Search results for "ATTAC"
showing 10 items of 610 documents
How do early family systems predict emotion recognition in middle childhood?
2021
Facial emotion recognition (FER) is a fundamental element in human interaction. It begins to develop soon after birth and is important in achieving developmental tasks of middle childhood, such as developing mutual friendships and acquiring social rules of peer groups. Despite its importance, FER research during middle childhood continues to be rather limited. Moreover, research is ambiguous on how the quality of one's early social-emotional environment shapes FER development, and longitudinal studies spanning from infancy to later development are scarce. In this study, we examine how the cohesive, authoritarian, disengaged and enmeshed family system types, assessed during pregnancy and inf…
Place Attachment and Its Consequence for Landscape-Scale Management and Readiness to Participate: Social Network Complexity in the Post-Soviet Rural …
2019
This paper uses the tripartite place attachment framework to examine six rural parishes across Estonia and Latvia. Existing analyses/frameworks on participatory processes often neglect the complexity of relationships that rural residents have to their local environments. From a qualitative analysis of face-to-face, semi-structured interviews with case study area inhabitants (23 interviews in Estonia and 27 in Latvia), we depict varying degrees of attachment of individuals to each other and to the place in which they live and their readiness to participate in terms of willingness and ability to participate in a landscape-scale management process. Attachment to the local area was strongest wh…
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…
Detection of behavioural patterns in Olympic male taekwondo athletes
2017
The relationship between athletes’ behaviours is relevant for developing defensive and offensive strategies. Traditionally, sequential analysis has been conducted to assess relationships between two behaviours (one considered as focal and the other as conditioned). The aim of the study was to examine Olympic taekwondo athletes’ behavioural patterns by conducting sequential analyses of tactical actions in bouts. Seventy-five male matches of the London Olympic Games in 2012 were studied to analyse tactical actions: attack (direct and indirect), counterattack (anticipatory, simultaneous and posterior), defensive (cuts, blocks and dodges), and opening actions. A sequential analysis of 2 lags (i…
Different Wings Flowfields Interaction on the Wing-Propeller Coupling
1997
A high-portability numerical technique based on the method of free wake analysis (FWA) is described that analyzes the interference between an aircraft propeller and a wing having different planforms and computes the influence of the wing aerodynamic field on the propeller performance. For an isolated propeller and wing, the models employed are based on the FWA and Prandtl theory, respectively. The performance of the propeller in the presence of the wing is related to the wing angle of attack and to the variation of wing circulation and the corresponding induced velocity at the propeller disk. A numerical model, previously and successfully used, was implemented to account for the effects of …
Guanxi, performance and innovation in entrepreneurial service projects
2013
PurposeThis paper aims to analyze the role played by two dimensions of entrepreneurs' private social capital in the survival, growth and innovativeness of entrepreneurial service ventures: local size and preferential attachment degree.Design/methodology/approachData were collected by a questionnaire, the unit of investigation being the private entrepreneur in the service sector in the city of Shanghai. The questionnaire allows the authors to identify the social network of the entrepreneurs, estimate the empirical degree distribution for the entire sample, and estimate local size and preferential attachment degree.FindingsThere is empirical evidence that entrepreneurs do not create social ne…
Socioemotional characteristics of minors in foster care: A comparison between the estimation of parents, teachers and children
2013
Abstract During the child's first few years, it's of fundamental importance the presence of a strong emotional base as long as it creates the possibility to open themselves to physical and social world with confidence, and as it acts as a facilitator of cognitive development. For this reason, if the family cannot ensure such base, social services are forced to resort to foster care, a resource that has a lot of difficulties, leading to different implications in the development of the child and of the foster family. It is therefore important to analyze in depth the socio-emotional variables that characterize children who are in a situation of foster care in order to provide adequate assistan…
Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context
2021
Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…
Eliciting Information on the Vulnerability Black Market from Interviews
2010
Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
2007
A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …