703 resultados para TERRORIST ATTACKS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Threatening intrusive images are central to posttraumatic stress disorder. It has been suggested that intrusive imagery in the context of a sense of threat leads to the development and persistence of posttraumatic stress symptoms. This study investigates London school children's (N = 76; age 10-11 years) self-reported posttraumatic stress symptoms in response to viewing the attacks of September 11, 2001 on television. Assessments were made at two time points. A minority of participants reported moderate-severe symptoms with functional impairment at 2 months (14.5%) and 6 months (9.2%) after viewing the September 11events. After controlling for symptom stability, persistent symptoms were associated with peri-traumatic factors, notably perceiving that one's life was in danger. The combined effect of intrusive imagery and peri-traumatic life threat was associated with symptom persistence. Assessments of intrusive image content via checklist and free-report indicated that the images were directly related to September 11 and were fairly stable over time. Implications for treating children's intrusive images following stressful events are explored. (C) 2007 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper represents the first step in an on-going work for designing an unsupervised method based on genetic algorithm for intrusion detection. Its main role in a broader system is to notify of an unusual traffic and in that way provide the possibility of detecting unknown attacks. Most of the machine-learning techniques deployed for intrusion detection are supervised as these techniques are generally more accurate, but this implies the need of labeling the data for training and testing which is time-consuming and error-prone. Hence, our goal is to devise an anomaly detector which would be unsupervised, but at the same time robust and accurate. Genetic algorithms are robust and able to avoid getting stuck in local optima, unlike the rest of clustering techniques. The model is verified on KDD99 benchmark dataset, generating a solution competitive with the solutions of the state-of-the-art which demonstrates high possibilities of the proposed method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Under the framework of the European Union Funded SAFEE project(1), this paper gives an overview of a novel monitoring and scene analysis system developed for use onboard aircraft in spatially constrained environments. The techniques discussed herein aim to warn on-board crew about pre-determined indicators of threat intent (such as running or shouting in the cabin), as elicited from industry and security experts. The subject matter experts believe that activities such as these are strong indicators of the beginnings of undesirable chains of events or scenarios, which should not be allowed to develop aboard aircraft. This project aimes to detect these scenarios and provide advice to the crew. These events may involve unruly passengers or be indicative of the precursors to terrorist threats. With a state of the art tracking system using homography intersections of motion images, and probability based Petri nets for scene understanding, the SAFEE behavioural analysis system automatically assesses the output from multiple intelligent sensors, and creates. recommendations that are presented to the crew using an integrated airborn user interface. Evaluation of the system is conducted within a full size aircraft mockup, and experimental results are presented, showing that the SAFEE system is well suited to monitoring people in confined environments, and that meaningful and instructive output regarding human actions can be derived from the sensor network within the cabin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of innovative features in terms of real-time programmable embedded hardware (FPGA) deployment as well as in the integrated management station. These have been devised so as to deliver enhanced detection of attacks and contextualised alerts against threats that can arise from both the network layer and the application layer protocols. The resulting architecture represents an efficient and effective framework for the future deployment of network security systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have discovered a novel approach of intrusion detection system using an intelligent data classifier based on a self organizing map (SOM). We have surveyed all other unsupervised intrusion detection methods, different alternative SOM based techniques and KDD winner IDS methods. This paper provides a robust designed and implemented intelligent data classifier technique based on a single large size (30x30) self organizing map (SOM) having the capability to detect all types of attacks given in the DARPA Archive 1999 the lowest false positive rate being 0.04 % and higher detection rate being 99.73% tested using full KDD data sets and 89.54% comparable detection rate and 0.18% lowest false positive rate tested using corrected data sets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the essential needs to implement a successful e-Government web application is security. Web application firewalls (WAF) are the most important tool to secure web applications against the increasing number of web application attacks nowadays. WAFs work in different modes depending on the web traffic filtering approach used, such as positive security mode, negative security mode, session-based mode, or mixed modes. The proposed WAF, which is called (HiWAF), is a web application firewall that works in three modes: positive, negative and session based security modes. The new approach that distinguishes this WAF among other WAFs is that it utilizes the concepts of Artificial Intelligence (AI) instead of regular expressions or other traditional pattern matching techniques as its filtering engine. Both artificial neural networks and fuzzy logic concepts will be used to implement a hybrid intelligent web application firewall that works in three security modes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electrochemical reduction of the triangular clusters [Os-3(CO)(10)(alpha-dimine)] (alpha-dimine = 2,2'-bipyridine (bpy), 2,2'-bipyrimidine (bpym)) and [Os-3(CO)(10)(mu-bpym) ReBr(CO)(3)] produces primarily the corresponding radical anions. Their stability is strongly determined by the pi acceptor ability of the reducible alpha-dimine ligand, which decreases in the order mu-bpym > bpym >> bpy. Along this series, increasing delocalisation of the odd electron density in the radical anion over the Os(alpha-dimine) chelate ring causes weakening of the axial (CO)(4)Os-Os(CO)(2)(alpha-dimine) bond and its facile cleavage for alpha-diimine = bpy. In contrast, the cluster radical anion is inherently stable for the bridging bpym ligand, the strongest pi-acceptor in the studied series. In the absence of the partial delocalisation of the unpaired electron over the Re( bpym) chelate bond, the Os-3-core of the radical anion remains intact only at low temperatures. Subsequent one-electron reduction of [Os-3(CO)(10)(bpym)](center dot-) at T = 223 K gives the open-triosmium core (= Os-3*) dianion, [Os-3*(CO)(10)(bpym)](2-). Its oxidation leads to the recovery of parent [Os-3(CO)(10)( bpym)]. At room temperature, [Os-3*( CO)(10)(bpym)](2-) is formed along a two-electron (ECE) reduction path. The chemical step (C) results in the formation of an open- core radical anion that is directly reducible at the cathodic potential of the parent cluster in the second electrochemical (E) step. In weakly coordinating tetrahydrofuran, [Os-3*(CO)(10)( bpym)](2-) rapidly attacks yet non- reduced parent cluster molecules, producing the relatively stable open- core dimer [Os-3*(CO)(10)(bpym)](2)(2-) featuring two open- triangle cluster moieties connected with an ( bpym) Os - Os( bpym) bond. In butyronitrile, [Os-3*( CO)(10)(bpym)](2-) is stabilised by the solvent and the dimer [Os-3*(CO)(10)(bpym)](2)(2-) is then mainly formed by reoxidation of the dianion on reverse potential scan. The more reactive cluster [Os-3(CO)(10)(bpy)] follows the same reduction path, as supported by spectroelectrochemical results and additional valuable evidence obtained from cyclic voltammetric scans. The ultimate process in the reduction mechanism is fragmentation of the cluster core triggered by the reduction of the dimer [Os-3*(CO)(10)(alpha- diimine)](2)(2-). The products formed are [Os-2(CO)(8)](2-) and {Os(CO)(2)(alpha- diimine)}(2). The latter dinuclear fragments constitute a linear polymeric chain [Os( CO)(2)(alpha-dimine)] n that is further reducible at the alpha-dimine ligands. For alpha-dimine = bpy, the charged polymer is capable of reducing carbon dioxide. The electrochemical opening of the triosmium core in the [Os-3( CO)(10)(alpha-dimine)] clusters exhibits several common features with their photochemistry. The same Os-alpha-dimine bond dissociates in both cases but the intimate mechanisms are different.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Serine proteases are a major component of viper venoms and are thought to disrupt several distinct elements of the blood coagulation system of envenomed victims. A detailed understanding of the functions of these enzymes is important both for acquiring a fuller understanding of the pathology of envenoming and because these venom proteins have shown potential in treating blood coagulation disorders. Methodology/Principal Findings: In this study a novel, highly abundant serine protease, which we have named rhinocerase, has been isolated and characterised from the venom of Bitis gabonica rhinoceros using liquid phase isoelectric focusing and gel filtration. Like many viper venom serine proteases, this enzyme is glycosylated; the estimated molecular mass of the native enzyme is approximately 36kDa, which reduces to 31kDa after deglycosylation. The partial amino acid sequence shows similarity to other viper venom serine proteases, but is clearly distinct from the sequence of the only other sequenced serine protease from Bitis gabonica. Other viper venom serine proteases have been shown to exert distinct biological effects, and our preliminary functional characterization of rhinocerase suggest it to be multifunctional. It is capable of degrading α and β chains of fibrinogen, dissolving plasma clots and of hydrolysing a kallikrein substrate. Conclusions/Significance: A novel multifunctional viper venom serine protease has been isolated and characterised. The activities of the enzyme are consistent with the known in vivo effects of Bitis gabonica envenoming, including bleeding disorders, clotting disorders and hypotension. This study will form the basis for future research to understand the mechanisms of serine protease action, and examine the potential for rhinocerase to be used clinically to reduce the risk of human haemostatic disorders such as heart attacks and strokes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the EU’s promotion of the religious identity of Muslims within the context of European counter-terrorism measures. Counter-terrorism laws of the EU and its Member States impact on the religious identity of Muslims. They have an arguably disproportionate effect on the civil rights of individuals in the quest to combat terrorism and can be seen to increase Islamophobia in two ways: a rise in general discrimination against Muslims and a requirement on Muslims to distance their connection to Islamic practice and traditions. EU law dealing with terrorist offences speak little of this backlash that Muslims face in European countries. Although the EU has somewhat of a framework in place which concerns the protection of Islamic identity, the reluctance of the EU to take a determined stance on the issue of the protection of religious identity is illustrated through the ambiguous nature of its legislation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In his book Democratic Authority, David Estlund puts forward a case for democracy, which he labels epistemic proceduralism, that relies on democracy's ability to produce good – that is, substantively just – results. Alongside this case for democracy Estlund attacks what he labels ‘utopophobia’, an aversion to idealistic political theory. In this article I make two points. The first is a general point about what the correct level of ‘idealisation’ is in political theory. Various debates are emerging on this question and, to the extent that they are focused on ‘political theory’ as a whole, I argue, they are flawed. This is because there are different kinds of political concept, and they require different kinds of ideal. My second point is about democracy in particular. If we understand democracy as Estlund does, then we should see it as a problem-solving concept – the problem being that we need coercive institutions and rules, but we do not know what justice requires. As democracy is a response to a problem, we should not allow our theories of it, even at the ideal level, to be too idealised – they must be embedded in the nature of the problem they are to solve, and the beings that have it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Allied bombing of France between 1940 and 1945 has received comparatively little attention from historians, although the civilian death toll, at about 60,000, was comparable to that of German raids on the UK. This article considers how Allied, and particularly British, bombing policy towards France was developed, what its objectives were and how French concerns about attacks on their territory were (or were not) addressed. It argues that while British policymakers were sensitive to the delicate political implications of attacking France, perceived military necessities tended to trump political misgivings; that Vichy, before November 1942, was a stronger constraint on Allied bombing than the Free French at any time and that the bombing programme largely escaped political control from May 1944.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The English cleric Matthew Sutcliffe arguably produced the first comprehensive security concept in history. It had at its centre the war between England and Spain (1585-1604), and Sutcliffe advocated taking the war to the Iberian Peninsula to seize Philip II's main Atlantic ports, rather than remaining satisfied with the indirect combat of Spain in Flanders, defensive action against naval attacks on England and the guerre de course on Spanish shipping at sea. This approach seems to be at the heart of Essex's 1596 naval campaing against Spanish ports, which foundered on the bureaucratic politics of the Elizabethan government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We analyze the impact of political proximity to the United States on the occurrence and severity of terror. Employing panel data for 116 countries over the period 1975–2001 we find that countries voting in line with the U.S. are victims of more and deadlier attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the relationship between terrorism and electoral accountability. We find that terror has a robust positive effect on the probability that the incumbent government is replaced. The magnitude of the effect increases with the severity of the terrorist attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.