979 resultados para panic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Drawing inspiration from real world interacting systems, we study a system consisting of two networks that exhibit antagonistic and dependent interactions. By antagonistic and dependent interactions we mean that a proportion of functional nodes in a network cause failure of nodes in the other, while failure of nodes in the other results in failure of links in the first. In contrast to interdependent networks, which can exhibit first-order phase transitions, we find that the phase transitions in such networks are continuous. Our analysis shows that, compared to an isolated network, the system is more robust against random attacks. Surprisingly, we observe a region in the parameter space where the giant connected components of both networks start oscillating. Furthermore, we find that for Erdos-Renyi and scale-free networks the system oscillates only when the dependence and antagonism between the two networks are very high. We believe that this study can further our understanding of real world interacting systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a new state transition based embedding (STBE) technique for audio watermarking with high fidelity. Furthermore, we propose a new correlation based encoding (CBE) scheme for binary logo image in order to enhance the payload capacity. The result of CBE is also compared with standard run-length encoding (RLE) compression and Huffman schemes. Most of the watermarking algorithms are based on modulating selected transform domain feature of an audio segment in order to embed given watermark bit. In the proposed STBE method instead of modulating feature of each and every segment to embed data, our aim is to retain the default value of this feature for most of the segments. Thus, a high quality of watermarked audio is maintained. Here, the difference between the mean values (Mdiff) of insignificant complex cepstrum transform (CCT) coefficients of down-sampled subsets is selected as a robust feature for embedding. Mdiff values of the frames are changed only when certain conditions are met. Hence, almost 50% of the times, segments are not changed and still STBE can convey watermark information at receiver side. STBE also exhibits a partial restoration feature by which the watermarked audio can be restored partially after extraction of the watermark at detector side. The psychoacoustic model analysis showed that the noise-masking ratio (NMR) of our system is less than -10dB. As amplitude scaling in time domain does not affect selected insignificant CCT coefficients, strong invariance towards amplitude scaling attacks is also proved theoretically. Experimental results reveal that the proposed watermarking scheme maintains high audio quality and are simultaneously robust to general attacks like MP3 compression, amplitude scaling, additive noise, re-quantization, etc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: Hacia el 167 a.C., un joven Polibio, se sorprendía de que Roma hubiera podido afi rmar su poderío en la península, resistir los ataques cartagineses y acabar imponiendo sus leyes en Oriente. Probablemente –explica P. Grimal– en ello también haya infl uido que las costumbres y tradiciones romanas contribuían a asegurar una superioridad sobre el resto de las culturas y hacían de Roma una ciudad única entre todas. La familia y la mujer constituyeron parte fundamental dentro de la consolidación de esa estructura socio política y de ello heredaríamos, especialmente a nivel normativo, una sólida tradición jurídico-romana. Sin embargo, la época imperial representó un grave período de crisis en el cual, tomar esposa, dar hijos a la patria y controlar los patrimonios, se convirtió en una importante reafi rmación moral, jurídica y política para la sociedad de su tiempo. En esta forma, se analizarán brevemente algunos conceptos y leyes relevantes –cuyos ecos volveremos a encontrar refl ejados a lo largo y ancho de la España cristiana medieval– los cuales nos ayudarán a adentrarnos en la cotidianidad de este singular período, sus emancipadas mujeres aristocráticas y el derecho privado.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En este trabajo se aborda la visión del hombre como persona humana y el respeto que se le debe como tal desde el inicio de su vida en la concepción hasta su fin natural. Los atentados que pueden y podrán cometerse contra la vida constituyen otros tantos atentados también contra la institución familiar, lugar natural del nacimiento y desarrollo de la vida de un nuevo ser humano. El respeto por el hombre en cuanto persona es una de las exigencias que no admiten discusión; de ella dependen la dignidad y también el bienestar y la subsistencia de la Humanidad.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Published as an article in: European Economic Review, 2008, vol. 52, issue 1, pages 1-27.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[Es] En este trabajo se parte de la hipótesis de que los propios contenidos televisivos son fuente de aprendizaje a través de las narraciones televisivas. En concreto, defendemos la idea de que es posible enseñar y aprender valores a través de dichas narraciones. Se sistematizan algunas de las investigaciones que han abordado la relación entre televisión y valores desde una triple dimensión: los propios contenidos; el medio en sí mismo y el lenguaje. Esta revisión nos permite defender que las condenas reiteradas a la televisión, responsabilizándola de la mayoría de los males que sufre la juventud, no pueden apoyarse en los estudios que la psicología ha realizado en las últimas décadas. Entendemos que el telespectador incorpora la información televisiva desde distintos contextos y que la enculturación no es unidireccional. Existe una interacción entre contextos de desarrollo y mensajes. Concretamente nos interesa analizar los valores implícitos y explícitos que subyacen a los contenidos televisivos. Para ello basándonos en el modelo elaborado por Schwartz y Bilsky hemos creado un cuestionario (Val-TV 01) con el fin de clasificar los valores e interpretar las conductas visualizadas en los textos televisivos y relacionarlos con los propios valores de los adolescentes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elasmobranchs are vital and valuable components of the marine biota. From an ecological perspective they occupy the role of top predators within marine food webs, providing a regulatory control that helps balance the ecosystem. From an evolutionary perspective, this group represents an early divergence along the vertebrate line that produced many unusual, but highly successful, adaptations in function and form. From man's perspective, elasmobranchs have been considered both an unavoidable nuisance, and an exploitable fishery resource. A few of the large shark species have earned a dubious notoriety because of sporadic attacks on humans that occur in coastal areas each year worldwide; the hysteria surrounding an encounter with a shark can be costly to the tourist industry. More importantly, elasmobranchs are often considered a detriment to commercial fishing operations; they cause significant economic damage to catches and fishing gear. On the other hand, consumer attitudes have changed concerning many previously unpopular food fishes, including elasmobranchs, and this group of fishes has been increasingly used by both recreational and commercial fishing interests. Many elasmobranchs have become a popular target of recreational fishermen for food and sport because of their abundance, size, and availability in coastal waters. Similarly, commercial fisheries for elasmobranchs have developed or expanded from an increased demand for elasmobranch food products. (PDF file contains 108 pages.)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the role that INTERPOL surveillance – the Mobile INTERPOL Network Database (MIND) and the Fixed INTERPOL Network Database (FIND) – played in the War on Terror since its inception in 2005. MIND/FIND surveillance allows countries to screen people and documents systematically at border crossings against INTERPOL databases on terrorists, fugitives, and stolen and lost travel documents. Such documents have been used in the past by terrorists to transit borders. By applying methods developed in the treatment-effects literature, this paper establishes that countries adopting MIND/FIND experienced fewer transnational terrorist attacks than had they not adopted MIND/FIND. Our estimates indicate that, on average, during 2008–2011, adopting and using MIND/FIND results in 1.23 fewer transnational terrorist incidents each year per 100 million people. Thus, a country like France with a population just above 64 million people in 2008 would have 0.79 fewer transnational terrorist incidents per year owing to its use of INTERPOL surveillance. For most treatment countries, this amounts to a sizeable proportional reduction of about 60 per cent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On October 24, 1871, a massacre of eighteen Chinese in Los Angeles brought the small southern California settlement into the national spotlight. Within a few days, news of this “night of horrors” was reported in newspapers across the country. This massacre has been cited in Asian American narratives as the first documented outbreak of ethnic violence against a Chinese community in the United States. This is ironic because Los Angeles’ small population has generally placed it on the periphery in historical studies of the California anti-Chinese movement. Because the massacre predated Los Angeles’ organized Chinese exclusion movements of the late 1870s, it has often been erroneously dismissed as an aberration in the history of the city.

The violence of 1871 was an outburst highlighting existing community tensions that would become part of public debate by decade’s close. The purpose of this study is to insert the massacre into a broader context of anti-Chinese sentiments, legal discrimination, and dehumanization in nineteenth century Los Angeles. While a second incident of widespread anti-Chinese violence never occurred, brutal attacks directed at Chinese small businessmen and others highlighted continued community conflict. Similarly, economic rivalries and concerns over Chinese prostitution that underlay the 1871 massacre were manifest in later campaigns of economic discrimination and vice suppression that sought to minimize Chinese influence within municipal limits. An analysis of the massacre in terms of anti-Chinese legal, social and economic strategies in nineteenth-century Los Angeles will elucidate these important continuities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O combate efetivo ao flagelo secular do terrorismo, ainda que possa se revestir de muitas formas, não prescinde da repressão penal de seus autores. Em vista da maciça internacionalização do terrorismo, a partir do Século XX, a cooperação jurídica internacional em matéria penal (aí incluída a extradição) consolida-se como instrumento de essencial importância para a repressão do terrorismo pela comunidade internacional, com a vantagem de resguardar o domínio do direito e, por conseguinte, de assegurar a paz e a segurança internacionais. A evolução do tratamento do crime de terrorismo pelo direito penal transnacional influenciada pelo direito da segurança coletiva, especialmente a partir dos atentados de 11 de setembro de 2001 exerceu expressivo impacto no direito extradicional. O entendimento desse efeito é fundamental para extrair-se do instituto da extradição todo o seu potencial para a repressão penal do terrorismo. Desde que presentes determinados requisitos, uma conduta de caráter terrorista à luz de parâmetros internacionais gera a obrigação estatal de extraditar ou processar seu autor, mesmo na ausência de tratado. Além disso, a extradição exercida ou não em decorrência de obrigação convencional tem seus princípios afetados pela obrigação internacional de repressão do terrorismo, particularmente no que se refere a questões como extraditabilidade, extradição por crimes políticos e extradição de refugiados. O direito brasileiro apresenta algumas vulnerabilidades para o cumprimento da obrigação aut dedere aut iudicare e a prática judicial brasileira relativa à extradição de acusados de atos de terrorismo poderia reportar-se mais ao direito internacional, com vistas a evitar o risco de violação de obrigações internacionais pelo Brasil.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[ES]Este Trabajo de Fin de Grado consiste en diseñar y desarrollar una solución de resilient communications para su uso en entornos de movilidad, en concreto, en entornos vehiculares. Se diseñara una solución que consiste en añadir soporte de múltiples vías de comunicación entre dos extremos para el protocolo de movilidad HIP. Este trabajo consiste en buscar una solución de resilient communications, ya que buscamos como objetivo principal aumentar la disponibilidad del sistema de comunicaciones, es decir, aumentar aspectos tales como la tolerancia a fallos y contra ataques de seguridad, concretamente contra ataques contra la disponibilidad.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is, in nature, as well as in the aquarium, a parasitic disease known as 'mousse' and which attacks predominantly fish. It is caused by Phycomycete fungi, genus Saprolegnia. The fungus causes external lesions and covers the fish with a thick white layer from whence comes the name 'mousse', commonly attributed to the disease, for which the scientific name is Saprolegnia. This article provides an overview of Saprolegnia infections on fish in nature and aquaria and then discusses symptomology of Saprolegnia in the mirror caro and t roach in more detail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Desde a síndrome do coração irritável, passando pelas diversas síndromes do fin de siècle e chegando ao triunfo das teorias neurocientíficas sobre a hipersensibilidade dos centros cerebrais de resposta ao alarme e sufocação, a Medicina buscou teorias para explicar a experiência de pavor. Investiga-se o modo como ocorreram, ao longo da história, as transformações da atenção médica sobre o medo e os estados mórbidos que o acompanham. Ao se buscar na literatura médica vestígios de análises científicas sobre o mal-estar intenso, do meio do século XIX ao fim do XX, não se pretendeu construir uma história triunfalista, de modo que as teorias atuais pudessem ganhar status de superioridade em relação às do passado. Evidenciou-se, sim, a importância cultural e a força histórica de cada uma delas, salientando as possíveis continuidades e rupturas de sentido que elas assumiram.