984 resultados para Attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role of religious leaders in promoting social cohesion and ‘shared security’ is increasingly being examined by scholars, as is the growing multifaith movement. The VIIIth World Assembly of Religions for Peace first proposed the notion of ‘shared security’ and the importance of religious leaders’ role in advancing such a concept in Kyoto 2006. A recent study, Managing the Impact of Global Crisis Events on Community Relations in Multicultural Australia (Bouma et al. 2007) has documented the impacts of international crisis events and discourses of exclusion on religiously diverse communities in Australia, in particular rising Islamophobia, migrantophobia and attacks on multiculturalism. Religious communities have been far from passive in their responses to the impact of these events initiating dialogue and educational activities to dispel negative stereotypes and attitudes. State actors, including police, have prioritized engagement with religious leaders resulting in a rise of state supported multifaith and secular-religious peacebuilding activities. This paper argues that, in response to global risks of terror and exclusion, secular-religious networks including religious leaders, state actors, educators and the media have the potential to advance ‘shared security’ in multifaith societies, by drawing on Australian experiences documented in the Global Crisis Events study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years a heightened awareness of global risks has produced an unprecedented interest in global peace and security initiatives. This article discusses the impact of international crisis events on religiously diverse communities in Australia, in particular rising Islamophobia, migrantophobia and attacks on multiculturalism. Religious communities have been far from passive in their responses to the impact of these events, initiating dialogue and educational activities to dispel negative stereotypes and attitudes. In addition, state actors, including police, have prioritized engagement with religious leaders, and this has resulted in a rise of state supported multifaith peacebuilding activities. The article argues that, in response to global risks of terror and exclusion, multifaith movements and multi-actor networks, including religious leaders, state actors, educators and the media, have the potential to advance common security. In response to conflicts both local and global, these examples of cooperation between religious and non-religious actors in Australia can be instructive to other increasingly multifaith societies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the trust issue in wireless sensor networks is emerging as one important factor in security schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper we categorize various types of attacks and countermeasures related to trust schemes in WSNs. Furthermore, we provide the development of trust mechanisms, give a short summarization of classical trust methodologies and emphasize the challenges of trust scheme in WSNs. An extensive literature survey is presented by summarizing state-of-the-art trust mechanisms in two categories: secure routing and secure data. Based on the analysis of attacks and the existing research, an open field and future direction with trust mechanisms in WSNs is provided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fabrics made from natural fibers, such as wool and cotton, are susceptible to attacks from micro-organisms, which may damage the fabrics and harm the human body. Antimicrobial finishing of natural textile products may involve harmful and non-environmentally friendly chemicals. In this study, a natural antibacterial agent, capsaicin, was coated on the surface of wool fabrics by a sol-gel process. The antibacterial properties of coated fabrics were evaluated against test bacteria Escherichia coli according to the American Association of Textile Chemists and Colorists (AATCC) method and standard American Society for Testing and Materials (ASTM) E2149-01. Compared with the control group (sol-gel coated fabric without capsaicin), the capsaicin-coated fabric inhibited bacterial growth markedly after 24 hours incubation at 37°C. The antibacterial efficiency after laundry washes was also investigated. Good durability to washing of capsaicin on fabric was achieved by the sol-gel coating technique.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work proposes a novel dual-channel time-spread echo method for audio watermarking, aiming to improve robustness and perceptual quality. At the embedding stage, the host audio signal is divided into two subsignals, which are considered to be signals obtained from two virtual audio channels. The watermarks are implanted into the two subsignals simultaneously. Then the subsignals embedded with watermarks are combined to form the watermarked signal. At the decoding stage, the watermarked signal is split up into two watermarked subsignals. The similarity of the cepstra corresponding to the watermarked subsignals is exploited to extract the embedded watermarks. Moreover, if a properly designed colored pseudonoise sequence is used, the large peaks of its auto-correlation function can be utilized to further enhance the performance of watermark extraction. Compared with the existing time-spread echo-based schemes, the proposed method is more robust to attacks and has higher imperceptibility. The effectiveness of our method is demonstrated by simulation results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The problem of extracting infrequent patterns from streams and building associations between these patterns is becoming increasingly relevant today as many events of interest such as attacks in network data or unusual stories in news data occur rarely. The complexity of the problem is compounded when a system is required to deal with data from multiple streams. To address these problems, we present a framework that combines the time based association mining with a pyramidal structure that allows a rolling analysis of the stream and maintains a synopsis of the data without requiring increasing memory resources. We apply the algorithms and show the usefulness of the techniques. © 2007 Crown Copyright.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a smartphone application that helps people with Autism Spectrum Disorder (ASD) cope with anxiety attacks. Our prototype provides a one-touch interface for indicating a panic level. The device's response-to instruct, soothe, and/or contact carers-is sensitive to the user's context, consisting of time, location, ambient noise, and nearby friends. Formative evaluation unearths a critical challenge to building assistive technologies for ASD sufferers: can regimented interfaces foster flexible behaviour? Our observations suggest that a delicate balance of design goals is required for a viable assistive technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SQL injection vulnerabilities poses a severe threat to web applications as an SQL Injection Attack (SQLIA) could adopt new obfuscation techniques to evade and thwart countermeasures such as Intrusion Detection Systems (IDS). SQLIA gains access to the back-end database of vulnerable websites, allowing hackers to execute SQL commands in a web application resulting in financial fraud and website defacement. The lack of existing models in providing protections against SQL injection has motivated this paper to present a new and enhanced model against web database intrusions that use SQLIA techniques. In this paper, we propose a novel concept of negative tainting along with SQL keyword analysis for preventing SQLIA and described our that we implemented. We have tested our proposed model on all types of SQLIA techniques by generating SQL queries containing legitimate SQL commands and SQL Injection Attack. Evaluations have been performed using three different applications. The results show that our model protects against 100% of tested attacks before even reaching the database layer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A convergence of emotions among people in social networks is potentially resulted by the occurrence of an unprecedented event in real world. E.g., a majority of bloggers would react angrily at the September 11 terrorist attacks. Based on this observation, we introduce a sentiment index, computed from the current mood tags in a collection of blog posts utilizing an affective lexicon, potentially revealing subtle events discussed in the blogosphere. We then develop a method for extracting events based on this index and its distribution. Our second contribution is establishment of a new bursty structure in text streams termed a sentiment burst. We employ a stochastic model to detect bursty periods of moods and the events associated. Our results on a dataset of more than 12 million mood-tagged blog posts over a 4-year period have shown that our sentiment-based bursty events are indeed meaningful, in several ways.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smartphones are mobile phones that offer processing power and features like personal computers (PC) with the aim of improving user productivity as they allow users to access and manipulate data over networks and Internet, through various mobile applications. However, with such anywhere and anytime functionality, new security threats and risks of sensitive and personal data are envisaged to evolve. With the emergence of open mobile platforms that enable mobile users to install applications on their own, it opens up new avenues for propagating malware among various mobile users very quickly. In particular, they become crossover targets of PC malware through the synchronization function between smartphones and computers. Literature lacks detailed analysis of smartphones malware and synchronization vulnerabilities. This paper addresses these gaps in literature, by first identifying the similarities and differences between smartphone malware and PC malware, and then by investigating how hackers exploit synchronization vulnerabilities to launch their attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While considerable attention has been given to the spate of attacks on Indian students in Australia in 2009 and 2010, less attention has been paid to how the students who were at the centre of the furore perceived the violence. In this paper we explore the perceptions of Indian postgraduate and undergraduate male students studying in Melbourne, Australia, based on data gathered in focus groups. Analysis revealed four broad themes in students' explanations for the attacks: race hate versus opportunism, intercultural issues, systemic ineffectiveness, and media reporting. Students' perceptions of the reasons for the attacks were divided in some areas and aligned in others. There was divergence among students about whether the attacks were race hate crime or opportunistic, and about intercultural issues. Students' perceptions were aligned on issues of systemic ineffectiveness and media reporting. In the current context of decreased international enrolments from Indian students, in which we seek to better understand them, the findings provide implications for international student policy and planning priorities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and frequency of cyber-attacks designed to take advantage of unsuspecting personnel are increasing, the significance of the human factor in information security management cannot be understated. In order to counter cyber-attacks designed to exploit human factors in information security chain, information security awareness with an objective to reduce information security risks that occur due to human related vulnerabilities is paramount. This paper discusses and evaluates the effects of various information security awareness delivery methods used in improving end-users’ information security awareness and behaviour. There are a wide range of information security awareness delivery methods such as web-based training materials, contextual training and embedded training. In spite of efforts to increase information security awareness, research is scant regarding effective information security awareness delivery methods. To this end, this study focuses on determining the security awareness delivery method that is most successful in providing information security awareness and which delivery method is preferred by users. We conducted information security awareness using text-based, game-based and video-based delivery methods with the aim of determining user preferences. Our study suggests that a combined delivery methods are better than individual security awareness delivery method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel patchwork-based embedding and decoding scheme for digital audio watermarking. At the embedding stage, an audio segment is divided into two subsegments and the discrete cosine transform (DCT) coefficients of the subsegments are computed. The DCT coefficients related to a specified frequency region are then partitioned into a number of frame pairs. The DCT frame pairs suitable for watermark embedding are chosen by a selection criterion and watermarks are embedded into the selected DCT frame pairs by modifying their coefficients, controlled by a secret key. The modifications are conducted in such a way that the selection criterion used at the embedding stage can be applied at the decoding stage to identify the watermarked DCT frame pairs. At the decoding stage, the secret key is utilized to extract watermarks from the watermarked DCT frame pairs. Compared with existing patchwork watermarking methods, the proposed scheme does not require information of which frame pairs of the watermarked audio signal enclose watermarks and is more robust to conventional attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis investigated the problem of strategic manipulation of feedback attacks and proposed an approach that makes trust management systems sufficiently robust against feedback manipulation attacks. The new trust management system enables potential service consumers to determine the risk level of a service before committing to proceed with the transaction.