Search results for " studi"

showing 10 items of 20942 documents

Die Alternative fuer Deutschland. Programmatik, Entwicklung und politische Verortung

2017

As an object of study, Germany’s new(-ish) Alternative fuer Deutschland party (AfD) is a moving target. Since its inception in early 2013, the party has gone from strength to strength and won parli...

021110 strategic defence & security studiesSociology and Political SciencePolitical science05 social sciencesPolitical Science and International Relations050602 political science & public administration0211 other engineering and technologies02 engineering and technologyObject (philosophy)Humanities0506 political scienceGerman Politics
researchProduct

“Save Romania” Union and the Persistent Populism in Romania

2020

The electoral success of the “Save Romania” Union (USR) in the 2016 parliamentary elections sheds new light on the rising populist parties in Romania and offers a new perspective on the Romanian po...

021110 strategic defence & security studiesSociology and Political ScienceRomanian05 social sciencesPerspective (graphical)0211 other engineering and technologies02 engineering and technologylanguage.human_language0506 political sciencePopulismPolitical economyPolitical scienceGeneral election050602 political science & public administrationlanguageProblems of Post-Communism
researchProduct

The Camorra and protection rackets: the cost to business

2016

Based on the observations from the judicial and investigative evidence provided by prosecutors in Camorra areas in Italy, this investigation provides an estimate of the economic impact of extortion racket to businesses. In particular, the estimates refer to the total and average withdrawal of monetary amounts from the businesses victimised by Camorra clans. Further insights are provided in terms of economic activities mostly victimised, and specifically the construction sector, which is subject to a different type of extortion racket.

021110 strategic defence & security studiesSociology and Political ScienceSettore SPS/08 - Sociologia Dei Processi Culturali E Comunicativi05 social sciences0211 other engineering and technologiesSubject (philosophy)02 engineering and technologyExtortionLawPolitical Science and International RelationsRacket050501 criminologyExtortion racket Camorra Mafia Impact.Settore SPS/07 - Sociologia GeneraleBusinessClanEconomic impact analysisextortion racket Camorra mafia impactLawcomputer0505 lawcomputer.programming_languageLaw and economics
researchProduct

Where Democrats Disagree: Citizens’ Normative Conceptions of Democracy

2017

While support for the essential norms of liberal electoral democracy is high in almost all developed democracies, there is arguably also a gap between democratic aspirations and democratic practice, leading to dissatisfaction among citizens. We argue that citizens may hold very different normative conceptions of democracy which are equally compatible with support for liberal democracy, but lead to different expectations where institutional design and democratic practice are concerned. Satisfaction with democracy may thus depend on congruence between such normative conceptions and institutionally entrenched norms. Drawing on survey data from Germany with a comprehensive item battery on attit…

021110 strategic defence & security studiesSociology and Political Sciencemedia_common.quotation_subject05 social sciences0211 other engineering and technologies02 engineering and technologyDemocracy0506 political sciencePolitical economyLawPolitical science050602 political science & public administrationNormativemedia_commonPolitical Studies
researchProduct

The consequences of supply gaps in two‐dimensional policy spaces for voter turnout and political support: The case of economically left‐wing and cult…

2019

Parties with left-wing positions on economic issues and right-wing (i.e., authoritarian) positions on cultural issues have been historically largely absent from the supply side of the policy space of Western European democracies. Yet, many citizens hold such left-authoritarian issue attitudes. This article addresses the hypotheses that left-authoritarian citizens are less likely to vote, less satisfied with the democratic process and have lower levels of political trust when there is a left-authoritarian supply gap. Using data for 14 Western European countries from the European Social Survey 2008 in the main analysis, it is shown that left-authoritarians are less likely to vote and exhibit …

021110 strategic defence & security studiesSociology and Political Sciencemedia_common.quotation_subject05 social sciencesAuthoritarianism0211 other engineering and technologies02 engineering and technologySpace (commercial competition)Affect (psychology)Democracy0506 political scienceEuropean Social SurveyPoliticsPolitical economyPolitical scienceVoting050602 political science & public administrationLeft-wing politicsmedia_commonEuropean Journal of Political Research
researchProduct

Language constraints in producing prefiguration posters for a scientific exhibition

1997

The museographic transposition of scientific knowledge leads notably to the preparation of exhibition posters. This is a delicate operation, on account of the constraints imposed by space, language, concepts and the text. These difficulties are even greater in the case of bovine reproduction biotechnologies, such as cloning, where knowledge is not yet stable. This paper deals with the choices made during the phase of museographic transposition. First of all, based on an epistemological approach, a historical analysis of knowledge-building underpins the choice of information to be presented. Language is then selected according to the linguistic analysis of a series of articles which popular…

021110 strategic defence & security studiesSociology of scientific knowledge010504 meteorology & atmospheric sciencesCloning (programming)CommunicationReproduction (economics)0211 other engineering and technologies02 engineering and technologySpace (commercial competition)01 natural sciencesExhibitionLinguistic analysisArts and Humanities (miscellaneous)AestheticsDevelopmental and Educational PsychologyTransposition (logic)SociologySocial science0105 earth and related environmental sciencesPublic Understanding of Science
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

The regression Tsetlin machine: a novel approach to interpretable nonlinear regression

2019

Relying simply on bitwise operators, the recently introduced Tsetlin machine (TM) has provided competitive pattern classification accuracy in several benchmarks, including text understanding. In this paper, we introduce the regression Tsetlin machine (RTM), a new class of TMs designed for continuous input and output, targeting nonlinear regression problems. In all brevity, we convert continuous input into a binary representation based on thresholding, and transform the propositional formula formed by the TM into an aggregated continuous output. Our empirical comparison of the RTM with state-of-the-art regression techniques reveals either superior or on par performance on five datasets. Thi…

021110 strategic defence & security studiesTheoretical computer scienceEmpirical comparisonComputer scienceGeneral Mathematics0211 other engineering and technologiesGeneral EngineeringGeneral Physics and AstronomyBinary number02 engineering and technologyThresholdingRegressionPropositional formula0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingBitwise operationTheme (computing)Nonlinear regressionVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct