Search results for "Intrusion"

showing 10 items of 159 documents

Intrusion Detection System Test Framework for SCADA Systems

2018

010302 applied physics010309 opticsSCADAComputer sciencebusiness.industryEmbedded system0103 physical sciencesIntrusion detection systembusiness01 natural sciencesTest (assessment)Proceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

Anthropogenic threats drive spatio-temporal responses of wildcat on Mt. Etna

2021

Human expansion can cause disturbance and intrusion of invasive species, which are detrimental to small carnivores. We investigated how European wildcats responded to disturbance from mushroom collectors, cattle and feral pigs in Sicily, Italy. We used detections from 76 cameras over 2 surveys (2015–2016 and 2018; camera days = 1985) to run occupancy and co-occurrence models and estimate overlap in activity patterns between species pairs. During 2015–2016, wildcats were detected at the same location with cattle, mushroom hunters and feral pigs at 14.4%, 26.3% and 17.1% of cameras. During 2018, wildcats were detected at the same location with cattle, mushroom hunters and feral pigs at 7.8%, …

0106 biological sciencesMushroomOccupancyInvasive speciesbusiness.industryMushroom huntersZoologyManagement Monitoring Policy and LawBiology010603 evolutionary biology01 natural sciencesInvasive species010605 ornithologyActivityIntrusionCamera-trappingDisturbance (ecology)Co-occurrenceLivestockCattlebusinessEcology Evolution Behavior and SystematicsWildcatNature and Landscape Conservation
researchProduct

How partnerships end in guillemots Uria aalge : chance events, adaptive change, or forced divorce?

2007

Divorce in socially monogamous species can result from different mechanisms, for example, chance events, active desertion of the partner, or the intrusion of a third individual ousting the partner. We compared the predictions associated with such mechanisms with data from common guillemots (Uria aalge) breeding on the Isle of May, Scotland. The data cover the years 1982--2005 and show a yearly divorce rate of 10.2%. In most divorces (86%), one of the original partners moved to another breeding site, whereas the other bird stayed and bred with a new partner. On average, movers had a significantly lower breeding success after divorce, stayers were largely unaffected, whereas the incoming bird…

0106 biological sciencesreunification rateEcologycommon guillemots05 social sciencesAdaptive changeBiologybiology.organism_classification010603 evolutionary biology01 natural sciencesforced divorceIntrusionauks (Alcidae)pair bondscommon murresAccidentalUria aalge0501 psychology and cognitive sciencesAnimal Science and Zoology050102 behavioral science & comparative psychologyNegative correlationEcology Evolution Behavior and SystematicsDemographyDiversity (business)
researchProduct

Robust Network Agreement on Logical Information

2011

Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…

0209 industrial biotechnology020901 industrial engineering & automationTheoretical computer scienceSettore ING-INF/04 - AutomaticaComputer scienceDistributed computingIntrusion detection security robust logical consensus networked and distributed systems.0202 electrical engineering electronic engineering information engineering020207 software engineeringTopology (electrical circuits)02 engineering and technologyIntrusion detection systemProtocol (object-oriented programming)
researchProduct

Tolerating malicious monitors in detecting misbehaving robots

2008

This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.

0209 industrial biotechnologybusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsContext (language use)security02 engineering and technologyMotion (physics)consensus algorithm020901 industrial engineering & automationSettore ING-INF/04 - AutomaticaWork (electrical)Embedded system0202 electrical engineering electronic engineering information engineeringRobotDistributed software architectureIntrusion detectionmulti-agent systemsSoftware architecturebusiness
researchProduct

Experimental study of a naturally weathered stiff clay

2016

Studying the shear strength of a naturally weathered clay is important to understand rain-induced slope failures in weathered soils. However, experimental studies on naturally weathered soils are limited. The paper focuses on the laboratory experimental investigation carried out to analyse the shear strength of a naturally weathered stiff clay that can be found in unsaturated conditions in situ. This has an important practical relevance in the evaluation of the stability conditions of natural slopes at clay outcrops. Different experimental techniques of suction measurement were used to obtain the soil-water retention curve of the clay over a wide range of suctions. Scanning electronic micr…

021110 strategic defence & security studiesNaturally weathered clayUnsaturated undisturbed clayExpansive clayIsotropy0211 other engineering and technologiesMineralogy02 engineering and technologyGeotechnical Engineering and Engineering Geologycomplex mixturesnaturally weathered clay unsaturated undisturbed clay water retention behaviour shear strengthShear (geology)Shear strengthSoil waterGeotechnical engineeringWater retention behaviourMercury intrusion porosimetryTriaxial compressionGeology021101 geological & geomatics engineeringCivil and Structural Engineering
researchProduct

The cross-cultural and transdiagnostic nature of unwanted mental intrusions

2019

Unwanted mental intrusions (UMIs), typically discussed in relation to Obsessive-Compulsive Disorder (OCD), are highly prevalent, regardless of the specific nationality, religion, and/or cultural context. Studies have also shown that UMIs related to Body Dysmorphic Disorder (BDD), Illness anxiety/Hypochondriasis (IA-H), and Eating Disorders (EDs) are commonly experienced. However, the influence of culture on these UMIs and their transdiagnostic nature has not been investigated.Participants were 1,473 non-clinical individuals from seven countries in Europe, the Middle-East, and South America. All the subjects completed the Questionnaire of Unpleasant Intrusive Thoughts, which assesses the occ…

050103 clinical psychologyUnwanted mentalCross-sectional studyCultural contextUnwanted mental intrusions050109 social psychologyTransdiagnósticoObsessive-compulsive spectrum disordersmental disordersmedicineCross-cultural0501 psychology and cognitive sciencesCross-cultural studyEstudio transculturalCross-sectional studyTransdiagnosticTrastornos del espectro obsesivo-compulsivo05 social sciencesCross-cultural study; Cross-sectional study; Obsessive-Compulsive spectrum disorders; Transdiagnostic; Unwanted mental intrusions; Clinical Psychologymedicine.diseaseEstudio transversalEating disordersClinical PsychologyOriginals articleObsessive-Compulsive spectrum disordersBody dysmorphic disorderAnxietyIntrusiones mentales no deseadasmedicine.symptomPsychologyClinical psychology
researchProduct

Functional links of obsessive, dysmorphic, hypochondriac, and eating-disorders related mental intrusions.

2017

Unwanted mental intrusions (UMIs) are the normal variants of obsessions in Obsessive-Compulsive Disorder (OCD), preoccupations about defects in Body Dysmorphic Disorder (BDD), images about illness in Hypochondriasis (HYP), and thoughts about eating in Eating Disorders (EDs). The aim was to examine the similarities and differences in the functional links of four UMI contents, adopting a within-subject perspective.Las intrusiones mentales no deseadas (IM) son la variante normativa de obsesiones en el Trastorno Obsesivo-Compulsivo (TOC), preocupaciones por defectos en el Trastorno Dismórfico Corporal (TDC), imágenes sobre enfermedad en Hipocondría (TH) y pensamientos sobre alimentación en los …

050103 clinical psychologymedicine.medical_specialtyOriginal article03 medical and health sciencesMental intrusions0302 clinical medicineBody dysmorphic disordermedicineObsessive-compulsive disordertrastorno dismórfico corporal0501 psychology and cognitive sciencesIntrusiones mentalesPsychiatryCross-sectional studyTransdiagnostictransdiagnóstico05 social sciencesPerspective (graphical)trastorno obsesivo-compulsivomedicine.disease030227 psychiatryClinical PsychologyEating disordersestudio transversalBody dysmorphic disorderPsychologyInternational journal of clinical and health psychology : IJCHP
researchProduct

Thermomineral waters of Greece: geochemical characterization

2020

75 °C). In terms of pH most results vary from 5.5 to 823 °C) ii) warm (23 40 °C) iii) thermal (40 75 °C) and iv) hyperthermal (&gtfew springs show either very low pH (&lt10) proposing serpentinization processes. Regarding TDS concentrations collected waters can be subdivided into low salinity (up to 1.5 g/L) brackish (up to 20 g/L) and saline (up to 43 g/L). The medium high salinities can be justified by mixing with sea water and/or strong waterrock interaction processes. Isotope composition of O and H ranges from 12.7 to +2.7 ‰ SMOW and from 91 to +12 ‰ SMOW respectively and is generally comprised between the Global Meteoric Water Line and the East Mediterranean Meteoric Water Line. Only few water samples show a positive shift for δ18O possibly related to high temperature waterrock interaction processes. Carbon dioxide (18 997000 μmol/mol) or N2 (1100 989000 μmol/mol) or CH4 (&ltMany geothermal areas of Greece are located in regions affected by Miocene or Quaternary volcanism and in continental basins characterised by elevated heat flow. Moreover the majority of them is found along the coast as well as in islands of the Aegean Sea and thus thermal water is often brackish to saline due to marine intrusion into costal aquifer. In the present study almost 300 thermal and cold mineral water samples were collected along the Hellenic territory with their physicochemical parameters (temperature pH electrical conductivity and Eh) and the amount of bicarbonates (titration with 0.1N HCl) being determined in situ. Additionally gases found either in free or dissolved phase were sampled. Both water and gas samples were analysed at the INGVPa laboratories for major ions (Ion Chromatography) silica (Inductively Coupled Plasma Optical Emission Spectrometry) chemical composition of free and dissolved gases (Gas Chromatography) water isotopes (O and H) and carbon and helium isotopes of free and dissolved gases (Mass Spectrometry). The temperature of the investigated waters ranges from 6.5 to 98°C pH from 1.96 to 11.98 whilst Total Dissolved Solids (TDS) from 0.06 to 43 g/L. Based on the temperature parameter waters can be divided into four groups: i) cold (&lt0.5 913000 μmol/mol) are the prevailing gas species found in the studied sites. The δ13CCO2 values ranged from 20.1 to +8.5 ‰ whilst the isotope ratio of He from 0.21 to 6.71 R/RA.4) suggesting interaction with H2Srich gases or very high pH values (&gtSettore GEO/08 - Geochimica E Vulcanologia
researchProduct

Edge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning

2022

Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across thes…

: Computer science [C05] [Engineering computing & technology]Federated deep learning[SPI] Engineering Sciences [physics]Intrusion detection systemEdge computing: Sciences informatiques [C05] [Ingénierie informatique & technologie]C-V2X
researchProduct