Search results for " THREAT"

showing 10 items of 113 documents

Prejudice Towards Muslims: A Study among Young People in the North-West Region of Cameroon

2020

Muslims and Christians in Cameroon have coexisted for decades within a shared context, but there are no studies that seek to understand the nature of Christian–Muslim intergroup relations within th...

060303 religions & theologyIntegrated threat theory05 social sciencesReligious studiesGender studiesContext (language use)06 humanities and the arts0603 philosophy ethics and religion0506 political scienceNorth westPolitical Science and International Relations050602 political science & public administrationSociologyPrejudice (legal term)Islam and Christian–Muslim Relations
researchProduct

An Investigation of the Roles of Group Identification, Perceived Ability, and Evaluative Conditions in Stereotype Threat Experiences

2019

The Multi-Threat Framework distinguishes six qualitatively distinct stereotype threats. Up to now, few studies have been performed to identify the situational and individual determinants of different stereotype threat experiences. This study investigates the role of group identification, perceived ability, and evaluative conditions (private/public) in six stereotype threat experiences for 261 French Physical Education Students. The results show that the expression level of the different stereotype threats does not vary according to evaluative conditions. In contrast, group identification affects all the forms of stereotype threats, and for three forms of stereotype threats, this effect is …

Adolescent050109 social psychology050105 experimental psychologyPhysical educationYoung AdultHumans0501 psychology and cognitive sciencesSituational ethicsStudentsPractical implicationsGeneral PsychologyStereotypingPhysical Education and TrainingSocial Identification05 social sciencesStereotype (UML)Contrast (statistics)Self ConceptGroup identificationStereotype threatExpression (architecture)FemaleFrancePsychologySocial psychologySportsPsychological Reports
researchProduct

Detection and distraction effects for threatening information in social phobia and change after treatment.

2007

This work examines differences in the detection and distraction by social-threatrelated information between a social phobia group (SP; N533) and a normal control group (NC; N532). The change obtained after psychological treatment is also studied for the SP group. A paper-and-pencil visual search task is used, in which the emotional valence of the ‘‘target’’ (social threat, physical threat, and neutral words) and ‘‘distractor’’ (social threat, physical threat, neutral, and nonsense words) verbal stimuli is manipulated. Results indicate that there are no differences in the detection of social-threat targets between SP and NC participants. However, the performance of SP individuals is more imp…

AdultMalemedicine.medical_specialtyEmotionsAttentional biasAudiologybehavioral disciplines and activitiesDevelopmental psychologyAntropofòbiaDistractionmedicineReaction TimeHumansAttentionValence (psychology)Psychological treatmentVisual searchPsicologia clínicaAttentional biasCognitive Behavioral TherapyVisual searchVerbal BehaviorFearControl GroupsPsychiatry and Mental healthClinical PsychologyPsicobiologiaPhobic DisordersSocial PerceptionVisual PerceptionAnxietyFemaleSocial threatDistractibilitymedicine.symptomCuesPsychologySocial phobiaArousalAfter treatmentFollow-Up StudiesDepression and anxiety
researchProduct

State of the Art Literature Review on Network Anomaly Detection

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatComputer science05 social sciences050801 communication & media studiesDenial-of-service attack02 engineering and technology021001 nanoscience & nanotechnologyComputer securitycomputer.software_genrenetwork anomaly detection0508 media and communicationsAnomaly detectionState (computer science)tietoturva0210 nano-technologyverkkohyökkäyksetcomputer
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

A Novel Deep Learning Stack for APT Detection

2019

We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…

Advanced persistent threatProcess (engineering)Computer science020209 energyDistributed computing02 engineering and technologylcsh:Technologylcsh:ChemistryStack (abstract data type)020204 information systemsAdvanced Persistent Thread (APT)0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencetietoturvalcsh:QH301-705.5Instrumentationta113Fluid Flow and Transfer Processeslcsh:Tbusiness.industryProcess Chemistry and TechnologyDeep learningGeneral EngineeringFlow networklcsh:QC1-999Computer Science Applicationsnetwork anomaly detectionkoneoppiminenlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Deep Learning (DL)Artificial intelligencelcsh:Engineering (General). Civil engineering (General)Raw databusinessverkkohyökkäyksetlcsh:Physics
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

Propagation of Calendula maritima Guss. (Asteraceae) through Biotechnological Techniques for Possible Usage in Phytotherapy

2022

The genus Calendula (Asteraceae) includes several species that are renowned for their therapeutic properties and/or use as ingredients in the preparation of cosmetics. The rare and critically endangered sea marigold, Calendula maritima Guss., an endemic species from Western Sicily, has also been recognized as a potential “farm plant species” for several important compounds used in cosmetics. However, the few remnant populations of this species are currently threatened with extinction because of several factors, such as hybridization with the congeneric species Calendula suffruticosa subsp. fulgida (Raf.) Guadagno and anthropogenic disturbance of its habitat. Therefore, in order to preserve …

Agronomy and Crop ScienceAsteraceae in vitro propagation secondary metabolites massive plant production genetic resources' conservation Mediterranean vascular flora threatened plants root induction
researchProduct

Awareness level of gender stereotype and stereotype threat effect on ingroup favoritism bias in mixed-gender basketball teams.

2016

BasketballbiologyAthletesmedia_common.quotation_subject05 social sciencesAwareness level050109 social psychologyStereotypeGroup dynamicbiology.organism_classification050105 experimental psychologyStereotype threat0501 psychology and cognitive sciencesMixed groupIn-group favoritismPsychologySocial psychologyGeneral Psychologymedia_commonCanadian Journal of Behavioural Science / Revue canadienne des sciences du comportement
researchProduct

Distribution, ecology, vegetation and conservation survey on the relictual population ofCarex panormitanaGuss. (Cyperaceae) in Sicily (Italy)

2013

We report the results of research on the Carex panormitana Guss. (Cyperaceae) population in Sicily, carried out within its locus classicus at the Oreto River (Palermo). The survey led to a morphological, biological and autoecological characterization, to the definition of the current distribution in the site, to an estimate of the number of individuals and to an analysis of its conservation status. The risk status was also assessed and the species was ascribed to the category Critically Endangered (CR), in accordance with the CR B1ab (ii, iii, v) and EN C1 IUCN criteria. Moreover, the phytosociological survey carried out on the meso-hygrophilous vegetation in which the species is dominant a…

Carexeducation.field_of_studyEcologybiologyCurrent distributionPhytosociologyEcologyphytosociologyPopulationForestryPlant Sciencecritically endangered speciebiology.organism_classificationHabitats Directive 92/43/EECCritically endangeredCarex panormitanapopulation analysisSettore BIO/03 - Botanica Ambientale E ApplicataIUCN Criteria and Direct ThreatIUCN Red ListConservation statusCyperaceaeCyperaceaeeducationEcology Evolution Behavior and SystematicsWebbia
researchProduct