924 resultados para Threat categories


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation examines novels that use terrorism to allegorize the threatened position of the literary author in contemporary culture. Allegory is a term that has been differently understood over time, but which has consistently been used by writers to articulate and construct their roles as authors. In the novels I look at, the terrorist challenge to authorship results in multiple deployments of allegory, each differently illustrating the way that allegory is used and authorship constructed in the contemporary American novel. Don DeLillo’s Mao II (1991), first puts terrorists and authors in an oppositional pairing. The terrorist’s ability to traffic in spectacle is presented as indicative of the author’s fading importance in contemporary culture and it is one way that terrorism allegorizes threats to authorship. In Philip Roth’s Operation Shylock (1993), the allegorical pairing is between the text of the novel and outside texts – newspaper reports, legal cases, etc. – that the novel references and adapts in order to bolster its own narrative authority. Richard Powers’s Plowing the Dark (1999) pairs the story of an imprisoned hostage, craving a single book, with employees of a tech firm who are creating interactive, virtual reality artworks. Focusing on the reader’s experience, Powers’s novel posits a form of authorship that the reader can take into consideration, but which does not seek to control the experience of the text. Finally, I look at two of Paul Auster’s twenty-first century novels, Travels in the Scriptorium (2007) and Man in the Dark (2008), to suggest that the relationship between representations of authors and terrorists changed after 9/11. Auster’s author-figures forward an ethics of authorship whereby novels can use narrative to buffer readers against the portrayal of violent acts in a culture that is suffused with traumatizing imagery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Based on the concept of the triple basic structure of human communication by Poyatos (1994a, 1994b) and on the analytical and theoretical implications that derive from this, the present paper conceives the human communication as an indivisible whole in which verbal communication can not be separated from body behavior. This paper analyzes nonverbal categories used in oral communication. The corpus consists of an oral narration in Galician from which we highlighted certain kinemes (minimum units of body movement with meaning) by using the model proposed by Bouvet (2001), in order to explain the non-verbal categories with examples taken from said recordings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

If C is a stable model category with a monoidal product then the set of homotopy classes of self-maps of the unit forms a commutative ring, [S,S]C. An idempotent e of this ring will split the homotopy category: [X,Y]C≅e[X,Y]C⊕(1−e)[X,Y]C. We prove that provided the localised model structures exist, this splitting of the homotopy category comes from a splitting of the model category, that is, C is Quillen equivalent to LeSC×L(1−e)SC and [X,Y]LeSC≅e[X,Y]C. This Quillen equivalence is strong monoidal and is symmetric when the monoidal product of C is.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model (PBSM) for Android does not address this threat, as it is rather limited to mitigating risks due to individual apps. This paper presents a technique for assessing the threat of collusion for apps, which is a first step towards quantifying collusion risk, and allows us to narrow down to candidate apps for collusion, which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29000 Android apps provided by Intel Security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However, as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks. This paper focuses on the classification of normal and threat patterns on an IoT Network. The ANN procedure is validated against a simulated IoT network. The experimental results demonstrate 99.4% accuracy and can successfully detect various DDoS/DoS attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aspergillus fumigatus is one of the major ubiquitous saprophytic fungi and it is considered one of the fungal species with higher clinical relevance. This study aimed at characterising the prevalence of A. fumigatus complex in one waste-sorting plant and also in one incineration plant. Conventional and molecular methodologies were applied in order to detect its presence. Aspergillus fumigatus complex was the second most frequently found in the air from the waste-sorting plant (16.0%) and from the incineration plant (18.0%). Regarding surfaces, it ranked the third species most frequently found in the waste-sorting plant (13.8%) and the second in the incineration plant (22.3%). In the waste-sorting plant, it was possible to amplify by qPCR DNA from the A. fumigatus complex in all culture-positive sampling sites plus one other sampling site that was negative by culture analysis. Considering the observed fungal load, it is recommended to apply preventive and protective measures in order to avoid or minimise worker's exposure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Languages based upon binary relations offer an appealing setting for constructing programs from specifications. For example, working with relations rather than functions allows specifications to be more abstract (for example, many programs have a natural specification using the converse operator on relations), and affords a natural treatment of non-determinism in specifications. In this paper we present a novel pictorial interpretation of relational terms as simple pictures of circuits, and a soundness/completeness result that allows relational equations to be proved by pictorial reasoning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The topic of this thesis is the application of distributive laws between comonads to the theory of cyclic homology. The work herein is based on the three papers 'Cyclic homology arising from adjunctions', 'Factorisations of distributive laws', and 'Hochschild homology, lax codescent,and duplicial structure', to which the current author has contributed. Explicitly, our main aims are: 1) To study how the cyclic homology of associative algebras and of Hopf algebras in the original sense of Connes and Moscovici arises from a distributive law, and to clarify the role of different notions of bimonad in this generalisation. 2) To extend the procedure of twisting the cyclic homology of a unital associative algebra to any duplicial object defined by a distributive law. 3) To study the universality of Bohm and Stefan’s approach to constructing duplicial objects, which we do in terms of a 2-categorical generalisation of Hochschild (co)homology. 4) To characterise those categories whose nerve admits a duplicial structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The discovery of the Red Imported Fire ants (Solenopsis invicta) in Brisbane on 22 February 2001 sent shock waves through urban and rural communities alike. This article is an attempt to address the often repeated question ‘What will become of Australia's unique fauna if they spread along Australia's eastern seaboard?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O trabalho foi realizado no Parque Natural Municipal Corredores da Biodiversidade (PNMCBio), em Sorocaba -SP, com o objetivo de avaliar a composição florística do componente arbóreo e o estágio sucessional de uma área de floresta nativa de aproximadamente 31 hectares. Para tanto, foram alocadas 64 parcelas de tamanho 10 x 10 m, distribuídas aleatoriamente na área, sendo coletados todos os indivíduos com CAP igual ou maior que 15 cm. Estimou-se a diversidade por meio do índice de diversidade de Shannon (H’) e a equabilidade por meio do índice de Pielou (J’). As espécies foram caracterizadas nos grupos sucessionais, síndrome de dispersão, categorias de ameaça, amplitude de distribuição e indicadoras do estágio de regeneração. Foram amostrados 1088 indivíduos, distribuídos em 79 espécies, 54 gêneros e 29 famílias, sendo o H’ estimado em 3,421 e o J’ em 0,78, valores próximos aos encontrados em outras áreas de formações vegetacionais similares. Foram identificadas quatro espécies ameaçadas de extinção, 11 espécies endêmicas da Mata Atlântica e duas espécies restritas à Floresta Estacional Semidecidual no domínio da Mata Atlântica. O fragmento encontra-se em estágio médio de regeneração, sendo de suma importância sua conservação e manejo para a manutenção da biodiversidade local e regional.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ein Verständnis von Demokratie als „stets im Kommen oder im Werden“ schließt fort- und immerwährende Verhandlungsprozesse mit ein. Das Ausbleiben von Konflikten oder die Versuche des Einebnens und Nivellierens von Widersprüchen oder gar deren Negation sind dann Indizien der Gefährdung von Demokratisierung und gesamtgesellschaftlicher Entwicklungsmöglichkeiten. Der vorliegende Beitrag betont die Bedeutung von Widerständigkeit für Demokratisierung. Der vorgestellte Ansatz der Reflexion auf Unterscheidungen - un/doing difference - verabschiedet die stillschweigende Vorstellung, dass es vorab feststehende und gegebene Individuen oder Gruppen mit bestimmten Eigenschaften gibt, an die unterschiedliche Angebote und Interventionen gerichtet werden können. Es ist eine differenzsensible Herangehensweise, die latente Unterschiede aufgreift und ihnen im Handeln - im Sinne von Ungleichheiten - Bedeutung verleiht. Den Abschluss des Beitrages bilden vier Strategien im Kontext politischer Bildungsarbeit, um Pluralität und Kontingenz sichtbar zu machen: Pluralisierung und Konkurrenz ermöglichen; Löschung durch Nichtbeachten; ironische Entlarvung von Selbstverständlichkeitsannahmen; eingeführte Kategorien stehen lassen und zugleich Alternativen fördern. (DIPF/Orig.)