6 resultados para VULNERABILITIES

em Aston University Research Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims to help local partners understand their role and the contributions they can make to reducing the vulnerability of crowded places at risk to terrorist attack by incorporating counter terrorist protective security advice into their existing work to improve community safety. Provides advice about how risk will be assessed and local performance managed and explains the roles of key partners in delivering reductions in the vulnerabilities of crowded places to terrorist attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

International Relations remains faithful to its rationalist roots focusing on instrumental forms of power and authority to address global problems and, in the process, fail to acknowledge a sense of vulnerability permeating the global community. This book challenges such assumptions establishing an account of international politics that draws on the ethical assumptions of agonism. it highlights the inherent struggle associated with individual and community based engagement to address this struggle. While it does not offer one single mode of engagement to overcome vulnerability per se, it hopes to elicit a series of reactions, on the part of the reader, provoking grater reflection on the nature of such shared vulnerabilities thereby challenging the dominance of rationalist assumptions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The principal aim of this chapter is to undertake a critical review of the social and environmental accountability of global business activities in developing countries. While global business activities have contributed to the economic development of developing countries they have many adverse social and environmental consequences which are often under-studied. I explore the role of accounting in making those consequences visible. The chapter, however, concludes that while social and environmental accounting has the potential to raise the visibility of social and environmental impacts of corporate activities it often fails to do so particularly under the current voluntary disclosure regime where corporations can choose what to report and how to report. This is even more pronounced in the developing countries because of their vulnerabilities arising from various social and environmental problems. The chapter argues for a case of ‘surrogate accountability’ as an alternative to the current corporate driven form of accountability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with quality of service (QoS) requirements. As more services are delivered over the Internet, we face increasing risk to their availability given that malicious attacks on those Internet services continue to increase. Several networks have witnessed denial of service (DoS) and distributed denial of service (DDoS) attacks over the past few years which have disrupted QoS of network services, thereby violating the Service Level Agreement (SLA) between the client and the Internet Service Provider (ISP). Hence DoS or DDoS attacks are major threats to network QoS. In this paper we survey techniques and solutions that have been deployed to thwart DoS and DDoS attacks and we evaluate them in terms of their impact on network QoS for Internet services. We also present vulnerabilities that can be exploited for QoS protocols and also affect QoS if exploited. In addition, we also highlight challenges that still need to be addressed to achieve end-to-end QoS with recently proposed DoS/DDoS solutions. © 2010 John Wiley & Sons, Ltd.