3 resultados para 090602 Control Systems Robotics and Automation
Resumo:
Objectives: Elevated shame and dissociation are common in dissociative identity disorder (DID) and chronic posttraumatic stress disorder (PTSD) and are part of the constellation of symptoms defined as complex PTSD. Previous work examined the relationship between shame, dissociation, and complex PTSD and whether they are associated with intimate relationship anxiety, relationship depression, and fear of relationships. This study investigated these variables in traumatized clinical samples and a nonclinical community group.
Method: Participants were drawn from the DID (n = 20), conflict-related chronic PTSD (n = 65), and nonclinical (n = 125) populations and completed questionnaires assessing the variables of interest. A model examining the direct impact of shame and dissociation on relationship functioning, and their indirect effect via complex PTSD symptoms, was tested through path analysis.
Results: The DID sample reported significantly higher dissociation, shame, complex PTSD symptom severity, relationship anxiety, relationship depression, and fear of relationships than the other two samples. Support was found for the proposed model, with shame directly affecting relationship anxiety and fear of relationships, and pathological dissociation directly affecting relationship anxiety and relationship depression. The indirect effect of shame and dissociation via complex PTSD symptom severity was evident on all relationship variables.
Conclusion: Shame and pathological dissociation are important for not only the effect they have on the development of other complex PTSD symptoms, but also their direct and indirect effects on distress associated with relationships.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.