Search results for "Adversary"
showing 9 items of 29 documents
Deportation vs. Sanctuary: The Rationalities, Technologies, and Subjects of Finnish Sanctuary Practices
1969

 Evangelical Lutheran parishes and their representatives have provided sanctuaries for asylum seekers for forty years in Finland.Yet this activity became widely publicly recognized only after the Finnish Ecumenical Council released the “Church as Sanctuary” document in 2007.The parishes are assisted by many civic organizations (e.g.women’s organizations, Free Movement Network, Amnesty International, and Finnish Refugee Council) in providing sanctuary.They share the same opponent: the state’s strict asylum policy.The various parties involved in Finnish sanctuary incidents can be divided into two groups using the terminology of the Foucaldian analytics of pastoral power: a state pastor…
Decodificando la esencia del mal, o del terror a la muerte del hijo
2011
Durante muchos años filósofos y teólogos se han cuestionado sobre la cuestión de la caída. Es innumerable la bibliografía sobre el tema como así también las propias dudas sobre la omnipresencia y sabiduría de un Dios que implícitamente o no permite la presencia del pecado por medio de su propia creación. El mito fundador de querubín Lucifer no sólo simboliza la relación entre el hombre y la traición sino también el amor filial entre el padre y su creación las cuales concilian la negación cultural de la muerte de la progenie o generaciones más jóvenes. Utilizando la teoría antropológica de los dones de M. Mauss, el presente trabajo teórico intentará explicar el origen mítico del mal dentro d…
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.
The good, the bad and the ugly: images of the foreigner in contemporary criminal law
2018
Since the end of the Second World War, the criminal law of Western states has tried to legitimate itself, in basically democratic-republican terms, as primarily addressed towards citizens. During approximately the last 20 years, however, new dimensions of criminal law have emerged, which refer paradigmatically (not to the citizen, but) to the foreigner and subject him/her to worse legal treatment than that which is considered legitimate when either citizens or ‘good’ foreigners are concerned. Next to the ideal-type of the citizen criminal law (also applicable, by assimilation, to the ‘good’ foreigner) a criminal law for ‘ugly’ mass-foreigners (crimmigration) and one for ‘bad’ foreigners (en…
Towards digital cognitive clones for the decision-makers: adversarial training experiments
2021
Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…
The Critical Role of Morale in Ukraine’s Fight against the Russian Invasion
2020
The role of morale, also known as esprit de corps, in a high technology environment of the 21st century warfare, is poorly understood. The purpose of the study is to seek evidence for the proposition that the Ukraine’s population and military forces morale has neutralized the asymmetric difference in the military force of the two countries. The academic and practical implications have the potential to refocus military practice. An exploratory qualitative research method using theoretical sampling was used in this study. The study finds significant evidence for high morale as a balancing factor in the asymmetric differences of Russia and Ukraine, which explains Ukraine’s success against grea…
Technical, tactical and spatial indicators related to goal scoring in European elite soccer
2020
The aim of this study was to describe the technical, tactical and spatial indicators related to goal scoring in elite European soccer, considering the type of defence and the positioning of the opponent. For the analysis, 8 tactical dimensions related to the final actions in 380 sequences that led to goal during the UEFA Champions League were evaluated by observational methodology. 75.9% of the goals were scored from open play and 24.1% were scored from set pieces. Collective actions produced 51.6% of the total goals while individual actions produced 10.5% of goals. Regarding the penultimate action, crosses were more frequent against organized defences, while passes in behind the defence, o…
'REOFUT' as an Observation Tool for Tactical Analysis on Offensive Performance in Soccer: Mixed Method Perspective
2019
Performance analysis in complex sports like soccer requires the study of the influence of the interaction between both teams during the game on final performance. The mixed methods approach involves the collection, analysis, and interpretation of qualitative and quantitative data for the same purpose and within the framework of the same study. To build certain observation tools, mixed methods are necessary in order to take advantage of integration between qualitative and quantitative elements. The aim of this study was to develop a new no standard observation tool to analyze soccer offensive performance considering not only the observed team but also some aspects of the opponent behavior, a…
A Network-Based Framework for Mobile Threat Detection
2018
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…