703 resultados para TERRORIST ATTACKS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automated border control (ABC) is concerned with fast and secure processing for intelligence-led identification. The FastPass project aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as identity, spoofing attacks become a concern. This paper presents current research in algorithm development for counter-spoofing attacks in biometrics. Focussing on three biometric traits, face, fingerprint, and iris, it examines possible types of spoofing attacks, and reviews existing algorithms reported in relevant academic papers in the area of countering measures to biometric spoofing attacks. It indicates that the new developing trend is fusion of multiple biometrics against spoofing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The late eighties and early nineties in Germany were not only marked by the fall of the Wall and German unification, but also by the dramatization of the political issue of asylum, resulting in outbreaks of xenophobic violence. In the context of the asylum debate of the early nineties, a number of punk bands produced songs between 1991 and 1994 which criticise the xenophobic climate created by the asylum debate and undermine an exculpatory official discourse about the violent attacks. The lyrics of these songs will be analysed as instances of counter-discourse emerging from a subcultural sphere that nurtures a critical distance towards hegemonic public and political discourse, arguing that Critical Discourse Analysis should pay more attention to defiance of hegemonic discourse.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reoriented to focus on another existing international legal obligation: the duty to prevent cyber-attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Can 'constructive engagement' provide a bridge between the pursuit of national interest and concern for human rights? This book explores the experience of Chester Crocker, Reagan's Assistant Secretary of State for African Affairs, and his policy of 'constructive engagement' with Pretoria during apartheid. It is argued that the policy was, in part, a Cold War-driven attempt to maintain strategically important ties with the South African government, and it explores the repercussions of this. The book also explores the linkage of Namibian independence and Cuban troop withdrawal from Angola. The analysis of this policy has important relevance to the foreign policy dilemmas of today. Abuse of human rights can render some disenfranchised groups vulnerable to terrorist recruitment, and it is argued that Reagan's myopic globalism is being repeated in America's 'War on Terror'. The policy of 'constructive engagement' is once again being used as a diplomatic fig leaf for realpolitik, rather than as a vital tool of diplomacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a data-driven mathematical model of a key initiating step in platelet activation, a central process in the prevention of bleeding following Injury. In vascular disease, this process is activated inappropriately and causes thrombosis, heart attacks and stroke. The collagen receptor GPVI is the primary trigger for platelet activation at sites of injury. Understanding the complex molecular mechanisms initiated by this receptor is important for development of more effective antithrombotic medicines. In this work we developed a series of nonlinear ordinary differential equation models that are direct representations of biological hypotheses surrounding the initial steps in GPVI-stimulated signal transduction. At each stage model simulations were compared to our own quantitative, high-temporal experimental data that guides further experimental design, data collection and model refinement. Much is known about the linear forward reactions within platelet signalling pathways but knowledge of the roles of putative reverse reactions are poorly understood. An initial model, that includes a simple constitutively active phosphatase, was unable to explain experimental data. Model revisions, incorporating a complex pathway of interactions (and specifically the phosphatase TULA-2), provided a good description of the experimental data both based on observations of phosphorylation in samples from one donor and in those of a wider population. Our model was used to investigate the levels of proteins involved in regulating the pathway and the effect of low GPVI levels that have been associated with disease. Results indicate a clear separation in healthy and GPVI deficient states in respect of the signalling cascade dynamics associated with Syk tyrosine phosphorylation and activation. Our approach reveals the central importance of this negative feedback pathway that results in the temporal regulation of a specific class of protein tyrosine phosphatases in controlling the rate, and therefore extent, of GPVI-stimulated platelet activation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In considering the position of community engagement within planning in a time of neo-liberalism and a context of ‘neo-communitarian localism’ (cf. Jessop, 2002; DeFilippis, 2004), this paper reviews the role and relevance of Planning Aid in terms of its performance and aspirations in guiding and transforming planning practice (Friedmann, 1973; 1987; 2011) since its inception in 1973. In doing this we reflect on the critiques of Planning Aid performance provided by Allmendinger (2004) and bring the account up-to-date following on from past considerations (e.g. Bidwell and Edgar, 1982; Thomas, 1992; Brownill and Carpenter, 2007a,b; Carpenter and Brownill, 2008) and prompted by the 35 years since the University of Reading produced the first published work reviewing Planning Aid (Curtis and Edwards, 1980). Our paper is timely given renewed attacks on planning, the implementation of a form of localism and reductions in funding for planning in a time of austerity. Our view is that the need for forms of ‘neo-advocacy’ planning and community development are perhaps even more necessary now, given the continuing under-representation of lower income groups, minority groups and to allow for the expression of alternative planning futures. Thus further consideration of how to ensure that Planning Aid functions are sustained and understood requires the attention of policymakers and the planning profession more widely.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The specialist digger wasp Trachypus boharti Rubio-Espina preys exclusively on males of the stingless bee Scaptotrigona postica Latreille 1807, although the hunting attacks involve both male and worker bees of S. postica and members of its own species. To understand the mechanism of prey selection, the cuticular hydrocarbon patterns of workers and males of S. postica are analyzed in detail, and the mandibular secretion of males is examined. The cuticular profiles of males and workers are distinctively different. The major group of cuticular compounds, heptacosene isomers, is twice as abundant in workers as in males. There is no clear distinction between worker and male mandibular secretions. Such a distinct and straightforward caste-specific difference in cuticular hydrocarbons could function as a recognition cue by which T. boharti distinguishes between workers and males of S. postica.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective.- To assess urinary 6-sulphatoxymelatonin levels in a large consecutive series of patients with migraine and several comorbidities (chronic fatigue, fibromyalgia, insomnia, anxiety, and depression) as compared with controls. Background.- Urine analysis is widely used as a measure of melatonin secretion, as it is correlated with the nocturnal profile of plasma melatonin secretion. Melatonin has critical functions in human physiology and substantial evidence points to its importance in the regulation of circadian rhythms, sleep, and headache disorders. Methods.- Urine samples were collected into a single plastic container over a 12-hour period from 8:00 pm to 8:00 am of the next day, and 6-sulphatoxymelatonin was measured by quantitative ELISA. All of the patients were given a detailed questionnaire about headaches and additionally answered the following questionnaires: Chalder fatigue questionnaire, Epworth somnolence questionnaire, State-Trait Anxiety Inventory, and the Beck Depression Inventory. Results.- A total of 220 subjects were evaluated - 73 (33%) had episodic migraine, 73 (33%) had chronic migraine, and 74 (34%) were enrolled as control subjects. There was a strong correlation between the concentration of 6-sulphatoxymelatonin detected and chronic migraine. Regarding the comorbidities, this study objectively demonstrates an inverse relationship between 6-sulphatoxymelatonin levels and depression, anxiety, and fatigue. Conclusions.- To our knowledge, this is the first study to evaluate the relationship between the urinary concentration of melatonin and migraine comorbidities. These results support hypothalamic involvement in migraine pathophysiology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Global Initiative Against Asthma (GINA) was developed to meet the global challenge of asthma. GINA has been adopted in most countries and comparison of asthma management in different parts of the world may be of help when assessing the global dissemination of the guideline. The overall goals in GINA include that asthma patients should be free of symptoms, acute asthma attacks and activity limitations. The aim of the present study was to compare asthma management and asthma control in Sao Paulo, Brazil and Uppsala, Sweden. Information was collected from asthmatics in Sao Paulo and Uppsala with a questionnaire. The questionnaire dealt with the following issues: symptoms, smoking, self-management, hospital visits, effect on school/work and medication. The Sao Paulo patients were more likely to have uncontrolled asthma (36% vs 13%, P < 0.001), having made emergency room visits (57% vs 29%, P < 0.001) and having lost days at school or work because of their asthma (46% vs 28%, P = 0.03) than the asthmatics from Uppsala. There were no difference in the use of inhaled corticosteroids, but the Brazilian patients were more likely to be using theophylline (18% vs 1%, P = 0.001) and less likely to be using long-acting beta-2 agonists (18% vs 37%, P < 0.001). We conclude that the level of asthma control was lower among the patients from Sao Paulo than Uppsala. Few of the patients in either city reached the goals set up by GINA. Improved asthma management may therefore lead to health-economic benefits in both locations. Please cite this paper as: Skorup P, Rizzo LV, Machado-Boman L and Janson C. Asthma management and asthma control in Sao Paulo, Brazil and Uppsala, Sweden: a questionnaire-based comparison. The Clinical Respiratory Journal 2009; 3: 22-28.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multidimensional scaling is applied in order to visualize an analogue of the small-world effect implied by edges having different displacement velocities in transportation networks. Our findings are illustrated for two real-world systems, namely the London urban network (streets and underground) and the US highway network enhanced by some of the main US airlines routes. We also show that the travel time in these two networks is drastically changed by attacks targeting the edges with large displacement velocities. (C) 2011 Elsevier By. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between the structure and function of biological networks constitutes a fundamental issue in systems biology. Particularly, the structure of protein-protein interaction networks is related to important biological functions. In this work, we investigated how such a resilience is determined by the large scale features of the respective networks. Four species are taken into account, namely yeast Saccharomyces cerevisiae, worm Caenorhabditis elegans, fly Drosophila melanogaster and Homo sapiens. We adopted two entropy-related measurements (degree entropy and dynamic entropy) in order to quantify the overall degree of robustness of these networks. We verified that while they exhibit similar structural variations under random node removal, they differ significantly when subjected to intentional attacks (hub removal). As a matter of fact, more complex species tended to exhibit more robust networks. More specifically, we quantified how six important measurements of the networks topology (namely clustering coefficient, average degree of neighbors, average shortest path length, diameter, assortativity coefficient, and slope of the power law degree distribution) correlated with the two entropy measurements. Our results revealed that the fraction of hubs and the average neighbor degree contribute significantly for the resilience of networks. In addition, the topological analysis of the removed hubs indicated that the presence of alternative paths between the proteins connected to hubs tend to reinforce resilience. The performed analysis helps to understand how resilience is underlain in networks and can be applied to the development of protein network models.