903 resultados para Fatal attacks


Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this study we evaluated an attacked-by-piranha human male cadaver in Mato Grosso’s Pantanal.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Suicide attacks have raised the stakes for officers deciding whether or not to shoot a suspect ('Police Officer's Terrorist Dilemma'). Despite high-profile errors we know little about how trust in the police is affected by their response to the terrorist threat. Building on a conceptualisation of lay observers as intuitive signal detection theorists, a general population sample (N= 1153) were presented with scenarios manipulated in terms of suspect status (Armed/Unarmed), officer decision (Shoot/Not Shoot) and outcome severity (e.g. suspect armed with Bomb/Knife; police shoot suspect/ suspect plus child bystander). Supporting predictions, people showed higher trust in officers who made correct decisions. reflecting good discrimination ability and who decided to shoot, reflecting an 'appropriate' response bias given the relative costs and benefits. This latter effect was moderated by (a) outcome severity, suggesting it did not simply reflect a preference for a particular type of action, and (b) preferences for a tough stance towards terrorism indexed by Right-Wing Authoritarianism (RWA). Despite loss of civilian life, failure to prevent minor terror attacks resulted in no loss of trust amongst people low in RWA. whereas among people high in RWA trust was positive when police erroneously shot all unarmed suspect. Relations to alternative definitions of trust and procedural justice research are discussed. Copyright (C),. 2007 John Wiley & Sons, Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe a fatal attack by a black caiman (Melanosuchus niger) on an 11-year-old child with comments on the reptile's aggression mechanisms and the conditions under which this kind of incident takes place in the Amazon region. © 2011 Wilderness Medical Society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Conflicts between humans and big cats have been known for centuries throughout the world, but have intensified in recent decades. Recently, attacks by Panthera onca on humans in Brazil have been brought to the forefront through exposure in the press and because of the severity of the attacks. We report 3 cases of patients attacked by jaguars in provoked and predatory situations. Two patients survived the attacks and one died. Attack mechanisms and lesions in victims are discussed. The attacks demonstrate a real risk of accidents from jaguars in certain regions, such as the Pantanal and the Amazon. © 2011 Wilderness Medical Society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.