979 resultados para panic attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Time period analysis was used in an international sample of clients ( N = 106) to demonstrate that cognitive - behavioral therapy (CBT) for panic disorder is associated with specific changes in both negative and positive cognitions during the treatment period. In the first 6 weeks of the treatment phase, working alliance failed to predict changes in panic severity, whereas changes in panic self-efficacy and catastrophic misinterpretation of bodily sensations predicted rapid symptom relief. In the last 6 weeks of treatment, higher doses of CBT were associated with further changes in positive and negative cognitions. The findings can be interpreted as suggesting that the role of the working alliance in CBT for panic disorder is to facilitate cognitive change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the differential role of negative and positive cognitions in mediating treatment outcome in CBT for Panic Disorder through comparison of a Standard CBT (n = 36) versus a Waitlist Condition (n = 24). Regression analyses indicated that, relative to the Waitlist Condition, patients in the Standard CBT condition reported significantly greater shifts both towards higher panic self-efficacy and lower catastrophic misinterpretation of bodily sensations during treatment, as well as a significantly lower level of panic severity at posttreatment. Changes in catastrophic misinterpretation of bodily sensations and panic self-efficacy contributed significantly more to prediction of panic severity than did assignment to either Standard CB T or a Waitlist Condition. Results are discussed in terms of the importance of including both negative and positive cognitions in demonstrating cognitive mediation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous studies have shown that an internet delivered indicated prevention program for panic disorder can be effective. However, those studies were done with select populations. Most individuals who are at risk for panic disorder present to hospital emergency rooms and primary care settings. This paper reports on a study currently being undertaken in Scotland where the program is being trialed in primary care. The intervention and experimental design will be described. However the key research question is whether General Practitioners will make use of the internet-based intervention system. Preliminary results will be reported. The results of the study will have implications for the way that primary care is recruited into the prevention of mental health problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security and reliability of a class of public-key cryptosystems against attacks by unauthorized parties, who had acquired partial knowledge of one or more of the private key components and/or of the message, were discussed. The standard statistical mechanical methods of dealing with diluted spin systems with replica symmetric considerations were analyzed. The dynamical transition which defined decryption success in practical situation was studied. The phase diagrams which showed the dynamical threshold as a function of the partial acquired knowledge of the private key were also presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an agent's critical data to a value that is meaningless to the malicious host. The effectiveness of the obfuscation algorithm is enhanced by addition of noise code. The second approach consists of a mechanism that is able to protect the integrity of the agent using state information, recorded during the agent execution process in a remote host environment, to detect a manipulation attack by a malicious host. Both approaches are implemented using a master-slave agent architecture that operates on a distributed migration pattern. Two sets of experimental test were conducted. The first set of experiments measures the migration and migration+computation overheads of the itinerary and distributed migration patterns. The second set of experiments is used to measure the security overhead of the proposed approaches. The protection of the agent is assessed by analysis of its effectiveness under known attacks. Finally, an agent-based application, known as Secure Flight Finder Agent-based System (SecureFAS) is developed, in order to prove the function of the proposed approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89 information attacks, joined in 33 groups and 73 methods of compression, joined in 10 groups are described in the paper. Experimental, expert, possible and real relations between attacks’ groups, method’ groups and objects’ groups are determined by means of matrix transformations and the respective maximum and potential sets are defined. At the end assessments and conclusions for future investigation are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.