Search results for " THREAT"
showing 10 items of 113 documents
Prejudice Towards Muslims: A Study among Young People in the North-West Region of Cameroon
2020
Muslims and Christians in Cameroon have coexisted for decades within a shared context, but there are no studies that seek to understand the nature of Christian–Muslim intergroup relations within th...
An Investigation of the Roles of Group Identification, Perceived Ability, and Evaluative Conditions in Stereotype Threat Experiences
2019
The Multi-Threat Framework distinguishes six qualitatively distinct stereotype threats. Up to now, few studies have been performed to identify the situational and individual determinants of different stereotype threat experiences. This study investigates the role of group identification, perceived ability, and evaluative conditions (private/public) in six stereotype threat experiences for 261 French Physical Education Students. The results show that the expression level of the different stereotype threats does not vary according to evaluative conditions. In contrast, group identification affects all the forms of stereotype threats, and for three forms of stereotype threats, this effect is …
Detection and distraction effects for threatening information in social phobia and change after treatment.
2007
This work examines differences in the detection and distraction by social-threatrelated information between a social phobia group (SP; N533) and a normal control group (NC; N532). The change obtained after psychological treatment is also studied for the SP group. A paper-and-pencil visual search task is used, in which the emotional valence of the ‘‘target’’ (social threat, physical threat, and neutral words) and ‘‘distractor’’ (social threat, physical threat, neutral, and nonsense words) verbal stimuli is manipulated. Results indicate that there are no differences in the detection of social-threat targets between SP and NC participants. However, the performance of SP individuals is more imp…
State of the Art Literature Review on Network Anomaly Detection
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
A Novel Deep Learning Stack for APT Detection
2019
We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
Propagation of Calendula maritima Guss. (Asteraceae) through Biotechnological Techniques for Possible Usage in Phytotherapy
2022
The genus Calendula (Asteraceae) includes several species that are renowned for their therapeutic properties and/or use as ingredients in the preparation of cosmetics. The rare and critically endangered sea marigold, Calendula maritima Guss., an endemic species from Western Sicily, has also been recognized as a potential “farm plant species” for several important compounds used in cosmetics. However, the few remnant populations of this species are currently threatened with extinction because of several factors, such as hybridization with the congeneric species Calendula suffruticosa subsp. fulgida (Raf.) Guadagno and anthropogenic disturbance of its habitat. Therefore, in order to preserve …
Awareness level of gender stereotype and stereotype threat effect on ingroup favoritism bias in mixed-gender basketball teams.
2016
Distribution, ecology, vegetation and conservation survey on the relictual population ofCarex panormitanaGuss. (Cyperaceae) in Sicily (Italy)
2013
We report the results of research on the Carex panormitana Guss. (Cyperaceae) population in Sicily, carried out within its locus classicus at the Oreto River (Palermo). The survey led to a morphological, biological and autoecological characterization, to the definition of the current distribution in the site, to an estimate of the number of individuals and to an analysis of its conservation status. The risk status was also assessed and the species was ascribed to the category Critically Endangered (CR), in accordance with the CR B1ab (ii, iii, v) and EN C1 IUCN criteria. Moreover, the phytosociological survey carried out on the meso-hygrophilous vegetation in which the species is dominant a…