933 resultados para Terrorist attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter aims to discuss the relationship between femininity and representations of women involved in violence, focussing on visual representations. Miranda Alison has made the point that the repeated necessity to qualify the term 'combatant' with the descriptor 'female' draws attention to how women soldiers, female freedom fighters, female suicide bombers and female terrorists are exceptional figures. That the female combatant or the female terrorist is an aberration or a deviation from a masculine norm is undermined by the lengthy history of women as warriors, fighters, and terrorists. In that sense it is not so much that fighting women are rare but that there is amnesia within cultural memories concerning the woman fighter. However, in representations of conflict, the dominant image associated with femininity is passive; that is as the defenceless and the defended, or as the allegory of peace. Moreover, representations of men in wars as defeated or wounded means feminising such figures. Miriam Cooke, in her Women and the War Story, 1996, points out how a mythic war story provides men with political roles, in the politikon or public arena, whereas women are domesticated in the space of the oikon. In the mythic war story women may function as Mater Dolorosa, Patriotic Mother or Spartan Mother. It follows then that there are conditions in which it is permissible to represent women fighting on behalf of their children or in defence of the home, and in the absence of men. These images are also found in wider culture: Sarah Connor in Terminator or Ripley in Alien, for example. Images of the female terrorist raise new issues but I want to argue that it is also the case that discussing femininity and the terrorist must involve relating such imagery to representations of the female warrior over a longer timespan. Some questions have shifted since the late twentieth century. Dating from the early 1990s, most Western nations increasingly incorporated women into combat roles within their armed forces. This paper will aim to unpick some of the intricate connections between the increasing presence of women in the armed forces, what relationship this has to emancipation and the participation of women in violence classed as terrorist.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What are the main causes of international terrorism? Despite the meticulous examination of various candidate explanations, existing estimates still diverge in sign, size, and significance. This article puts forward a novel explanation and supporting evidence. We argue that domestic political instability provides the learning environment needed to successfully execute international terror attacks. Using a yearly panel of 123 countries over 1973–2003, we find that the occurrence of civil wars increases fatalities and the number of international terrorist acts by 45%. These results hold for alternative indicators of political instability, estimators, subsamples, subperiods, and accounting for competing explanations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We assess the robustness of previous findings on the determinants of terrorism. Using extreme bound analysis, the three most comprehensive terrorism datasets, and focusing on the three most commonly analyzed aspects of terrorist activity, i.e., location, victim, and perpetrator, we re-assess the effect of 65 proposed correlates. Evaluating around 13.4 million regressions, we find 18 variables to be robustly associated with the number of incidents occurring in a given country-year, 15 variables with attacks against citizens from a particular country in a given year, and six variables with attacks perpetrated by citizens of a particular country in a given year.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accuracy can be enhanced, but traditional sum-rule based fusion algorithms are known to be highly sensitive to single spoofed instances. This paper investigates 1-median filtering as a spoofing-resistant generalised alternative to the sum-rule targeting the problem of partial multibiometric spoofing where m out of n biometric sources to be combined are attacked. Augmenting previous work, this paper investigates the dynamic detection and rejection of livenessrecognition pair outliers for spoofed samples in true multi-modal configuration with its inherent challenge of normalisation. As a further contribution, bootstrap aggregating (bagging) classifiers for fingerprint spoof-detection algorithm is presented. Experiments on the latest face video databases (Idiap Replay- Attack Database and CASIA Face Anti-Spoofing Database), and fingerprint spoofing database (Fingerprint Liveness Detection Competition 2013) illustrate the efficiency of proposed techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainable methods are required to protect newly planted tree seedlings from insect herbivore attack. To this end, here Norway spruce (Picea abies (L.) Karst.) seeds were treated with 2.5 mM nicotinamide (NIC), 2.5 mM nicotinic acid (NIA), 3 mM jasmonic acid (JA) or 0.2 mM 5-azacytidine (5-Aza), and 6-month-old seedlings grown from these seeds were planted at a reforestation area in central Sweden. Attack by pine weevils (Hylobius abietis) was reduced by 50 per cent by NIC treatment, 62.5 per cent by JA treatment and 25 per cent by 5-Aza treatment, when compared with seedlings grown from untreated seeds. Watering 18-month-old spruce seedlings with 2 mM NIC or 2 mM NIA did reduce attack during the first season in the field by 40 and 53 per cent, respectively, compared with untreated plants. Girdling was also reduced by the different treatments. Analysis of conifer seedlings treated with 5-Aza points at a possible involvement of epigenetic mechanisms in this defensive capacity. This is supported by a reduced level of DNA methylation in the needles of young spruce seedlings grown in a greenhouse from NIC-treated seeds. Seed treatment for seedling defense potentiation is simple, inexpensive and also a new approach for forestry with many potential applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently a number of highly publicised incidents of Distributed Denial of Service (DDoS) attacks have made people aware of the importance of providing available securely the grids’ data and services to users. This paper introduces the vulnerability of grids to DDoS attacks, and proposes a distributed defense system that has a mixture deployment of sub-systems to protect grids from DDoS attacks. According to the simulation experiments, this system is effective to defend grids against attacks. It can avoid overall network congestion and provide more resources to legitimate grid users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent algebraic attacks on LFSR-based stream ciphers and S-boxes have generated much interest as they appear to be extremely powerful. Theoretical work has been developed focusing around the Boo- lean function case. In this paper, we generalize this theory to arbitrary finite fields and extend the theory of annihilators and ideals introduced at Eurocrypt 2004 by Meier, Pasalic and Carlet. In particular, we prove that for any function f in the multivariate polynomial ring over GF(q), f has a low degree multiple precisely when two low degree functions appear in the same coset of the annihilator of f q – 1 – 1. In this case, many such low degree multiples exist.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can discover the attacks more timely from both source end and victim end, fight the attacks with more resources and take advantage of more flexible strategies. This paper investigates 7 distributed defense systems which make use of various strategies to mitigate the DDoS attacks. Different architectures are designed in these 7 systems to provide distributed DDoS defense solutions. We evaluate these systems in terms of deployment, detection, response, security, robustness and implementation. For each criteria, we give a recommendation on which technologies are best suitable for a successful distributed defense system based on the analysis result. Finally we propose our idea on the design of an effective distributed defense system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays Distributed Denial of Service (DDoS) attacks have made one of the most serious threats to the information infrastructure. In this paper we firstly present a new filtering approach, Mark-Aided Distributed Filtering (MADF), which is to find the network anomalies by using a back-propagation neural network, deploy the defense system at distributed routers, identify and filtering the attack packets before they can reach the victim; and secondly propose an analytical model for the interactions between DDoS attack party and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. According to the experimental results, we find that MADF can detect and filter DDoS attack packets with high sensitivity and accuracy, thus provide high legitimate traffic throughput and low attack traffic throughput. Through the comparison between experiments and numerical results, we also demonstrate the validity of the analytical model that can precisely estimate the effectiveness of a DDoS defense system before it encounters different attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high-profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment mixture of sub-systems to protect web applications from DDoS attacks. According to the simulation experiments, this system is effective in that it is able to defend web applications against attacks. It can avoid overall network congestion and provide more resources to legitimate web users.

Relevância:

20.00% 20.00%

Publicador: