service and platform providers to assist law enforcement and the Canadian Security Intelligence Service by decrypting communications and data. We will also touch on the legal capacity of these organizations to develop their own ‘workarounds’, including the role of Canada’s signals intelligence agency, the Communications Security Establishment. Throughout, we highlight how Canada’s long-standing ‘intelligence to evidence’ problem affects and, arguably exacerbates, the encryption-prompted ‘going dark’ phenomenon and consequently impairs Canadian counterterrorism efforts. We predict legal reform resolving the ‘going dark’ issue will be impossible without modernization of Canada’s disclosure regime.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Wilczynski, Artur. « Equity, Diversity, and Inclusion in National Security Intelligence ». Journal of Intelligence, Conflict, and Warfare 4, no 3 (27 février 2022) : 222–26. http://dx.doi.org/10.21810/jicw.v4i3.4197.

Texte intégral
Résumé :
On November 23, 2021, Mr. Artur Wilczynski, Associate Deputy Chief at Communications Security Establishment (CSE), presented on Equity, Diversity, and Inclusion in National Security Intelligence at the 2021 CASIS Vancouver West Coast Security Conference. This presentation was followed by a question and answer period and a breakout room session with questions from the audience and CASIS Vancouver executives. The key points discussed included how a lack of diversity in intelligence can negatively contribute to Canada’s national security, how diversity broadens the effectiveness of organizations, and how Canadian national security institutions must be in service to all Canadians.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Gratton, Phil. « Leadership, Technology and National Security ». Journal of Intelligence, Conflict, and Warfare 4, no 3 (31 janvier 2022) : 147–51. http://dx.doi.org/10.21810/jicw.v4i3.4164.

Texte intégral
Résumé :
On November 26, 2021, Mr. Phil Gratton, former DG in the Directorate of Technology for the Canadian Security Intelligence Service (CSIS) and current Associate Faculty at the Canada School of Public Service, presented on Leadership, Technology and National Security at the 2021 CASIS West Coast Security Conference. The presentation was followed by a question-and-answer period and a breakout room session with questions from the audience and CASIS Vancouver executives. The key point discussed was how leadership must adapt to best support its mission and technology workforce in the face of ever-evolving technological advancements in the realm of national security.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Young, Bob. « Foreign Interference / Influence in Canada : A Way Forward ». Journal of Intelligence, Conflict, and Warfare 6, no 2 (24 novembre 2023) : 79–83. http://dx.doi.org/10.21810/jicw.v6i2.6250.

Texte intégral
Résumé :
On June 15, 2023, Mr. Bob Young, security consultant and former Canadian Security Intelligence Service (CSIS) Regional Director for British Columbia and Yukon, presented Foreign Interference / Influence in Canada: A Way Forward. The presentation was followed by a question-and-answer period with questions from the audience and CASIS Vancouver Executives. The key points discussed were the characteristics of foreign interference and influence (FI), how the Chinese Community Party (CPP) conducts FI in Canada, and what actions the Canadian government and its agencies can take to better counter the threat of FI.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ryan, Joseph F. « Review of the Canadian security intelligence service : A suitable model for the United Kingdom ? » Intelligence and National Security 5, no 3 (juillet 1990) : 200–206. http://dx.doi.org/10.1080/02684529008432070.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Park, Keundug, et Heung-Youl Youm. « Proposal of a Service Model for Blockchain-Based Security Tokens ». Big Data and Cognitive Computing 8, no 3 (12 mars 2024) : 30. http://dx.doi.org/10.3390/bdcc8030030.

Texte intégral
Résumé :
The volume of the asset investment and trading market can be expanded through the issuance and management of blockchain-based security tokens that logically divide the value of assets and guarantee ownership. This paper proposes a service model to solve a problem with the existing investment service model, identifies security threats to the service model, and specifies security requirements countering the identified security threats for privacy protection and anti-money laundering (AML) involving security tokens. The identified security threats and specified security requirements should be taken into consideration when implementing the proposed service model. The proposed service model allows users to invest in tokenized tangible and intangible assets and trade in blockchain-based security tokens. This paper discusses considerations to prevent excessive regulation and market monopoly in the issuance of and trading in security tokens when implementing the proposed service model and concludes with future works.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Canadian Security Intelligence Service (Proposed)"

1

Tracey, Neil R. « Metaphor, the press, and the Canadian Security Intelligence Service (CSIS) ». Thesis, University of Ottawa (Canada), 1990. http://hdl.handle.net/10393/6006.

Texte intégral
Résumé :
The dissemination of press information in areas of concern to criminal justice plays an important role in the public conceptions of crime and the criminal justice system. The theoretical basis of the work, which integrates studies in phenomenology and metaphor, serves as a vehicle to arrive at a critical understanding of the press portrayal of the security legislation (CSIS Act). The thesis studies press articles gathered from microfilms, government press clippings, and a computer search (Dialog, File 262) for the Vancouver Sun, Winnipeg Free Press, Toronto Globe and Mail, Toronto Star, Ottawa Citizen, Ottawa Le Droit, Montreal Gazette, Le Devoir. Specific sub-themes in the reporting of the CSIS indicate that: (1) the reporting was uniformly critical of the bill, (2) the issue of civil rights versus state security provided the boundaries of virtually all coverage, (3) the CSIS was consistently portrayed through totalitarian imagery. (Abstract shortened by UMI.)
Styles APA, Harvard, Vancouver, ISO, etc.
2

Gonçalves, Joanisval Brito. « Sed quis custodiet ipso custodes ? : O controle da atividade de inteligência em regimes democráticos : os casos de Brasil e Canadá ». reponame:Repositório Institucional da UnB, 2008. http://repositorio.unb.br/handle/10482/1262.

Texte intégral
Résumé :
Tese (doutorado)—Universidade de Brasília, Instituto de Relações Internacionais, Programa de Pós-Graduação em Relações Internacionais, 2008.
Submitted by Jaqueline Oliveira (jaqueoliveiram@gmail.com) on 2008-12-05T16:39:02Z No. of bitstreams: 1 TESE_2008_JoanisvalBritoGoncalves.pdf: 3326471 bytes, checksum: 0ab0da5b0f5e851a6bda2fd15a6a33ab (MD5)
Approved for entry into archive by Georgia Fernandes(georgia@bce.unb.br) on 2009-02-17T17:41:19Z (GMT) No. of bitstreams: 1 TESE_2008_JoanisvalBritoGoncalves.pdf: 3326471 bytes, checksum: 0ab0da5b0f5e851a6bda2fd15a6a33ab (MD5)
Made available in DSpace on 2009-02-17T17:41:19Z (GMT). No. of bitstreams: 1 TESE_2008_JoanisvalBritoGoncalves.pdf: 3326471 bytes, checksum: 0ab0da5b0f5e851a6bda2fd15a6a33ab (MD5)
O presente trabalho tem por objetivo o estudo do controle da atividade de inteligência em regimes democráticos, com ênfase no controle externo exercido pelo Poder Legislativo. A primeira parte da Tese dedica-se à apresentação da influência da atividade de inteligência nas relações internacionais, aos aspectos conceituais, teóricos e metodológicos da inteligência e do controle da Administração Pública e dos serviços secretos. A partir desse embasamento doutrinário, segue-se para a segunda parte, na qual são estudados os casos do Brasil e do Canadá, considerando-se a maneira como os sistemas de inteligência se estruturaram em cada país e como se exerce o controle da comunidade de informações. Conclui-se comparando os modelos de supervisão e revisão brasileiro e canadense, e discutindo-se a possibilidade de aproveitamento da experiência de ambos para o perfeiçoamento do controle. _______________________________________________________________________________ ABSTRACT
The main objective of this Dissertation is to study intelligence and the mechanisms of control over secret services, particularly in Brazil and Canada. The first part of the Dissertation is dedicated to analyze the influence of intelligence in international relations along history. It also contains a presentation of theoretical and methodological approaches of intelligence, and a general perspective of control related to secret services. The second part evolves the study of the intelligence systems in Brazil and in Canada, and the particular mechanisms of control and accountability in each country. To conclude, a comparison between Brazil and Canada is made, considering the control of the intelligence community, especially in terms of external review and oversight.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Canadian Security Intelligence Service (Proposed)"

1

Branch, Canada Library of Parliament Research. The Canadian Security Intelligence Service. [Ottawa] : Library of Parliament, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Rosen, Philip. The Canadian Security Intelligence Service. [Ottawa] : Library of Parliament, Research Branch, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Posner, Richard A. Remaking domestic intelligence. Stanford, Calif : Stanford University, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Service, Canadian Security Intelligence. The Canadian Security Intelligence Service : Public report 1991. [Ottawa] : Canadian Security Intelligence Service, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kavchak, Andrew. Canadian national security and the CSIS Act. Toronto : MacKenzie Institute for the Study of Terrorism, Revolution and Propaganda, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Service, Canadian Security Intelligence. The Canadian Security Intelligence Service : Helping to protect Canada and its people. Ottawa : The Service, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Team, Canada Independent Advisory. People and process in transition : Report to the Solicitor General. [Ottawa] : Solicitor General Canada, 1987.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

General, Canada Dept of the Solicitor. On course : National security for the 1990s : the government's responseto the Report of the House of Commons Special Committee on the Review of the Canadian Security Intelligence Service Act and the Security Offences Act. Ottawa : Department of the Solicitor General, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Canada, Canada Solicitor General. On course : National security for the 1990s : the government's response to the Report of the House of Commons Special Committee on the Review of the Canadian Security Intelligence Service Act and the Security Offences Act. [Ottawa] : Solicitor General Canada, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Canada. Dept. of the Solicitor General. People and Process in Transition : Report to the Solicitor General by the Independent Advisory Team on the Canadian Security Intelligence Service. Ottawa, Ont : Minister of Supply and Services Canada = Ministre des approvisionnements et services Canada, 1987.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Canadian Security Intelligence Service (Proposed)"

1

Zhang, Yan. « The Future of Mobile Edge Computing ». Dans Simula SpringerBriefs on Computing, 81–105. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83944-4_7.

Texte intégral
Résumé :
AbstractThis chapter first introduces the fundamental principles of blockchain and the integration of blockchain and mobile edge computing (MEC). Blockchain is a distributed ledger technology with a few desirable security characteristics. The integration of blockchain and MEC can improve the security of current MEC systems and provide greater performance benefits in terms of better decentralization, security, privacy, and service efficiency. Then, the convergence of artificial intelligence (AI) and MEC is presented. A federated learning–empowered MEC architecture is introduced. To improve the performance of the proposed scheme, asynchronous federated learning is proposed. The integration of blockchain and federated learning is also presented to enhance the security and privacy of the federated learning–empowered MEC scheme. Finally, more MEC enabled applications are discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Littlewood, Jez. « 3 The Canadian Security Intelligence Service (CSIS) ». Dans Top Secret Canada, 45–71. University of Toronto Press, 2021. http://dx.doi.org/10.3138/9781487536657-005.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

« 10 ‘I’m Shocked, Shocked to Find That Gambling Is Going on in Here!’ : The Creation of the Canadian Security Intelligence Service ». Dans Secret Service, 324–64. University of Toronto Press, 2012. http://dx.doi.org/10.3138/9781442662377-012.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sarkar, Manash, Soumya Banerjee, Youakim Badr et Arun Kumar Sangaiah. « Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence ». Dans Cyber Security and Threats, 337–59. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch020.

Texte intégral
Résumé :
Emerging research concerns about the authenticated cloud service with high performance of security and assuring trust for distributed clients in a smart city. Cloud services are deployed by the third-party or web-based service providers. Thus, security and trust would be considered for every layer of cloud architecture. The principle objective of cloud service providers is to deliver better services with assurance of trust about clients' information. Cloud's users recurrently face different security challenges about the use of sharable resources. It is really difficult for Cloud Service Provider for adapting varieties of security policies to sustain their enterprises' goodwill. To make an optimistic decision that would be better suitable to provide a trusted cloud service for users' in smart city. Statistical method known as Multivariate Normal Distribution is used to select different attributes of different security entities for developing the proposed model. Finally, fuzzy multi objective decision making and Bio-Inspired Bat algorithm are applied to achieve the objective.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Juneau, Thomas, et Stephanie Carvin. « Managing Analytical Units ». Dans Intelligence Analysis and Policy Making, 45–80. Stanford University Press, 2021. http://dx.doi.org/10.11126/stanford/9781503613508.003.0003.

Texte intégral
Résumé :
A crucial factor determining the success of intelligence analysis is how analytical units are managed. This chapter highlights the importance of everyday bureaucratic practices to the intelligence policy dynamic, including hiring, training, offering exchanges and secondments, and available career paths. Given the decentralized nature of the Canadian intelligence and national security community and the importance of personalities, we find that the management practices of analytical units lack standards in terms of hiring, training, and career paths. This makes beneficial practices, such as exchanges and secondments and/or community interactions and transfers, more difficult. The chapter ends with a case study of the Intelligence Assessment Branch of the Canadian Security Intelligence Service.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Singh, Mayank, Umang Kant, P. K. Gupta et Viranjay M. Srivastava. « Cloud-Based Predictive Intelligence and Its Security Model ». Dans Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 1215–30. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch058.

Texte intégral
Résumé :
Predictive computing is a relatively new area of research. Predictive computing helps people to predict the future or unknown events. It combines various statistical approaches like predictive analytics, predictive modeling, data mining, big data, and machine learning. Predictive computing uses current and historical facts to predict future events. It looks for relationships and patterns between data variables. The outcomes of data variables can be predicted if we know the values of explanatory variables. Cloud computing is another new technology that provides everything-as-a-service (XaaS) and is used widely in various businesses. All storage and computing devices use cloud platform due to its elasticity, scalability, and dynamicity. Cloud-based predictive computing is a technology that uses data available on the cloud. Presently, the data from the social sites (e.g., Facebook, Gmail, LinkedIn, election data, etc.) are stored on cloud, and the volume of this data is enormous which needs innovative predictive computing design and architecture. This chapter represents the cloud-based predictive intelligence and its security model. Architecture for predictive intelligence is proposed and compared with the existing models. An attack prediction algorithm is also proposed and compared for the accuracy in the predictive intelligence.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Singh, Mayank, Umang Kant, P. K. Gupta et Viranjay M. Srivastava. « Cloud-Based Predictive Intelligence and Its Security Model ». Dans Predictive Intelligence Using Big Data and the Internet of Things, 128–43. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6210-8.ch006.

Texte intégral
Résumé :
Predictive computing is a relatively new area of research. Predictive computing helps people to predict the future or unknown events. It combines various statistical approaches like predictive analytics, predictive modeling, data mining, big data, and machine learning. Predictive computing uses current and historical facts to predict future events. It looks for relationships and patterns between data variables. The outcomes of data variables can be predicted if we know the values of explanatory variables. Cloud computing is another new technology that provides everything-as-a-service (XaaS) and is used widely in various businesses. All storage and computing devices use cloud platform due to its elasticity, scalability, and dynamicity. Cloud-based predictive computing is a technology that uses data available on the cloud. Presently, the data from the social sites (e.g., Facebook, Gmail, LinkedIn, election data, etc.) are stored on cloud, and the volume of this data is enormous which needs innovative predictive computing design and architecture. This chapter represents the cloud-based predictive intelligence and its security model. Architecture for predictive intelligence is proposed and compared with the existing models. An attack prediction algorithm is also proposed and compared for the accuracy in the predictive intelligence.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fu, Chao, Shize Zhang, Chao Peng, Meng Sun, Xiaohong Yu, Yu Li et Zhiqing Huang. « A Blockchain-Based Decentralized IoT Sensing as a Service Framework for Smart Supply Chain ». Dans Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230817.

Texte intégral
Résumé :
Smart supply chain services rely on the utilization of massive amount of data collected by sensor networks deployed in different enterprises. Sensing as a Service (S2aaS) is a promising Internet of Things (IoT) business model pattern for data exchange. The current centralized IoT S2aaS models are not suitable for IoT big data exchange due to the issues on privacy disclosure, single point of failure, data security, performance, etc. In this paper, we propose a blockchain-based decentralized framework for IoT S2aaS for smart supply chain, which can ensure the IoT solution owners have full control of their data and securely exchange data with data consumers without intermediaries. We introduce the system model and the layered architecture of our proposed framework, based on which we give a concrete scheme, smart contract is used to perform the whole process of IoT S2aaS. We implement a software prototype on Ethereum. Experiment results show the validity and effectiveness of our proposed solution.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dasari, Kishore Babu, et Srinivas Mekala. « Proactive DDoS Attacks Detection on the Cloud Computing Environment Using Machine Learning Techniques ». Dans Advances in Information Security, Privacy, and Ethics, 318–33. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-9317-5.ch016.

Texte intégral
Résumé :
Distributed Denial of Service (DDoS) is a cyber-attack targeted on availability principle of information security by disrupts the services to the users. Cloud computing is very demand service in internet to provide computing resources. DDoS attack is one of the severe cyber-attack to disrupt the resource unavailable to the legitimate users. So DDoS attack detection is more essential in cloud computing environment to reduce the effect of circumstances of the attack. This Chapter proposed DDoS attack detection with network flow features instead of conventional researchers use network type features in cloud computing environment. This study evaluate the DDoS attack detection in cloud computing environment using uncorrelated network type features selected by Pearson, Spearman and Kendall correlation methods. CIC-DDoS2019 dataset used for experiments this study which is collected from Canadian Institute for Cyber Security. Finally, Pearson uncorrelated feature subset produces .better results with KNN and MLP classification algorithms.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Juneau, Thomas, et Stephanie Carvin. « Governance and Structure ». Dans Intelligence Analysis and Policy Making, 13–44. Stanford University Press, 2021. http://dx.doi.org/10.11126/stanford/9781503613508.003.0002.

Texte intégral
Résumé :
The Canadian intelligence community’s nominal center, the National Security and Intelligence Advisor to the Prime Minister, has limited ability to coordinate the work of the community as a whole, and a limited capacity to coerce and cajole counterparts to work together. This relatively weak central leadership makes it more difficult to manage the activities of the community in a coordinated manner. This contrasts sharply with other national contexts, especially the US, where stronger institutions imply that personalities have a lesser impact on intelligence-policy dynamics. The chapter then examines the impact of structural factors that shape the work of the Canadian intelligence community: dependency on foreign intelligence and lack of a foreign human intelligence service, as well as uncertainty in the face of ongoing reforms and enhanced oversight and review. The chapter concludes with a case study of the Intelligence Assessment Secretariat in the Privy Council Office.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Canadian Security Intelligence Service (Proposed)"

1

Wang, Zhongqing, et Yue Zhang. « DDoS Event Forecasting using Twitter Data ». Dans Twenty-Sixth International Joint Conference on Artificial Intelligence. California : International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/580.

Texte intégral
Résumé :
Distributed Denial of Service (DDoS) attacks have been significant threats to the Internet. Traditional research in cyber security focuses on detecting emerging DDoS attacks by tracing network package flow. A characteristic of DDoS defense is that rescue time is limited since the launch of attack. More resilient detection and defence models are typically more costly. We aim at predicting the likelihood of DDoS attacks by monitoring relevant text streams in social media, so that the level of defense can be adjusted dynamically for maximizing cost-effect. To our knowledge, this is a novel and challenge research question for DDoS rescue. Because the input of this task is a text stream rather than a document, information should be collected both on the textual content of individual posts. We propose a fine-grained hierarchical stream model to capture semantic information over infinitely long history, and reveal burstiness and trends. Empirical evaluation shows that social text streams are indeed informative for DDoS forecasting, and our proposed hierarchical model is more effective compared to strong baseline text stream models and discrete bag-of-words models.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Huiyi, Xia, Nankai Xia et Liu Liu. « Urban living environment assessment index system based on psychological security ». Dans 55th ISOCARP World Planning Congress, Beyond Metropolis, Jakarta-Bogor, Indonesia. ISOCARP, 2019. http://dx.doi.org/10.47472/lvyv5472.

Texte intégral
Résumé :
With the development of urbanization and the continuous development, construction and renewal of the city, the living environment of human beings has also undergone tremendous changes, such as residential community environment and service facilities, urban roads and street spaces, and urban public service formats. And the layout of the facilities, etc., and these are the real needs of people in urban life, but the characteristics of these needs or their problems will inevitably have a certain impact on the user's psychological feelings, thus affecting people's use needs. Then, studying the ways in which urban residents perceive changes in the living environment and how they perceive changes in psychology and emotions will have practical significance and can effectively assist urban management and builders to optimize the living environment of residents. This is also the long-term. One of the topics of greatest interest to urban researchers since then. In the theory of demand hierarchy proposed by American psychologist Abraham Maslow, safety is the basic requirement second only to physiological needs. So safety, especially psychological security, has become one of the basic needs of people in the urban environment. People's perception of the psychological security of the urban environment is also one of the most important indicators in urban environmental assessment. In the past, due to the influence of technical means, the study of urban environmental psychological security often relied on the limited investigation of a small number of respondents. Low-density data is difficult to measure the perceptual results of universality. With the leaping development of the mobile Internet, Internet image data has grown geometrically over time. And with the development of artificial intelligence technology in recent years, image recognition and perception analysis based on machine learning has become possible. The maturity of these technical conditions provides a basis for the study of the urban renewal index evaluation system based on psychological security. In addition to the existing urban visual street furniture data obtained through urban big data collection combined with artificial intelligence image analysis, this paper also proposes a large number of urban living environment psychological assessment data collection strategies. These data are derived from crowdsourcing, and the collection method is limited by the development of cost and technology. At present, the psychological security preference of a large number of users on urban street images is collected by forced selection method, and then obtained by statistical data fitting to obtain urban environmental psychology. Security sense training set. In the future, when the conditions are mature, the brainwave feedback data in the virtual reality scene can be used to carry out the machine learning of psychological security, so as to improve the accuracy of the psychological security data.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Alameldin, Magdi. « Smart Predictive Maintenance Framework SPMF for Gas and Oil Industry ». Dans International Petroleum Technology Conference. IPTC, 2022. http://dx.doi.org/10.2523/iptc-22497-ms.

Texte intégral
Résumé :
Abstract The O&G industry is facing big challenges which consequently raise the necessity for reforming its traditional business model and integrating digital disruptive technologies such as Digital Twins, Artificial Intelligence and Blockchain. A Digital Twin(DT) is defined as a dynamic intelligent digital replica/model of the physical system/process/service/people which enables just-in-time informed decision making and root-cause analysis using AI. DTs are implanted at different levels such as Equipment/Asset Level Twin, System Level Twin, System of Systems (SoS) Level Twin. This research introduces a novel framework which is based on a Smart Secure Digital Twin (S2DT) to bridge the development gap compared to other leading industries such as manufacturing and automotive. The proposed model relies on Tiny Machine Learning (TinyML) to implement edge intelligence and solve the problems of transfer latency and data overload and consequently achieves low carbon footprint. Edge Intelligence (EI) reduces energy consumption and enhances security and perspective maintenance. The Blockchain Technology is used to solve the privacy, and cybersecurity problems [4]. The Extended Reality (XR) will be used to ensure proper training of operators, and industry 5.0 to boost collaboration between human and machine. At the component level, security is maintained by integrated the locally generated intelligence on a blockchain to insure immutability, and enhance security.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sailada, Srikanth, Vineeth Aitipamula, Suresh V et Anil Kumar Gupta. « Intelligent RAN Slicing Orchestration Framework For Healthcare Application in 5G ». Dans Intelligent Human Systems Integration (IHSI 2022) Integrating People and Intelligent Systems. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001005.

Texte intégral
Résumé :
With the increase in the number of internet-connected devices, there is a need to improve reliability, lower latency, higher capacity, more security, and high-speed connectivity. Every application has its performance metrics in terms of QoS parameters. Network slicing enables slicing an extensive broadband network into multiple virtual networks to serve applications more cost-efficiently. With the advancements in Artificial Intelligence (AI), the performance of network decision-making accelerates. In this paper, a dynamic RAN slicing framework is proposed for healthcare applications and a static Radio Access Network slice simulation model is developed by implementing KNN to predict the class. The deep slice data set from the public domain was leveraged to train the model and predict appropriate slice service types for healthcare applications.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Wu, Yanqun, Yang Zhao, Mingxing Liu, Wei Jiang, Qi Chen, Shun Wang et Hao Yan. « Research on Nuclear Safety Video Display Unit Technology Based on Digital Twin ». Dans 2020 International Conference on Nuclear Engineering collocated with the ASME 2020 Power Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/icone2020-16792.

Texte intégral
Résumé :
Abstract The nuclear safety video display unit (SVDU) in the nuclear safety level DCS implements functions such as displaying and warning of reactor safety related parameters and sending safety control instructions, which belongs to safety level 1 equipment. As a high-cost complex safety level display device, due to its high functional complexity, high security and reliability requirements, and special usage scenarios, its design, research, and function verification have always encountered problems such as low intelligence and low digitization, resulting in slow development process, complicated product function verification, and inconvenient use and training, etc. After the SVDU is put into practical use, continuous analysis of its stability, reliability, and safety, and its health status monitoring and maintenance are also difficult technical problems. Based on the five-dimensional digital twin model as a design benchmark, a digital twin-based design method for SVDU is proposed. Taking the SVDU in a nuclear safety level DCS (NASPIC) as the object, the digital twin technology is adopted to model the physical objects such as display unit, human-machine interface unit, storage unit and communication network unit, and the high-speed industrial Ethernet network is used to map and interconnect the data between the components, so as to realize the physical fusion, model fusion and data fusion of the real SVDU and the virtual SVDU. With the help of data feedback from safety level DCS, the data, symbol display and control process of SVDU can be visualized and analyzed in virtual environment, and the real-time control function verification, fault early warning and auxiliary decision-making can be carried out, which improves the visibility, accessibility, operability and predictability of real SVDU display and control process. The real-time data, historical data, fault self-diagnosis data, and expert experience of real SVDU and virtual SVDU are incorporated into the twin data pool to reproduce the variable-speed replay of the historical operation process of SVDU and realize the post-accident condition analysis with multiple spatiotemporal dimensions; the record and analysis of self-fault diagnosis data provides the possibility of stability analysis services such as clock, power supply, human-machine input, and storage equipment, etc. Digital twin-based SVDU technology can ensure rapid development and iteration of products under the requirements of complex functions and high safety and reliability, and truly reproduce the display and control effects of SVDU, while meeting users’ multiple application scenarios and data service requirements.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie