895 resultados para Realistic threat


Relevância:

20.00% 20.00%

Publicador:

Resumo:

[EN]In previous works, many authors have widely used mass consistent models for wind field simulation by the finite element method. On one hand, we have developed a 3-D mass consistent model by using tetrahedral meshes which are simultaneously adapted to complex orography and to terrain roughness length. In addition, we have included a local refinement strategy around several measurement or control points, significant contours, as for example shorelines, or numerical solution singularities. On the other hand, we have developed a 2.5-D model for simulating the wind velocity in a 3-D domain in terms of the terrain elevation, the surface temperature and the meteorological wind, which is consider as an averaged wind on vertical boundaries...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nel mondo della sicurezza informatica, le tecnologie si evolvono per far fronte alle minacce. Non è possibile prescindere dalla prevenzione, ma occorre accettare il fatto che nessuna barriera risulterà impenetrabile e che la rilevazione, unitamente ad una pronta risposta, rappresenta una linea estremamente critica di difesa, ma l’unica veramente attuabile per poter guadagnare più tempo possibile o per limitare i danni. Introdurremo quindi un nuovo modello operativo composto da procedure capaci di affrontare le nuove sfide che il malware costantemente offre e allo stesso tempo di sollevare i comparti IT da attività onerose e sempre più complesse, ottimizzandone il processo di comunicazione e di risposta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ein durchgängiger Befund internationaler Schulleistungsvergleichsstudien bezieht sich auf die niedrigere Lesekompetenz von Jungen im Vergleich zu Mädchen (OECD, 2010). Ziel der vorliegenden Arbeit war, zu prüfen, welchen Einfluss negative Stereotype – im Sinne der Stereotype Threat-Theorie (Steele & Aronson, 1995) – auf die Leseleistung von Jungen haben. Basierend auf Befunden aus der Lese- und Stereotype Threat-Forschung wurde ein Mediator-Moderator-Modell des Stereotype Threat-Effekts (vgl. Schmader, Johns & Forbes, 2008) auf die Leseleistung von Jungen abgeleitet und überprüft. Um diese Fragestellungen zu beantworten, wurden zwei quasiexperimentelle Untersuchungen mit Schülern achter und neunter Klassen durchgeführt. An der ersten Untersuchung nahmen insgesamt 167 Schüler (n = 69 Jungen, n = 98 Mädchen) zweier Gymnasien in privater Trägerschaft teil. Um die Fragestellungen an einer weniger selektiven Stichprobe untersuchen zu können, erfolgte eine zweite Untersuchung mit Schülern (N = 441) öffentlicher Schulen und verschiedener Schulformen, wobei der Fokus ausschließlich auf den männlichen Schülern (n = 188 Jungen; n = 122 Gymnasiasten, n = 66 Realschüler plus) lag. Für beide Experimente kann zusammenfassend festgehalten werden, dass sich, entgegen der Erwartungen, kein leistungsmindernder Stereotype Threat-Effekt auf die Leseleistung von Jungen zeigte. Ferner konnten keine signifikante Mediatoren und Moderatoren eines leistungsmindernden Stereotype Threat-Effekts auf die Leseleistung von Jungen identifiziert werden. Ziel zukünftiger Forschung muss sein, den Einfluss negativer Stereotype auf die Leistungen männlicher Probanden im Sinne von Mitgliedern dominanter Gruppen zu untersuchen. Besonderes Augenmerk sollte auf die stereotypisierte Fähigkeitsdomäne gelegt werden. Weiterhin ist wichtig, der Frage nach zugrunde liegenden Prozessen und Voraussetzungen für das Erleben von Stereotype Threat nachzugehen. Studien weisen darauf hin, dass unterschiedlich stigmatisierte Gruppen unterschiedlich auf Stereotype Threat reagieren. Daher sollte der Fokus zukünftiger Forschung darauf liegen, die Prozesse und Voraussetzungen näher zu untersuchen, die für Mitglieder sonst positiv stereotypisierter Gruppen in solchen Situationen zum Tragen kommen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Il Cryptolocker è un malware diffuso su scala globale appartenente alla categoria ransomware. La mia analisi consiste nel ripercorrere le origini dei software maligni alla ricerca di rappresentanti del genere con caratteristiche simili al virus che senza tregua persevera a partire dal 2013: il Cryptolocker. Per imparare di più sul comportamento di questa minaccia vengono esposte delle analisi del malware, quella statica e quella dinamica, eseguite sul Cryptolocker (2013), CryptoWall (2014) e TeslaCrypt (2015). In breve viene descritta la parte operativa per la concezione e la configurazione di un laboratorio virtuale per la successiva raccolta di tracce lasciate dal malware sul sistema e in rete. In seguito all’analisi pratica e alla concentrazione sui punti deboli di queste minacce, oltre che sugli aspetti tecnici alla base del funzionamento dei crypto, vengono presi in considerazione gli aspetti sociali e psicologici che caratterizzano un complesso background da cui il virus prolifica. Vengono confrontate fonti autorevoli e testimonianze per chiarire i dubbi rimasti dopo i test. Saranno questi ultimi a confermare la veridicità dei dati emersi dai miei esperimenti, ma anche a formare un quadro più completo sottolineando quanto la morfologia del malware sia in simbiosi con la tipologia di utente che va a colpire. Capito il funzionamento generale del crypto sono proprio le sue funzionalità e le sue particolarità a permettermi di stilare, anche con l’aiuto di fonti esterne al mio operato, una lista esauriente di mezzi e comportamenti difensivi per contrastarlo ed attenuare il rischio d’infezione. Vengono citati anche le possibili procedure di recupero per i dati compromessi, per i casi “fortunati”, in quanto il recupero non è sempre materialmente possibile. La mia relazione si conclude con una considerazione da parte mia inaspettata: il potenziale dei crypto, in tutte le loro forme, risiede per la maggior parte nel social engineering, senza il quale (se non per certe categorie del ransomware) l’infezione avrebbe percentuali di fallimento decisamente più elevate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The risk of transmission of pathogens from free-ranging wild boars (Sus scrofa scrofa) to outdoor domestic pigs (S. scrofa domesticus) is of increasing concern in many European countries. We assess this risk, using Switzerland as an example. We estimated 1) the prevalence of important pathogens in wild boars and 2) the risk of interactions between wild boars and outdoor pigs. First, we tested 252 wild boars from selected areas between 2008 and 2010 for infection with Brucella spp. Bacterial prevalence was estimated to 28.8% (confidence interval [CI] 23.0-34.0) when using bacterial culture (B. suis Biovar 2) and real-time polymerase chain reaction. Antibody prevalence was 35.8% (CI 30.0-42.0), which was significantly higher than in previous studies in Switzerland. We also tested 233 wild boars for porcine reproductive and respiratory syndrome virus (PRRSV). Antibody prevalence was 0.43% (CI 0.01-2.4) for EU-PRRSV and real-time reverse transcription polymerase chain reaction results were negative. These findings suggest that B. suis is increasingly widespread in wild boars and PRRSV is currently not of concern. Second, we documented the spatial overlap between free-ranging wild boars and outdoor piggeries by mapping data on their respective occurrence. Wild boars are most widespread in the mountain range along the western and northern Swiss borders, while most piggeries are located in central lowlands. A risk of interaction is mainly expected at the junction between these two bioregions. This risk may increase if wild boars expand eastward and southward beyond anthropogenic barriers believed to limit their range. Therefore, we evaluated the potential of expansion of the wild boar population. Population trends suggest a continuous increase of wild boars for the past 15 yr. Surveillance of selected wildlife passages using cameras on highways and main roads indicates that these barriers are permeable (average of up to 13 wild boar crossings per 100 days). Thus an increase of wild boar range should be considered. There may be a risk of B. suis spillover from wild boars in Switzerland, which could increase in the future. Data on the occurrence of interactions between pigs and wild boars are needed to assess this risk.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background For reliable assessment of ventilation inhomogeneity, multiple-breath washout (MBW) systems should be realistically validated. We describe a new lung model for in vitro validation under physiological conditions and the assessment of a new nitrogen (N2)MBW system. Methods The N2MBW setup indirectly measures the N2 fraction (FN2) from main-stream carbon dioxide (CO2) and side-stream oxygen (O2) signals: FN2 = 1−FO2−FCO2−FArgon. For in vitro N2MBW, a double chamber plastic lung model was filled with water, heated to 37°C, and ventilated at various lung volumes, respiratory rates, and FCO2. In vivo N2MBW was undertaken in triplets on two occasions in 30 healthy adults. Primary N2MBW outcome was functional residual capacity (FRC). We assessed in vitro error (√[difference]2) between measured and model FRC (100–4174 mL), and error between tests of in vivo FRC, lung clearance index (LCI), and normalized phase III slope indices (Sacin and Scond). Results The model generated 145 FRCs under BTPS conditions and various breathing patterns. Mean (SD) error was 2.3 (1.7)%. In 500 to 4174 mL FRCs, 121 (98%) of FRCs were within 5%. In 100 to 400 mL FRCs, the error was better than 7%. In vivo FRC error between tests was 10.1 (8.2)%. LCI was the most reproducible ventilation inhomogeneity index. Conclusion The lung model generates lung volumes under the conditions encountered during clinical MBW testing and enables realistic validation of MBW systems. The new N2MBW system reliably measures lung volumes and delivers reproducible LCI values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Predicting the behavior of phobic patients in a confrontational situation is challenging. While avoidance as a major clinical component of phobias suggests that patients orient away from threat, findings based on cognitive paradigms indicate an attentional bias towards threat. Here we present eye movement data from 21 spider phobics and 21 control subjects, based on 3 basic oculomotor tasks and a visual exploration task that included close-up views of spiders. Relative to the control group, patients showed accelerated reflexive saccades in one of the basic oculomotor tasks, while the fear-relevant exploration task evoked a general slowing in their scanning behavior and pronounced oculomotor avoidance. However, this avoidance strongly varied within the patient group and was not associated with the scores from spider avoidance-sensitive questionnaire scales. We suggest that variation of oculomotor avoidance between phobics reflects different strategies of how they cope with threat in confrontational situations.