New Search

If you are not happy with the results below please do another search

97 search results for: data protection

61

The security challenges of open IT systems

In today’s society, IT security systems are seriously put to the test: cloud data storage, the omnipresence of micro chips, social networking… Not only does constant communication via networks expose cryptographic systems to multitudes of threatening connections, but security mechanisms must also now function on devices with weak computing capacity, such as mobile phones. The […]

62

Protecting sensitive sites: AI in radar systems

Radar systems are safe and durable, and used for both detection and surveillance. However, they deliver signals, not images, which can be difficult to interpret. Using artificial intelligence to complement current algorithms offers a technological solution to this problem. The RadaR-IO laboratory, shared by IMT Mines Albi and the company EPSI, is looking to develop and industrialize this solution.

63

Good RESOH-lutions for nuclear power

The RESOH Chair’s mission is to address safety and performance issues from a socio-organizational perspective. For its third term, the Chair will have a special focus on the issue of skills and facilitating the use of research results by its partners. This research and teaching project led by IMT Atlantique closely analyzes work activities and the dynamics surrounding “safe performance” in high-risk industries, particularly the nuclear sector.

65

Smart masks to analyze humidity and respiration

Surgical masks were widely used during the Covid-19 pandemic. To assess their effectiveness in real time, scientists at Mines Saint-Étienne have developed a smart mask, a device that collects data on the humidity of the mask and the wearer’s respiration. Moisture retention is often considered a factor that reduces mask filtration. For example, the WHO […]

66

Side Channel Attacks: How to exploit vulnerabilities of processors?

Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work and give suggestions to improve computer security. What are the motivations that can lead to side channel attacks? Maria Mushtaq: A side-channel attack is a […]

67

Governments, banks, and hospitals: all victims of cyber-attacks

Hervé Debar, Télécom SudParis – Institut Mines-Télécom Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000 computers connected to the Internet at the time. Published back in 1989, the novel The Cuckoo’s Egg was based on a […]

69

Decision support tools for maritime accident management

The European MANIFESTS project, launched in January, is a two-year project bringing together a consortium of nine research institutions and public administrations with complementary expertise in managing maritime accidents. Funded by the European Commission, this project aims to improve responses to emergencies related to these accidents. An interview with Laurent Aprin, a researcher at IMT Mines […]

70

Covid-19: putting the figures into perspective

Since the start of the Covid-19 crisis we have developed a unique relationship with the abundance of figures reflecting the current state of affairs. They are used as indicators to describe the trends in the pandemic and serve to make major political decisions. Valérie Charolles, a researcher in philosophy at Institut Mines-Télécom Business School, explains […]