877 resultados para Replay Attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A military operation is about to take place during an ongoing international armed conflict; it can be carried out either by aerial attack, which is expected to cause the deaths of enemy civilians, or by using ground troops, which is expected to cause the deaths of fewer enemy civilians but is expected to result in more deaths of compatriot soldiers. Does the principle of proportionality in international humanitarian law impose a duty on an attacker to expose its soldiers to life-threatening risks in order to minimise or avert risks of incidental damage to enemy civilians? If such a duty exists, is it absolute or qualified? And if it is a qualified duty, what considerations may be taken into account in determining its character and scope? This article presents an analytic framework under the current international humanitarian law (IHL) legal structure, following a proportionality analysis. The proposed framework identifies five main positions for addressing the above queries. The five positions are arranged along two ‘axes’: a value ‘axis’, which identifies the value assigned to the lives of compatriot soldiers in relation to lives of enemy civilians; and a justification ‘axis’, which outlines the justificatory bases for assigning certain values to lives of compatriot soldiers and enemy civilians: intrinsic, instrumental or a combination thereof. The article critically assesses these positions, and favours a position which attributes a value to compatriot soldiers’ lives, premised on a justificatory basis which marries intrinsic considerations with circumscribed instrumental considerations, avoiding the indeterminacy and normative questionability entailed by more expansive instrumental considerations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Containment, as conceived by the US government official George Kennan, was an aggressive attempt to cause the Soviet Cold War empire to disintegrate. This can is demonstrated by the case study of how the USA, Britain, and France tried to instrumentalise renegade Tito's Yugoslavia as a wedge to break up the cohesion of the Communist regimes within the Soviet sphere. They supported Tito against subversion and planned Soviet-orchestrated military attack from its neighbouring states; Western plans for the support of Yugoslavia included plans for a selective use of nuclear weapons.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The very first numerical models which were developed more than 20 years ago were drastic simplifications of the real atmosphere and they were mostly restricted to describe adiabatic processes. For prediction of a day or two of the mid tropospheric flow these models often gave reasonable results but the result deteriorated quickly when the prediction was extended further in time. The prediction of the surface flow was unsatisfactory even for short predictions. It was evident that both the energy generating processes as well as the dissipative processes have to be included in numerical models in order to predict the weather patterns in the lower part of the atmosphere and to predict the atmosphere in general beyond a day or two. Present-day computers make it possible to attack the weather forecasting problem in a more comprehensive and complete way and substantial efforts have been made during the last decade in particular to incorporate the non-adiabatic processes in numerical prediction models. The physics of radiational transfer, condensation of moisture, turbulent transfer of heat, momentum and moisture and the dissipation of kinetic energy are the most important processes associated with the formation of energy sources and sinks in the atmosphere and these have to be incorporated in numerical prediction models extended over more than a few days. The mechanisms of these processes are mainly related to small scale disturbances in space and time or even molecular processes. It is therefore one of the basic characteristics of numerical models that these small scale disturbances cannot be included in an explicit way. The reason for this is the discretization of the model's atmosphere by a finite difference grid or the use of a Galerkin or spectral function representation. The second reason why we cannot explicitly introduce these processes into a numerical model is due to the fact that some physical processes necessary to describe them (such as the local buoyance) are a priori eliminated by the constraints of hydrostatic adjustment. Even if this physical constraint can be relaxed by making the models non-hydrostatic the scale problem is virtually impossible to solve and for the foreseeable future we have to try to incorporate the ensemble or gross effect of these physical processes on the large scale synoptic flow. The formulation of the ensemble effect in terms of grid-scale variables (the parameters of the large-scale flow) is called 'parameterization'. For short range prediction of the synoptic flow at middle and high latitudes, very simple parameterization has proven to be rather successful.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the relationship between terrorism and electoral accountability. We find that terror has a robust positive effect on the probability that the incumbent government is replaced. The magnitude of the effect increases with the severity of the terrorist attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, are becoming increasingly complex. With ever-growing data processing functionalities in these implants, privacy and security become vital concerns. Electronic attacks on human ICT implants can cause significant harm, both to implant subjects and to their environment. This paper explores the vulnerabilities which human implants pose to crime victimisation in light of recent technological developments, and analyses how the law can deal with emerging challenges of what may well become the next generation of cybercrime: attacks targeted at technology implanted in the human body. After a state-of-the-art description of relevant types of human implants and a discussion how these implants challenge existing perceptions of the human body, we describe how various modes of attacks, such as sniffing, hacking, data interference, and denial of service, can be committed against implants. Subsequently, we analyse how these attacks can be assessed under current substantive and procedural criminal law, drawing on examples from UK and Dutch law. The possibilities and limitations of cybercrime provisions (eg, unlawful access, system interference) and bodily integrity provisions (eg, battery, assault, causing bodily harm) to deal with human-implant attacks are analysed. Based on this assessment, the paper concludes that attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks. Traditional distinctions between physical and non-physical modes of attack, between human bodies and things, between exterior and interior of the body need to be re-interpreted in light of developments in human implants. As the human body and technology become increasingly intertwined, cybercrime legislation and body-integrity crime legislation will also become intertwined, posing a new puzzle that legislators and practitioners will sooner or later have to solve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1 The recent increase in planting of selected willow clones as energy crops for biomass production has resulted in a need to understand the relationship between commonly grown, clonally propagated genotypes and their pests. 2 For the first time, we present a study of the interactions of six willow clones and a previously unconsidered pest, the giant willow aphid Tuberolachnus salignus. 3 Tuberolachnus salignus alatae displayed no preference between the clones, but there was genetic variation in resistance between the clones; Q83 was the most resistant and led to the lowest reproductive performance in the aphid 4 Maternal effects buffered changes in aphid performance. On four tested willow clones fecundity of first generation aphids on the new host clone was intermediate to that of the second generation and that of the clone used to maintain the aphids in culture. 5 In the field, patterns of aphid infestation were highly variable between years, with the duration of attack being up to four times longer in 1999. In both years there was a significant effect of willow clone on the intensity of infestation. However, whereas Orm had the lowest intensity of infestation in the first year, Dasyclados supported a lower population level than other monitored clones in the second year.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter considers the possible use in armed conflict of low-yield (also known as tactical) nuclear weapons. The Legality of the Threat or Use of Nuclear Weapons Advisory Opinion maintained that it is a cardinal principle that a State must never make civilians an object of attack and must consequently never use weapons that are incapable of distinguishing between civilian and military targets. As international humanitarian law applies equally to any use of nuclear weapons, it is argued that there is no use of nuclear weapons that could spare civilian casualties particularly if you view the long-term health and environmental effects of the use of such weaponry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This essay contends that the constitutive elements of well-being are plural, partly objective, and separable. The essay argues that these elements are pleasure, friendship, significant achievement, important knowledge, and autonomy, but not either the appreciation of beauty or the living of a morally good life. The essay goes on to attack the view that elements of well-being must be combined in order for well-being to be enhanced. The final section argues against the view that, because anything important to say about well-being could be reduced to assertions about these separable elements, the concept of well-being or personal good is ultimately unimportant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Plants produce volatile organic compounds (VOCs) in response to herbivore attack, and these VOCs can be used by parasitoids of the herbivore as host location cues. We investigated the behavioural responses of the parasitoid Cotesia vestalis to VOCs from a plant–herbivore complex consisting of cabbage plants (Brassica oleracea) and the parasitoids host caterpillar, Plutella xylostella. A Y-tube olfactometer was used to compare the parasitoids' responses to VOCs produced as a result of different levels of attack by the caterpillar and equivalent levels of mechanical damage. Headspace VOC production by these plant treatments was examined using gas chromatography–mass spectrometry. Cotesia vestalis were able to exploit quantitative and qualitative differences in volatile emissions, from the plant–herbivore complex, produced as a result of different numbers of herbivores feeding. Cotesia vestalis showed a preference for plants with more herbivores and herbivore damage, but did not distinguish between different levels of mechanical damage. Volatile profiles of plants with different levels of herbivores/herbivore damage could also be separated by canonical discriminant analyses. Analyses revealed a number of compounds whose emission increased significantly with herbivore load, and these VOCs may be particularly good indicators of herbivore number, as the parasitoid processes cues from its external environment

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The type and quantity of fertilizer supplied to a crop will differ between organic and conventional farming practices. Altering the type of fertilizer a plant is provided with can influence a plant’s foliar nitrogen levels, as well as the composition and concentration of defence compounds, such as glucosinolates. Many natural enemies of insect herbivores can respond to headspace volatiles emitted by the herbivores’ host plant in response to herbivory. We propose that manipulating fertilizer type may also influence the headspace volatile profiles of plants, and as a result, the tritrophic interactions that occur between plants, their insect pests and those pests’ natural enemies. Here, we investigate a tritrophic system consisting of cabbage plants, Brassica oleracea, a parasitoid, Diaeretiella rapae, and one of its hosts, the specialist cabbage aphid Brevicoryne brassicae. Brassica oleracea plants were provided with either no additional fertilization or one of three types of fertilizer: Nitram (ammonium nitrate), John Innes base or organic chicken manure. We investigated whether these changes would alter the rate of parasitism of aphids on those plants and whether any differences in parasitism could be explained by differences in attractivity of the plants to D. rapae or attack rate of aphids by D. rapae. In free-choice experiments, there were significant differences in the percentage of B. brassicae parasitized by D. rapae between B. oleracea plants grown in different fertilizer treatments. In a series of dual-choice Y-tube olfactometry experiments, D. rapae females discriminated between B. brassicae-infested and undamaged plants, but parasitoids did not discriminate between similarly infested plants grown in different fertilizer treatments. Correspondingly, in attack rate experiments, there were no differences in the rate that D. rapae attacked B. brassicae on B. oleracea plants grown in different fertilizer treatments. These findings are of direct relevance to sustainable and conventional farming practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Interest in sustainable farming methods that rely on alternatives to conventional synthetic fertilizers and pesticides is increasing. Sustainable farming methods often utilize natural populations of predatory and parasitic species to control populations of herbivores, which may be potential pest species. We investigated the effects of several types of fertilizer, including those typical of sustainable and conventional farming systems, on the interaction between a herbivore and parasitoid. The effects of fertilizer type on percentage parasitism, parasitoid performance, parasitoid attack behaviour and responses to plant volatiles were examined using a model Brassica system, consisting of Brassica oleracea var capitata, Plutella xylostella (Lepidoptera) larvae and Cotesia vestalis (parasitoid). Percentage parasitism was greatest for P. xylostella larvae feeding on plants that had received either a synthetic ammonium nitrate fertilizer or were unfertilized, in comparison to those receiving a composite fertilizer containing hoof and horn. Parasitism was intermediate on plants fertilized with an organically produced animal manure. Male parasitoid tibia length showed the same pattern as percentage parasitism, an indication that offspring performance was maximized on the treatments preferred by female parasitoids for oviposition. Percentage parasitism and parasitoid size were not correlated with foliar nitrogen concentration. The parasitoids did not discriminate between hosts feeding on plants in the four fertilizer treatments in parasitoid behaviour assays, but showed a preference for unfertilized plants in olfactometer experiments. The percentage parasitism and tibia length results provide support for the preference–performance hypothesis

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article focuses on one particular factor that is of crucial importance to all self-defence actions. It is a factor that is almost always present in the application and appraisal of the right, but one that is not always explicitly engaged with: time. There are various ratione temporis elements underpinning the lawful exercise of the right of self-defence, and questions related to the timing of both an attack being responded to in self-defence and the response itself are notably controversial. The self-defence timeline is therefore charted, and the key legal debates encountered along its trajectory are identified. In particular, there is a focus on three temporal ‘stages’ of the right of self-defence: (i) the much-debated question of preventative forms of self-defence (the ‘before’); (ii) the timeliness of a state's defensive action, or what is sometimes called the need for the response to be ‘immediate’ (the ‘during’); and (iii) the duration of self-defence actions, including the crucial issue of when they must end (the ‘after’). The aim of this article is not to break new substantive ground with regard to these ‘stages’ as such, but is, rather, to draw together the temporal strands of self-defence in a more focused manner than is often the case in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Platelets are involved in the maintenance of haemostasis but their inappropriate activation leads to thrombosis, a principal trigger for heart attack and ischemic stroke. Although platelets circulate in isolation, upon activation they accumulate or aggregate together to form a thrombus, where they function in a coordinated manner to prevent loss of blood and control wound repair. Recent reports indicate that the stability and functions of a thrombus are maintained through sustained, contact dependent signalling between platelets. Given the role of gap junctions in the coordination of tissue responses, it was hypothesized that gap junctions may be present within a thrombus and mediate intercellular communication between platelets. Therefore studies were performed to explore the presence and functions of connexins in platelets. In this brief review, the roles of hemichannels and gap junctions in the control of thrombosis and haemostasis and the future directions for this research will be discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts – even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in an ensemble of evidence with liveness information. This approach aims at making multibiometric systems more resistant to presentation attacks by modeling the typical behaviour of human surveillance operators detecting anomalies as employed in many decision support systems. It is shown to improve security, while retaining the high accuracy level of standard fusion approaches on the latest Fingerprint Liveness Detection Competition (LivDet) 2013 dataset.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.