Search results for " studi"
showing 10 items of 20942 documents
Die Alternative fuer Deutschland. Programmatik, Entwicklung und politische Verortung
2017
As an object of study, Germany’s new(-ish) Alternative fuer Deutschland party (AfD) is a moving target. Since its inception in early 2013, the party has gone from strength to strength and won parli...
“Save Romania” Union and the Persistent Populism in Romania
2020
The electoral success of the “Save Romania” Union (USR) in the 2016 parliamentary elections sheds new light on the rising populist parties in Romania and offers a new perspective on the Romanian po...
The Camorra and protection rackets: the cost to business
2016
Based on the observations from the judicial and investigative evidence provided by prosecutors in Camorra areas in Italy, this investigation provides an estimate of the economic impact of extortion racket to businesses. In particular, the estimates refer to the total and average withdrawal of monetary amounts from the businesses victimised by Camorra clans. Further insights are provided in terms of economic activities mostly victimised, and specifically the construction sector, which is subject to a different type of extortion racket.
Where Democrats Disagree: Citizens’ Normative Conceptions of Democracy
2017
While support for the essential norms of liberal electoral democracy is high in almost all developed democracies, there is arguably also a gap between democratic aspirations and democratic practice, leading to dissatisfaction among citizens. We argue that citizens may hold very different normative conceptions of democracy which are equally compatible with support for liberal democracy, but lead to different expectations where institutional design and democratic practice are concerned. Satisfaction with democracy may thus depend on congruence between such normative conceptions and institutionally entrenched norms. Drawing on survey data from Germany with a comprehensive item battery on attit…
The consequences of supply gaps in two‐dimensional policy spaces for voter turnout and political support: The case of economically left‐wing and cult…
2019
Parties with left-wing positions on economic issues and right-wing (i.e., authoritarian) positions on cultural issues have been historically largely absent from the supply side of the policy space of Western European democracies. Yet, many citizens hold such left-authoritarian issue attitudes. This article addresses the hypotheses that left-authoritarian citizens are less likely to vote, less satisfied with the democratic process and have lower levels of political trust when there is a left-authoritarian supply gap. Using data for 14 Western European countries from the European Social Survey 2008 in the main analysis, it is shown that left-authoritarians are less likely to vote and exhibit …
Language constraints in producing prefiguration posters for a scientific exhibition
1997
The museographic transposition of scientific knowledge leads notably to the preparation of exhibition posters. This is a delicate operation, on account of the constraints imposed by space, language, concepts and the text. These difficulties are even greater in the case of bovine reproduction biotechnologies, such as cloning, where knowledge is not yet stable. This paper deals with the choices made during the phase of museographic transposition. First of all, based on an epistemological approach, a historical analysis of knowledge-building underpins the choice of information to be presented. Language is then selected according to the linguistic analysis of a series of articles which popular…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
2019
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
2019
Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.
The regression Tsetlin machine: a novel approach to interpretable nonlinear regression
2019
Relying simply on bitwise operators, the recently introduced Tsetlin machine (TM) has provided competitive pattern classification accuracy in several benchmarks, including text understanding. In this paper, we introduce the regression Tsetlin machine (RTM), a new class of TMs designed for continuous input and output, targeting nonlinear regression problems. In all brevity, we convert continuous input into a binary representation based on thresholding, and transform the propositional formula formed by the TM into an aggregated continuous output. Our empirical comparison of the RTM with state-of-the-art regression techniques reveals either superior or on par performance on five datasets. Thi…