733 resultados para Drone attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial of service attacks are common place and cause great inconvenience. Thus, this study presents simulations of denial of service attacks on 802.11 wireless networks using the network simulator OMNeT++. Furthermore, we present an approach to mitigate such attack, obtaining significant results for improving wireless networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is with great astonishment and concern that I read the letter to the editor by Barreiros et al1 in which the authors report an attack by a blue shark on a spear fisherman in the Azores. Whereas the first part of the article accurately details the circumstances of the accident, Barreiros et al, in the second part, devise a far-fetched and illegitimate connection with shark diving, in particular with shark feeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several pharmacological targets have been proposed as modulators of panic-like reactions. However, interest should be given to other potential therapeutic neurochemical agents. Recent attention has been given to the potential anxiolytic properties of cannabidiol, because of its complex actions on the endocannabinoid system together with its effects on other neurotransmitter systems. The aim of this study was to investigate the effects of cannabidiol on innate fear-related behaviors evoked by a prey vs predator paradigm. Male Swiss mice were submitted to habituation in an arena containing a burrow and subsequently pre-treated with intraperitoneal administrations of vehicle or cannabidiol. A constrictor snake was placed inside the arena, and defensive and non-defensive behaviors were recorded. Cannabidiol caused a clear anti-aversive effect, decreasing explosive escape and defensive immobility behaviors outside and inside the burrow. These results show that cannabidiol modulates defensive behaviors evoked by the presence of threatening stimuli, even in a potentially safe environment following a fear response, suggesting a panicolytic effect. Neuropsychopharmacology (2012) 37, 412-421; doi:10.1038/npp.2011.188; published online 14 September 2011

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: To observe postpartum migraine recurrence among migraine sufferers before pregnancy, its classifications and associated factors and to compare women, who were exclusively breastfeeding, with those that used other forms of infant feeding. Methods: Out of 686 consecutively assisted women, at the first postnatal week, 266 were identified as migraine sufferers before pregnancy. Among those, one in five that were exclusively breastfeeding (53) and all the ones consecutively using others forms of infant feeding (40) were interviewed at the first and forth postpartum weeks. Results: After multivariable analysis, exclusive breastfeeding, no breastfeeding problems, and low income were associated with decrease in migraine recurrence at the first postpartum week. At the fourth week, exclusive breastfeeding continued to be a protective factor. Conclusions: A decrease in postpartum migraine recurrence seems to be another advantage of exclusive breastfeeding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To review the clinical characteristics of patients with neuromyelitis optica (NMO) and to compare their visual outcome with those of patients with optic neuritis (ON) and multiple sclerosis (MS). Methods: Thirty-three patients with NMO underwent neuro-ophthalmic evaluation, including automated perimetry along with 30 patients with MS. Visual function in both groups was compared overall and specifically for eyes after a single episode of ON. Results: Visual function and average visual field (VF) mean deviation were significantly worse in eyes of patients with NMO. After a single episode of ON, the VF was normal in only 2 of 36 eyes of patients with NMO compared to 17 of 35 eyes with MS (P < 0.001). The statistical analysis indicated that after a single episode of ON, the odds ratio for having NMO was 6.0 (confidence interval [CI]: 1.6-21.9) when VF mean deviation was worse than -20.0 dB while the odds ratio for having MS was 16.0 (CI: 3.6-68.7) when better than -3.0 dB. Conclusion: Visual outcome was significantly worse in NMO than in MS. After a single episode of ON, suspicion of NMO should be raised in the presence of severe residual VF deficit with automated perimetry and lowered in the case of complete VF recovery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

[EN]Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L’avanzare delle tecnologie ICT e l’abbattimento dei costi di produzione hanno portato ad un aumento notevole della criminalità informatica. Tuttavia il cambiamento non è stato solamente quantitativo, infatti si può assistere ad un paradigm-shift degli attacchi informatici da completamente opportunistici, ovvero senza un target specifico, ad attacchi mirati aventi come obiettivo una particolare persona, impresa o nazione. Lo scopo della mia tesi è quello di analizzare modelli e tassonomie sia di attacco che di difesa, per poi valutare una effettiva strategia di difesa contro gli attacchi mirati. Il lavoro è stato svolto in un contesto aziendale come parte di un tirocinio. Come incipit, ho effettuato un attacco mirato contro l’azienda in questione per valutare la validità dei sistemi di difesa. L’attacco ha avuto successo, dimostrando l’inefficacia di moderni sistemi di difesa. Analizzando i motivi del fallimento nel rilevare l’attacco, sono giunto a formulare una strategia di difesa contro attacchi mirati sotto forma di servizio piuttosto che di prodotto. La mia proposta è un framework concettuale, chiamato WASTE (Warning Automatic System for Targeted Events) il cui scopo è fornire warnings ad un team di analisti a partire da eventi non sospetti, ed un business process che ho nominato HAZARD (Hacking Approach for Zealot Attack Response and Detection), che modella il servizio completo di difesa contro i targeted attack. Infine ho applicato il processo all’interno dell’azienda per mitigare minacce ed attacchi informatici.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis is organized in two main parts, which deal with management of GNSS intentional counterfeit signals. The first part deals with the interference management, focusing on the intentional interfering signal. In particular, a technique for the detection and localization of the interfering signal level in the GNSS bands in frequency domain has been proposed. In addition, an effective mitigation technique which exploits the periodic characteristics of the common jamming signals reducing interfering effects at the receiver side has been introduced. Moreover, this technique has been also tested in a different and more complicated scenario resulting still effective in mitigation and cancellation of the interfering signal, without high complexity. The second part still deals with the problem of interference management, but regarding with more sophisticated signal. The attention is focused on the detection of spoofing signal, which is the most complex among the jamming signal types. Due to this highly difficulty in detect and mitigate this kind of signal, spoofing threat is considered the most dangerous. In this work, a possible techniques able to detect this sophisticated signal has been proposed, observing and exploiting jointly the outputs of several operational block measurements of the GNSS receiver operating chain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Con un sistema di multivisione correttamente installato e calibrato, si è tracciato il moto di un drone a seguito di operazioni di triangolazione e ne si è controllata automaticamente la traiettoria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Studio e ottimizzazione di un piccolo propulsore Diesel di piccola potenza common rail, sovralimentato per un drone.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Progettazione di un motore Diesel 2 tempi sulla base commerciale di un TM100Kb a benzina di derivazione karting. Il motore è capace di 5kW di potenza ad un peso contenuto. La progettazione è orientata agli aspetti sia termodinamici che dinamici. Si effettua una serie di verifiche per capire l'efficienza e l'uso di componenti originali.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fourteen non-terrorist attackers of public figures in Germany between 1968 and 2004 were intensively studied, with a particular focus on warning behaviors, attack behaviors, and the relationship between psychiatric diagnosis, symptoms, and motivations for the assault. A large proportion of the attackers were severely mentally ill, and most likely to be in the potentially lethal rather than the non-lethal group. A new typology of seven warning behaviors was applied to the data, and all were present, most frequently fixation and pathway warning behavior, and least frequently a direct threat. Psychiatric diagnosis could be closely linked to motivation when analyzed at the level of symptom and content of thought, often delusional. Most of the attacks were directed at political figures, and the majority occurred after 1995.