760 resultados para ATTACKS
Resumo:
Un résumé en français est également disponible.
Resumo:
Dans un contexte où les virus informatiques présentent un risque sérieux pour les réseaux à travers le globe, il est impératif de retenir la responsabilité des compagnies qui n’y maintiennent pas une sécurité adéquate. À ce jour, les tribunaux québécois n’ont pas encore été saisis d’affaires en responsabilité pour des virus informatiques. Cet article brosse un portrait général de la responsabilité entourant les virus informatiques en fonction des principes généraux de responsabilité civile en vigueur au Québec. L’auteur propose des solutions pour interpréter les trois critères traditionnels la faute, le dommage et le lien causal en mettant l’accent sur l’obligation de précaution qui repose sur les épaules de l’administrateur de réseau. Ce joueur clé pourrait bénéficier de l’adoption de dispositions générales afin de limiter sa responsabilité. De plus, les manufacturiers et les distributeurs peuvent également partager une partie de la responsabilité en proportion de la gravité de leur faute. Les entreprises ont un devoir légal de s’assurer que leurs systèmes sont sécuritaires afin de protéger les intérêts de leurs clients et des tiers.
Resumo:
The pea aphid, Acyrthosiphon pisum Harris (Hemiptera: Aphididae) is found in red and green color morphs. Previous work has suggested that the aphidiine parasitoid Aphidius ervi Haliday preferentially attacks green pea aphids in the field. It is not clear whether these results reflect a real preference, or some unknown clonal difference, such as in immunity, between the aphids used in the previous studies. We used three susceptibility-matched pairs of red and green morph pea aphid clones to test for preferences. In a no-choice situation, the parasitoids attacked equal proportions of each color morph. When provided with a choice, A. ervi was significantly more likely to oviposit into colonies formed from green morphs when the neighboring colony was formed from red morph aphids. In contrast, red morphs were less likely to be attacked when their neighboring colony was of the green morph. By preferentially attacking green colonies, A. ervi may reduce the likelihood of intraguild predation, as it is suggested that visually foraging predators preferentially attack red aphid colonies. Furthermore, if this host choice behavior is replicated in the field, we speculate that color morphs of the pea aphid may interact indirectly through their shared natural enemies, leading to intraspecific apparent competition.
Resumo:
An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root attacks. This paper aims to provide an approach for mitigating negative aspects of the mentioned dataset, which led to low detection rates. Genetic algorithm is employed to implement rules for detecting various types of attacks. Rules are formed of the features of the dataset identified as the most important ones for each attack type. In this way we introduce high level of generality and thus achieve high detection rates, but also gain high reduction of the system training time. Thenceforth we re-check the decision of the user-to- root rules with the rules that detect other types of attacks. In this way we decrease the false-positive rate. The model was verified on KDD 99, demonstrating higher detection rates than those reported by the state- of-the-art while maintaining low false-positive rate.
Resumo:
Since the terrorist attacks of September 11, 2001, international law has had to grapple with the fundamental challenges that large-scale violence carried out by non-State actors poses to the traditional inter- State orientation of international law. Questions related to the “adequacy” and “effectiveness” of international humanitarian law, international human rights law and the law related to the use of force have been particularly pronounced. This paper focuses on the international humanitarian law implications of American drone attacks in northwest Pakistan. A highly-advanced modality of modern warfare, armed drones highlight the possibilities, problems, prospects and pitfalls of high-tech warfare. How is the battlefield to be defined and delineated geographically and temporally? Who can be targeted, and by whom? Ultimately, this paper concludes that American drone attacks in northwest Pakistan are not unlawful as such under international humanitarian law, though, like any tactical decision in the context of asymmetric warfare, they should be continuously and closely monitored according to the dictates of law with sensitivity to facts on the ground.
Resumo:
Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accuracy can be enhanced, but traditional sum-rule based fusion algorithms are known to be highly sensitive to single spoofed instances. This paper investigates 1-median filtering as a spoofing-resistant generalised alternative to the sum-rule targeting the problem of partial multibiometric spoofing where m out of n biometric sources to be combined are attacked. Augmenting previous work, this paper investigates the dynamic detection and rejection of livenessrecognition pair outliers for spoofed samples in true multi-modal configuration with its inherent challenge of normalisation. As a further contribution, bootstrap aggregating (bagging) classifiers for fingerprint spoof-detection algorithm is presented. Experiments on the latest face video databases (Idiap Replay- Attack Database and CASIA Face Anti-Spoofing Database), and fingerprint spoofing database (Fingerprint Liveness Detection Competition 2013) illustrate the efficiency of proposed techniques.
Resumo:
Sustainable methods are required to protect newly planted tree seedlings from insect herbivore attack. To this end, here Norway spruce (Picea abies (L.) Karst.) seeds were treated with 2.5 mM nicotinamide (NIC), 2.5 mM nicotinic acid (NIA), 3 mM jasmonic acid (JA) or 0.2 mM 5-azacytidine (5-Aza), and 6-month-old seedlings grown from these seeds were planted at a reforestation area in central Sweden. Attack by pine weevils (Hylobius abietis) was reduced by 50 per cent by NIC treatment, 62.5 per cent by JA treatment and 25 per cent by 5-Aza treatment, when compared with seedlings grown from untreated seeds. Watering 18-month-old spruce seedlings with 2 mM NIC or 2 mM NIA did reduce attack during the first season in the field by 40 and 53 per cent, respectively, compared with untreated plants. Girdling was also reduced by the different treatments. Analysis of conifer seedlings treated with 5-Aza points at a possible involvement of epigenetic mechanisms in this defensive capacity. This is supported by a reduced level of DNA methylation in the needles of young spruce seedlings grown in a greenhouse from NIC-treated seeds. Seed treatment for seedling defense potentiation is simple, inexpensive and also a new approach for forestry with many potential applications.
Resumo:
Traditionally the issue of an optimum currency area is based on the theoretical underpinnings developed in the 1960s by McKinnon [13], Kenen [12] and mainly Mundell [14], who is concerned with the benefits of lowering transaction costs vis-à- vis adjustments to asymmetrical shocks. Recently, this theme has been reappraised with new aspects included in the analysis, such as: incomplete markets, credibility of monetary policy and seigniorage, among others. For instance, Neumeyer [15] develops a general equilibrium model with incomplete asset markets and shows that a monetary union is desirable when the welfare gains of eliminating the exchange rate volatility are greater than the cost of reducing the number of currencies to hedge against risks. In this paper, we also resort to a general equilibrium model to evaluate financial aspects of an optimum currency area. Our focus is to appraise the welfare of a country heavily dependent on foreign capital that may suffer a speculative attack on its public debt. The welfare analysis uses as reference the self-fulfilling debt crisis model of Cole and Kehoe ([6], [7] and [8]), which is employed here to represent dollarization. Under this regime, the national government has no control over its monetary policy, the total public debt is denominated in dollars and it is in the hands of international bankers. To describe a country that is a member of a currency union, we modify the original Cole-Kehoe model by including public debt denominated in common currency, only purchased by national consumers. According to this rule, the member countries regain some influence over the monetary policy decision, which is, however, dependent on majority voting. We show that for specific levels of dollar debt, to create inflation tax on common-currency debt in order to avoid an external default is more desirable than to suspend its payment, which is the only choice available for a dollarized economy when foreign creditors decide not to renew their loans.
Resumo:
In this paper we propose a dynamic stochastic general equilibrium model to evaluate financial adjustments that some emerging market economies went through to overcome external crises during the latest decades, such as default and local currency devaluation. We assume that real devaluation can be used to avoid external debt default, to improve trade balance and to reduce the real public debt level denominated in local currency. Such effects increase the government ability to deal with external crisis, but also have costs in terms of welfare, related to expected inflation, reductions in private investments and higher interest to be paid over the public debt. We conclude that openness improves expected welfare as it allows for a better devaluation-response technology against crises. We also present results for 32 middle-income countries, verifying that the proposed model can indicate, in a stylized way, the preferences for default-devaluation options and the magnitude of the currency depreciation required to overcome 48 external crises occurred as from 1971. Finally, as we construct our model based on the Cole-Kehoe self-fulfilling debt crisis model ([7]), adding local debt and trade, it is important to say that their policy alternatives to leave the crisis zone remains in our extended model, namely, to reduce the external debt level and to lengthen its maturity.
Resumo:
The purpose of this article is to contribute to the discussion of the financial aspects of dollarization and optimum currency areas. Based on the model of self-fulfilling debt crisis developed by Cole and Kehoe [4], it is possible to evaluate the comparative welfare of economies, which either keep their local currency and an independent monetary policy, join a monetary union or adopt dollarization. In the two former monetary regimes, governments can issue debt denominated, respectively, in local and common currencies, which is completely purchased by national consumers. Given this ability, governments may decide to impose an inflation tax on these assets and use the revenues so collected to avoid an external debt crises. While the country that issues its own currency takes this decision independently, a country belonging to a monetary union depends on the joint decision of all member countries about the common monetary policy. In this way, an external debt crises may be avoided under the local and common currency regimes, if, respectively, the national and the union central banks have the ability to do monetary policy, represented by the reduction in the real return on the bonds denominated in these currencies. This resource is not available under dollarization. In a dollarized economy, the loss of control over national monetary policy does not allow adjustments for exogenous shocks that asymmetrically affect the client and the anchor countries, but credibility is strengthened. On the other hand, given the ability to inflate the local currency, the central bank may be subject to the political influence of a government not so strongly concerned with fiscal discipline, which reduces the welfare of the economy. In a similar fashion, under a common currency regime, the union central bank may also be under the influence of a group of countries to inflate the common currency, even though they do not face external restrictions. Therefore, the local and common currencies could be viewed as a way to provide welfare enhancing bankruptcy, if it is not abused. With these peculiarities of monetary regimes in mind, we simulate the levels of economic welfare for each, employing recent data for the Brazilian economy.
Resumo:
Neonatal maternal separation (NMS) is a form of stress that interferes with the regulation of the stress response, an effect that predisposes to the emergence of panic and anxiety related disorders. We previously showed that at adulthood, awake female (but not male) rats subjected to NMS show a hypercapnic ventilatory response (HCVR; 5% CO(2)) that is 63% greater than controls (Genest et al., 2007). To understand the mechanisms underlying the sex-specific effects of NMS on the ventilatory response to CO(2), we used two different anesthetized female rat preparations to assess central CO(2) chemosensitivity and contribution of sensory afferents (stretch receptors and peripheral chemoreceptors) that influence the HCVR. Data show that anesthesia eliminated the respiratory phenotype observed previously in awake females and CO(2) chemosensitivity did not differ between groups. Finally, the assessment of the ovarian hormone levels across the oestrus cycle failed to reveal significant differences between groups. Since anesthesia did not affect the manifestation of NMS-related respiratory dysfunction in males (including the hypercapnic ventilatory response) (Kinkead et al., 2005; Dumont and Kinkead, 2010), we propose that the panic or anxiety induced by CO(2) during wakefulness is responsible for enhancement of the HCVR in NMS females. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
Ataques por piranhas vêm se tornando um problema comum em trechos represados de rios e córregos no estado de São Paulo, Sudeste do Brasil. em dois surtos ocorridos em dois municípios vizinhos no noroeste do estado, 74 banhistas foram mordidos. Uma mordida por pessoa foi registrada, em curto período do ano. As mordidas estão relacionadas a cuidado parental e/ou defesa do território de desova, o que reforça estudos anteriores e desmistifica os ataques por este peixe lendário, da maneira como são popularmente percebidos. A colocação de redes de malha fina e a remoção de vegetação aquática cessaram os ataques.