Search results for "Intrusion"
showing 10 items of 159 documents
Intrusion Detection System Test Framework for SCADA Systems
2018
Anthropogenic threats drive spatio-temporal responses of wildcat on Mt. Etna
2021
Human expansion can cause disturbance and intrusion of invasive species, which are detrimental to small carnivores. We investigated how European wildcats responded to disturbance from mushroom collectors, cattle and feral pigs in Sicily, Italy. We used detections from 76 cameras over 2 surveys (2015–2016 and 2018; camera days = 1985) to run occupancy and co-occurrence models and estimate overlap in activity patterns between species pairs. During 2015–2016, wildcats were detected at the same location with cattle, mushroom hunters and feral pigs at 14.4%, 26.3% and 17.1% of cameras. During 2018, wildcats were detected at the same location with cattle, mushroom hunters and feral pigs at 7.8%, …
How partnerships end in guillemots Uria aalge : chance events, adaptive change, or forced divorce?
2007
Divorce in socially monogamous species can result from different mechanisms, for example, chance events, active desertion of the partner, or the intrusion of a third individual ousting the partner. We compared the predictions associated with such mechanisms with data from common guillemots (Uria aalge) breeding on the Isle of May, Scotland. The data cover the years 1982--2005 and show a yearly divorce rate of 10.2%. In most divorces (86%), one of the original partners moved to another breeding site, whereas the other bird stayed and bred with a new partner. On average, movers had a significantly lower breeding success after divorce, stayers were largely unaffected, whereas the incoming bird…
Robust Network Agreement on Logical Information
2011
Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…
Tolerating malicious monitors in detecting misbehaving robots
2008
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.
Experimental study of a naturally weathered stiff clay
2016
Studying the shear strength of a naturally weathered clay is important to understand rain-induced slope failures in weathered soils. However, experimental studies on naturally weathered soils are limited. The paper focuses on the laboratory experimental investigation carried out to analyse the shear strength of a naturally weathered stiff clay that can be found in unsaturated conditions in situ. This has an important practical relevance in the evaluation of the stability conditions of natural slopes at clay outcrops. Different experimental techniques of suction measurement were used to obtain the soil-water retention curve of the clay over a wide range of suctions. Scanning electronic micr…
The cross-cultural and transdiagnostic nature of unwanted mental intrusions
2019
Unwanted mental intrusions (UMIs), typically discussed in relation to Obsessive-Compulsive Disorder (OCD), are highly prevalent, regardless of the specific nationality, religion, and/or cultural context. Studies have also shown that UMIs related to Body Dysmorphic Disorder (BDD), Illness anxiety/Hypochondriasis (IA-H), and Eating Disorders (EDs) are commonly experienced. However, the influence of culture on these UMIs and their transdiagnostic nature has not been investigated.Participants were 1,473 non-clinical individuals from seven countries in Europe, the Middle-East, and South America. All the subjects completed the Questionnaire of Unpleasant Intrusive Thoughts, which assesses the occ…
Functional links of obsessive, dysmorphic, hypochondriac, and eating-disorders related mental intrusions.
2017
Unwanted mental intrusions (UMIs) are the normal variants of obsessions in Obsessive-Compulsive Disorder (OCD), preoccupations about defects in Body Dysmorphic Disorder (BDD), images about illness in Hypochondriasis (HYP), and thoughts about eating in Eating Disorders (EDs). The aim was to examine the similarities and differences in the functional links of four UMI contents, adopting a within-subject perspective.Las intrusiones mentales no deseadas (IM) son la variante normativa de obsesiones en el Trastorno Obsesivo-Compulsivo (TOC), preocupaciones por defectos en el Trastorno Dismórfico Corporal (TDC), imágenes sobre enfermedad en Hipocondría (TH) y pensamientos sobre alimentación en los …
Thermomineral waters of Greece: geochemical characterization
2020
Edge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning
2022
Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across thes…