Search results for "ATTAC"
showing 10 items of 610 documents
Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
2022
Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…
Accuracy of cotinine serum test to detect the smoking habit and its association with periodontal disease in a multicenter study
2016
Background The validity of the surveys on self-reported smoking status is often questioned because smokers underestimate cigarette use and deny the habit. It has been suggested that self-report should be accompanied by cotinine test. This report evaluates the usefulness of serum cotinine test to assess the association between smoking and periodontal status in a study with a large sample population to be used in studies with other serum markers in epidemiologic and periodontal medicine researches. Material and Methods 578 patients who were part of a multicenter study on blood biomarkers were evaluated about smoking and its relation to periodontal disease. Severity of periodontal disease was …
MODERN VOLLEYBALL ANALYSIS AND TRAINING PERIODIZATION
2018
The purpose of this study is to clarify the scientific approach to modern volleyball at men´s high-level and introduce the most influential studies, which still are not very well implemented in the world of volleyball. On individual level, requirements of modern volleyball consist psychological aspects like inner motivational and maintaining the focus during the game, which is difficult because there are a lot of breaks and successful and unsuccessful rallies in every volleyball match. Inner motivated player can push himself easier to the limits of his capacity during the game. Good focus and team routines keep the difference between won and lost rally small so that the player and the team …
Il "grattacielo" INA a Palermo: una progettazione complessa
2009
LA STRUTTURA IN CEMENTO ARMATO DEL “GRATTACIELO INA” A PALERMO
2009
Gio Ponti dalla scena al grattacielo. Un unico modo
2012
Adversarial Machine Learning in e-Health: Attacking a Smart Prescription System
2022
Machine learning (ML) algorithms are the basis of many services we rely on in our everyday life. For this reason, a new research line has recently emerged with the aim of investigating how ML can be misled by adversarial examples. In this paper we address an e-health scenario in which an automatic system for prescriptions can be deceived by inputs forged to subvert the model's prediction. In particular, we present an algorithm capable of generating a precise sequence of moves that the adversary has to take in order to elude the automatic prescription service. Experimental analyses performed on a real dataset of patients' clinical records show that a minimal alteration of the clinical record…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Environmental Stimulus Perception as an Incidence Factor in Social Interaction and Personality Development
2019
This paper seeks to analyze the impact of perceptual process, as a way of perceiving ourselves and others, as well as personality development and social attitudes which emerge from early interactions in the primary environment. Although many studies have highlighted the importance of early social interactions for both the genetic and psychobiological components of personality development, there is actually little data that examines the influence of these genetic factors on this process. This study focuses on the genetic bases of the perception process and its role in how we experience emotions and how we perceive the surrounding environment, starting with early interactions with caregivers.…