Sample records for adversarial risk analysis

  1. Modeling intelligent adversaries for terrorism risk assessment: some necessary conditions for adversary models.

    PubMed

    Guikema, Seth

    2012-07-01

    Intelligent adversary modeling has become increasingly important for risk analysis, and a number of different approaches have been proposed for incorporating intelligent adversaries in risk analysis models. However, these approaches are based on a range of often-implicit assumptions about the desirable properties of intelligent adversary models. This "Perspective" paper aims to further risk analysis for situations involving intelligent adversaries by fostering a discussion of the desirable properties for these models. A set of four basic necessary conditions for intelligent adversary models is proposed and discussed. These are: (1) behavioral accuracy to the degree possible, (2) computational tractability to support decision making, (3) explicit consideration of uncertainty, and (4) ability to gain confidence in the model. It is hoped that these suggested necessary conditions foster discussion about the goals and assumptions underlying intelligent adversary modeling in risk analysis. © 2011 Society for Risk Analysis.

  2. Adversarial risk analysis with incomplete information: a level-k approach.

    PubMed

    Rothschild, Casey; McLay, Laura; Guikema, Seth

    2012-07-01

    This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.

  3. Adversarial Risk Analysis for Urban Security Resource Allocation.

    PubMed

    Gil, César; Rios Insua, David; Rios, Jesus

    2016-04-01

    Adversarial risk analysis (ARA) provides a framework to deal with risks originating from intentional actions of adversaries. We show how ARA may be used to allocate security resources in the protection of urban spaces. We take into account the spatial structure and consider both proactive and reactive measures, in that we aim at both trying to reduce criminality as well as recovering as best as possible from it, should it happen. We deal with the problem by deploying an ARA model over each spatial unit, coordinating the models through resource constraints, value aggregation, and proximity. We illustrate our approach with an example that uncovers several relevant policy issues. © 2016 Society for Risk Analysis.

  4. Validation of Rational Deterrence Theory: Analysis of U.S. Government and Adversary Risk Propensity and Relative Emphasis on Gain or Loss

    DTIC Science & Technology

    2010-03-01

    policy (Achen & Snidal, 1989). Huth and Russett (1984) emphasize : “if we do not know how deterrence works when it is most needed, policies assigned...application of deterrence to U.S. adversaries in these policies. Analysis of risk propensity and relative emphases on loss/gain of those actors...research, the strategic environment. Evidence of such assessment may reflect an adversary’s risk propensities and relative emphases on loss/gain; however

  5. Modeling Opponents in Adversarial Risk Analysis.

    PubMed

    Rios Insua, David; Banks, David; Rios, Jesus

    2016-04-01

    Adversarial risk analysis has been introduced as a framework to deal with risks derived from intentional actions of adversaries. The analysis supports one of the decisionmakers, who must forecast the actions of the other agents. Typically, this forecast must take account of random consequences resulting from the set of selected actions. The solution requires one to model the behavior of the opponents, which entails strategic thinking. The supported agent may face different kinds of opponents, who may use different rationality paradigms, for example, the opponent may behave randomly, or seek a Nash equilibrium, or perform level-k thinking, or use mirroring, or employ prospect theory, among many other possibilities. We describe the appropriate analysis for these situations, and also show how to model the uncertainty about the rationality paradigm used by the opponent through a Bayesian model averaging approach, enabling a fully decision-theoretic solution. We also show how as we observe an opponent's decision behavior, this approach allows learning about the validity of each of the rationality models used to predict his decision by computing the models' (posterior) probabilities, which can be understood as a measure of their validity. We focus on simultaneous decision making by two agents. © 2015 Society for Risk Analysis.

  6. Evaluating the risk of patient re-identification from adverse drug event reports

    PubMed Central

    2013-01-01

    Background Our objective was to develop a model for measuring re-identification risk that more closely mimics the behaviour of an adversary by accounting for repeated attempts at matching and verification of matches, and apply it to evaluate the risk of re-identification for Canada’s post-marketing adverse drug event database (ADE).Re-identification is only demonstrably plausible for deaths in ADE. A matching experiment between ADE records and virtual obituaries constructed from Statistics Canada vital statistics was simulated. A new re-identification risk is considered, it assumes that after gathering all the potential matches for a patient record (all records in the obituaries that are potential matches for an ADE record), an adversary tries to verify these potential matches. Two adversary scenarios were considered: (a) a mildly motivated adversary who will stop after one verification attempt, and (b) a highly motivated adversary who will attempt to verify all the potential matches and is only limited by practical or financial considerations. Methods The mean percentage of records in ADE that had a high probability of being re-identified was computed. Results Under scenario (a), the risk of re-identification from disclosing the province, age at death, gender, and exact date of the report is quite high, but the removal of province brings down the risk significantly. By only generalizing the date of reporting to month and year and including all other variables, the risk is always low. All ADE records have a high risk of re-identification under scenario (b), but the plausibility of that scenario is limited because of the financial and practical deterrent even for highly motivated adversaries. Conclusions It is possible to disclose Canada’s adverse drug event database while ensuring that plausible re-identification risks are acceptably low. Our new re-identification risk model is suitable for such risk assessments. PMID:24094134

  7. The Adversarial Route Analysis Tool: A Web Application

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Casson, William H. Jr.

    2012-08-02

    The Adversarial Route Analysis Tool is a type of Google maps for adversaries. It's a web-based Geospatial application similar to Google Maps. It helps the U.S. government plan operations that predict where an adversary might be. It's easily accessible and maintainble and it's simple to use without much training.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversarys task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significantmore » funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.« less

  9. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Darby, John L.

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using anmore » adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.« less

  10. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    PubMed

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  11. On the Concept and Definition of Terrorism Risk.

    PubMed

    Aven, Terje; Guikema, Seth

    2015-12-01

    In this article, we provide some reflections on how to define and understand the concept of terrorism risk in a professional risk assessment context. As a basis for this discussion we introduce a set of criteria that we believe should apply to any conceptualization of terrorism risk. These criteria are based on both criteria used in other areas of risk analysis and our experience with terrorism risk analysis. That is, these criteria offer our perspective. We show that several of the suggested perspectives and definitions have weaknesses in relation to these criteria. A main problem identified is the idea that terrorism risk can be conceptualized as a function of probability and consequence, not as a function of the interactions between adaptive individuals and organizations. We argue that perspectives based solely on probability and consequence should be used cautiously or not at all because they fail to reflect the essential features of the concept of terrorism risk, the threats and attacks, their consequences, and the uncertainties, all in the context of adaptation by the adversaries. These three elements should in our view constitute the main pillars of the terrorism risk concept. From this concept we can develop methods for assessing the risk by identifying a set of threats, attacks, and consequence measures associated with the possible outcome scenarios together with a description of the uncertainties and interactions between the adversaries. © 2015 Society for Risk Analysis.

  12. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyers, C A; Powers, S S; Faissol, D M

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform futuremore » studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.« less

  13. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model (PREPRINT)

    DTIC Science & Technology

    2009-02-20

    Dengue • Listeria monocytogenes • Filoviruses coronavirus ( SARS -CoV) • Campylobacter jejuni • Ebola • Yersinia enterocolitica) • Marburg...OF: 17. LIMITATION OF ABSTRACT Same as Report ( SAR ) 18. NUMBER OF PAGES 29 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...which may be to maximize the consequences they can inflict (Golany et al., Figure 2: Decision Tree Example  7    Submitted to Risk Analysis

  14. Recent Trends in Adversarial Attitudes among American Newspaper Journalists: A Cohort Analysis.

    ERIC Educational Resources Information Center

    Zhu, Jian-Hua

    A study explored the question of whether there is an adversary press, by examining the recent trends in adversarial attitudes among newspaper journalists in the United States. Using a differentiation model for delineating the nature and boundaries of American adversarial journalism, the study re-analyzed the data from two national surveys. The…

  15. Proposed Doctrine Based Structure of the Armored Reconnaissance Squadron

    DTIC Science & Technology

    2017-06-09

    adversarial, non -state non -adversarial and International Organizations (IO). Non -state adversarial are groups that oppose the interest and priorities of...Canada and its partners; these groups include violent extremist organizations and criminal organizations. Non - state non -adversarial are groups that... Grouping can be executed to facilitate control , communications, function or output of a collection. Recall, that for the purpose of this analysis

  16. Engineering Trade-off Considerations Regarding Design-for-Security, Design-for-Verification, and Design-for-Test

    NASA Technical Reports Server (NTRS)

    Berg, Melanie; Label, Kenneth

    2018-01-01

    The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.

  17. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  18. A Forensically Sound Adversary Model for Mobile Devices.

    PubMed

    Do, Quang; Martini, Ben; Choo, Kim-Kwang Raymond

    2015-01-01

    In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device.

  19. A Forensically Sound Adversary Model for Mobile Devices

    PubMed Central

    Choo, Kim-Kwang Raymond

    2015-01-01

    In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device. PMID:26393812

  20. Adaptation of a multi-resolution adversarial model for asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Rosenberg, Brad; Gonsalves, Paul G.

    2006-05-01

    Recent military operations have demonstrated the use by adversaries of non-traditional or asymmetric military tactics to offset US military might. Rogue nations with links to trans-national terrorists have created a highly unpredictable and potential dangerous environment for US military operations. Several characteristics of these threats include extremism in beliefs, global in nature, non-state oriented, and highly networked and adaptive, thus making these adversaries less vulnerable to conventional military approaches. Additionally, US forces must also contend with more traditional state-based threats that are further evolving their military fighting strategies and capabilities. What are needed are solutions to assist our forces in the prosecution of operations against these diverse threat types and their atypical strategies and tactics. To address this issue, we present a system that allows for the adaptation of a multi-resolution adversarial model. The developed model can then be used to support both training and simulation based acquisition requirements to effectively respond to such an adversary. The described system produces a combined adversarial model by merging behavior modeling at the individual level with aspects at the group and organizational level via network analysis. Adaptation of this adversarial model is performed by means of an evolutionary algorithm to build a suitable model for the chosen adversary.

  1. A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nithyanand, Rishab; Solis, John H.

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributionsmore » are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.« less

  2. An Analysis of Technology Transition Within the Department of Defense

    DTIC Science & Technology

    2010-06-01

    relentless adversaries, it is essential that the DoD performs technology transition in a practical yet expedient manner. Time is a critical factor in...themselves, rather than rely on DOD labs to do so—a practice that brings cost and schedule risk since programs may well find themselves addressing problems...that utilized non-traditional, industry practices to abate the difficulties bringing technologies to a suitable maturation state. Albeit these

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less

  4. Quantitative Risk Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Helms, J.

    2017-02-10

    The US energy sector is vulnerable to multiple hazards including both natural disasters and malicious attacks from an intelligent adversary. The question that utility owners, operators and regulators face is how to prioritize their investments to mitigate the risks from a hazard that can have the most impact on the asset of interest. In order to be able to understand their risk landscape and develop a prioritized mitigation strategy, they must quantify risk in a consistent way across all hazards their asset is facing. Without being able to quantitatively measure risk, it is not possible to defensibly prioritize security investmentsmore » or evaluate trade-offs between security and functionality. Development of a methodology that will consistently measure and quantify risk across different hazards is needed.« less

  5. Chemical facility vulnerability assessment project.

    PubMed

    Jaeger, Calvin D

    2003-11-14

    Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal attacks (VAM-CF). The project also included a report to the Department of Justice for Congress that in addition to describing the VAM-CF also addressed general observations related to security practices, threats and risks at chemical facilities and chemical transport. In the development of the VAM-CF Sandia leveraged the experience gained from the use and development of VAs in other areas and the input from the chemical industry and Federal agencies. The VAM-CF is a systematic, risk-based approach where risk is a function of the severity of consequences of an undesired event, the attack potential, and the likelihood of adversary success in causing the undesired event. For the purpose of the VAM-CF analyses Risk is a function of S, L(A), and L(AS), where S is the severity of consequence of an event, L(A) is the attack potential and L(AS) likelihood of adversary success in causing a catastrophic event. The VAM-CF consists of 13 basic steps. It involves an initial screening step, which helps to identify and prioritize facilities for further analysis. This step is similar to the prioritization approach developed by the American Chemistry Council (ACC). Other steps help to determine the components of the risk equation and ultimately the risk. The VAM-CF process involves identifying the hazardous chemicals and processes at a chemical facility. It helps chemical facilities to focus their attention on the most critical areas. The VAM-CF is not a quantitative analysis but, rather, compares relative security risks. If the risks are deemed too high, recommendations are developed for measures to reduce the risk. This paper will briefly discuss the CFVA project and VAM-CF process.

  6. Context-Aware Generative Adversarial Privacy

    NASA Astrophysics Data System (ADS)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  7. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.

    PubMed

    He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-02-24

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor.

  8. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †

    PubMed Central

    Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-01-01

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor. PMID:29495291

  9. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  10. Bring a gun to a gunfight: armed adversaries and violence across nations.

    PubMed

    Felson, Richard B; Berg, Mark T; Rogers, Meghan L

    2014-09-01

    We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. With God on our side: Religious primes reduce the envisioned physical formidability of a menacing adversary.

    PubMed

    Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy

    2016-01-01

    The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Extracting Knowledge from Graph Data in Adversarial Settings

    NASA Astrophysics Data System (ADS)

    Skillicorn, David

    Graph data captures connections and relationships among individuals, and between individuals and objects, places, and times. Because many of the properties f graphs are emergent, they are resistant to manipulation by adversaries. This robustness comes at the expense of more-complex analysis algorithms. We describe several approaches to analysing graph data, illustrating with examples from the relationships within al Qaeda.

  13. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

    DTIC Science & Technology

    2013-11-01

    the number of TorPS samples, and let D (x) be the absolute difference between the empirical CDF and the true CDF at x. The Dvoretzky– Kiefer–Wolfowitz...0.05 0.06 0.07 Fraction of streams 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Cu m ul at iv e pr ob ab ili ty typical bittorrent irc worst best ( d ...Adversaries) IRC (2 Adversaries) IRC (3 Adversaries) Typical (1 Adversary) Typical (2 Adversaries) Typical (3 Adversaries) ( d ) Varying time to first

  14. Evaluating Moving Target Defense with PLADD

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, Stephen T.; Outkin, Alexander V.; Gearhart, Jared Lee

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. Wemore » show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.« less

  15. GANViz: A Visual Analytics Approach to Understand the Adversarial Game.

    PubMed

    Wang, Junpeng; Gou, Liang; Yang, Hao; Shen, Han-Wei

    2018-06-01

    Generative models bear promising implications to learn data representations in an unsupervised fashion with deep learning. Generative Adversarial Nets (GAN) is one of the most popular frameworks in this arena. Despite the promising results from different types of GANs, in-depth understanding on the adversarial training process of the models remains a challenge to domain experts. The complexity and the potential long-time training process of the models make it hard to evaluate, interpret, and optimize them. In this work, guided by practical needs from domain experts, we design and develop a visual analytics system, GANViz, aiming to help experts understand the adversarial process of GANs in-depth. Specifically, GANViz evaluates the model performance of two subnetworks of GANs, provides evidence and interpretations of the models' performance, and empowers comparative analysis with the evidence. Through our case studies with two real-world datasets, we demonstrate that GANViz can provide useful insight into helping domain experts understand, interpret, evaluate, and potentially improve GAN models.

  16. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    NASA Astrophysics Data System (ADS)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  17. Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.

    PubMed

    Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip

    2018-02-01

    Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.

  18. Understanding policy persistence-The case of police drug detection dog policy in NSW, Australia.

    PubMed

    Hughes, Caitlin E; Ritter, Alison; Lancaster, Kari; Hoppe, Robert

    2017-06-01

    Significant research attention has been given to understanding the processes of drug policy reform. However, there has been surprisingly little analysis of the persistence of policy in the face of opposition and evidence of ineffectiveness. In this article we analysed just such a case - police drug detection dog policy in NSW, Australia. We sought to identify factors which may account for the continuation of this policy, in spite of counter-evidence and concerted advocacy. The analysis was conducted using the Advocacy Coalition Framework (ACF). We collated documents relating to NSW drug detection dog policy from 1995 to 2016, including parliamentary records (NSW Parliament Hansard), government and institutional reports, legislation, police procedures, books, media, and academic publications. Texts were then read, coded and classified against the core dimensions of the ACF, including subsystem actors and coalitions, their belief systems and resources and venues employed for policy debate. Three coalitions were identified as competing in the policy subsystem: security/law and order, civil liberties and harm reduction. Factors that aided policy stability were the continued dominance of the security/law and order coalition since they introduced the drug dog policy; a power imbalance enabling the ruling coalition to limit when and where the policy was discussed; and a highly adversarial policy subsystem. In this context even technical knowledge that dogs infringed civil liberties and increased risks of overdose were readily downplayed, leading to only incremental changes in implementation rather than policy cessation or wholesale revision. The analysis provides new insights into why the accumulation of new evidence and advocacy efforts can be insufficient to drive significant policy change. It poses a challenge for the evidence-based paradigm suggesting that in highly adversarial policy subsystems new evidence is unlikely to generate policy change without broader subsystem change, such as reducing the adversarial nature and/or providing new avenues for cross-coalition learning. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Interrater reliability of Violence Risk Appraisal Guide scores provided in Canadian criminal proceedings.

    PubMed

    Edens, John F; Penson, Brittany N; Ruchensky, Jared R; Cox, Jennifer; Smith, Shannon Toney

    2016-12-01

    Published research suggests that most violence risk assessment tools have relatively high levels of interrater reliability, but recent evidence of inconsistent scores among forensic examiners in adversarial settings raises concerns about the "field reliability" of such measures. This study specifically examined the reliability of Violence Risk Appraisal Guide (VRAG) scores in Canadian criminal cases identified in the legal database, LexisNexis. Over 250 reported cases were located that made mention of the VRAG, with 42 of these cases containing 2 or more scores that could be submitted to interrater reliability analyses. Overall, scores were skewed toward higher risk categories. The intraclass correlation (ICCA1) was .66, with pairs of forensic examiners placing defendants into the same VRAG risk "bin" in 68% of the cases. For categorical risk statements (i.e., low, moderate, high), examiners provided converging assessment results in most instances (86%). In terms of potential predictors of rater disagreement, there was no evidence for adversarial allegiance in our sample. Rater disagreement in the scoring of 1 VRAG item (Psychopathy Checklist-Revised; Hare, 2003), however, strongly predicted rater disagreement in the scoring of the VRAG (r = .58). (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  20. Cybersecurity Roadmap for the United States

    DTIC Science & Technology

    2010-04-01

    economic, political, and military world. This unprecedented capability to connect a globalized world carries significant risk and opportunity for cyber ... criminals , spies, and state or non-state adversaries to exploit cybersecurity weaknesses for their own gain.

  1. Adversarial Risk Analysis for Dynamic Network Routing

    DTIC Science & Technology

    2011-03-20

    Attacker’s strategy space A . Then the Defender finds IEP [ã ′] = ∑I i=1 piai, where ã is Attacker’s choice of IED sites, which is unknown and thus...r∈D IEP [ã ′]Y r, where Y is the (actual) payoff matrix for the Defender. In order to construct P , we describe the mirroring argument. The...Attacker will try to find argmax P∈P IEP [ã ′]X̃(ω)IEQ[·|ω][r̃], (3) which elicits one mixed-strategy. Next, allowing ω to have non-unitary support

  2. Adversarial reasoning: challenges and approaches

    NASA Astrophysics Data System (ADS)

    Kott, Alexander; Ownby, Michael

    2005-05-01

    This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-world problems, the paper explores the lessons learned in the CADET -- a battle planning system that focuses on brigade-level ground operations and involves adversarial reasoning. From this example of current capabilities, the paper proceeds to describe RAID -- a DARPA program that aims to build capabilities in adversarial reasoning, and how such capabilities would address practical requirements in Defense and other application areas.

  3. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    DTIC Science & Technology

    2016-08-01

    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program

  4. Game theoretic analysis of physical protection system design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canion, B.; Schneider, E.; Bickel, E.

    The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less

  5. Energy Theft in the Advanced Metering Infrastructure

    NASA Astrophysics Data System (ADS)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  6. Using adversary text to detect adversary phase changes.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Speed, Ann Elizabeth; Doser, Adele Beatrice; Warrender, Christina E.

    2009-05-01

    The purpose of this work was to help develop a research roadmap and small proof ofconcept for addressing key problems and gaps from the perspective of using text analysis methods as a primary tool for detecting when a group is undergoing a phase change. Self- rganizing map (SOM) techniques were used to analyze text data obtained from the tworld-wide web. Statistical studies indicate that it may be possible to predict phase changes, as well as detect whether or not an example of writing can be attributed to a group of interest.

  7. Probabilistic Characterization of Adversary Behavior in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  8. Secure Localization in the Presence of Colluders in WSNs

    PubMed Central

    Barbeau, Michel; Corriveau, Jean-Pierre; Garcia-Alfaro, Joaquin; Yao, Meng

    2017-01-01

    We address the challenge of correctly estimating the position of wireless sensor network (WSN) nodes in the presence of malicious adversaries. We consider adversarial situations during the execution of node localization under three classes of colluding adversaries. We describe a decentralized algorithm that aims at determining the position of nodes in the presence of such colluders. Colluders are assumed to either forge or manipulate the information they exchange with the other nodes of the WSN. This algorithm allows location-unknown nodes to successfully detect adversaries within their communication range. Numeric simulation is reported to validate the approach. Results show the validity of the proposal, both in terms of localization and adversary detection. PMID:28817077

  9. Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation

    DTIC Science & Technology

    1998-04-01

    34AFRL-HE-WP-TR-1999-0216 UNITED STATES AIR FORCE RESEARCH LABORATORY STUDIES AND ANALYSES OF AIDED ADVERSARIAL DECISION MAKING PHASE 2: RESEARCH ON...Analyses of Aided Adversarial Decision Making . C: F41624-94-D-6000 Phase 2: Research on Human Trust in Automation PE: 62202F PR: 7184 6. AUTHOR(S) TA...Buffalo. This work focused on Aided Adversarial Decision Making (AADM) in Information Warfare (1W) environments. Previous work examined informational

  10. An analytic approach to cyber adversarial dynamics

    NASA Astrophysics Data System (ADS)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  11. Static-99R reporting practices in sexually violent predator cases: Does norm selection reflect adversarial allegiance?

    PubMed

    Chevalier, Caroline S; Boccaccini, Marcus T; Murrie, Daniel C; Varela, Jorge G

    2015-06-01

    We surveyed experts (N = 109) who conduct sexually violent predator (SVP) evaluations to obtain information about their Static-99R score reporting and interpretation practices. Although most evaluators reported providing at least 1 normative sample recidivism rate estimate, there were few other areas of consensus. Instead, reporting practices differed depending on the side for which evaluators typically performed evaluations. Defense evaluators were more likely to endorse reporting practices that convey the lowest possible level of risk (e.g., routine sample recidivism rates, 5-year recidivism rates) and the highest level of uncertainty (e.g., confidence intervals, classification accuracy), whereas prosecution evaluators were more likely to endorse practices suggesting the highest possible level of risk (e.g., high risk/need sample recidivism rates, 10-year recidivism rates). Reporting practices from state-agency evaluators tended to be more consistent with those of prosecution evaluators than defense evaluators, although state-agency evaluators were more likely than other evaluators to report that it was at least somewhat difficult to choose an appropriate normative comparison group. Overall, findings provide evidence for adversarial allegiance in Static-99R score reporting and interpretation practices. (c) 2015 APA, all rights reserved).

  12. I feel good whether my friends win or my foes lose: brain mechanisms underlying feeling similarity.

    PubMed

    Aue, Tatjana

    2014-07-01

    People say they enjoy both seeing a preferred social group succeed and seeing an adversary social group fail. At the same time, they state they dislike seeing a preferred social group fail and seeing an adversary social group succeed. The current magnetic resonance imaging study investigated whether-and if so, how-such similarities in reported feeling states are reflected in neural activities. American football fans anticipated success and failure situations for their favorite or their adversary teams. The data support the idea that feeling similarities and divergences expressed in verbal reports carry with them significant neural similarities and differences, respectively. Desired (favorite team likely to win and adversary team likely to lose) rather than undesired (favorite team likely to lose and adversary team likely to win) outcomes were associated with heightened activity in the supramarginal gyrus, posterior cingulate cortex, insula, and cerebellum. Precuneus activity additionally distinguished anticipated desirable outcomes for favorite versus adversary teams. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. 78 FR 55772 - Culturally Significant Objects Imported for Exhibition Determinations: “American Adversaries...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... DEPARTMENT OF STATE [Public Notice 8464] Culturally Significant Objects Imported for Exhibition Determinations: ``American Adversaries: West and Copley in a Transatlantic World'' SUMMARY: Notice is hereby... objects to be included in the exhibition ``American Adversaries: West and Copley in a Transatlantic World...

  14. Arguing with Adversaries: Aikido, Rhetoric, and the Art of Peace

    ERIC Educational Resources Information Center

    Kroll, Barry M.

    2008-01-01

    The Japanese martial art of aikido affords a framework for understanding argument as harmonization rather than confrontation. Two movements, circling away ("tenkan") and entering in ("irimi"), suggest tactics for arguing with adversaries. The ethical imperative of aikido involves protecting one's adversary from harm, using the least force…

  15. The macroeconomics of Dr. Strangelove

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    John, A.A.; Pecchenino, R.A.; Schreft, S.L.

    1993-03-01

    This paper examines the weapons-accumulation decisions of two adversarial countries in the context of a deterrence/conflict initiation game embedded in an overlapping-generations model. The demographic structure permits analysis of both within- and between-country intergenerational externalities caused by past weapons-accumulation decisions, as well as of intragenerational externalities from the adversary's current weapons accumulation. Zero accumulation is a possible equilibrium with both noncooperative and cooperative behavior. Countries may also accumulate weapons to the point where conflict initiation never occurs. Pareto-improving policies are generally available, but international cooperation need not be Pareto-improving. 15 refs., 12 figs.

  16. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  17. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  18. Generative Adversarial Networks for Noise Reduction in Low-Dose CT.

    PubMed

    Wolterink, Jelmer M; Leiner, Tim; Viergever, Max A; Isgum, Ivana

    2017-12-01

    Noise is inherent to low-dose CT acquisition. We propose to train a convolutional neural network (CNN) jointly with an adversarial CNN to estimate routine-dose CT images from low-dose CT images and hence reduce noise. A generator CNN was trained to transform low-dose CT images into routine-dose CT images using voxelwise loss minimization. An adversarial discriminator CNN was simultaneously trained to distinguish the output of the generator from routine-dose CT images. The performance of this discriminator was used as an adversarial loss for the generator. Experiments were performed using CT images of an anthropomorphic phantom containing calcium inserts, as well as patient non-contrast-enhanced cardiac CT images. The phantom and patients were scanned at 20% and 100% routine clinical dose. Three training strategies were compared: the first used only voxelwise loss, the second combined voxelwise loss and adversarial loss, and the third used only adversarial loss. The results showed that training with only voxelwise loss resulted in the highest peak signal-to-noise ratio with respect to reference routine-dose images. However, CNNs trained with adversarial loss captured image statistics of routine-dose images better. Noise reduction improved quantification of low-density calcified inserts in phantom CT images and allowed coronary calcium scoring in low-dose patient CT images with high noise levels. Testing took less than 10 s per CT volume. CNN-based low-dose CT noise reduction in the image domain is feasible. Training with an adversarial network improves the CNNs ability to generate images with an appearance similar to that of reference routine-dose CT images.

  19. Gender Identity and Adversarial Sexual Beliefs as Predictors of Attitudes toward Sexual Harassment.

    ERIC Educational Resources Information Center

    Murrell, Audrey J.; Dietz-Uhler, Beth L.

    1993-01-01

    Examines impact of gender identity and adversarial sexual beliefs as predictors of attitudes toward sexual harassment for 52 female and 55 male college students. Adversarial beliefs and experience with sexual harassment predict less tolerant attitudes toward harassment for males, whereas strong gender group identity and experience with harassment…

  20. Multipath Very-Simplified Estimate of Adversary Sequence Interruption v. 2.1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Snell, Mark K.

    2017-10-10

    MP VEASI is a training tool that models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.

  1. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  2. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks

    PubMed Central

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails. PMID:29515478

  3. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less

  4. Security risk assessment: applying the concepts of fuzzy logic.

    PubMed

    Bajpai, Shailendra; Sachdeva, Anish; Gupta, J P

    2010-01-15

    Chemical process industries (CPI) handling hazardous chemicals in bulk can be attractive targets for deliberate adversarial actions by terrorists, criminals and disgruntled employees. It is therefore imperative to have comprehensive security risk management programme including effective security risk assessment techniques. In an earlier work, it has been shown that security risk assessment can be done by conducting threat and vulnerability analysis or by developing Security Risk Factor Table (SRFT). HAZOP type vulnerability assessment sheets can be developed that are scenario based. In SRFT model, important security risk bearing factors such as location, ownership, visibility, inventory, etc., have been used. In this paper, the earlier developed SRFT model has been modified using the concepts of fuzzy logic. In the modified SRFT model, two linguistic fuzzy scales (three-point and four-point) are devised based on trapezoidal fuzzy numbers. Human subjectivity of different experts associated with previous SRFT model is tackled by mapping their scores to the newly devised fuzzy scale. Finally, the fuzzy score thus obtained is defuzzyfied to get the results. A test case of a refinery is used to explain the method and compared with the earlier work.

  5. Detecting nuclear materials smuggling: performance evaluation of container inspection policies.

    PubMed

    Gaukler, Gary M; Li, Chenhua; Ding, Yu; Chirayath, Sunil S

    2012-03-01

    In recent years, the United States, along with many other countries, has significantly increased its detection and defense mechanisms against terrorist attacks. A potential attack with a nuclear weapon, using nuclear materials smuggled into the country, has been identified as a particularly grave threat. The system for detecting illicit nuclear materials that is currently in place at U.S. ports of entry relies heavily on passive radiation detectors and a risk-scoring approach using the automated targeting system (ATS). In this article we analyze this existing inspection system and demonstrate its performance for several smuggling scenarios. We provide evidence that the current inspection system is inherently incapable of reliably detecting sophisticated smuggling attempts that use small quantities of well-shielded nuclear material. To counter the weaknesses of the current ATS-based inspection system, we propose two new inspection systems: the hardness control system (HCS) and the hybrid inspection system (HYB). The HCS uses radiography information to classify incoming containers based on their cargo content into "hard" or "soft" containers, which then go through different inspection treatment. The HYB combines the radiography information with the intelligence information from the ATS. We compare and contrast the relative performance of these two new inspection systems with the existing ATS-based system. Our studies indicate that the HCS and HYB policies outperform the ATS-based policy for a wide range of realistic smuggling scenarios. We also examine the impact of changes in adversary behavior on the new inspection systems and find that they effectively preclude strategic gaming behavior of the adversary. © 2011 Society for Risk Analysis.

  6. Beyond the Moscow Treaty: Alternative Perspectives on the Future Roles and Utility of Nuclear Weapons

    DTIC Science & Technology

    2008-03-01

    Adversarial Tripolarity ................................................................................... VII-1 VIII. Fallen Nuclear Dominoes...power dimension, it is possible to imagine a best case (deep concert) and a worst case (adversarial tripolarity ) and some less extreme outcomes, one...vanquished and the sub-regions have settled into relative stability). 5. Adversarial U.S.-Russia-China tripolarity : In this world, the regional

  7. Potential criminal adversaries of nuclear programs: a portrait

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jenkins, B.M.

    1980-07-01

    This paper examines the possibility that terrorists or other kinds of criminals might attempt to seize or sabotage a nuclear facility, steal nuclear material, or carry out other criminal activities in the nuclear domain which has created special problems for the security of nuclear programs. This paper analyzes the potential threat. Our tasks was to describe the potential criminal adversary, or rather the spectrum of potential adversaries who conceivably might carry out malevolent criminal actions against nuclear programs and facilities. We were concerned with both the motivations as well as the material and operational capabilities likely to be displayed bymore » various categories of potential nuclear adversaries.« less

  8. On deception detection in multi-agent systems and deception intent

    NASA Astrophysics Data System (ADS)

    Santos, Eugene, Jr.; Li, Deqing; Yuan, Xiuqing

    2008-04-01

    Deception detection plays an important role in the military decision-making process, but detecting deception is a challenging task. The deception planning process involves a number of human factors. It is intent-driven where intentions are usually hidden or not easily observable. As a result, in order to detect deception, any adversary model must have the capability to capture the adversary's intent. This paper discusses deception detection in multi-agent systems and in adversary modeling. We examined psychological and cognitive science research on deception and implemented various theories of deception within our approach. First, in multi-agent expert systems, one detection method uses correlations between agents to predict reasonable opinions/responses of other agents (Santos & Johnson, 2004). We further explore this idea and present studies that show the impact of different factors on detection success rate. Second, from adversary modeling, our detection method focuses on inferring adversary intent. By combining deception "branches" with intent inference models, we can estimate an adversary's deceptive activities and at the same time enhance intent inference. Two major kinds of deceptions are developed in this approach in different fashions. Simulative deception attempts to find inconsistency in observables, while dissimulative deception emphasizes the inference of enemy intentions.

  9. AGATE: Adversarial Game Analysis for Tactical Evaluation

    NASA Technical Reports Server (NTRS)

    Huntsberger, Terrance L.

    2013-01-01

    AGATE generates a set of ranked strategies that enables an autonomous vehicle to track/trail another vehicle that is trying to break the contact using evasive tactics. The software is efficient (can be run on a laptop), scales well with environmental complexity, and is suitable for use onboard an autonomous vehicle. The software will run in near-real-time (2 Hz) on most commercial laptops. Existing software is usually run offline in a planning mode, and is not used to control an unmanned vehicle actively. JPL has developed a system for AGATE that uses adversarial game theory (AGT) methods (in particular, leader-follower and pursuit-evasion) to enable an autonomous vehicle (AV) to maintain tracking/ trailing operations on a target that is employing evasive tactics. The AV trailing, tracking, and reacquisition operations are characterized by imperfect information, and are an example of a non-zero sum game (a positive payoff for the AV is not necessarily an equal loss for the target being tracked and, potentially, additional adversarial boats). Previously, JPL successfully applied the Nash equilibrium method for onboard control of an autonomous ground vehicle (AGV) travelling over hazardous terrain.

  10. Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments

    NASA Astrophysics Data System (ADS)

    Nelson, Kevin; Corbin, George; Blowers, Misty

    2014-05-01

    Machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algorithm development, data processing, and optimization. Lately, a subset of research has emerged which explores issues related to security. This research is gaining traction as systems employing these methods are being applied to both secure and adversarial environments. One of machine learning's biggest benefits, its data-driven versus logic-driven approach, is also a weakness if the data on which the models rely are corrupted. Adversaries could maliciously influence systems which address drift and data distribution changes using re-training and online learning. Our work is focused on exploring the resilience of various machine learning algorithms to these data-driven attacks. In this paper, we present our initial findings using Monte Carlo simulations, and statistical analysis, to explore the maximal achievable shift to a classification model, as well as the required amount of control over the data.

  11. Achieving the physical limits of the bounded-storage model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mandayam, Prabha; Wehner, Stephanie; Centre for Quantum Technologies, National University of Singapore, 2 Science Drive 3, 117543 Singapore

    2011-02-15

    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security canmore » be extended to a larger class of noisy quantum memories.« less

  12. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  13. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  14. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  15. 6 CFR 37.15 - Physical security features for the driver's license or identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...

  16. ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-10-23

    Initiation (Adversarial)…….…17 Table 2. Assessment Scale-Likelihood of Threat Event Occurrence ( Non -Adversarial).17 Table 3. Assessment Scale...action to thwart the attacks from adversarial nation states and non -state actors alike. While there are numerous cybersecurity concerns, or non ...compliant cybersecurity controls across all weapon systems, not all non -compliant controls contribute equally to the cyber-attack surface and overall

  17. Contracting With the Enemy: The Contracting Officer’s Dilemma

    DTIC Science & Technology

    2015-06-01

    forgery, bribery , etc. Intentionally misusing "Made in America" designation Other offenses indicating a lack of business integrity or honesty that...major risk associated with using local national contractors in contingency environments is the presence of business entities that may directly or...indirectly support adversarial forces. Entering into contracts with enemy-affiliated business entities creates significant contractual and security

  18. CYBER DETERRENCE

    DTIC Science & Technology

    2016-02-11

    directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http

  19. Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors.

    PubMed

    Song, Cen; Zhuang, Jun

    2018-01-01

    In security check systems, tighter screening processes increase the security level, but also cause more congestion, which could cause longer wait times. Having to deal with more congestion in lines could also cause issues for the screeners. The Transportation Security Administration (TSA) Precheck Program was introduced to create fast lanes in airports with the goal of expediting passengers who the TSA does not deem to be threats. In this lane, the TSA allows passengers to enjoy fewer restrictions in order to speed up the screening time. Motivated by the TSA Precheck Program, we study parallel queueing imperfect screening systems, where the potential normal and adversary participants/applicants decide whether to apply to the Precheck Program or not. The approved participants would be assigned to a faster screening channel based on a screening policy determined by an approver, who balances the concerns of safety of the passengers and congestion of the lines. There exist three types of optimal normal applicant's application strategy, which depend on whether the marginal payoff is negative or positive, or whether the marginal benefit equals the marginal cost. An adversary applicant would not apply when the screening policy is sufficiently large or the number of utilized benefits is sufficiently small. The basic model is extended by considering (1) applicants' parameters to follow different distributions and (2) applicants to have risk levels, where the approver determines the threshold value needed to qualify for Precheck. This article integrates game theory and queueing theory to study the optimal screening policy and provides some insights to imperfect parallel queueing screening systems. © 2017 Society for Risk Analysis.

  20. No-Regret Learning and a Mechanism for Distributed Multiagent Planning

    DTIC Science & Technology

    2008-02-01

    adversarial agents who influence prices for the resources. The adversarial agents benefit from arbitrage : that is, their incentive is to uncover ...who influence prices for the resources. The adversarial agents benefit from arbitrage : that is, their incentive is to uncover violations of the resource...2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE No-Regret Learning and a Mechanism for Distributed Multiagent

  1. RETHINKING THE ROLE OF SMALL-GROUP COLLABORATORS AND ADVERSARIES IN THE LONDON KLEINIAN DEVELOPMENT (1914-1968).

    PubMed

    Aguayo, Joseph; Regeczkey, Agnes

    2016-07-01

    The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968. © 2016 The Psychoanalytic Quarterly, Inc.

  2. Exploitation of Unintentional Information Leakage from Integrated Circuits

    DTIC Science & Technology

    2011-12-01

    U.S. Defense Science Board Task Force examined the effects and risks of outsourcing high performance microchip production to foreign countries [Off05...mapping methodology is developed and demon- strated to comprehensively assess the information leakage of arbitrary block cipher implementations. The...engineering poses a serious threat since it can en- able competitors or adversaries to bypass years of research and development through counterfeiting or

  3. Cyber Adversary Dynamics

    DTIC Science & Technology

    2013-02-01

    that the Government formulated or supplied the drawings, specifications, or other data does not license the holder or any other person or corporation ...preparation. Berk , V. H., Cybenko, G., Souza, I. G. D., & Murphy, J. P. (2012, January). “Managing Malicious Insider Risk through BANDIT.” In System... finances , human resources for example; • Tactics – Short term goals and techniques to achieve those goals; • Strategy – Long term outcomes and

  4. 12 CFR 1071.202 - Documentation of fees and expenses.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... initiation of the adversary adjudication, including the cost of any study, engineering report, test, or... incurred after initiation of the adversary adjudication, including the cost of any study, engineering...

  5. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    PubMed Central

    2018-01-01

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one. PMID:29695066

  6. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    PubMed

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  7. Quantifying Differential Privacy under Temporal Correlations.

    PubMed

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  8. Context Sensing System Analysis for Privacy Preservation Based on Game Theory.

    PubMed

    Wang, Shengling; Li, Luyun; Sun, Weiman; Guo, Junqi; Bie, Rongfang; Lin, Kai

    2017-02-10

    In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user's contexts, based on which it provides personalized services. However, the application may sell the user's contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.

  9. Modern Air&Space Power and political goals at war

    NASA Astrophysics Data System (ADS)

    Özer, Güngör.

    2014-05-01

    Modern AirandSpace Power is increasingly becoming a political tool. In this article, AirandSpacePower as a political tool will be discussed. The primary purpose of this article is to search how AirandSpacePower can provide contributions to security and also determine if it may reach the political goals on its own at war by SWOT Analysis Method and analysing the role of AirandSpace Power in Operation Unified Protector (Libya) as a case study. In conclusion, AirandSpacePower may not be sufficient to win the political goals on its own. However it may reach the political aims partially against the adversary on its own depending upon the situations. Moreover it can alone persuade the adversary to alter its behavior(s) in war.

  10. Using Machine Learning in Adversarial Environments.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren Leon Davis

    Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approachesmore » only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.« less

  11. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries.

    PubMed

    Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-03-27

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  12. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    PubMed Central

    Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-01-01

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679

  13. Automated Program Analysis for Cybersecurity (APAC)

    DTIC Science & Technology

    2016-07-14

    AUTOMATED PROGRAM ANALYSIS FOR CYBERSECURITY (APAC) FIVE DIRECTIONS, INC JULY 2016 FINAL TECHNICAL REPORT APPROVED... CYBERSECURITY (APAC) 5a. CONTRACT NUMBER FA8750-14-C-0050 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR(S) William Arbaugh...AC Team Adversarial Challenge Team, responsible for creating malicious applications APAC Automated Program Analysis for Cybersecurity BAE BAE Systems

  14. WMD Intent Identification and Interaction Analysis Using the Dark Web

    DTIC Science & Technology

    2016-04-01

    WMD Intent Identification and Interaction Analysis Using the Dark Web Distribution Statement A. Approved for public release; distribution is...Organization/Institution: University of Arizona Project Title: WMD Intent Identification and Interaction Analysis Using the Dark Web Report Period: Final...and social media analytics. We are leveraging our highly successful Dark Web project as our research testbed (for identifying target adversarial

  15. Auditing Rational Adversaries to Provably Manage Risks

    DTIC Science & Technology

    2012-05-23

    series of white papers on accountability-based privacy governance in which one recommendation is that organisations should have in place policies and...that this state of affairs raises is how to design effective audit and punishment schemes. This paper articulates a desirable property and presents an...In this section, we provide an overview of our model using a motivating scenario that will serve as a running example for this paper . Consider a

  16. Deterrence and WMD Terrorism: Calibrating Its Potential Contributions to Risk Reduction

    DTIC Science & Technology

    2007-06-01

    ideology and aspiration (so-called franchisees ) • operational enablers (financiers etc.) • moral legitimizers • state sponsors • passive state...of al Qaeda • groups affiliated by ideology and aspiration (so-called franchisees ) • operational enablers (financiers etc.) • moral legitimizers...of deterrence.14 One is “deterrence by the threat of punishment,” which compels the adversary to try to calculate whether the potential benefits of

  17. Scalable Iterative Classification for Sanitizing Large-Scale Datasets

    PubMed Central

    Li, Bo; Vorobeychik, Yevgeniy; Li, Muqun; Malin, Bradley

    2017-01-01

    Cheap ubiquitous computing enables the collection of massive amounts of personal data in a wide variety of domains. Many organizations aim to share such data while obscuring features that could disclose personally identifiable information. Much of this data exhibits weak structure (e.g., text), such that machine learning approaches have been developed to detect and remove identifiers from it. While learning is never perfect, and relying on such approaches to sanitize data can leak sensitive information, a small risk is often acceptable. Our goal is to balance the value of published data and the risk of an adversary discovering leaked identifiers. We model data sanitization as a game between 1) a publisher who chooses a set of classifiers to apply to data and publishes only instances predicted as non-sensitive and 2) an attacker who combines machine learning and manual inspection to uncover leaked identifying information. We introduce a fast iterative greedy algorithm for the publisher that ensures a low utility for a resource-limited adversary. Moreover, using five text data sets we illustrate that our algorithm leaves virtually no automatically identifiable sensitive instances for a state-of-the-art learning algorithm, while sharing over 93% of the original data, and completes after at most 5 iterations. PMID:28943741

  18. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    PubMed Central

    2016-01-01

    This survey of 206 forensic psychologists tested the “filtering” effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the “allegiance effect” in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process. PMID:27124416

  19. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks.

    PubMed

    Zhang, Laobing; Reniers, Genserik

    2016-12-01

    The New York City 9/11 terrorist attacks urged people from academia as well as from industry to pay more attention to operational security research. The required focus in this type of research is human intention. Unlike safety-related accidents, security-related accidents have a deliberate nature, and one has to face intelligent adversaries with characteristics that traditional probabilistic risk assessment techniques are not capable of dealing with. In recent years, the mathematical tool of game theory, being capable to handle intelligent players, has been used in a variety of ways in terrorism risk assessment. In this article, we analyze the general intrusion detection system in process plants, and propose a game-theoretical model for security management in such plants. Players in our model are assumed to be rational and they play the game with complete information. Both the pure strategy and the mixed strategy solutions are explored and explained. We illustrate our model by an illustrative case, and find that in our case, no pure strategy but, instead, a mixed strategy Nash equilibrium exists. © 2016 Society for Risk Analysis.

  20. Adversarial Threshold Neural Computer for Molecular de Novo Design.

    PubMed

    Putin, Evgeny; Asadulaev, Arip; Vanhaelen, Quentin; Ivanenkov, Yan; Aladinskaya, Anastasia V; Aliper, Alex; Zhavoronkov, Alex

    2018-03-30

    In this article, we propose the deep neural network Adversarial Threshold Neural Computer (ATNC). The ATNC model is intended for the de novo design of novel small-molecule organic structures. The model is based on generative adversarial network architecture and reinforcement learning. ATNC uses a Differentiable Neural Computer as a generator and has a new specific block, called adversarial threshold (AT). AT acts as a filter between the agent (generator) and the environment (discriminator + objective reward functions). Furthermore, to generate more diverse molecules we introduce a new objective reward function named Internal Diversity Clustering (IDC). In this work, ATNC is tested and compared with the ORGANIC model. Both models were trained on the SMILES string representation of the molecules, using four objective functions (internal similarity, Muegge druglikeness filter, presence or absence of sp 3 -rich fragments, and IDC). The SMILES representations of 15K druglike molecules from the ChemDiv collection were used as a training data set. For the different functions, ATNC outperforms ORGANIC. Combined with the IDC, ATNC generates 72% of valid and 77% of unique SMILES strings, while ORGANIC generates only 7% of valid and 86% of unique SMILES strings. For each set of molecules generated by ATNC and ORGANIC, we analyzed distributions of four molecular descriptors (number of atoms, molecular weight, logP, and tpsa) and calculated five chemical statistical features (internal diversity, number of unique heterocycles, number of clusters, number of singletons, and number of compounds that have not been passed through medicinal chemistry filters). Analysis of key molecular descriptors and chemical statistical features demonstrated that the molecules generated by ATNC elicited better druglikeness properties. We also performed in vitro validation of the molecules generated by ATNC; results indicated that ATNC is an effective method for producing hit compounds.

  1. Optimal space-time attacks on system state estimation under a sparsity constraint

    NASA Astrophysics Data System (ADS)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  2. Scientific method, adversarial system, and technology assessment

    NASA Technical Reports Server (NTRS)

    Mayo, L. H.

    1975-01-01

    A basic framework is provided for the consideration of the purposes and techniques of scientific method and adversarial systems. Similarities and differences in these two techniques of inquiry are considered with reference to their relevance in the performance of assessments.

  3. Defending Against Advanced Persistent Threats Using Game-Theory.

    PubMed

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  4. The Application of materials attractiveness in a graded approach to nuclear materials security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ebbinghaus, B.; Bathke, C.; Dalton, D.

    2013-07-01

    The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that ismore » necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.« less

  5. Robust Structural Analysis and Design of Distributed Control Systems to Prevent Zero Dynamics Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno

    We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less

  6. Anticipatory Understanding of Adversary Intent: A Signature-Based Knowledge System

    DTIC Science & Technology

    2009-06-01

    concept of logical positivism has been applied more recently to all human knowledge and reflected in current data fusion research, information mining...this work has been successfully translated into useful analytical tools that can provide a rigorous and quantitative basis for predictive analysis

  7. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  8. ICADx: interpretable computer aided diagnosis of breast masses

    NASA Astrophysics Data System (ADS)

    Kim, Seong Tae; Lee, Hakmin; Kim, Hak Gu; Ro, Yong Man

    2018-02-01

    In this study, a novel computer aided diagnosis (CADx) framework is devised to investigate interpretability for classifying breast masses. Recently, a deep learning technology has been successfully applied to medical image analysis including CADx. Existing deep learning based CADx approaches, however, have a limitation in explaining the diagnostic decision. In real clinical practice, clinical decisions could be made with reasonable explanation. So current deep learning approaches in CADx are limited in real world deployment. In this paper, we investigate interpretability in CADx with the proposed interpretable CADx (ICADx) framework. The proposed framework is devised with a generative adversarial network, which consists of interpretable diagnosis network and synthetic lesion generative network to learn the relationship between malignancy and a standardized description (BI-RADS). The lesion generative network and the interpretable diagnosis network compete in an adversarial learning so that the two networks are improved. The effectiveness of the proposed method was validated on public mammogram database. Experimental results showed that the proposed ICADx framework could provide the interpretability of mass as well as mass classification. It was mainly attributed to the fact that the proposed method was effectively trained to find the relationship between malignancy and interpretations via the adversarial learning. These results imply that the proposed ICADx framework could be a promising approach to develop the CADx system.

  9. U.S. Overseas Military Posture: Relative Costs and Strategic Benefits

    DTIC Science & Technology

    2013-01-01

    C O R P O R A T I O N RESE ARCH BR IEF U.S. Overseas Military Posture Relative Costs and Strategic Benefits The United States is at an inflection...posture translates into benefits ; the risks that different poten- tial postures pose and the cost of maintaining these postures; how these benefits ...changes. Strategic Benefits of Overseas Posture Overseas presence contributes to contingency responsiveness, deterrence of adversaries and assurance of

  10. Influence versus intent for predictive analytics in situation awareness

    NASA Astrophysics Data System (ADS)

    Cui, Biru; Yang, Shanchieh J.; Kadar, Ivan

    2013-05-01

    Predictive analytics in situation awareness requires an element to comprehend and anticipate potential adversary activities that might occur in the future. Most work in high level fusion or predictive analytics utilizes machine learning, pattern mining, Bayesian inference, and decision tree techniques to predict future actions or states. The emergence of social computing in broader contexts has drawn interests in bringing the hypotheses and techniques from social theory to algorithmic and computational settings for predictive analytics. This paper aims at answering the question on how influence and attitude (some interpreted such as intent) of adversarial actors can be formulated and computed algorithmically, as a higher level fusion process to provide predictions of future actions. The challenges in this interdisciplinary endeavor include drawing existing understanding of influence and attitude in both social science and computing fields, as well as the mathematical and computational formulation for the specific context of situation to be analyzed. The study of `influence' has resurfaced in recent years due to the emergence of social networks in the virtualized cyber world. Theoretical analysis and techniques developed in this area are discussed in this paper in the context of predictive analysis. Meanwhile, the notion of intent, or `attitude' using social theory terminologies, is a relatively uncharted area in the computing field. Note that a key objective of predictive analytics is to identify impending/planned attacks so their `impact' and `threat' can be prevented. In this spirit, indirect and direct observables are drawn and derived to infer the influence network and attitude to predict future threats. This work proposes an integrated framework that jointly assesses adversarial actors' influence network and their attitudes as a function of past actions and action outcomes. A preliminary set of algorithms are developed and tested using the Global Terrorism Database (GTD). Our results reveals the benefits to perform joint predictive analytics with both attitude and influence. At the same time, we discover significant challenges in deriving influence and attitude from indirect observables for diverse adversarial behavior. These observations warrant further investigation of optimal use of influence and attitude for predictive analytics, as well as the potential inclusion of other environmental or capability elements for the actors.

  11. Strategic Mobility 21: Integrated Tracking System Analysis and Concept Design

    DTIC Science & Technology

    2007-08-31

    public and foreign nationals, companies, and governments , including adversary governments , and may be exported. c. This statement may not be used on...42 ii Integrated Tracking System Analysis & Concept Design LIST OF FIGURES Figure 1: Southern California Association of Governments ...conducted under the auspices of the California State University – Long Beach Foundation, a government -industry academic collaborative enterprise

  12. Control Theoretic Modeling for Uncertain Cultural Attitudes and Unknown Adversarial Intent

    DTIC Science & Technology

    2009-02-01

    Constructive computational tools. 15. SUBJECT TERMS social learning, social networks , multiagent systems, game theory 16. SECURITY CLASSIFICATION OF: a...over- reactionary behaviors; 3) analysis of rational social learning in networks : analysis of belief propagation in social networks in various...general methodology as a predictive device for social network formation and for communication network formation with constraints on the lengths of

  13. The Rhetoric of Redistricting: Ohio's Altered State.

    ERIC Educational Resources Information Center

    Lucas, David M.

    An event such as congressional boundary redistricting, so ripe with political confrontation, provides a fertile ground for the profuse growth of political rhetoric. The traditional two-party political system, charged by the two well-developed adversarial philosophies, generates a highly charged environment with messages begging for analysis. After…

  14. Active Detection for Exposing Intelligent Attacks in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weerakkody, Sean; Ozel, Omur; Griffioen, Paul

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detectmore » the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.« less

  15. Decorrelated jet substructure tagging using adversarial neural networks

    NASA Astrophysics Data System (ADS)

    Shimmin, Chase; Sadowski, Peter; Baldi, Pierre; Weik, Edison; Whiteson, Daniel; Goul, Edward; Søgaard, Andreas

    2017-10-01

    We describe a strategy for constructing a neural network jet substructure tagger which powerfully discriminates boosted decay signals while remaining largely uncorrelated with the jet mass. This reduces the impact of systematic uncertainties in background modeling while enhancing signal purity, resulting in improved discovery significance relative to existing taggers. The network is trained using an adversarial strategy, resulting in a tagger that learns to balance classification accuracy with decorrelation. As a benchmark scenario, we consider the case where large-radius jets originating from a boosted resonance decay are discriminated from a background of nonresonant quark and gluon jets. We show that in the presence of systematic uncertainties on the background rate, our adversarially trained, decorrelated tagger considerably outperforms a conventionally trained neural network, despite having a slightly worse signal-background separation power. We generalize the adversarial training technique to include a parametric dependence on the signal hypothesis, training a single network that provides optimized, interpolatable decorrelated jet tagging across a continuous range of hypothetical resonance masses, after training on discrete choices of the signal mass.

  16. High-Speed Device-Independent Quantum Random Number Generation without a Detection Loophole

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Yuan, Xiao; Li, Ming-Han; Zhang, Weijun; Zhao, Qi; Zhong, Jiaqiang; Cao, Yuan; Li, Yu-Huai; Chen, Luo-Kan; Li, Hao; Peng, Tianyi; Chen, Yu-Ao; Peng, Cheng-Zhi; Shi, Sheng-Cai; Wang, Zhen; You, Lixing; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei

    2018-01-01

    Quantum mechanics provides the means of generating genuine randomness that is impossible with deterministic classical processes. Remarkably, the unpredictability of randomness can be certified in a manner that is independent of implementation devices. Here, we present an experimental study of device-independent quantum random number generation based on a detection-loophole-free Bell test with entangled photons. In the randomness analysis, without the independent identical distribution assumption, we consider the worst case scenario that the adversary launches the most powerful attacks against the quantum adversary. After considering statistical fluctuations and applying an 80 Gb ×45.6 Mb Toeplitz matrix hashing, we achieve a final random bit rate of 114 bits /s , with a failure probability less than 10-5. This marks a critical step towards realistic applications in cryptography and fundamental physics tests.

  17. Constructing Learning: Adversarial and Collaborative Working in the British Construction Industry

    ERIC Educational Resources Information Center

    Bishop, Dan; Felstead, Alan; Fuller, Alison; Jewson, Nick; Unwin, Lorna; Kakavelakis, Konstantinos

    2009-01-01

    This paper examines two competing systems of work organisation in the British construction industry and their consequences for learning. Under the traditional "adversarial" system, conflict, hostility and litigation between contractors are commonplace. Such a climate actively militates against collective learning and knowledge sharing between…

  18. Optimal helicopter trajectory planning for terrain following flight

    NASA Technical Reports Server (NTRS)

    Menon, P. K. A.

    1990-01-01

    Helicopters operating in high threat areas have to fly close to the earth surface to minimize the risk of being detected by the adversaries. Techniques are presented for low altitude helicopter trajectory planning. These methods are based on optimal control theory and appear to be implementable onboard in realtime. Second order necessary conditions are obtained to provide a criterion for finding the optimal trajectory when more than one extremal passes through a given point. A second trajectory planning method incorporating a quadratic performance index is also discussed. Trajectory planning problem is formulated as a differential game. The objective is to synthesize optimal trajectories in the presence of an actively maneuvering adversary. Numerical methods for obtaining solutions to these problems are outlined. As an alternative to numerical method, feedback linearizing transformations are combined with the linear quadratic game results to synthesize explicit nonlinear feedback strategies for helicopter pursuit-evasion. Some of the trajectories generated from this research are evaluated on a six-degree-of-freedom helicopter simulation incorporating an advanced autopilot. The optimal trajectory planning methods presented are also useful for autonomous land vehicle guidance.

  19. Seeking Common Ground: Deliberative Democracy and Sustainable Communities.

    ERIC Educational Resources Information Center

    Hyman, Drew; Clinehens, Brad

    Public deliberation, sometimes called deliberative democracy, offers alternatives to what are often adversarial governmental debates and hearings. This paper provides a case example of applying the deliberative democracy process to development issues and an analysis of data comparing the effectiveness of the process for creating a consensus for…

  20. Boy Trouble: Rhetorical Framing of Boys' Underachievement

    ERIC Educational Resources Information Center

    Titus, Jordan J.

    2004-01-01

    This article examines discourse in the United States used to socially construct an "underachieving boys" moral panic. Employing discourse analysis I examine the adversarial rhetoric of claims-makers and the frames they deploy to undermine alternative and conflicting accounts (of females as disadvantaged) and to forestall any challenges to the…

  1. Adversaries, Advocates, or Thoughtful Analysts? Some Lessons from Dance History.

    ERIC Educational Resources Information Center

    Wagner, Ann

    1999-01-01

    Argues that the arts demand careful analysis when providing a rationale for the inclusion of the arts in educational programs and policies. Provides information on the content and context of dance opposition and provides examples from dance history of issues that need to be addressed. (CMK)

  2. Quantifying Improbability: An Analysis of the Lloyd’s of London Business Blackout Cyber Attack Scenario

    DTIC Science & Technology

    Scenarios that describe cyber attacks on the electric grid consistently predict significant disruptions to the economy and citizens quality of life...phenomena that deserve further investigation, such as the importance of some individual power plants in influencing the adversarys probability of

  3. Assessing and Minimizing Adversarial Risk in a Nuclear Material Transportation Network

    DTIC Science & Technology

    2013-09-01

    0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave Blank) 2. REPORT DATE 09-27-2013 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND...U.S. as of July 2013. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Figure A.1 Google Earth routing from Areva to Arkansas Nuclear...Uranium ore is mined or removed from the earth in a leaching process. 2. Conversion (1). Triuranium octoxide (U3O8, “yellowcake”) is converted into ura

  4. World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism

    DTIC Science & Technology

    2008-12-01

    we brought together a staff of more than two dozen profes- sionals and subject matter experts from across the national security, intelli - gence, and...cities or time-phased attacks (i.e., “reload”). For federal planning purposes, it will be assumed that the Universal Adversary ( UA ) will attack five...that biologists will become terrorists. The last point bears repeating. We accept the validity of intelli - gence estimates about the current

  5. Procedural Justice in Family Court: Does the Adversary Model Make Sense?

    ERIC Educational Resources Information Center

    Melton, Gary B.; Lind, E. Allan

    1982-01-01

    Reviews research and theory on procedural justice concerning family disputes, and discusses existing proposals for reform of family court procedures. Holds that adversary proceedings in custody disputes may be more beneficial to older children and disputing parents than nonadversary procedures. Identifies areas for needed research in procedural…

  6. Networking in the Presence of Adversaries

    DTIC Science & Technology

    2014-09-12

    a topological graph with linear algebraic constraints. As a practical example, such a model arises from an electric power system in which the power...flow is governed by the Kirchhoff law. When an adversary launches an MiM data attack, part of the sensor data are intercepted and substituted with

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  8. Graph Coarsening for Path Finding in Cybersecurity Graphs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh

    2013-01-01

    n the pass-the-hash attack, hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges. In this paper we apply graph coarsening in network graphs for the purpose of detecting hackers using this attack or assessing the risk level of the network's current state. We repeatedly take graph minors, which preserve the existence of paths in the graph, and take powers of the adjacency matrix to count the paths. This allows us to detect the existence of paths as well as find paths that have high risk ofmore » being used by adversaries.« less

  9. Resilient Distributed Estimation Through Adversary Detection

    NASA Astrophysics Data System (ADS)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2018-05-01

    This paper studies resilient multi-agent distributed estimation of an unknown vector parameter when a subset of the agents is adversarial. We present and analyze a Flag Raising Distributed Estimator ($\\mathcal{FRDE}$) that allows the agents under attack to perform accurate parameter estimation and detect the adversarial agents. The $\\mathcal{FRDE}$ algorithm is a consensus+innovations estimator in which agents combine estimates of neighboring agents (consensus) with local sensing information (innovations). We establish that, under $\\mathcal{FRDE}$, either the uncompromised agents' estimates are almost surely consistent or the uncompromised agents detect compromised agents if and only if the network of uncompromised agents is connected and globally observable. Numerical examples illustrate the performance of $\\mathcal{FRDE}$.

  10. [Nursing care during sporting competitions, an on-site first aid kit].

    PubMed

    Fernández García, Julián

    2008-12-01

    In the world of sports, just as in daily life, many situations can bring with them some kind of risk to our physical integrity If we add on the additional factor competition against an adversary and against oneself bears, this risk multiplies and numerous emergency situations arise; these risks may be sporting in nature or even vital to survival. There are various professional figures inside and outside sports capable to deal with an emergency, but the nursing professional is best positioned to provide all the care an athlete needs. Furthermore, when one adds on the specific knowledge belonging to sports and the required materials, a nurse who specializes in sports medicine becomes the most complete medical professional to care for an athlete.

  11. 34 CFR 21.10 - Adversary adjudications covered by the Act.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Adversary adjudications covered by the Act. 21.10 Section 21.10 Education Office of the Secretary, Department of Education EQUAL ACCESS TO JUSTICE Which... Assistance for Local Educational Agencies in Areas Affected by Federal Activity) (20 U.S.C. 240(g)). (2...

  12. Liberal Democracy and Objective Journalism: Partners or Adversaries?

    ERIC Educational Resources Information Center

    Reeb, Richard H., Jr.

    Contemporary journalism, although claiming to be politically objective and neutral, has become a powerful critic of the conduct of the government, often seeming to be a force for the reordering of national priorities along leftist lines. This "adversary journalism" of the past 15 years has strayed a long way from the neutral journalism…

  13. Revitalizing Adversary Evaluation: Deep Dark Deficits or Muddled Mistaken Musings

    ERIC Educational Resources Information Center

    Thurston, Paul

    1978-01-01

    The adversary evaluation model consists of utilizing the judicial process as a metaphor for educational evaluation. In this article, previous criticism of the model is addressed and its fundamental problems are detailed. It is speculated that the model could be improved by borrowing ideas from other legal forms of inquiry. (Author/GC)

  14. The Effects of an Adversarial Process on Adoption Decisions.

    ERIC Educational Resources Information Center

    Ryburn, Murray

    1993-01-01

    Examines the legal and social work process in contested adoption proceedings, and argues that there are moral grounds for repealing provisions in British legislation on forced adoption. Considers the adversarial process that characterizes adoption hearings, the role of poverty in the lives of families whose children are admitted to foster care,…

  15. Cooperation and punishment in an adversarial game: How defectors pave the way to a peaceful society

    NASA Astrophysics Data System (ADS)

    Short, M. B.; Brantingham, P. J.; D'Orsogna, M. R.

    2010-12-01

    The evolution of human cooperation has been the subject of much research, especially within the framework of evolutionary public goods games, where several mechanisms have been proposed to account for persistent cooperation. Yet, in addressing this issue, little attention has been given to games of a more adversarial nature, in which defecting players, rather than simply free riding, actively seek to harm others. Here, we develop an adversarial evolutionary game using the specific example of criminal activity, recasting the familiar public goods strategies of punishers, cooperators, and defectors in this light. We then introduce a strategy—the informant—with no clear analog in public goods games and show that individuals employing this strategy are a key to the emergence of systems where cooperation dominates. We also find that a defection-dominated regime may be transitioned to one that is cooperation-dominated by converting an optimal number of players into informants. We discuss these findings, the role of informants, and possible intervention strategies in extreme adversarial societies, such as those marred by wars and insurgencies.

  16. Quantum tagging for tags containing secret classical data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kent, Adrian

    Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less

  17. High-Speed Device-Independent Quantum Random Number Generation without a Detection Loophole.

    PubMed

    Liu, Yang; Yuan, Xiao; Li, Ming-Han; Zhang, Weijun; Zhao, Qi; Zhong, Jiaqiang; Cao, Yuan; Li, Yu-Huai; Chen, Luo-Kan; Li, Hao; Peng, Tianyi; Chen, Yu-Ao; Peng, Cheng-Zhi; Shi, Sheng-Cai; Wang, Zhen; You, Lixing; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei

    2018-01-05

    Quantum mechanics provides the means of generating genuine randomness that is impossible with deterministic classical processes. Remarkably, the unpredictability of randomness can be certified in a manner that is independent of implementation devices. Here, we present an experimental study of device-independent quantum random number generation based on a detection-loophole-free Bell test with entangled photons. In the randomness analysis, without the independent identical distribution assumption, we consider the worst case scenario that the adversary launches the most powerful attacks against the quantum adversary. After considering statistical fluctuations and applying an 80  Gb×45.6  Mb Toeplitz matrix hashing, we achieve a final random bit rate of 114  bits/s, with a failure probability less than 10^{-5}. This marks a critical step towards realistic applications in cryptography and fundamental physics tests.

  18. 'Meatball searching' - The adversarial approach to online information retrieval

    NASA Technical Reports Server (NTRS)

    Jack, R. F.

    1985-01-01

    It is proposed that the different styles of online searching can be described as either formal (highly precise) or informal with the needs of the client dictating which is most applicable at a particular moment. The background and personality of the searcher also come into play. Particular attention is focused on meatball searching which is a form of online searching characterized by deliberate vagueness. It requires generally comprehensive searches, often on unusual topics and with tight deadlines. It is most likely to occur in search centers serving many different disciplines and levels of client information sophistication. Various information needs are outlined as well as the laws of meatball searching and the adversarial approach. Traits and characteristics important to sucessful searching include: (1) concept analysis, (2) flexibility of thinking, (3) ability to think in synonyms and (4) anticipation of variant word forms and spellings.

  19. Function and activity classification in network traffic data: existing methods, their weaknesses, and a path forward

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy

    2016-05-01

    The cyber spaces are increasingly becoming the battlefields between friendly and adversary forces, with normal users caught in the middle. Accordingly, planners of enterprise defensive policies and offensive cyber missions alike have an essential goal to minimize the impact of their own actions and adversaries' attacks on normal operations of the commercial and government networks. To do this, the cyber analysis need accurate "cyber battle maps", where the functions, roles, and activities of individual and groups of devices and users are accurately identified. Most of the research in cyber exploitation has focused on the identification of attacks, attackers, and their devices. Many tools exist for device profiling, malware identification, user attribution, and attack analysis. However, most of the tools are intrusive, sensitive to data obfuscation, or provide anomaly flagging and not able to correctly classify the semantics and causes of network activities. In this paper, we review existing solutions that can identify functional and social roles of entities in cyberspace, discuss their weaknesses, and propose an approach for developing functional and social layers of cyber battle maps.

  20. Defending Against Advanced Persistent Threats Using Game-Theory

    PubMed Central

    König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. PMID:28045922

  1. GalaxyGAN: Generative Adversarial Networks for recovery of galaxy features

    NASA Astrophysics Data System (ADS)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Krishnan Santhanam, Gokula

    2017-02-01

    GalaxyGAN uses Generative Adversarial Networks to reliably recover features in images of galaxies. The package uses machine learning to train on higher quality data and learns to recover detailed features such as galaxy morphology by effectively building priors. This method opens up the possibility of recovering more information from existing and future imaging data.

  2. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    ERIC Educational Resources Information Center

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  3. On the Uses of Cultural Knowledge

    DTIC Science & Technology

    2007-11-01

    awareness that a cultural understanding of an adversary society is imperative if counterinsurgency is to succeed. This monograph, by Dr. Sheila...cultural awareness and understanding of adversary societies has been widely recognized as essential to operations and tactics on the battlefield, Dr...levels of warfare—strategy, operations, and tactics. Although not mutually exclusive, cultural knowledge informs these distinct levels in different

  4. Life's Dominion: An Argument about Abortion, Euthanasia, and Individual Freedom, Ronald Dworkin.

    PubMed

    Campbell, Courtney S

    1994-01-01

    As a teacher of biomedical ethics, I have constantly sought a method to motivate my students to engage in meaningful moral debate on the controversial issues of abortion and euthanasia, without risking a shouting match (as happened on one occasion). The moral views are so personalized and polarized that silence often displaces discourse. Ronald Dworkin's masterful Life's Dominion offers an innovative and insightful way through this impasse by identifying moral commitments shared by persons with different conclusions. His argument begins with "conservative" premises and winds up with "liberal" conclusions. It is a philosophical and constitutional analysis of the meaning of life and death that draws on substantive religious values. In so doing, Dworkin suggests an approach that could alter the adversarial and even violent nature of our cultural debate about the ending of life towards a more dialogic and tolerant, but not indifferent, mode....

  5. Risk taking in adversarial situations: Civilization differences in chess experts.

    PubMed

    Chassy, Philippe; Gobet, Fernand

    2015-08-01

    The projections of experts in politics predict that a new world order will emerge within two decades. Being multipolar, this world will inevitably lead to frictions where civilizations and states will have to decide whether to risk conflict. Very often these decisions are informed if not taken by experts. To estimate risk-taking across civilizations, we examined strategies used in 667,599 chess games played over eleven years by chess experts from 11 different civilizations. We show that some civilizations are more inclined to settle for peace. Similarly, we show that once engaged in the battle, the level of risk taking varies significantly across civilizations, the boldest civilization using the riskiest strategy about 35% more than the most conservative civilization. We discuss which psychological factors might underpin these civilizational differences. Copyright © 2015. Published by Elsevier B.V.

  6. Framework for Identifying Cybersecurity Risks in Manufacturing

    DOE PAGES

    Hutchins, Margot J.; Bhinge, Raunak; Micali, Maxwell K.; ...

    2015-10-21

    Increasing connectivity, use of digital computation, and off-site data storage provide potential for dramatic improvements in manufacturing productivity, quality, and cost. However, there are also risks associated with the increased volume and pervasiveness of data that are generated and potentially accessible to competitors or adversaries. Enterprises have experienced cyber attacks that exfiltrate confidential and/or proprietary data, alter information to cause an unexpected or unwanted effect, and destroy capital assets. Manufacturers need tools to incorporate these risks into their existing risk management processes. This article establishes a framework that considers the data flows within a manufacturing enterprise and throughout its supplymore » chain. The framework provides several mechanisms for identifying generic and manufacturing-specific vulnerabilities and is illustrated with details pertinent to an automotive manufacturer. Finally, in addition to providing manufacturers with insights into their potential data risks, this framework addresses an outcome identified by the NIST Cybersecurity Framework.« less

  7. Framework for Identifying Cybersecurity Risks in Manufacturing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchins, Margot J.; Bhinge, Raunak; Micali, Maxwell K.

    Increasing connectivity, use of digital computation, and off-site data storage provide potential for dramatic improvements in manufacturing productivity, quality, and cost. However, there are also risks associated with the increased volume and pervasiveness of data that are generated and potentially accessible to competitors or adversaries. Enterprises have experienced cyber attacks that exfiltrate confidential and/or proprietary data, alter information to cause an unexpected or unwanted effect, and destroy capital assets. Manufacturers need tools to incorporate these risks into their existing risk management processes. This article establishes a framework that considers the data flows within a manufacturing enterprise and throughout its supplymore » chain. The framework provides several mechanisms for identifying generic and manufacturing-specific vulnerabilities and is illustrated with details pertinent to an automotive manufacturer. Finally, in addition to providing manufacturers with insights into their potential data risks, this framework addresses an outcome identified by the NIST Cybersecurity Framework.« less

  8. Key Elements of Protection for Military Textiles

    DTIC Science & Technology

    2010-10-15

    responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would...future for each aspect of protection are given. Aspects of protection considered are limited to threats from human adversaries and include camouflage...of protection considered are limited to threats from human adversaries and include camoufl age, ballistic protection and protection from toxic

  9. An Adversarial Exchange on Adversarial Ethics: Text, Subtext, and Context.

    ERIC Educational Resources Information Center

    Rhode, Deborah L.

    1991-01-01

    Presented in the form of a debate and rebuttals are both sides of the issue, first stated by Lord Brougham in 1820, of a client's legal and moral rights to his counsel's total support. It is concluded that advocacy in law does not carry some special authority or excuse the lawyer from accepting moral responsibility for his professional choices.…

  10. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems.

  11. Expanding Combat Power Through Military Cyberpower Theory

    DTIC Science & Technology

    2015-04-02

    systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to

  12. CARA: Cognitive Architecture for Reasoning About Adversaries

    DTIC Science & Technology

    2012-01-20

    synthesis approach taken here the KIDS principle (Keep It Descriptive, Stupid ) applies, and agents and organizations are profiled in great detail...developed two algorithms to make forecasts about adversarial behavior. We developed game-theoretical approaches to reason about group behavior. We...to automatically make forecasts about group behavior together with methods to quantify the uncertainty inherent in such forecasts; • Developed

  13. Proactive malware detection

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty

    2014-06-01

    Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.

  14. The adversarial court system and the expert medical witness: 'The truth the whole truth and nothing but the truth?'.

    PubMed

    Ryan, Matthew

    2003-06-01

    This discussion aims to provide the occasional medical expert witness with background knowledge of the adversarial court system and the role of the medical expert witness within it. The parallel evolution of the adversarial and inquisitorial legal systems has been more out of tradition rather than any systematic review of the effectiveness of one system or the other. Both legal systems have their merits and limitations. Witnesses within the adversarial system are required to present evidence in a structured and highly stylized format consisting of 'evidence in chief' followed by 'cross-examination'. This format is an attempt to exclude unreliable evidence. The medical witness is an 'expert' by means of specialized knowledge not possessed by the general public. This distinction allows the expert medical witness to offer his or her opinion as evidence. There remain several limitations to the expert's evidence and these relate to common knowledge, field of expertise and the 'ultimate issue'. The current practice of selection of expert medical witnesses is seriously flawed with several pressures operating to maximise bias and inaccurate testimony. Doctors should not only anticipate change in this area they should lead reform in this area.

  15. Understanding the operational environment: implications for advanced visualizations

    NASA Astrophysics Data System (ADS)

    Aleva, Denise; Fitzhugh, Elisabeth; Dixon, Sharon

    2009-05-01

    With the changing character of warfare, information superiority is a high priority. Given the complexity of current and future operating environments, analysts, strategists and planners need a multidimensional understanding of the battlespace. Asymmetric warfare necessitates that our strategists look beyond targets-based operations, where we simply identify and destroy enemy entities. Effects-based operations models the enemy as a system which reacts to our actions. This requires the capability to predict the adversary response to a selected action. Actions may be diplomatic, information, military or economic (DIME). Effects may be political, military, economic, social, information or infrastructure (PMESII). Timing must be explicitly considered and effects dynamically assessed. Visualizations of intelligence information are needed which will promote full understanding of all aspects of adversary strengths and weaknesses by providing the extensive data about adversary forces, organic essentials, infrastructure, leadership, population, and science and technology in an easily accessible and understandable format. This will enhance Effectsbased operations, and therefore, the capability to predict and counter adversary courses of action. This paper outlines a systems engineering approach to designing visualizations which convey the multidimensional information to decision makers. Visualization issues inherent in understanding the multidimensional operational environment will be discussed.

  16. Study of Adversarial and Defensive Components in an Experimental Machinery Control Systems Laboratory Environment

    DTIC Science & Technology

    2014-09-01

    prevention system (IPS), capable of performing real-time traffic analysis and packet logging on IP networks [25]. Snort’s features include protocol... analysis and content searching/matching. Snort can detect a variety of attacks and network probes, such as buffer overflows, port scans and OS...www.digitalbond.com/tools/the- rack/jtr-s7-password-cracking/ Kismet Mike Kershaw Cross- platform Open source wireless network detector and wireless sniffer

  17. New threats to health data privacy.

    PubMed

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  18. New threats to health data privacy

    PubMed Central

    2011-01-01

    Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection. PMID:22168526

  19. Learning consensus in adversarial environments

    NASA Astrophysics Data System (ADS)

    Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.

    2013-05-01

    This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.

  20. A5: Automated Analysis of Adversarial Android Applications

    DTIC Science & Technology

    2014-06-03

    algorithm is fairly intuitive. First, A5 invokes the DED [11] decompiler to create Java classes from the Android application code. Next, A5 uses Soot [30...implemented such as Bluetooth, Wi-Fi, sensors , etc. These hardware features are very common in physical devices and are simply not present in the...such as Androguard [1] and Soot [30]. Deficiencies in these tools may also manifest in A5. The bytecode static analysis is limited to finding only

  1. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less

  2. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  3. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  4. Development of nonproliferation and assessment scenarios.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Finley, Melissa; Barnett, Natalie Beth

    2005-10-01

    The overall objective of the Nonproliferation and Assessments Scenario Development project is to create and analyze potential and plausible scenarios that would lead to an adversary's ability to acquire and use a biological weapon. The initial three months of funding was intended to be used to develop a scenario to demonstrate the efficacy of this analysis methodology; however, it was determined that a substantial amount of preliminary data collection would be needed before a proof of concept scenario could be developed. We have dedicated substantial effort to determine the acquisition pathways for Foot and Mouth Disease Virus, and similar processesmore » will be applied to all pathogens of interest. We have developed a biosecurity assessments database to capture information on adversary skill locales, available skill sets in specific regions, pathogen sources and regulations involved in pathogen acquisition from legitimate facilities. FY06 funding, once released, will be dedicated to data collection on acquisition, production and dissemination requirements on a pathogen basis. Once pathogen data has been collected, scenarios will be developed and scored.« less

  5. SUSTAINING NAVAL SURFACE COMBATANT VERTICAL LAUNCH SYSTEM MUNITIONS DURING JOINT OPERATIONS

    DTIC Science & Technology

    2017-04-21

    permission of the author. 14. ABSTRACT Maintaining maritime dominance against near peer adversaries will tax an already complex logistics structure...This page intentionally blank i ABSTRACT Maintaining maritime dominance against near peer adversaries will tax an already complex logistics...140725-N-EW716- 002.jpg 40 California to Guam, approximately eight days would be required but this does not account for delay to conduct refueling

  6. Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments

    DTIC Science & Technology

    2006-08-14

    COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN ADVERSARIAL ENVIRONMENTS Grant #F49620–01–1–0361 Final Report Jeff Shamma Department of...CONTRACT NUMBER F49620-01-1-0361 5b. GRANT NUMBER 4. TITLE AND SUBTITLE COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN...single dominant language or a distribution of languages. A relation to multivehicle systems is understanding how highly autonomous vehicles on extended

  7. The Logic of Definition

    DTIC Science & Technology

    2009-05-01

    adversary. This method is also known as definition by genus and differentia, acknowledging its roots in the Aristotelian method of classification. To define...a term, one begins by naming the larger group ( genus ) with which the phenomenon shares a common characteristic, then stating the specific...sets out the genus as agent11 (“one who, or that which”) and the differentia – that is, the attribute which distinguishes an adversary from other

  8. Extended Deterrence and Allied Assurance: Key Concepts and Current Challenges for U.S. Policy

    DTIC Science & Technology

    2013-09-01

    include adversary nuclear forces and stockpiles) in the pre- satellite era required a strategy using large numbers of bombers, large numbers of...radar and sensor capabilities related to TMD, activities Canberra considered important to “bolstering 59 the [U.S.-Australia] alliance.” 146 In...external attack; with potential adversaries developing anti- satellite 90 capabilities, and conducting cyber incursions and attacks against U.S. and

  9. Toward Adversarial Online Learning and the Science of Deceptive Machines

    DTIC Science & Technology

    2015-11-14

    noise . Adver- saries can take advantage of this inherent blind spot to avoid detection (mimicry). Adversarial label noise is the intentional switching...of classification labels leading to de- terministic noise , error that the model cannot capture due to its generalization bias. An experiment in user...potentially infinite and with imperfect information. We will combine Monte-Carlo tree search ( MCTS ) with rein- forcement learning because the manipulation

  10. Toward a Developmentally-Informed Approach to Parenting Interventions: Seeking Hidden Effects

    PubMed Central

    Brock, Rebecca L.; Kochanska, Grazyna

    2015-01-01

    Drawing from developmental psychology and psychopathology, we propose a new, developmentally-informed approach to parenting interventions that focuses on elucidating changes in the unfolding developmental process between the parent and child. We present data from 186 low-income mothers of toddlers, randomly assigned to Child-Oriented Play group or Play-as-Usual group. We examined the maladaptive cascade from child difficulty to mother adversarial, negative parenting to child maladjustment, well documented in the literature. The measures incorporated multiple observations and reports. As expected, the sequence from child difficulty (Pretest) to mother adversarial, negative parenting (Posttest 1, after 3-month intervention) to child maladjustment (Posttest 2, 6 months later) was present in Play-as-Usual group, but absent, or defused, in Child-Oriented Play group. The findings are consistent with a view of intervention presumably enhancing the mother-child relationship, which in turn served to moderate future mother-child dynamics, altering its otherwise anticipated negative trajectory. A closer examination of the cascade revealed that, at Posttest 1, mothers in Play-as-Usual group engaged in more adversarial, negative parenting (controlling for Pretest) than mothers in Child-Oriented Play group when their children were of high difficulty. The intervention appears to exert its primary influence on the cascade by weakening the link between child difficulty and maternal adversarial, negative parenting. PMID:27063895

  11. Through the Looking Glass: The Role of Ethnicity and Affiliation in Responses to Terrorism in the Media

    PubMed Central

    Shoshani, Anat; Slone, Michelle

    2016-01-01

    This study examined whether attitudinal and emotional responses to broadcasts of images of terrorist events differ according to ethnic group (Jewish and Arab Israelis) and outgroup affiliation during an intense wave of terrorism that occurred in Israel during 2015. Participants were 118 Jewish and 110 Arab-Israelis adults randomly allocated to a terrorism or criminal violence television broadcast. State anxiety, state anger, stereotypes, and negative attitudes toward an adversary were examined prior and subsequent to the media exposure. Findings showed significant increases in anxiety, anger, stereotypes, and negative adversary perceptions in the terrorism exposure group compared to only anxiety increases in the criminal violence exposure. In the terrorism exposure group, Jewish participants showed greater increases in negative adversary perceptions of the Palestinians than Arab Israeli participants, but both groups showed similar significant increases in levels of anxiety and anger. Exposure to broadcasts of terrorism increased willingness to negotiate with the adversary among the Arab participants, but not among the Jewish participants. In the terrorism exposure group, both Jewish and Arab Israelis with high affiliation with the Palestinian cause showed less increases in stereotypes than those with low affiliation. Findings emphasize the role of ethnicity and outgroup affiliation in responses to media exposure to terrorism images. PMID:28018258

  12. Through the Looking Glass: The Role of Ethnicity and Affiliation in Responses to Terrorism in the Media.

    PubMed

    Shoshani, Anat; Slone, Michelle

    2016-01-01

    This study examined whether attitudinal and emotional responses to broadcasts of images of terrorist events differ according to ethnic group (Jewish and Arab Israelis) and outgroup affiliation during an intense wave of terrorism that occurred in Israel during 2015. Participants were 118 Jewish and 110 Arab-Israelis adults randomly allocated to a terrorism or criminal violence television broadcast. State anxiety, state anger, stereotypes, and negative attitudes toward an adversary were examined prior and subsequent to the media exposure. Findings showed significant increases in anxiety, anger, stereotypes, and negative adversary perceptions in the terrorism exposure group compared to only anxiety increases in the criminal violence exposure. In the terrorism exposure group, Jewish participants showed greater increases in negative adversary perceptions of the Palestinians than Arab Israeli participants, but both groups showed similar significant increases in levels of anxiety and anger. Exposure to broadcasts of terrorism increased willingness to negotiate with the adversary among the Arab participants, but not among the Jewish participants. In the terrorism exposure group, both Jewish and Arab Israelis with high affiliation with the Palestinian cause showed less increases in stereotypes than those with low affiliation. Findings emphasize the role of ethnicity and outgroup affiliation in responses to media exposure to terrorism images.

  13. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.

    PubMed

    Merrick, Jason R W; Leclerc, Philip

    2016-04-01

    Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions. © 2014 Society for Risk Analysis.

  14. Theory to Strategy: War Insight for the Strategic Soldier

    DTIC Science & Technology

    2008-05-22

    Library Typography , New York, 1993, 162. 3 Additionally, these models may provide insights as to what an adversary may do depending on the nature of...11. 7 Carl Von Clausewitz, On War (edited and translated by Michael Howard and Peter Paret), Everyman’s Library Typography , New York, 1993, 73...Paret), Everyman’s Library Typography , New York, 1993, 88. 8 common enemy. Minimizing the amount of allies an adversary has may also limit its

  15. Optimizing Adversary Training and the Structure of the Navy Adversary Fleet

    DTIC Science & Technology

    2013-09-01

    ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) OPNAV N98 2000 Navy Pentagon , Room 5C469 Washington DC, 20350...an overhaul of existing computers and encryption in the range operations centers (CDR R. Van Diepen, OPNAV Simulator Requirements Officer, personal...1.0. Using a simulated annealing heuristic algorithm in conjunction with the utility assignments, CNA found, in order of priority, that the following

  16. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  17. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    PubMed

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  18. Computer network defense system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less

  19. Proceedings of the Annual Meeting of the Association for Education in Journalism and Mass Communication (78th, Washington, DC, August 9-12, 1995). Minorities and Communication Division.

    ERIC Educational Resources Information Center

    Association for Education in Journalism and Mass Communication.

    The Minorities and Communication section of the proceedings contains the following 10 papers: "A Content Analysis of Advertising Techniques in Mass Market and African-American Magazine Advertisements" (Jan S. Slater and others); "Political and Racial Adversaries: Southern Black Elected Officials and the Press" (Daniel Riffe and…

  20. Integrated Cyber Defenses: Towards Cyber Defense Doctrine

    DTIC Science & Technology

    2007-12-01

    National Security Affairs Department) Professor Dorothy Denning (Defense Analysis Department) To select NPS Instructors for teaching me how to...asymmetric battlefield advantage to get inside adversary decision cycles to shorten the “kill chain.” As a force multiplier, NCW continues to...the] number of [network] events is increasing.6 Therefore, the DoD and each U.S. military service faces the daunting challenge of determining how

  1. Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis

    DTIC Science & Technology

    2005-12-01

    reasoning balanced against deductive (hypothesis- based and evidence tested) reasoning . It extols the value of truly scientific modes of thinking, including...the age of information and globalization. We need to be more open on a lot of things, especially where the original reason for secrecy perishes quickly...been reasonably successful in meeting the challenges on the tactical battlefield of locating, identifying, and targeting adversary units for main

  2. An Analysis of Trust in Deception Operations

    DTIC Science & Technology

    2009-03-01

    presents an overview of deception, both from the military and academic perspectives. The importance of the adversarial mind to a successful deception is...to most literature on deception. This section will introduce both military and academic theories of deception and discuss their relevance to trust...claim, faking documentation, plagiarism , and purchasing one (p. 226). A doctorate is regarded as a valuable item for establishing reputational

  3. The DTIC Review; Volume 3 Number 4. Antimissile Defense: Strategic Interceptor

    DTIC Science & Technology

    1997-12-01

    threat by pursuing policies and initiatives designed to both prevent and limit this aggression. Plans to improve the interception of missiles will...to this threat by pursuing policies and initiatives designed to both prevent and limit it. Plans to improve the interception of missiles will depend...the 21st Century, it must be able to deter adversaries possessing or planning to possess WMD. If not, threats of WMD use by adversaries will prevent

  4. A System Dynamics Model of the Essential Tension Between Self-Synchronization and C2

    DTIC Science & Technology

    2006-06-01

    Model of the Essential Tension Between Self- Synchronization and C2 CCRTS June 20 - 22, 2006 Bob Wiebe Dan Compton Dave Garvey Report Documentation Page...DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE A System Dynamics Model of the Essential Tension Between Self- Synchronization and... synchronicity (being hit all at once), and the degree (surprise) 1 pushing the adversary into unfamiliar territory (adversary situational change) 1 Synergy of

  5. Government - contractor interaction

    NASA Technical Reports Server (NTRS)

    Thomas, D. M.

    1983-01-01

    The development of the Administrative Contracting Officer represents an advance in the Government system of contract management because it provides an individual with knowledge, time, and a specialized function to insure performance of Government contracts. However, the development has created a dichotomy between the award and the post-award function which increases the adversary relationship with Government contractors. This paper advocates that this adversary relationship can be decreased if PCOs and ACOs are provided with opportunities to serve in the assignments of the other.

  6. The Effect of Adversary Unmanned Aerial Systems on the US Concept of Air Superiority

    DTIC Science & Technology

    2014-12-04

    impact on the US concept of air superiority. Politically, psychologically , and operationally, air superiority is important. UAS are capable of attack...challenge to the US concept of air superiority. Adversary drones have the potential to be a sporadic but deadly and psychologically powerful weapon that...toll they took in lives and equipment, kamikaze attacks also had a psychological impact. Dr. Alvin D. Coox, a professor of history and Asian studies

  7. Reinforced Adversarial Neural Computer for de Novo Molecular Design.

    PubMed

    Putin, Evgeny; Asadulaev, Arip; Ivanenkov, Yan; Aladinskiy, Vladimir; Sanchez-Lengeling, Benjamin; Aspuru-Guzik, Alán; Zhavoronkov, Alex

    2018-06-12

    In silico modeling is a crucial milestone in modern drug design and development. Although computer-aided approaches in this field are well-studied, the application of deep learning methods in this research area is at the beginning. In this work, we present an original deep neural network (DNN) architecture named RANC (Reinforced Adversarial Neural Computer) for the de novo design of novel small-molecule organic structures based on the generative adversarial network (GAN) paradigm and reinforcement learning (RL). As a generator RANC uses a differentiable neural computer (DNC), a category of neural networks, with increased generation capabilities due to the addition of an explicit memory bank, which can mitigate common problems found in adversarial settings. The comparative results have shown that RANC trained on the SMILES string representation of the molecules outperforms its first DNN-based counterpart ORGANIC by several metrics relevant to drug discovery: the number of unique structures, passing medicinal chemistry filters (MCFs), Muegge criteria, and high QED scores. RANC is able to generate structures that match the distributions of the key chemical features/descriptors (e.g., MW, logP, TPSA) and lengths of the SMILES strings in the training data set. Therefore, RANC can be reasonably regarded as a promising starting point to develop novel molecules with activity against different biological targets or pathways. In addition, this approach allows scientists to save time and covers a broad chemical space populated with novel and diverse compounds.

  8. Toward a developmentally informed approach to parenting interventions: Seeking hidden effects.

    PubMed

    Brock, Rebecca L; Kochanska, Grazyna

    2016-05-01

    Drawing from developmental psychology and psychopathology, we propose a new, developmentally informed approach to parenting interventions that focuses on elucidating changes in the unfolding developmental process between the parent and child. We present data from 186 low-income mothers of toddlers, randomly assigned to a child-oriented play group or a play-as-usual group. We examined the maladaptive cascade from child difficulty to mother adversarial, negative parenting to child maladjustment, well documented in the literature. The measures incorporated multiple observations and reports. As expected, the sequence from child difficulty (pretest) to mother adversarial, negative parenting (Posttest 1, after 3-month intervention) to child maladjustment (Posttest 2, 6 months later) was present in the play-as-usual group, but absent, or defused, in the child-oriented play group. The findings are consistent with a view of intervention presumably enhancing the mother-child relationship, which in turn served to moderate future mother-child dynamics, altering its otherwise anticipated negative trajectory. A closer examination of the cascade revealed that, at Posttest 1, mothers in the play-as-usual group engaged in more adversarial, negative parenting (controlling for pretest) than did mothers in the child-oriented play group when their children were of high difficulty. The intervention appears to exert its primary influence on the cascade by weakening the link between child difficulty and maternal adversarial, negative parenting.

  9. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  10. An Open Source Tool for Game Theoretic Health Data De-Identification.

    PubMed

    Prasser, Fabian; Gaupp, James; Wan, Zhiyu; Xia, Weiyi; Vorobeychik, Yevgeniy; Kantarcioglu, Murat; Kuhn, Klaus; Malin, Brad

    2017-01-01

    Biomedical data continues to grow in quantity and quality, creating new opportunities for research and data-driven applications. To realize these activities at scale, data must be shared beyond its initial point of collection. To maintain privacy, healthcare organizations often de-identify data, but they assume worst-case adversaries, inducing high levels of data corruption. Recently, game theory has been proposed to account for the incentives of data publishers and recipients (who attempt to re-identify patients), but this perspective has been more hypothetical than practical. In this paper, we report on a new game theoretic data publication strategy and its integration into the open source software ARX. We evaluate our implementation with an analysis on the relationship between data transformation, utility, and efficiency for over 30,000 demographic records drawn from the U.S. Census Bureau. The results indicate that our implementation is scalable and can be combined with various data privacy risk and quality measures.

  11. Perceptions of randomized security schedules.

    PubMed

    Scurich, Nicholas; John, Richard S

    2014-04-01

    Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. © 2013 Society for Risk Analysis.

  12. The Importance of Context: Risk-based De-identification of Biomedical Data.

    PubMed

    Prasser, Fabian; Kohlmayer, Florian; Kuhn, Klaus A

    2016-08-05

    Data sharing is a central aspect of modern biomedical research. It is accompanied by significant privacy concerns and often data needs to be protected from re-identification. With methods of de-identification datasets can be transformed in such a way that it becomes extremely difficult to link their records to identified individuals. The most important challenge in this process is to find an adequate balance between an increase in privacy and a decrease in data quality. Accurately measuring the risk of re-identification in a specific data sharing scenario is an important aspect of data de-identification. Overestimation of risks will significantly deteriorate data quality, while underestimation will leave data prone to attacks on privacy. Several models have been proposed for measuring risks, but there is a lack of generic methods for risk-based data de-identification. The aim of the work described in this article was to bridge this gap and to show how the quality of de-identified datasets can be improved by using risk models to tailor the process of de-identification to a concrete context. We implemented a generic de-identification process and several models for measuring re-identification risks into the ARX de-identification tool for biomedical data. By integrating the methods into an existing framework, we were able to automatically transform datasets in such a way that information loss is minimized while it is ensured that re-identification risks meet a user-defined threshold. We performed an extensive experimental evaluation to analyze the impact of using different risk models and assumptions about the goals and the background knowledge of an attacker on the quality of de-identified data. The results of our experiments show that data quality can be improved significantly by using risk models for data de-identification. On a scale where 100 % represents the original input dataset and 0 % represents a dataset from which all information has been removed, the loss of information content could be reduced by up to 10 % when protecting datasets against strong adversaries and by up to 24 % when protecting datasets against weaker adversaries. The methods studied in this article are well suited for protecting sensitive biomedical data and our implementation is available as open-source software. Our results can be used by data custodians to increase the information content of de-identified data by tailoring the process to a specific data sharing scenario. Improving data quality is important for fostering the adoption of de-identification methods in biomedical research.

  13. Hazards of solid waste management: bioethical problems, principles, and priorities

    PubMed Central

    Maxey, Margaret N.

    1978-01-01

    The putative hazards of solid waste management cannot be evaluated without placing the problem within a cultural climate of crisis where some persons consider such by-products of “high, hard technology” to have raised unresolved moral and ethical issues. In order to assist scientific and technical efforts to protect public health and safety, a bioethical perspective requires us to examine three controversial aspects of policy-making about public safety. Failure to recognize the qualitative difference between two cognitive activities—risk-measurements (objective, scientific probabilities) and safety-judgments (subjective, shifting value priorities)—has had three unfortunate consequences. Sophisticated methods of risk analysis have been applied in a piecemeal, haphazard, ad hoc fashion within traditional institutions with the false expectation that incremental risk-reducing programs automatically ensure public health and safety. Ethical priorities require, first and foremost, a whole new field of data arranged for comparable risk-analyses. Critics of cost/risk/benefit quantifications attack the absurdity of “putting a price on human life” but have not been confronted with its threefold ethical justification. The widening discrepancy in risk-perceptions and loss of mutual confidence between scientific experts and ordinary citizens has placed a burden of social responsibility on members of the scientific and technical community to engage in more effective public education through the political process, notwithstanding advocates of a nonscientific adversary process. The urgency of effective public education has been demonstrated by the extent to which we have lost our historically balanced judgment about the alleged environmental hazards posed by advanced technology. PMID:738238

  14. System-Level Experimentation: Executive Summary and Annotated Brief

    DTIC Science & Technology

    2006-07-01

    both friendlies and adversaries – to define their own capabilities, unfettered by doctrinal or cultural limitations and bounded only by the laws of...Gen Eric Nelson, USAF (Ret) Independent Consultant (Systems, Software) Dr. Brad Parkinson Stanford University (GPS, Sensors, Systems) Mr. Skip Saunders...RCO* – rapid fielding for high priority needs SLE is focused on understanding the future - unknown needs A8’ s Future Game – analysis of future

  15. Comparative Analysis of Two-Stage-to-Orbit Rocket and Airbreathing Reusable Launch Vehicles for Military Applications

    DTIC Science & Technology

    2006-03-01

    Manpower of Military RLVs.” AIAA 2004-6111, Space 2004 Conference, San Diego, CA, September 28-30, 2004. 37. Serway , Raymond A . Physics for...E. Franke (Chairman) Date _____________//SIGNED//_____________ __14 Mar 06__ Ralph A . Anthenien (Member) Date _____________//SIGNED...keep a technological advantage over our adversaries, and many designs for RLVs have been proposed over the years. In addition, advances in

  16. Evolving Intelligence, Surveillance & Reconnaissance (ISR) for Air Force Cyber Defense

    DTIC Science & Technology

    2013-02-14

    Telecommunications and Assessment Program ( TMAP ) notes in Air Force Instruction (AFI) 10-712 that “adversaries can easily monitor (unclassified) systems to...Instruction (AFI) 10-712, Telecommunications Monitoring And Assessment Program ( TMAP ), 2011, 4. 23. Lt Col Hugh M. Ragland., interview with author...Monitoring And Assessment Program ( TMAP ), 8 June 2011. Brenner, Carl N. Col, USAF. NASIC Air & Cyber Analysis Group/CC. Interview by the author. 29

  17. Determining a Relationship Between Foreign News Media Reports Covering U.S. Military Events and Network Incidents Against DoD Networks

    DTIC Science & Technology

    2005-03-01

    influence on the actions of the public (Hill, 1997). Both the U.S. government and its adversaries have taken advantage of the effects the media has on...public opinion to gain political advantage (Snyder, 2003). Furthermore, media reports may contain sensitive DoD information which our adversaries...could use to their advantage (McHugh, 1997). DoD public affairs policy has been created to supply the news media with the support it needs for

  18. The art of negotiation. A delicate balance.

    PubMed

    Rehberg, C; Sullivan, G

    1997-01-01

    Successful negotiation is the art of gentle persuasion, not a "winner-take-all" showdown. Accordingly, it is essential to begin the process with a positive outlook and with the goal of reaching an agreement that is acceptable to all parties involved. Although the term "opponent" is used in this article to describe the person or group with whom you are negotiating, it is not used in the adversarial context. It is important to maintain a non-adversarial relationship, to the extent possible.

  19. Device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hänggi, Esther

    2010-12-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.

  20. Sexual abuse prevention with high-risk males: the roles of victim empathy and rape myths.

    PubMed

    Schewe, P A; O'Donohue, W

    1993-01-01

    The outcome of two sexual abuse prevention programs, one emphasizing victim empathy and the other stressing modifying rape myths, was evaluated with high-risk males. Sixty-eight high-risk males, as determined by self-reported likelihood of committing sexual abuse, were randomly assigned to an empathy-treatment, a facts-treatment, or a no-treatment control group. Treatment effects were assessed using subjects' pre- and post-treatment scores on the Likelihood of Sexually Abusing scale, the Rape Empathy Scale, the Acceptance of Interpersonal Violence scale, the Adversarial Sexual Beliefs Scale, and a test of self-reported sexual arousal to forced versus consenting sex. In addition, posttest scores on an Asch-type conformity measure were obtained. Results of validity checks indicated that high-risk subjects differed from low-risk subjects on a number of rape-related variables, that the victim-empathy condition increased subjects' empathy, and that subjects found both treatments to be credible and helpful. Comparisons between the empathy-, facts-, and no-treatment group contraindicated the practice of dispelling rape myths as a method of preventing rape among high-risk males.

  1. Justice foundations for the Comprehensive Law Movement.

    PubMed

    Dewhurst, Dale

    2010-01-01

    Authors examining the developing dispute resolution alternatives to the adversarial system have identified nine converging "vectors" or alternatives in what has been termed the Comprehensive Law Movement. These authors have sought to understand how the developing vectors can remain separate and vibrant movements while sharing common ground. Some analyze these developments as being within law and legal practice, others see them as alternative approaches to law, and still others take a combined approach. It will be impossible to understand how these vectors have meaningful differences from law and legal practice if the search is limited to looking within law and legal practice. It will be impossible to understand how these vectors have meaningful commonalities with law and legal practice if the search is limited to looking external to law and legal practice. Instead of comparing the vectors with the adversarial system, higher order criteria are required. What is needed is a comprehensive and internally consistent super-system of norms; one that can be used to evaluate the adversarial system and the evolving vectors on an equal footing. An Aristotelian natural law virtue theory of justice can: (a) provide a functional guiding definition of justice; (b) serve as a comprehensive and internally consistent super-system of norms; and (c) provide the theoretical and evaluative foundation required to clarify the relationships among the adversarial system and the developing vectors. Finally, it will become clear why the Comprehensive Law Movement might be more appropriately conceptualized as the Comprehensive Justice Movement. Copyright © 2010 Elsevier Ltd. All rights reserved.

  2. Unique Approach to Threat Analysis Mapping: A Malware Centric Methodology for Better Understanding the Adversary Landscape

    DTIC Science & Technology

    2016-04-05

    Unlimited http://www.sei.cmu.edu CMU/SEI-2016-TR-004 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A...Approved for Public Release; Distribution is Unlimited Copyright 2016 Carnegie Mellon University

 This material is based upon work funded and supported...by Department of Homeland Security under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software

  3. Interdicting an Adversary’s Economy Viewed As a Trade Sanction Inoperability Input Output Model

    DTIC Science & Technology

    2017-03-01

    set of sectors. The design of an economic sanction, in the context of this thesis, is the selection of the sector or set of sectors to sanction...We propose two optimization models. The first, the Trade Sanction Inoperability Input-output Model (TS-IIM), selects the sector or set of sectors that...Interdependency analysis: Extensions to demand reduction inoperability input-output modeling and portfolio selection . Unpublished doctoral dissertation

  4. Sacred bounds on rational resolution of violent political conflict

    PubMed Central

    Ginges, Jeremy; Atran, Scott; Medin, Douglas; Shikaki, Khalil

    2007-01-01

    We report a series of experiments carried out with Palestinian and Israeli participants showing that violent opposition to compromise over issues considered sacred is (i) increased by offering material incentives to compromise but (ii) decreased when the adversary makes symbolic compromises over their own sacred values. These results demonstrate some of the unique properties of reasoning and decision-making over sacred values. We show that the use of material incentives to promote the peaceful resolution of political and cultural conflicts may backfire when adversaries treat contested issues as sacred values. PMID:17460042

  5. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  6. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.

    PubMed

    Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav

    2017-01-03

    Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N - 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.

  7. Changing the response of professionals to child abuse.

    PubMed Central

    Munro, E

    1998-01-01

    Britain has developed a child protection system that relies on good interprofessional communication. However, some doctors are questioning the benefits to the child of triggering a child abuse referral. The system has become disproportionately skewed towards investigation and risk assessment, leaving few resources for meeting the needs of children, or helping parents provide better care. The Department of Health (DoH) is proposing a policy to redress the balance; creating a more cooperative and less adversarial relationship with parents, and paying more attention to assessing family needs and long-term family functioning. This paper examines the history of the current system and argues that, while the proposed changes are desirable, it needs to be acknowledged that they may reduce the accuracy of risk assessments. Professionals, therefore, need the backing of the general public to implement such a fundamental shift in emphasis. PMID:9830191

  8. Privacy Vulnerability of Published Anonymous Mobility Traces

    DOE PAGES

    Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; ...

    2013-06-01

    Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers,more » or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.« less

  9. Mothers’ Power Assertion, Children’s Negative, Adversarial Orientation, and Future Behavior Problems in Low-Income Families: Early Maternal Responsiveness as a Moderator of the Developmental Cascade

    PubMed Central

    Kim, Sanghag; Kochanska, Grazyna

    2014-01-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children’s negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers’ responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children’s negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children’s behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children’s negative, adversarial orientation to future behavior problems was present when mothers’ responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483

  10. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    PubMed

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  11. Practical results from a mathematical analysis of guard patrols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Indusi, Joseph P.

    1978-12-01

    Using guard patrols as a primary detection mechanism is not generally viewed as a highly efficient detection method when compared to electronic means. Many factors such as visibility, alertness, and the space-time coincidence of guard and adversary presence all have an effect on the probability of detection. Mathematical analysis of the guard patrol detection problem is related to that of classical search theory originally developed for naval search operations. The results of this analysis tend to support the current practice of using guard forces to assess and respond to previously detected intrusions and not as the primary detection mechanism. 6more » refs.« less

  12. Overcoming the barrier of narrative adherence in conflicts through awareness of the psychological bias of naïve realism.

    PubMed

    Nasie, Meytal; Bar-Tal, Daniel; Pliskin, Ruthie; Nahhas, Eman; Halperin, Eran

    2014-11-01

    One significant socio-psychological barrier for peaceful resolution of conflicts is each party's adherence to its own collective narrative. We hypothesized that raising awareness to the psychological bias of naïve realism and its identification in oneself would provide a path to overcoming this barrier, thus increasing openness to the adversary's narrative. We conducted three experimental studies in the context of the Israeli-Palestinian conflict. Studies 1 and 2, conducted among Jewish Israelis and Palestinian Israelis, respectively, revealed that participants with hawkish political ideology reported greater openness to the adversary's narrative when they were made aware of naïve realism bias. Study 3 revealed that hawkish participants at the baseline adhered to the ingroup narrative and resisted the adversary's narrative more than dovish participants. They were also more able to identify the bias in themselves upon learning about it. This identification may explain why the manipulation led to bias correction only among hawkish participants. © 2014 by the Society for Personality and Social Psychology, Inc.

  13. A spatial model for conflict incorporating within- and between-actor effects

    NASA Astrophysics Data System (ADS)

    Knipl, Diána; Davies, Toby; Baudains, Peter

    2017-10-01

    The application of ecological models to human conflict scenarios has given rise to a number of models which describe antagonistic relationships between adversaries. Recent work demonstrates that the spatial disaggregation of such models is not only well-motivated but also gives rise to interesting dynamic behaviour, particularly with respect to the spatial distribution of resources. One feature which is largely absent from previous models, however, is the ability of an adversary to coordinate activity across its various locations. Most immediately, this corresponds to the notion of 'support' - the reallocation of resources from one site to another according to need - which plays an important role in real-world conflict. In this paper, we generalise a spatially-disaggregated form of the classic Richardson model of conflict escalation by adding a cross-location interaction term for the within-adversary dynamics at each location. We explore the model analytically, giving conditions for the stability of the balanced equilibrium state. We then also carry out a number of numerical simulations which correspond to stylised real-world conflict scenarios. Potential further applications of the model, and its implications for policy, are then discussed.

  14. Vehicle barrier with access delay

    DOEpatents

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  15. Data Retention and Anonymity Services

    NASA Astrophysics Data System (ADS)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  16. Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification.

    PubMed

    Wang, Yi; Wan, Jianwu; Guo, Jun; Cheung, Yiu-Ming; Yuen, Pong C; Yi Wang; Jianwu Wan; Jun Guo; Yiu-Ming Cheung; Yuen, Pong C; Cheung, Yiu-Ming; Guo, Jun; Yuen, Pong C; Wan, Jianwu; Wang, Yi

    2018-07-01

    Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric privacy protection are in general based on pairwise matching of secured biometric templates and have inherent limitations in search efficiency and scalability. In this paper, we propose an inference-based framework for privacy-preserving similarity search in Hamming space. Our approach builds on an obfuscated distance measure that can conceal Hamming distance in a dynamic interval. Such a mechanism enables us to systematically design statistically reliable methods for retrieving most likely candidates without knowing the exact distance values. We further propose to apply Montgomery multiplication for generating search indexes that can withstand adversarial similarity analysis, and show that information leakage in randomized Montgomery domains can be made negligibly small. Our experiments on public biometric datasets demonstrate that the inference-based approach can achieve a search accuracy close to the best performance possible with secure computation methods, but the associated cost is reduced by orders of magnitude compared to cryptographic primitives.

  17. The control of chemical weapons: A strategic analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stern, J.E.

    This thesis develops an analytical framework for optimal design of a ban on chemical weapons (CW). The thesis addresses two principal questions: first, could it be in the interest of individual states to adopt a CW ban, even if compliance by adversaries cannot be presupposed Second, how can designers of the treaty maximize incentives to accede and comply, but simultaneously minimize the threat to national sovereignty, including the risk of giving up a deterrent stockpile, and the risk that sensitive information would be revealed during inspections Three problems can plague any disarmament agreement. The first danger is that the agreementmore » will be so minimalist that although all countries may adhere to it, it will have little effect on international behavior. The second danger is that the treaty will have such a weak enforcement mechanism that although nations may accede, they may not comply under conditions of international stress. The third danger is that the terms of the arrangement will be so onerous that few nations will agree to adopt it in the first place. This thesis develops a framework for thinking about how to strike the proper balance between these competing concerns. A salient characteristic of CW is the relative ease with which they can be produced in secret. The dissertation analyzes the effectiveness of inspection procedures of varying intrusiveness, and investigates the risks to sensitive government and industrial facilities. The thesis concludes with an analysis of the extent to which a ban on a single weapon could enhance the stability of the [open quotes]balance of terror.[close quotes] The author makes specific policy recommendations about how to set the optimal level of enforcement so that the ban is likely to succeed, and thus become more than a symbolic gesture.« less

  18. The control of chemical weapons: A strategic analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stern, J.E.

    This thesis develops an analytical framework for optimal design of a ban on chemical weapons (CW). The thesis addresses two principal questions: first, could it be in the interest of individual states to adopt a CW ban, even if compliance by adversaries cannot be presupposed? Second, how compliance by adverse can designers of the treaty maximize incentives to accede and to national comply, but simultaneously minimize the threat sovereignty, including the risk of giving up a deterrent stockpile, and the risk that sensitive information would be revealed during inspections? Three problems can plague any disarmament agreement will be so minimalistmore » that although all countries may adhere to it, it will have little effect on international behavior. The second danger is that weak enforcement mechanism that the treaty will have such a although nations may accede, they may not comply under conditions of international stress. The third danger is that the terms of the arrangement will be so onerous that few nations will agree to adopt it in the first place. This thesis develops a framework for thinking about how to strike the proper balance between these competing concerns. A salient characteristic of CW is the relative ease with which they can be produced in secret. The dissertation analyzes the effectiveness of inspection procedures of varying intrusiveness, and investigates the risks to sensitive government and industrial facilities. The thesis concludes with an analysis of the extent to which a ban on a single weapon could enhance the stability of the ``balance of terror.`` The author makes specific policy recommendations about how to set the optimal level of enforcement so that the ban is likely to succeed, and thus become more than a symbolic gesture.« less

  19. Beyond the Paths of Heaven. The Emergence of Space Power Thought

    DTIC Science & Technology

    1999-09-01

    more practical. In any event, the United States will have to develop i t s space doc t r ine under the assumpt ion tha t the adversary...will have some space information access, or in the words of the next author , we wi l l have to proceed under the assump- t ion that “ the...sa te l l i tes , an unders tanding of changes within the mil i tary space community, or an analysis of the space control mission. In

  20. Consequence-driven cyber-informed engineering (CCE)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freeman, Sarah G.; St Michel, Curtis; Smith, Robert

    The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal ofmore » the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.« less

  1. SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation.

    PubMed

    Xue, Yuan; Xu, Tao; Zhang, Han; Long, L Rodney; Huang, Xiaolei

    2018-05-03

    Inspired by classic Generative Adversarial Networks (GANs), we propose a novel end-to-end adversarial neural network, called SegAN, for the task of medical image segmentation. Since image segmentation requires dense, pixel-level labeling, the single scalar real/fake output of a classic GAN's discriminator may be ineffective in producing stable and sufficient gradient feedback to the networks. Instead, we use a fully convolutional neural network as the segmentor to generate segmentation label maps, and propose a novel adversarial critic network with a multi-scale L 1 loss function to force the critic and segmentor to learn both global and local features that capture long- and short-range spatial relationships between pixels. In our SegAN framework, the segmentor and critic networks are trained in an alternating fashion in a min-max game: The critic is trained by maximizing a multi-scale loss function, while the segmentor is trained with only gradients passed along by the critic, with the aim to minimize the multi-scale loss function. We show that such a SegAN framework is more effective and stable for the segmentation task, and it leads to better performance than the state-of-the-art U-net segmentation method. We tested our SegAN method using datasets from the MICCAI BRATS brain tumor segmentation challenge. Extensive experimental results demonstrate the effectiveness of the proposed SegAN with multi-scale loss: on BRATS 2013 SegAN gives performance comparable to the state-of-the-art for whole tumor and tumor core segmentation while achieves better precision and sensitivity for Gd-enhance tumor core segmentation; on BRATS 2015 SegAN achieves better performance than the state-of-the-art in both dice score and precision.

  2. US conventional arms transfers: Promoting stability or fueling conflict?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hartung, W.D.

    1995-11-01

    Ever sense President Nixon outlined a new national security doctrine in 1969 that emphasized sending arms instead of troops to defend United States (US) interests, policy-makers have taken it as an article of faith that arms transfers are virtually a risk-free way to win friends and intimidate adversaries. This enthusiasm for swapping arms for influence is based on the flawed assumption that the laws and policies of the US have succeeded in ensuring that this technology is supplied only to reliable allies who use the systems for legitimate defensive purposes. The author concludes that recent experience suggests otherwise and reviewsmore » the policies of the Clinton administration.« less

  3. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach.

    PubMed

    Wan, Zhiyu; Vorobeychik, Yevgeniy; Xia, Weiyi; Clayton, Ellen Wright; Kantarcioglu, Murat; Malin, Bradley

    2017-02-02

    Emerging scientific endeavors are creating big data repositories of data from millions of individuals. Sharing data in a privacy-respecting manner could lead to important discoveries, but high-profile demonstrations show that links between de-identified genomic data and named persons can sometimes be reestablished. Such re-identification attacks have focused on worst-case scenarios and spurred the adoption of data-sharing practices that unnecessarily impede research. To mitigate concerns, organizations have traditionally relied upon legal deterrents, like data use agreements, and are considering suppressing or adding noise to genomic variants. In this report, we use a game theoretic lens to develop more effective, quantifiable protections for genomic data sharing. This is a fundamentally different approach because it accounts for adversarial behavior and capabilities and tailors protections to anticipated recipients with reasonable resources, not adversaries with unlimited means. We demonstrate this approach via a new public resource with genomic summary data from over 8,000 individuals-the Sequence and Phenotype Integration Exchange (SPHINX)-and show that risks can be balanced against utility more effectively than with traditional approaches. We further show the generalizability of this framework by applying it to other genomic data collection and sharing endeavors. Recognizing that such models are dependent on a variety of parameters, we perform extensive sensitivity analyses to show that our findings are robust to their fluctuations. Copyright © 2017 American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  4. Coordinating with Humans by Adjustable-Autonomy for Multirobot Pursuit (CHAMP)

    NASA Astrophysics Data System (ADS)

    Dumond, Danielle; Ayers, Jeanine; Schurr, Nathan; Carlin, Alan; Burke, Dustin; Rousseau, Jeffrey

    2012-06-01

    One of the primary challenges facing the modern small-unit tactical team is the ability of the unit to safely and effectively search, explore, clear and hold urbanized terrain that includes buildings, streets, and subterranean dwellings. Buildings provide cover and concealment to an enemy and restrict the movement of forces while diminishing their ability to engage the adversary. The use of robots has significant potential to reduce the risk to tactical teams and dramatically force multiply the small unit's footprint. Despite advances in robotic mobility, sensing capabilities, and human-robot interaction, the use of robots in room clearing operations remains nascent. CHAMP is a software system in development that integrates with a team of robotic platforms to enable them to coordinate with a human operator performing a search and pursuit task. In this way, the human operator can either give control to the robots to search autonomously, or can retain control and direct the robots where needed. CHAMP's autonomy is built upon a combination of adversarial pursuit algorithms and dynamic function allocation strategies that maximize the team's resources. Multi-modal interaction with CHAMP is achieved using novel gesture-recognition based capabilities to reduce the need for heads-down tele-operation. The Champ Coordination Algorithm addresses dynamic and limited team sizes, generates a novel map of the area, and takes into account mission goals, user preferences and team roles. In this paper we show results from preliminary simulated experiments and find that the CHAMP system performs faster than traditional search and pursuit algorithms.

  5. Vital area identification for U.S. Nuclear Regulatory Commission nuclear power reactor licensees and new reactor applicants.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitehead, Donnie Wayne; Varnado, G. Bruce

    2008-09-01

    U.S. Nuclear Regulatory Commission nuclear power plant licensees and new reactor applicants are required to provide protection of their plants against radiological sabotage, including the placement of vital equipment in vital areas. This document describes a systematic process for the identification of the minimum set of areas that must be designated as vital areas in order to ensure that all radiological sabotage scenarios are prevented. Vital area identification involves the use of logic models to systematically identify all of the malicious acts or combinations of malicious acts that could lead to radiological sabotage. The models available in the plant probabilisticmore » risk assessment and other safety analyses provide a great deal of the information and basic model structure needed for the sabotage logic model. Once the sabotage logic model is developed, the events (or malicious acts) in the model are replaced with the areas in which the events can be accomplished. This sabotage area logic model is then analyzed to identify the target sets (combinations of areas the adversary must visit to cause radiological sabotage) and the candidate vital area sets (combinations of areas that must be protected against adversary access to prevent radiological sabotage). Any one of the candidate vital area sets can be selected for protection. Appropriate selection criteria will allow the licensee or new reactor applicant to minimize the impacts of vital area protection measures on plant safety, cost, operations, or other factors of concern.« less

  6. Generative Adversarial Networks: An Overview

    NASA Astrophysics Data System (ADS)

    Creswell, Antonia; White, Tom; Dumoulin, Vincent; Arulkumaran, Kai; Sengupta, Biswa; Bharath, Anil A.

    2018-01-01

    Generative adversarial networks (GANs) provide a way to learn deep representations without extensively annotated training data. They achieve this through deriving backpropagation signals through a competitive process involving a pair of networks. The representations that can be learned by GANs may be used in a variety of applications, including image synthesis, semantic image editing, style transfer, image super-resolution and classification. The aim of this review paper is to provide an overview of GANs for the signal processing community, drawing on familiar analogies and concepts where possible. In addition to identifying different methods for training and constructing GANs, we also point to remaining challenges in their theory and application.

  7. Efficient spatial privacy preserving scheme for sensor network

    NASA Astrophysics Data System (ADS)

    Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar

    2013-03-01

    The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

  8. Translation-aware semantic segmentation via conditional least-square generative adversarial networks

    NASA Astrophysics Data System (ADS)

    Zhang, Mi; Hu, Xiangyun; Zhao, Like; Pang, Shiyan; Gong, Jinqi; Luo, Min

    2017-10-01

    Semantic segmentation has recently made rapid progress in the field of remote sensing and computer vision. However, many leading approaches cannot simultaneously translate label maps to possible source images with a limited number of training images. The core issue is insufficient adversarial information to interpret the inverse process and proper objective loss function to overcome the vanishing gradient problem. We propose the use of conditional least squares generative adversarial networks (CLS-GAN) to delineate visual objects and solve these problems. We trained the CLS-GAN network for semantic segmentation to discriminate dense prediction information either from training images or generative networks. We show that the optimal objective function of CLS-GAN is a special class of f-divergence and yields a generator that lies on the decision boundary of discriminator that reduces possible vanished gradient. We also demonstrate the effectiveness of the proposed architecture at translating images from label maps in the learning process. Experiments on a limited number of high resolution images, including close-range and remote sensing datasets, indicate that the proposed method leads to the improved semantic segmentation accuracy and can simultaneously generate high quality images from label maps.

  9. Generative adversarial network based telecom fraud detection at the receiving bank.

    PubMed

    Zheng, Yu-Jun; Zhou, Xiao-Han; Sheng, Wei-Guo; Xue, Yu; Chen, Sheng-Yong

    2018-06-01

    Recently telecom fraud has become a serious problem especially in developing countries such as China. At present, it can be very difficult to coordinate different agencies to prevent fraud completely. In this paper we study how to detect large transfers that are sent from victims deceived by fraudsters at the receiving bank. We propose a new generative adversarial network (GAN) based model to calculate for each large transfer a probability that it is fraudulent, such that the bank can take appropriate measures to prevent potential fraudsters to take the money if the probability exceeds a threshold. The inference model uses a deep denoising autoencoder to effectively learn the complex probabilistic relationship among the input features, and employs adversarial training that establishes a minimax game between a discriminator and a generator to accurately discriminate between positive samples and negative samples in the data distribution. We show that the model outperforms a set of well-known classification methods in experiments, and its applications in two commercial banks have reduced losses of about 10 million RMB in twelve weeks and significantly improved their business reputation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. The cornucopia of meaningful leads: Applying deep adversarial autoencoders for new molecule development in oncology

    PubMed Central

    Kadurin, Artur; Aliper, Alexander; Kazennov, Andrey; Mamoshina, Polina; Vanhaelen, Quentin; Khrabrov, Kuzma; Zhavoronkov, Alex

    2017-01-01

    Recent advances in deep learning and specifically in generative adversarial networks have demonstrated surprising results in generating new images and videos upon request even using natural language as input. In this paper we present the first application of generative adversarial autoencoders (AAE) for generating novel molecular fingerprints with a defined set of parameters. We developed a 7-layer AAE architecture with the latent middle layer serving as a discriminator. As an input and output the AAE uses a vector of binary fingerprints and concentration of the molecule. In the latent layer we also introduced a neuron responsible for growth inhibition percentage, which when negative indicates the reduction in the number of tumor cells after the treatment. To train the AAE we used the NCI-60 cell line assay data for 6252 compounds profiled on MCF-7 cell line. The output of the AAE was used to screen 72 million compounds in PubChem and select candidate molecules with potential anti-cancer properties. This approach is a proof of concept of an artificially-intelligent drug discovery engine, where AAEs are used to generate new molecular fingerprints with the desired molecular properties. PMID:28029644

  11. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    PubMed

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  12. Cyber Security Research Frameworks For Coevolutionary Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rush, George D.; Tauritz, Daniel Remy

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less

  13. Reinforcements, ammunition limits, and termination of neutralization engagements in ASSESS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Paulus, W.K.; Mondragon, J.

    1991-01-01

    This paper reports on the ASSESS Neutralization Analysis module (Neutralization) which is part of Analytic system and Software for Evaluation of Safeguards and Security, ASSESS, a vulnerability assessment tool. Neutralization models a fire fight engagement between security inspectors (SIs) and adversaries. The model has been improved to represent more realistically the addition of reinforcements to an engagement, the criteria for declaring an engagement terminated, and the amount of ammunition which security forces can use. SI reinforcements must prevent adversaries from achieving their purpose even if an initial security force has been overcome. The reinforcements must be timely. A variety ofmore » reinforcement timeliness cases can be modeled. Reinforcements that are not timely are shown to be ineffective in the calculated results. Engagements may terminate before all combatants on one side are neutralized if they recognize that they are losing. A winner is declared when the number of survivors on one side is reduced to a user specified level. Realistically, the amount of ammunition that can be carried into an engagement is limited. Neutralization now permits the analyst to specify the number of rounds available to the security forces initially and the quantity of resupply that is introduced with reinforcements. These new capabilities all contribute toward more realistic modeling of neutralization engagements.« less

  14. Secure and lightweight network admission and transmission protocol for body sensor networks.

    PubMed

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Zhang, Pingxin

    2013-05-01

    A body sensor network (BSN) is a wireless network of biosensors and a local processing unit, which is commonly referred to as the personal wireless hub (PWH). Personal health information (PHI) is collected by biosensors and delivered to the PWH before it is forwarded to the remote healthcare center for further processing. In a BSN, it is critical to only admit eligible biosensors and PWH into the network. Also, securing the transmission from each biosensor to PWH is essential not only for ensuring safety of PHI delivery, but also for preserving the privacy of PHI. In this paper, we present the design, implementation, and evaluation of a secure network admission and transmission subsystem based on a polynomial-based authentication scheme. The procedures in this subsystem to establish keys for each biosensor are communication efficient and energy efficient. Moreover, based on the observation that an adversary eavesdropping in a BSN faces inevitable channel errors, we propose to exploit the adversary's uncertainty regarding the PHI transmission to update the individual key dynamically and improve key secrecy. In addition to the theoretical analysis that demonstrates the security properties of our system, this paper also reports the experimental results of the proposed protocol on resource-limited sensor platforms, which show the efficiency of our system in practice.

  15. Personal and organizational predictors of workplace sexual harassment of women by men.

    PubMed

    Dekker, I; Barling, J

    1998-01-01

    The authors investigated the predictors of workplace sexual harassment in 278 male university faculty and staff (M age = 45 years). Workplace variables (perceptions of organizational sanctions against harassment and perceptions of a sexualized workplace) and personal variables (adversarial sexual beliefs, sexual harassment beliefs, perspective taking, and self-esteem) were studied as predictors of sexualized and gender harassment. Social desirability was controlled. Both organizational variables and beliefs about sexual harassment predicted gender harassment and sexualized harassment. Perspective taking, adversarial sexual beliefs, and sexual harassment beliefs moderated the effects of perceived organizational sanctions against harassment on sexualized harassment. Findings are discussed as they relate to organizational efforts to reduce or prevent sexual harassment.

  16. The effects of gender and music video imagery on sexual attitudes.

    PubMed

    Kalof, L

    1999-06-01

    This study examined the influence of gender and exposure to gender-stereo-typed music video imagery on sexual attitudes (adversarial sexual beliefs, acceptance of rape myths, acceptance of interpersonal violence, and gender role stereotyping). A group of 44 U.S. college students were randomly assigned to 1 of 2 groups that viewed either a video portraying stereotyped sexual imagery or a video that excluded all sexual images. Exposure to traditional sexual imagery had a significant main effect on attitudes about adversarial sexual relationships, and gender had main effects on 3 of 4 sexual attitudes. There was some evidence of an interaction between gender and exposure to traditional sexual imagery on the acceptance of interpersonal violence.

  17. Fine-Tuning Neural Patient Question Retrieval Model with Generative Adversarial Networks.

    PubMed

    Tang, Guoyu; Ni, Yuan; Wang, Keqiang; Yong, Qin

    2018-01-01

    The online patient question and answering (Q&A) system attracts an increasing amount of users in China. Patient will post their questions and wait for doctors' response. To avoid the lag time involved with the waiting and to reduce the workload on the doctors, a better method is to automatically retrieve the semantically equivalent question from the archive. We present a Generative Adversarial Networks (GAN) based approach to automatically retrieve patient question. We apply supervised deep learning based approaches to determine the similarity between patient questions. Then a GAN framework is used to fine-tune the pre-trained deep learning models. The experiment results show that fine-tuning by GAN can improve the performance.

  18. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a 'game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  19. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a `game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  20. What the Hell Do We Do Now? A Policy Options Analysis of State, Local, and Tribal Law Enforcement Participation in Immigration Enforcement

    DTIC Science & Technology

    2013-09-01

    less like adversaries and more like partners with the affected communities in the effort. 94 THIS PAGE INTENTIONALLY LEFT BLANK 95 LIST OF... INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is...ABSTRACT UU NSN 7540–01–280–5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI Std. 239–18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved

  1. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    NASA Technical Reports Server (NTRS)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  2. A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus

    NASA Astrophysics Data System (ADS)

    Blackwell, Clive

    We illustrate the design of an intelligent agent to aid a merchant to limit fraudulent payment card purchases over the Internet. This is important because increasing fraud may limit the rise of e-commerce, and difficult because of the uncertainty in identifying and authenticating people remotely. The agent can advise the merchant what actions to take to reduce risk without complete knowledge of the circumstances. It can also negotiate flexibly to conclude transactions successfully that would otherwise be rejected. We use the Event Calculus to model the transaction system including the participants and their actions. The idea has applications in other distributed systems where incomplete knowledge of a system may be exploited by adversaries to their advantage.

  3. Device independence for two-party cryptography and position verification with memoryless devices

    NASA Astrophysics Data System (ADS)

    Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie

    2018-06-01

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.

  4. Evolution of trends in risk management.

    PubMed

    Aziz, Farah; Khalil, Alizan; Hall, John C

    2005-07-01

    In the past, the detection and response to adverse clinical events were viewed as an inherent part of professionalism; and, if perceived problems were not sorted out at that level, the ultimate expression of dissatisfaction was litigation. There are now demands for the adoption of more transparent and effective processes for risk management. Reviews of surgical practice have highlighted the presence of unacceptable levels of avoidable adverse events. This is being resolved in two ways. First, attention is being directed to the extent that training and experience have on outcomes after surgery, and both appear to be important. Second, a greater appreciation of human factors engineering has promoted a greater involvement of surgeons in processes involving teamwork and non-technical skills. The community wants surgeons who are competent and health-care systems that minimize risk. In recent times attention has been focused on the turmoil associated with change; but, when events are viewed over a period of several decades, there has been considerable progress towards these ideals. Further advancement would be aided by removing the adversarial nature of malpractice systems that have failed to maintain standards.

  5. LINEBACkER: Bio-inspired Data Reduction Toward Real Time Network Traffic Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Teuton, Jeremy R.; Peterson, Elena S.; Nordwall, Douglas J.

    Abstract—One essential component of resilient cyber applications is the ability to detect adversaries and protect systems with the same flexibility adversaries will use to achieve their goals. Current detection techniques do not enable this degree of flexibility because most existing applications are built using exact or regular-expression matching to libraries of rule sets. Further, network traffic defies traditional cyber security approaches that focus on limiting access based on the use of passwords and examination of lists of installed or downloaded programs. These approaches do not readily apply to network traffic occurring beyond the access control point, and when the datamore » in question are combined control and payload data of ever increasing speed and volume. Manual analysis of network traffic is not normally possible because of the magnitude of the data that is being exchanged and the length of time that this analysis takes. At the same time, using an exact matching scheme to identify malicious traffic in real time often fails because the lists against which such searches must operate grow too large. In this work, we introduce an alternative method for cyber network detection based on similarity-measuring algorithms for gene sequence analysis. These methods are ideal because they were designed to identify similar but nonidentical sequences. We demonstrate that our method is generally applicable to the problem of network traffic analysis by illustrating its use in two different areas both based on different attributes of network traffic. Our approach provides a logical framework for organizing large collections of network data, prioritizing traffic of interest to human analysts, and makes it possible to discover traffic signatures without the bias introduced by expert-directed signature generation. Pattern recognition on reduced representations of network traffic offers a fast, efficient, and more robust way to detect anomalies.« less

  6. Security of practical private randomness generation

    NASA Astrophysics Data System (ADS)

    Pironio, Stefano; Massar, Serge

    2013-01-01

    Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness in a device-independent way, i.e., without making detailed assumptions about the internal working of the quantum devices used to generate the random numbers. Furthermore these numbers are also private; i.e., they appear random not only to the user but also to any adversary that might possess a perfect description of the devices. Since this process requires a small initial random seed to sample the behavior of the quantum devices and to extract uniform randomness from the raw outputs of the devices, one usually speaks of device-independent randomness expansion. The purpose of this paper is twofold. First, we point out that in most real, practical situations, where the concept of device independence is used as a protection against unintentional flaws or failures of the quantum apparatuses, it is sufficient to show that the generated string is random with respect to an adversary that holds only classical side information; i.e., proving randomness against quantum side information is not necessary. Furthermore, the initial random seed does not need to be private with respect to the adversary, provided that it is generated in a way that is independent from the measured systems. The devices, however, will generate cryptographically secure randomness that cannot be predicted by the adversary, and thus one can, given access to free public randomness, talk about private randomness generation. The theoretical tools to quantify the generated randomness according to these criteria were already introduced in S. Pironio [Nature (London)NATUAS0028-083610.1038/nature09008 464, 1021 (2010)], but the final results were improperly formulated. The second aim of this paper is to correct this inaccurate formulation and therefore lay out a precise theoretical framework for practical device-independent randomness generation.

  7. VIGAN: Missing View Imputation with Generative Adversarial Networks.

    PubMed

    Shang, Chao; Palmer, Aaron; Sun, Jiangwen; Chen, Ko-Shin; Lu, Jin; Bi, Jinbo

    2017-01-01

    In an era when big data are becoming the norm, there is less concern with the quantity but more with the quality and completeness of the data. In many disciplines, data are collected from heterogeneous sources, resulting in multi-view or multi-modal datasets. The missing data problem has been challenging to address in multi-view data analysis. Especially, when certain samples miss an entire view of data, it creates the missing view problem. Classic multiple imputations or matrix completion methods are hardly effective here when no information can be based on in the specific view to impute data for such samples. The commonly-used simple method of removing samples with a missing view can dramatically reduce sample size, thus diminishing the statistical power of a subsequent analysis. In this paper, we propose a novel approach for view imputation via generative adversarial networks (GANs), which we name by VIGAN. This approach first treats each view as a separate domain and identifies domain-to-domain mappings via a GAN using randomly-sampled data from each view, and then employs a multi-modal denoising autoencoder (DAE) to reconstruct the missing view from the GAN outputs based on paired data across the views. Then, by optimizing the GAN and DAE jointly, our model enables the knowledge integration for domain mappings and view correspondences to effectively recover the missing view. Empirical results on benchmark datasets validate the VIGAN approach by comparing against the state of the art. The evaluation of VIGAN in a genetic study of substance use disorders further proves the effectiveness and usability of this approach in life science.

  8. Privacy-preserving techniques of genomic data-a survey.

    PubMed

    Aziz, Md Momin Al; Sadat, Md Nazmus; Alhadidi, Dima; Wang, Shuang; Jiang, Xiaoqian; Brown, Cheryl L; Mohammed, Noman

    2017-11-07

    Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from a specific genomic data set. This can reveal the current association or future susceptibility of some diseases for that individual (and sometimes the kinship between individuals) resulting in a privacy violation. Regardless of these risks, our genomic data hold much importance in analyzing the well-being of us and the future generation. Thus, in this article, we discuss the different privacy and security-related problems revolving around human genomic data. In addition, we will explore some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation. This article will relate the gaps between these two research areas-Cryptography and Genomics. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Resilience of Cyber Systems with Over- and Underregulation.

    PubMed

    Gisladottir, Viktoria; Ganin, Alexander A; Keisler, Jeffrey M; Kepner, Jeremy; Linkov, Igor

    2017-09-01

    Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber defense strategies. This unintentionally increases time and effort that employees spend on training and policy implementation and decreases the time and latitude to perform critical job functions, thus raising overall levels of stress. People's performance under stress, coupled with an overabundance of information, results in even more vulnerabilities for adversaries to exploit. In this article, we embed a simple regulatory model that accounts for cybersecurity human factors and an organization's regulatory environment in a model of a corporate cyber network under attack. The resulting model demonstrates the effect of under- and overregulation on an organization's resilience with respect to insider threats. Currently, there is a tendency to use ad-hoc approaches to account for human factors rather than to incorporate them into cyber resilience modeling. It is clear that using a systematic approach utilizing behavioral science, which already exists in cyber resilience assessment, would provide a more holistic view for decisionmakers. © 2016 Society for Risk Analysis.

  10. Settlement Documents: Anadarko Fraudulent Conveyance Litigation

    EPA Pesticide Factsheets

    Settlement agreement to resolve adversary proceedings related to the fraudulent conveyance litigation with Kerr-McGee and Anadarko Petroleum Corporation associated with the Tronox bankruptcy proceedings

  11. Wide-threat detection: recognition of adversarial missions and activity patterns in Empire Challenge 2009

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy; Shabarekh, Charlotte; Furjanic, Caitlin

    2011-06-01

    In this paper, we present results of adversarial activity recognition using data collected in the Empire Challenge (EC 09) exercise. The EC09 experiment provided an opportunity to evaluate our probabilistic spatiotemporal mission recognition algorithms using the data from live air-born and ground sensors. Using ambiguous and noisy data about locations of entities and motion events on the ground, the algorithms inferred the types and locations of OPFOR activities, including reconnaissance, cache runs, IED emplacements, logistics, and planning meetings. In this paper, we present detailed summary of the validation study and recognition accuracy results. Our algorithms were able to detect locations and types of over 75% of hostile activities in EC09 while producing 25% false alarms.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shue, Craig A; Gupta, Prof. Minaxi

    Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active ormore » passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.« less

  13. Collaborative Divorce: An Effort to Reduce the Damage of Divorce.

    PubMed

    Alba-Fisch, Maria

    2016-05-01

    Divorce has been trapped in the adversarial system of the courts, a system ill suited to the needs of a family attempting to reorganize itself and still safeguard the well-being of its members. Collaborative divorce (CD) is a relatively new approach comprising an interdisciplinary professional team trained to help the divorcing family arrive at a financial, legal, and emotional settlement. The CD approach is designed to assist both members of the couple and their children transition into a more constructive future wherein they can still be a family. The structure and adversarial approach of the courts have been replaced by collaborative structures and principles developed to encourage honesty and cooperation. The case presented illustrates how this actually works. © 2016 Wiley Periodicals, Inc.

  14. Scientific impacts on nuclear strategic policy: Dangers and opportunities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keeny S.M. Jr.

    1988-12-15

    Nuclear weapons have revolutionized warfare, making a mutual capability for assured destruction a fact of life and mutual assured deterrence the underlying nuclear strategy of the superpowers. The program to find a technical solution to the threat of nuclear weapons by creating an impervious defense is fatally flawed by failure to consider responses available to a sophisticated adversary at much lower cost. Responses could involve: exploiting vulnerabilities; increased firepower; technical innovation; and circumvention. Efforts to achieve strategic defense would in fact increase risk of nuclear war by stimulating the nuclear arms race since history demonstrates neither side will allow itsmore » deterrent force to be seriously degraded. Defenses would increase instability in times of a crisis. Science has also reduced the risk of nuclear war by making possible improved control and safety of nuclear forces and predictability of US/Soviet relations, verifiability of arms control agreements, and survivable strategic systems. Science can be a tool for good or evil; mankind must be its masters not its slaves.« less

  15. Scientific impacts on nuclear strategic policy: Dangers and opportunities

    NASA Astrophysics Data System (ADS)

    Keeny, Spurgeon M.

    1988-12-01

    Nuclear weapons have revolutionized warfare, making a mutual capability for assured destruction a fact of life and mutual assured deterrence the underlying nuclear strategy of the superpowers. The program to find a technical solution to the threat of nuclear weapons by creating an impervious defense is fatally flawed by failure to consider responses available to a sophisticated adversary at much lower cost. Responses could involve: exploiting vulnerabilities; increased firepower; technical innovation; and circumvention. Efforts to achieve strategic defense would in fact increase risk of nuclear war by stimulating the nuclear arms race since history demonstrates neither side will allow its deterrent force to be seriously degraded. Defenses would increase instability in times of a crisis. Science has also reduced the risk of nuclear war by making possible improved control and safety of nuclear forces and predictability of US/Soviet relations, verifiability of arms control agreements, and survivable strategic systems. Science can be a tool for good or evil; mankind must be its masters not its slaves.

  16. Optimizing annotation resources for natural language de-identification via a game theoretic framework.

    PubMed

    Li, Muqun; Carrell, David; Aberdeen, John; Hirschman, Lynette; Kirby, Jacqueline; Li, Bo; Vorobeychik, Yevgeniy; Malin, Bradley A

    2016-06-01

    Electronic medical records (EMRs) are increasingly repurposed for activities beyond clinical care, such as to support translational research and public policy analysis. To mitigate privacy risks, healthcare organizations (HCOs) aim to remove potentially identifying patient information. A substantial quantity of EMR data is in natural language form and there are concerns that automated tools for detecting identifiers are imperfect and leak information that can be exploited by ill-intentioned data recipients. Thus, HCOs have been encouraged to invest as much effort as possible to find and detect potential identifiers, but such a strategy assumes the recipients are sufficiently incentivized and capable of exploiting leaked identifiers. In practice, such an assumption may not hold true and HCOs may overinvest in de-identification technology. The goal of this study is to design a natural language de-identification framework, rooted in game theory, which enables an HCO to optimize their investments given the expected capabilities of an adversarial recipient. We introduce a Stackelberg game to balance risk and utility in natural language de-identification. This game represents a cost-benefit model that enables an HCO with a fixed budget to minimize their investment in the de-identification process. We evaluate this model by assessing the overall payoff to the HCO and the adversary using 2100 clinical notes from Vanderbilt University Medical Center. We simulate several policy alternatives using a range of parameters, including the cost of training a de-identification model and the loss in data utility due to the removal of terms that are not identifiers. In addition, we compare policy options where, when an attacker is fined for misuse, a monetary penalty is paid to the publishing HCO as opposed to a third party (e.g., a federal regulator). Our results show that when an HCO is forced to exhaust a limited budget (set to $2000 in the study), the precision and recall of the de-identification of the HCO are 0.86 and 0.8, respectively. A game-based approach enables a more refined cost-benefit tradeoff, improving both privacy and utility for the HCO. For example, our investigation shows that it is possible for an HCO to release the data without spending all their budget on de-identification and still deter the attacker, with a precision of 0.77 and a recall of 0.61 for the de-identification. There also exist scenarios in which the model indicates an HCO should not release any data because the risk is too great. In addition, we find that the practice of paying fines back to a HCO (an artifact of suing for breach of contract), as opposed to a third party such as a federal regulator, can induce an elevated level of data sharing risk, where the HCO is incentivized to bait the attacker to elicit compensation. A game theoretic framework can be applied in leading HCO's to optimized decision making in natural language de-identification investments before sharing EMR data. Copyright © 2016 Elsevier Inc. All rights reserved.

  17. Designing an effective microbial forensics program for law enforcement and national security purposes.

    PubMed

    Murch, Randall S

    2014-06-01

    Forensic capabilities that provide lead information, and investigative, intelligence, prosecution and policy decision support can be invaluable for responding to and resolving bioterrorism events. Attributing biological attacks through scientific and other resources and processes is an important goal, for which science can be instrumental. Some even believe that having effective microbial forensics capabilities along with others can even deter adversaries from using biological weapons. For those nations that do not have such or wish to integrate or upgrade capabilities, thoughtful analysis and consideration of certain design principles will increase the likelihood that success will be attained.

  18. A consumption value-gap analysis for sustainable consumption.

    PubMed

    Biswas, Aindrila

    2017-03-01

    Recent studies on consumption behavior have depicted environmental apprehension resulting from across wide consumer segments. However, this has not been widely reflected upon the growth in the market shares for green or environment-friendly products mostly because gaps exist between consumers' expectations and perceptions for those products. Previous studies have highlighted the impact of perceived value on potential demand, consumer satisfaction and behavioral intentions. The necessity to understand the effects of gaps in expected and perceived values on consumers' behavioral intention and potential demand for green products cannot be undermined as it shapes the consumers' inclination to repeated purchase and consumption and thus foster potential market demand. Pertaining to this reason, the study aims to adopt a consumption value-gap model based on the theory of consumption values to assess their impact on sustainable consumption behavior and market demand of green products. Consumption value refers to the level of fulfillment of consumer needs by assessment of net utility derived after effective comparison between the benefits (financial or emotional) and the gives (money, time, or energy). The larger the gaps the higher will be the adversarial impact on behavioral intentions. A structural equation modeling was applied to assess data collected through questionnaire survey. The results indicate that functional value-gap and environmental value-gap has the most adversarial impact on sustainable consumption behavior and market demand for green products.

  19. Competition in the domain of wireless networks security

    NASA Astrophysics Data System (ADS)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  20. PTSD symptoms, satisfaction with life, and prejudicial attitudes toward the adversary among Israeli civilians exposed to ongoing missile attacks.

    PubMed

    Besser, Avi; Neria, Yuval

    2009-08-01

    Few studies have examined the consequences of exposure to ongoing missile attacks in civilian populations. The authors examine the relationships between such exposure, and posttraumatic stress disorder (PTSD), satisfaction with life, and prejudicial attitudes toward the adversary. By using a stratified probability sampling, 160 adults, exposed to repeated missile attacks in southern Israel, were compared to 181 adults from areas outside the range of these attacks. Exposed participants reported more PTSD symptoms and less satisfaction with life, as compared to unexposed participants. The associations between PTSD and satisfaction with life and between PTSD and prejudicial attitudes were significantly stronger among the exposed participants, as compared to those who were not exposed to the attacks. Theoretical and clinical implications of the findings are discussed.

  1. Uncertainties in building a strategic defense.

    PubMed

    Zraket, C A

    1987-03-27

    Building a strategic defense against nuclear ballistic missiles involves complex and uncertain functional, spatial, and temporal relations. Such a defensive system would evolve and grow over decades. It is too complex, dynamic, and interactive to be fully understood initially by design, analysis, and experiments. Uncertainties exist in the formulation of requirements and in the research and design of a defense architecture that can be implemented incrementally and be fully tested to operate reliably. The analysis and measurement of system survivability, performance, and cost-effectiveness are critical to this process. Similar complexities exist for an adversary's system that would suppress or use countermeasures against a missile defense. Problems and opportunities posed by these relations are described, with emphasis on the unique characteristics and vulnerabilities of space-based systems.

  2. A survey of automated methods for sensemaking support

    NASA Astrophysics Data System (ADS)

    Llinas, James

    2014-05-01

    Complex, dynamic problems in general present a challenge for the design of analysis support systems and tools largely because there is limited reliable a priori procedural knowledge descriptive of the dynamic processes in the environment. Problem domains that are non-cooperative or adversarial impute added difficulties involving suboptimal observational data and/or data containing the effects of deception or covertness. The fundamental nature of analysis in these environments is based on composite approaches involving mining or foraging over the evidence, discovery and learning processes, and the synthesis of fragmented hypotheses; together, these can be labeled as sensemaking procedures. This paper reviews and analyzes the features, benefits, and limitations of a variety of automated techniques that offer possible support to sensemaking processes in these problem domains.

  3. On the Design of Forgiving Biometric Security Systems

    NASA Astrophysics Data System (ADS)

    Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.

    This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.

  4. Asymptotically Optimal and Private Statistical Estimation

    NASA Astrophysics Data System (ADS)

    Smith, Adam

    Differential privacy is a definition of "privacy" for statistical databases. The definition is simple, yet it implies strong semantics even in the presence of an adversary with arbitrary auxiliary information about the database.

  5. Ensuring Adversarial Process in the FISA Court Act

    THOMAS, 113th Congress

    Rep. Schiff, Adam B. [D-CA-28

    2013-09-20

    House - 01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. U.S. Regional Deterrence Strategies

    DTIC Science & Technology

    1995-01-01

    MOTIVATIONS OF REGIONAL ADVERSARIES ............................. 27 Regime Types ................................. 27 Domestic Political Instability...32 Historical Cases Illustrating the influence of Domestic Politics .................................. 36 China, 1950... Political Constraints ............................. 86 Military Constraints ............. II................89 Deterrence in U.S. Regional Strategy

  7. Random patterns and biometrics for counterfeit deterrence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolk, K.M.

    1993-12-31

    Sandia National Laboratories (SNL) has been working on non-counterfeitable seals, tags, and documents for over fifteen years. During that time, several technologies have been developed that can be applied to deter counterfeiting of identification documents such as ID cards, passports, and possibly credit cards. Two technologies are presented in some detail. The first is reflective particle tagging technology that was developed to help verify treaties limiting the numbers of nuclear weapons that participating parties may possess. This approach uses the random locations and orientations of reflective particles applied to the surface of an item to uniquely identify the item. Themore » resulting tags are secure against even the most determined adversaries. The second technology uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals.« less

  8. Saliency detection by conditional generative adversarial network

    NASA Astrophysics Data System (ADS)

    Cai, Xiaoxu; Yu, Hui

    2018-04-01

    Detecting salient objects in images has been a fundamental problem in computer vision. In recent years, deep learning has shown its impressive performance in dealing with many kinds of vision tasks. In this paper, we propose a new method to detect salient objects by using Conditional Generative Adversarial Network (GAN). This type of network not only learns the mapping from RGB images to salient regions, but also learns a loss function for training the mapping. To the best of our knowledge, this is the first time that Conditional GAN has been used in salient object detection. We evaluate our saliency detection method on 2 large publicly available datasets with pixel accurate annotations. The experimental results have shown the significant and consistent improvements over the state-of-the-art method on a challenging dataset, and the testing speed is much faster.

  9. System for training and evaluation of security personnel in use of firearms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hall, H.F.

    This patent describes an interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has drawn anmore » infrared laser handgun from his holster, fired his laser handgun, taken cover, advanced or retreated from the adversary on the screen, and when the adversary has fired his gun at the trainee.« less

  10. System for training and evaluation of security personnel in use of firearms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hall, H.F.

    An interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has drawn an infrared laser handgunmore » from high holster, fired his laser handgun, taken cover, advanced or retreated from the adversary on the screen, and when the adversary has fired his gun at the trainee. 8 figs.« less

  11. Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.

    PubMed

    Biddle, Justin

    2013-12-01

    There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others.

  12. Cryptography in the Bounded-Quantum-Storage Model

    NASA Astrophysics Data System (ADS)

    Schaffner, Christian

    2007-09-01

    This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.

  13. System for training and evaluation of security personnel in use of firearms

    DOEpatents

    Hall, Howard F.

    1990-01-01

    An interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has (1) drawn an infrared laser handgun from his holster, (2) fired his laser handgun, (3) taken cover, (4) advanced or retreated from the adversary on the screen, and (5) when the adversary has fired his gun at the trainee.

  14. Measurement device-independent quantum dialogue

    NASA Astrophysics Data System (ADS)

    Maitra, Arpita

    2017-12-01

    Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).

  15. Adversarial allegiance: The devil is in the evidence details, not just on the witness stand.

    PubMed

    McAuliff, Bradley D; Arter, Jeana L

    2016-10-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5-year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on prodefense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Prosecution-retained experts shifted their focus from prodefense aspects of the case in the high suggestibility interview to proprosecution aspects in the low suggestibility interview; defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and police interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts because of negativity bias and positive testing strategies associated with confirmation bias. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  16. Adversarial Allegiance: The Devil is in the Evidence Details, Not Just on the Witness Stand

    PubMed Central

    McAuliff, Bradley D.; Arter, Jeana L.

    2016-01-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5 year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on pro-defense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Unlike prosecution-retained experts who shifted their focus from pro-defense aspects of the case in the high suggestibility interview to pro-prosecution aspects in the low suggestibility interview, defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts due to negativity bias and positive testing strategies associated with confirmation bias. PMID:27243362

  17. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  18. Reconstruction of three-dimensional porous media using generative adversarial neural networks

    NASA Astrophysics Data System (ADS)

    Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.

    2017-10-01

    To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.

  19. Sandia Dynamic Materials Program Strategic Plan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flicker, Dawn Gustine; Benage, John F.; Desjarlais, Michael P.

    2017-05-01

    Materials in nuclear and conventional weapons can reach multi-megabar pressures and 1000s of degree temperatures on timescales ranging from microseconds to nanoseconds. Understanding the response of complex materials under these conditions is important for designing and assessing changes to nuclear weapons. In the next few decades, a major concern will be evaluating the behavior of aging materials and remanufactured components. The science to enable the program to underwrite decisions quickly and confidently on use, remanufacturing, and replacement of these materials will be critical to NNSA’s new Stockpile Responsiveness Program. Material response is also important for assessing the risks posed bymore » adversaries or proliferants. Dynamic materials research, which refers to the use of high-speed experiments to produce extreme conditions in matter, is an important part of NNSA’s Stockpile Stewardship Program.« less

  20. EPA enforcement at a crossroads

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Humphreys, S.L.

    1994-10-15

    Environmental enforcement policy in the US is at a crossroads today, faced with a choice of two competing approaches for achieving the country's environmental goals. On the one hand is the federal government's current push to beef up enforcement of environmental laws by increasing the severity of criminal sanctions and general enforcement activities. On the other hand is the growing trend in many environmental regulations to incentivize voluntary compliance by encouraging pollution prevention and self-auditing. Although these two approaches are not inherently incompatible, there is growing concern that the government's current emphasis on criminal enforcement may severely undermine the goalmore » of voluntary compliance by creating an overly adversarial relationship between government and industry and by placing corporate managers at risk of incurring personal liability when they attempt to ferret out environmental compliance problems.« less

  1. Coping with Opposition Groups.

    ERIC Educational Resources Information Center

    Lesly, Philip

    1992-01-01

    Discusses how organizations can cope with opposition and thwart unsound pressures for change. Advocates knowing the situation and the climate, knowing the people involved, knowing the adversaries, knowing what to do, and knowing how to do it. (SR)

  2. Streaming PCA with many missing entries.

    DOT National Transportation Integrated Search

    2015-12-01

    This paper considers the problem of matrix completion when some number of the columns are : completely and arbitrarily corrupted, potentially by a malicious adversary. It is well-known that standard : algorithms for matrix completion can return arbit...

  3. Cost of equity in homeland security resource allocation in the face of a strategic attacker.

    PubMed

    Shan, Xiaojun; Zhuang, Jun

    2013-06-01

    Hundreds of billions of dollars have been spent in homeland security since September 11, 2001. Many mathematical models have been developed to study strategic interactions between governments (defenders) and terrorists (attackers). However, few studies have considered the tradeoff between equity and efficiency in homeland security resource allocation. In this article, we fill this gap by developing a novel model in which a government allocates defensive resources among multiple potential targets, while reserving a portion of defensive resources (represented by the equity coefficient) for equal distribution (according to geographical areas, population, density, etc.). Such a way to model equity is one of many alternatives, but was directly inspired by homeland security resource allocation practice. The government is faced with a strategic terrorist (adaptive adversary) whose attack probabilities are endogenously determined in the model. We study the effect of the equity coefficient on the optimal defensive resource allocations and the corresponding expected loss. We find that the cost of equity (in terms of increased expected loss) increases convexly in the equity coefficient. Furthermore, such cost is lower when: (a) government uses per-valuation equity; (b) the cost-effectiveness coefficient of defense increases; and (c) the total defense budget increases. Our model, results, and insights could be used to assist policy making. © 2012 Society for Risk Analysis.

  4. Negotiation in academic medicine: narratives of faculty researchers and their mentors.

    PubMed

    Sambuco, Dana; Dabrowska, Agata; Decastro, Rochelle; Stewart, Abigail; Ubel, Peter A; Jagsi, Reshma

    2013-04-01

    Few researchers have explored the negotiation experiences of academic medical faculty even though negotiation is crucial to their career success. The authors sought to understand medical faculty researchers' experiences with and perceptions of negotiation. Between February 2010 and August 2011, the authors conducted semistructured, in-depth telephone interviews with 100 former recipients of National Institutes of Health mentored career development awards and 28 of their mentors. Purposive sampling ensured a diverse range of viewpoints. Multiple analysts thematically coded verbatim transcripts using qualitative data analysis software. Participants described the importance of negotiation in academic medical careers but also expressed feeling naïve and unprepared for these negotiations, particularly as junior faculty. Award recipients focused on power, leverage, and strategy, and they expressed a need for training and mentorship to learn successful negotiation skills. Mentors, by contrast, emphasized the importance of flexibility and shared interests in creating win-win situations for both the individual faculty member and the institution. When faculty construed negotiation as adversarial and/or zero-sum, participants believed it required traditionally masculine traits and perceived women to be at a disadvantage. Academic medical faculty often lack the skills and knowledge necessary for successful negotiation, especially early in their careers. Many view negotiation as an adversarial process of the sort that experts call "hard positional bargaining." Increasing awareness of alternative negotiation techniques (e.g., "principled negotiation," in which shared interests, mutually satisfying options, and fair standards are emphasized) may encourage the success of medical faculty, particularly women.

  5. Detection of unmanned aerial vehicles using a visible camera system.

    PubMed

    Hu, Shuowen; Goldman, Geoffrey H; Borel-Donohue, Christoph C

    2017-01-20

    Unmanned aerial vehicles (UAVs) flown by adversaries are an emerging asymmetric threat to homeland security and the military. To help address this threat, we developed and tested a computationally efficient UAV detection algorithm consisting of horizon finding, motion feature extraction, blob analysis, and coherence analysis. We compare the performance of this algorithm against two variants, one using the difference image intensity as the motion features and another using higher-order moments. The proposed algorithm and its variants are tested using field test data of a group 3 UAV acquired with a panoramic video camera in the visible spectrum. The performance of the algorithms was evaluated using receiver operating characteristic curves. The results show that the proposed approach had the best performance compared to the two algorithmic variants.

  6. Biases in research: risk factors for non-replicability in psychotherapy and pharmacotherapy research.

    PubMed

    Leichsenring, F; Abbass, A; Hilsenroth, M J; Leweke, F; Luyten, P; Keefe, J R; Midgley, N; Rabung, S; Salzer, S; Steinert, C

    2017-04-01

    Replicability of findings is an essential prerequisite of research. For both basic and clinical research, however, low replicability of findings has recently been reported. Replicability may be affected by research biases not sufficiently controlled for by the existing research standards. Several biases such as researcher allegiance or selective reporting are well-known for affecting results. For psychotherapy and pharmacotherapy research, specific additional biases may affect outcome (e.g. therapist allegiance, therapist effects or impairments in treatment implementation). For meta-analyses further specific biases are relevant. In psychotherapy and pharmacotherapy research these biases have not yet been systematically discussed in the context of replicability. Using a list of 13 biases as a starting point, we discuss each bias's impact on replicability. We illustrate each bias by selective findings of recent research, showing that (1) several biases are not yet sufficiently controlled for by the presently applied research standards, (2) these biases have a pernicious effect on replicability of findings. For the sake of research credibility, it is critical to avoid these biases in future research. To control for biases and to improve replicability, we propose to systematically implement several measures in psychotherapy and pharmacotherapy research, such as adversarial collaboration (inviting academic rivals to collaborate), reviewing study design prior to knowing the results, triple-blind data analysis (including subjects, investigators and data managers/statisticians), data analysis by other research teams (crowdsourcing), and, last not least, updating reporting standards such as CONSORT or the Template for Intervention Description and Replication (TIDieR).

  7. 78 FR 62590 - 36(b)(1) Arms Sales Notification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    .... Japan is one of the major political and economic powers in East Asia and the Western Pacific and a key... material will be classified Secret. 6. If a technologically advanced adversary were to obtain knowledge of...

  8. 16 CFR 1052.3 - Conduct of oral presentation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the Commission of relevant data, views and arguments. (b) The oral presentation, which shall be taped or transcribed, shall be an informal, non-adversarial legislative-type proceeding at which there will... presentation of data, views or arguments. ...

  9. GEOSTATISTICAL SAMPLING DESIGNS FOR HAZARDOUS WASTE SITES

    EPA Science Inventory

    This chapter discusses field sampling design for environmental sites and hazardous waste sites with respect to random variable sampling theory, Gy's sampling theory, and geostatistical (kriging) sampling theory. The literature often presents these sampling methods as an adversari...

  10. Sensor Compromise Detection in Multiple-Target Tracking Systems

    PubMed Central

    Doucette, Emily A.; Curtis, Jess W.

    2018-01-01

    Tracking multiple targets using a single estimator is a problem that is commonly approached within a trusted framework. There are many weaknesses that an adversary can exploit if it gains control over the sensors. Because the number of targets that the estimator has to track is not known with anticipation, an adversary could cause a loss of information or a degradation in the tracking precision. Other concerns include the introduction of false targets, which would result in a waste of computational and material resources, depending on the application. In this work, we study the problem of detecting compromised or faulty sensors in a multiple-target tracker, starting with the single-sensor case and then considering the multiple-sensor scenario. We propose an algorithm to detect a variety of attacks in the multiple-sensor case, via the application of finite set statistics (FISST), one-class classifiers and hypothesis testing using nonparametric techniques. PMID:29466314

  11. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  12. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  13. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao

    2014-06-01

    Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.

  14. Quantum-secure covert communication on bosonic channels.

    PubMed

    Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat

    2015-10-19

    Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.

  15. Secret-key expansion from covert communication

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less

  17. Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong

    Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.

  18. Realistic noise-tolerant randomness amplification using finite number of devices.

    PubMed

    Brandão, Fernando G S L; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-04-21

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.

  19. Realistic noise-tolerant randomness amplification using finite number of devices

    NASA Astrophysics Data System (ADS)

    Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-04-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.

  20. A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Purvine, Emilie AH; Johnson, John R.; Lo, Chaomei

    Most cyber network attacks begin with an adversary gain- ing a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signa- ture of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typ- ically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reach- ability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolvemore » over time. We use this reacha- bility graph to develop dynamic machine-level and network- level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.« less

  1. Imparting protean behavior to mobile robots accomplishing patrolling tasks in the presence of adversaries.

    PubMed

    Curiac, Daniel-Ioan; Volosencu, Constantin

    2015-10-08

    Providing unpredictable trajectories for patrol robots is essential when coping with adversaries. In order to solve this problem we developed an effective approach based on the known protean behavior of individual prey animals-random zig-zag movement. The proposed bio-inspired method modifies the normal robot's path by incorporating sudden and irregular direction changes without jeopardizing the robot's mission. Such a tactic is aimed to confuse the enemy (e.g. a sniper), offering less time to acquire and retain sight alignment and sight picture. This idea is implemented by simulating a series of fictive-temporary obstacles that will randomly appear in the robot's field of view, deceiving the obstacle avoiding mechanism to react. The new general methodology is particularized by using the Arnold's cat map to obtain the timely random appearance and disappearance of the fictive obstacles. The viability of the proposed method is confirmed through an extensive simulation case study.

  2. Loss-tolerant quantum secure positioning with weak laser sources

    NASA Astrophysics Data System (ADS)

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing

    2016-09-01

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.

  3. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries.

    PubMed

    Finkel, Eli J; Norton, Michael I; Reis, Harry T; Ariely, Dan; Caprariello, Peter A; Eastwick, Paul W; Frost, Jeana H; Maniaci, Michael R

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our conceptualizations of the familiarity-attraction link, as well as the limitations of prior research, were masking a set of higher order principles capable of integrating these diverse conceptualizations. This realization led us to adopt a broader perspective, which focuses on three distinct relationship stages-awareness, surface contact, and mutuality-and suggests that the influence of familiarity on attraction depends on both the nature and the stage of the relationship between perceivers and targets. This article introduces the framework that emerged from our discussions and suggests directions for research to investigate its validity. © The Author(s) 2014.

  4. Realistic noise-tolerant randomness amplification using finite number of devices

    PubMed Central

    Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna

    2016-01-01

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302

  5. A 2D chaotic path planning for mobile robots accomplishing boundary surveillance missions in adversarial conditions

    NASA Astrophysics Data System (ADS)

    Curiac, Daniel-Ioan; Volosencu, Constantin

    2014-10-01

    The path-planning algorithm represents a crucial issue for every autonomous mobile robot. In normal circumstances a patrol robot will compute an optimal path to ensure its task accomplishment, but in adversarial conditions the problem is getting more complicated. Here, the robot’s trajectory needs to be altered into a misleading and unpredictable path to cope with potential opponents. Chaotic systems provide the needed framework for obtaining unpredictable motion in all of the three basic robot surveillance missions: area, points of interests and boundary monitoring. Proficient approaches have been provided for the first two surveillance tasks, but for boundary patrol missions no method has been reported yet. This paper addresses the mentioned research gap by proposing an efficient method, based on chaotic dynamic of the Hénon system, to ensure unpredictable boundary patrol on any shape of chosen closed contour.

  6. Groundwater contamination from waste management sites: The interaction between risk-based engineering design and regulatory policy: 1. Methodology

    NASA Astrophysics Data System (ADS)

    Massmann, Joel; Freeze, R. Allan

    1987-02-01

    This paper puts in place a risk-cost-benefit analysis for waste management facilities that explicitly recognizes the adversarial relationship that exists in a regulated market economy between the owner/operator of a waste management facility and the government regulatory agency under whose terms the facility must be licensed. The risk-cost-benefit analysis is set up from the perspective of the owner/operator. It can be used directly by the owner/operator to assess alternative design strategies. It can also be used by the regulatory agency to assess alternative regulatory policy, but only in an indirect manner, by examining the response of an owner/operator to the stimuli of various policies. The objective function is couched in terms of a discounted stream of benefits, costs, and risks over an engineering time horizon. Benefits are in the form of revenues for services provided; costs are those of construction and operation of the facility. Risk is defined as the cost associated with the probability of failure, with failure defined as the occurrence of a groundwater contamination event that violates the licensing requirements established for the facility. Failure requires a breach of the containment structure and contaminant migration through the hydrogeological environment to a compliance surface. The probability of failure can be estimated on the basis of reliability theory for the breach of containment and with a Monte-Carlo finite-element simulation for the advective contaminant transport. In the hydrogeological environment the hydraulic conductivity values are defined stochastically. The probability of failure is reduced by the presence of a monitoring network operated by the owner/operator and located between the source and the regulatory compliance surface. The level of reduction in the probability of failure depends on the probability of detection of the monitoring network, which can be calculated from the stochastic contaminant transport simulations. While the framework is quite general, the development in this paper is specifically suited for a landfill in which the primary design feature is one or more synthetic liners in parallel. Contamination is brought about by the release of a single, inorganic nonradioactive species into a saturated, high-permeability, advective, steady state horizontal flow system which can be analyzed with a two-dimensional analysis. It is possible to carry out sensitivity analyses for a wide variety of influences on this system, including landfill size, liner design, hydrogeological parameters, amount of exploration, extent of monitoring network, nature of remedial schemes, economic factors, and regulatory policy.

  7. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Paul, Nathanael R; Shue, Craig; Taylor, Curtis

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless localmore » area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.« less

  8. DAGAN: Deep De-Aliasing Generative Adversarial Networks for Fast Compressed Sensing MRI Reconstruction.

    PubMed

    Yang, Guang; Yu, Simiao; Dong, Hao; Slabaugh, Greg; Dragotti, Pier Luigi; Ye, Xujiong; Liu, Fangde; Arridge, Simon; Keegan, Jennifer; Guo, Yike; Firmin, David; Keegan, Jennifer; Slabaugh, Greg; Arridge, Simon; Ye, Xujiong; Guo, Yike; Yu, Simiao; Liu, Fangde; Firmin, David; Dragotti, Pier Luigi; Yang, Guang; Dong, Hao

    2018-06-01

    Compressed sensing magnetic resonance imaging (CS-MRI) enables fast acquisition, which is highly desirable for numerous clinical applications. This can not only reduce the scanning cost and ease patient burden, but also potentially reduce motion artefacts and the effect of contrast washout, thus yielding better image quality. Different from parallel imaging-based fast MRI, which utilizes multiple coils to simultaneously receive MR signals, CS-MRI breaks the Nyquist-Shannon sampling barrier to reconstruct MRI images with much less required raw data. This paper provides a deep learning-based strategy for reconstruction of CS-MRI, and bridges a substantial gap between conventional non-learning methods working only on data from a single image, and prior knowledge from large training data sets. In particular, a novel conditional Generative Adversarial Networks-based model (DAGAN)-based model is proposed to reconstruct CS-MRI. In our DAGAN architecture, we have designed a refinement learning method to stabilize our U-Net based generator, which provides an end-to-end network to reduce aliasing artefacts. To better preserve texture and edges in the reconstruction, we have coupled the adversarial loss with an innovative content loss. In addition, we incorporate frequency-domain information to enforce similarity in both the image and frequency domains. We have performed comprehensive comparison studies with both conventional CS-MRI reconstruction methods and newly investigated deep learning approaches. Compared with these methods, our DAGAN method provides superior reconstruction with preserved perceptual image details. Furthermore, each image is reconstructed in about 5 ms, which is suitable for real-time processing.

  9. Divorce Mediation and Its Emotional Impact on the Couple and Their Children.

    ERIC Educational Resources Information Center

    Kaslow, Florence W.

    1984-01-01

    Discusses the influence of development on divorce, and presents a diaclectic model of divorce stages. Suggests mediation as an alternative dispute resolution strategy and describes contraindications for both mediation and the adversarial approach. (JAC)

  10. Advanced Agent Methods in Adversarial Environment

    DTIC Science & Technology

    2005-11-30

    2 Contents Contents 1 Introduction – Technical Statement of Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.1...37 5.4.1 Deriving Trust Observations from Coalition Cooperation Results . . . . . . . . . . . 37 Contents 3 5.4.2 Iterative Learning of...85 4 Contents A.3.5 Class Finder

  11. False Dichotomy? "Western" and "Confucian" Concepts of Scholarship and Learning

    ERIC Educational Resources Information Center

    Ryan, Janette; Louie, Kam

    2007-01-01

    Discourses of "internationalisation" of the curriculum of Western universities often describe the philosophies and paradigms of "Western" and "Eastern" scholarship in binary terms, such as "deep/surface", "adversarial/harmonious", and "independent/dependent". In practice, such dichotomies…

  12. 76 FR 10627 - Assumption Buster Workshop: Trust Anchors Are Invulnerable

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-25

    .... The goal is to engage in robust debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat...

  13. Sharing the Cyber Journey

    DTIC Science & Technology

    2012-01-01

    destroy information; disrupt networks or communications; or deny service. In military terms, cyberspace is a contested environment. Hactivists, cyber ... criminals , terrorists, and adversarial nations are active in cyberspace networks across the globe; our military networks are no excep­ tion. DoD

  14. A Model of Political Violence

    DTIC Science & Technology

    2015-01-01

    can be used to dehumanize the enemy. Dehumanizing the enemy reduces the perceived moral and psychological costs of killing the adversary.12 The...organizationally condoned, the opposition can use this information to further dehumanize the enemy. While dehumanization can lead to underestimation

  15. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risksmore » of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.« less

  16. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOEpatents

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  17. 28 CFR 24.305 - Extensions of time.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...

  18. 28 CFR 24.305 - Extensions of time.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...

  19. 28 CFR 24.305 - Extensions of time.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...

  20. 28 CFR 24.305 - Extensions of time.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...

  1. 28 CFR 24.305 - Extensions of time.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...

  2. Environment and Alternative Development.

    ERIC Educational Resources Information Center

    Kothari, Rajni

    Stressing the global dimension to the adversary relationship between economic development and environmental conservation, this monograph examines the philosophical, historical, cultural, and ethnic underpinnings of modern science and technology. In addition, the monograph spells out policy implications of an alternative concept of development and…

  3. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

    NASA Astrophysics Data System (ADS)

    Nikolopoulos, Georgios M.

    2018-01-01

    We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.

  4. Length of hospitalization and outcome of commitment and recommitment hearings.

    PubMed

    Parry, C D; Turkheimer, E

    1992-01-01

    Despite extensive legislative reformulation of civil commitment procedures, empirical studies have shown that civil commitment hearings continue to be largely nonadversarial. The authors observed all civil commitment hearings during a three-month period at a large state hospital in Virginia and examined the characteristics of patients and the actions of attorneys, clinical examiners, and judges as a function of the length of time the patient had been in the hospital. The analysis revealed that as the length of a patient's hospitalization increased, the hearings became shorter and less adversarial; patients tended to show fewer signs of acute psychiatric illness and more signs of chronic schizophrenia. The implications of these findings for civil commitment policy are discussed.

  5. Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion

    NASA Astrophysics Data System (ADS)

    Annaby, M. H.; Rushdi, M. A.; Nehary, E. A.

    2018-04-01

    The recent tremendous proliferation of color imaging applications has been accompanied by growing research in data encryption to secure color images against adversary attacks. While recent color image encryption techniques perform reasonably well, they still exhibit vulnerabilities and deficiencies in terms of statistical security measures due to image data redundancy and inherent weaknesses. This paper proposes two encryption algorithms that largely treat these deficiencies and boost the security strength through novel integration of the random fractional Fourier transforms, phase retrieval algorithms, as well as chaotic scrambling and diffusion. We show through detailed experiments and statistical analysis that the proposed enhancements significantly improve security measures and immunity to attacks.

  6. A complexity science-based framework for global joint operations analysis to support force projection: LDRD Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lawton, Craig R.

    2015-01-01

    The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineeringmore » system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.« less

  7. Negotiation in Academic Medicine: Narratives of Faculty Researchers and Their Mentors

    PubMed Central

    Sambuco, Dana; Dabrowska, Agata; DeCastro, Rochelle; Stewart, Abigail; Ubel, Peter A.; Jagsi, Reshma

    2013-01-01

    Purpose Few researchers have explored the negotiation experiences of academic medical faculty even though negotiation is crucial to their career success. The authors sought to understand medical faculty researchers' experiences with and perceptions of negotiation. Method Between February 2010 and August 2011, the authors conducted semi-structured, in-depth telephone interviews with 100 former recipients of National Institutes of Health mentored career development awards and 28 of their mentors. Purposive sampling ensured a diverse range of viewpoints. Multiple analysts thematically coded verbatim transcripts using qualitative data analysis software. Results Participants described the importance of negotiation in academic medical careers but also expressed feeling naïve and unprepared for these negotiations, particularly as junior faculty. Award recipients focused on power, leverage, and strategy, and they expressed a need for training and mentorship to learn successful negotiation skills. Mentors, by contrast, emphasized the importance of flexibility and shared interests in creating win-win situations for both the individual faculty member and the institution. When faculty construed negotiation as adversarial and/or zero-sum, participants believed it required traditionally masculine traits and perceived women to be at a disadvantage. Conclusions Academic medical faculty often lack the skills and knowledge necessary for successful negotiation, especially early in their careers. Many view negotiation as an adversarial process of the sort that experts call “hard positional bargaining.” Increasing awareness of alternative negotiation techniques (e.g., “principled negotiation,” in which shared interests, mutually satisfying options, and fair standards are emphasized), may encourage the success of medical faculty, particularly women. PMID:23425992

  8. 24 CFR 7.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...”, as used in this part, are interchangeable. Alternative Dispute Resolution (ADR) means a variety of approaches used to resolve conflict rather than traditional adjudicatory or adversarial methods such as... of an organizational unit that is analogous to that headed by an Assistant Secretary. Conflict-of...

  9. Course Design for Critical Thinking.

    ERIC Educational Resources Information Center

    Furedy, John J.; Furedy, Christine

    1979-01-01

    A fourth year honors thesis research course in psychology at the University of Toronto uses the device of adversarial interaction to improve critical thinking. Course components, including thesis submission, research seminar, student relations, and supervision, are designed to simulate the constraints, criticism, and relationships of actual…

  10. Decision Space Operations: Campaign Design Aimed at an Adversary’s Decision Making

    DTIC Science & Technology

    2003-01-01

    14 Figure 3: Reflexive control, Initial situation (physical reality ...20 Figure 4: Reflexive control, reality as X imagines it to be...20 Figure 5: Reflexive control, reality as Y imagines it to be .......................................................21 Figure 6: Reflexive

  11. JPRS Report, China.

    DTIC Science & Technology

    1993-06-08

    size, with some of its industrial wares entering international markets. Overall, however, because of the shortage of capital and some irrational ...time. Japan’s exuberance makes it a formidable adversary of the United States and the USSR in the scientific and high technology fields. The grim

  12. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-12

    ... debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat environment is reflected in the discussion...

  13. 20 CFR 405.1 - Introduction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...-adversarial proceeding. In making a determination or decision on your claim, we conduct the administrative... CLAIMS Introduction, General Description, and Definitions § 405.1 Introduction. (a) General. This part... before an administrative law judge. If you are dissatisfied with a decision made by the Federal reviewing...

  14. Prospects for improved detection of chemical, biological, radiological, and nuclear threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wuest, Craig R.; Hart, Brad; Slezak, Thomas R.

    2012-07-31

    Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.

  15. Legality in Cyberspace: An Adversary View

    DTIC Science & Technology

    2014-03-01

    Internet, one might assume that Russia would represent an implacably hostile environment for cyber criminals . Yet the Russian Federation has become one...figures. The reason, while unspoken, is largely understood. Russian cyber criminals are free . . . provided the tar- 19 get of [their] attacks are

  16. Space and Cyber: Shared Challenges, Shared Opportunities

    DTIC Science & Technology

    2011-11-15

    adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue

  17. Massachusetts Superintendents' Perceptions of Teacher Bargaining Practices

    ERIC Educational Resources Information Center

    Borstel, Scott L.

    2010-01-01

    For five decades, collective bargaining has been implemented in American public schools (Loveless, 2000). It has protected the rights of teachers; and teacher work conditions issues and compensation have improved (Hannaway & Rotherham, 2006). However, improvements have created adversarial labor-management relationships, resulted in excessive…

  18. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks

    PubMed Central

    Zhao, Yongan; Carey, Knox; Lloyd, David; Sofia, Heidi; Baker, Dixie; Flicek, Paul; Shringarpure, Suyash; Bustamante, Carlos; Wang, Shuang; Jiang, Xiaoqian; Ohno-Machado, Lucila; Tang, Haixu; Wang, XiaoFeng; Hubaux, Jean-Pierre

    2018-01-01

    The Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context—a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or “beacon”) is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy and standards. While recognizing the inference risks associated with large-scale data aggregation, and the fact that some beacons contain sensitive phenotypic associations that increase privacy risk, the GA4GH adjudged the risk of re-identification based on the binary yes/no allele-presence query responses as acceptable. However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual’s whole genome sequence), the individual’s membership in a beacon can be inferred through repeated queries for variants present in the individual’s genome. In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome. Using a beacon containing data from the 1000 Genomes Project, we demonstrate that the proposed strategies can effectively reduce re-identification risk in beacon-like datasets. PMID:28339683

  19. Learning Physics-based Models in Hydrology under the Framework of Generative Adversarial Networks

    NASA Astrophysics Data System (ADS)

    Karpatne, A.; Kumar, V.

    2017-12-01

    Generative adversarial networks (GANs), that have been highly successful in a number of applications involving large volumes of labeled and unlabeled data such as computer vision, offer huge potential for modeling the dynamics of physical processes that have been traditionally studied using simulations of physics-based models. While conventional physics-based models use labeled samples of input/output variables for model calibration (estimating the right parametric forms of relationships between variables) or data assimilation (identifying the most likely sequence of system states in dynamical systems), there is a greater opportunity to explore the full power of machine learning (ML) methods (e.g, GANs) for studying physical processes currently suffering from large knowledge gaps, e.g. ground-water flow. However, success in this endeavor requires a principled way of combining the strengths of ML methods with physics-based numerical models that are founded on a wealth of scientific knowledge. This is especially important in scientific domains like hydrology where the number of data samples is small (relative to Internet-scale applications such as image recognition where machine learning methods has found great success), and the physical relationships are complex (high-dimensional) and non-stationary. We will present a series of methods for guiding the learning of GANs using physics-based models, e.g., by using the outputs of physics-based models as input data to the generator-learner framework, and by using physics-based models as generators trained using validation data in the adversarial learning framework. These methods are being developed under the broad paradigm of theory-guided data science that we are developing to integrate scientific knowledge with data science methods for accelerating scientific discovery.

  20. Identifying quantum phase transitions with adversarial neural networks

    NASA Astrophysics Data System (ADS)

    Huembeli, Patrick; Dauphin, Alexandre; Wittek, Peter

    2018-04-01

    The identification of phases of matter is a challenging task, especially in quantum mechanics, where the complexity of the ground state appears to grow exponentially with the size of the system. Traditionally, physicists have to identify the relevant order parameters for the classification of the different phases. We here follow a radically different approach: we address this problem with a state-of-the-art deep learning technique, adversarial domain adaptation. We derive the phase diagram of the whole parameter space starting from a fixed and known subspace using unsupervised learning. This method has the advantage that the input of the algorithm can be directly the ground state without any ad hoc feature engineering. Furthermore, the dimension of the parameter space is unrestricted. More specifically, the input data set contains both labeled and unlabeled data instances. The first kind is a system that admits an accurate analytical or numerical solution, and one can recover its phase diagram. The second type is the physical system with an unknown phase diagram. Adversarial domain adaptation uses both types of data to create invariant feature extracting layers in a deep learning architecture. Once these layers are trained, we can attach an unsupervised learner to the network to find phase transitions. We show the success of this technique by applying it on several paradigmatic models: the Ising model with different temperatures, the Bose-Hubbard model, and the Su-Schrieffer-Heeger model with disorder. The method finds unknown transitions successfully and predicts transition points in close agreement with standard methods. This study opens the door to the classification of physical systems where the phase boundaries are complex such as the many-body localization problem or the Bose glass phase.

  1. Risk as a social phenomenon.

    PubMed

    Jamison, Wesley V

    2003-01-01

    What do nuclear power, smoking, and eating beef have in common? The answer is multifaceted. They all share aspects of mass production and consumption, and therefore consumer confidence comes into play in evaluating each of the products' merits. They all produce some level of anxiety--be it in response to adverse media coverage, or the successes of adversarial interest groups in publicizing those products' weaknesses--among consumers who wonder what if any level of the product should be consumed. Finally, nuclear power, smoking, and eating beef all share risk; that is, the perceived and real detriments of producing and consuming those products. Whether or not the associated risks--from increased cancer to increased heart disease--are real is beside the point. When talking about risk, scientific education must deal with the perception of risk as much as its reality. Risk is a socially defined phenomenon, and as such, the successful scientists/communicator must understand the social evaluations of it. While many scientists take a rational view of risk evaluation and consumers often make rational decisions about technological and scientific risk based upon the costs and benefits of that technology, this approach is problematic for three reasons. First, the nature of modern risks has changed in that risk is complex, incomprehensible and uncontrollable to the average person. Second, the rational approach assumes that all costs and benefits of a technology, both real and potential, both current and future, can be known and therefore rationally evaluated. This is not the case. Third, evidence from Europe indicates that trust in information sources about risk has fallen, and thus classic scientific education campaigns that rely upon increasing public knowledge and acceptance of technological and scientific risk are problematic. Because of these factors we argue that effective scientific response must begin to understand the social components of risk if campaigns to shape public perception are to have any success. The report concludes that public perceptions concerning risk are driven more by social and moral debates than by scientific or economic debates (340 words).

  2. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.

    PubMed

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations.

  3. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations

    PubMed Central

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is “frankencerts,” synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired—a low-risk, often ignored error—but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations. PMID:25404868

  4. Predictors of sexual coercion against women and men: a multilevel, multinational study of university students.

    PubMed

    Hines, Denise A

    2007-06-01

    Several explanations have been forwarded to account for sexual coercion in romantic relationships. Feminist theory states that sexual coercion is the result of male dominance over women and the need to maintain that dominance; however, studies showing that women sexually coerce men point towards weaknesses in that theory. Some researchers have, therefore, suggested that it is the extent to which people view the other gender as hostile that influences these rates. Furthermore, much research suggests that a history of childhood sexual abuse is a strong risk factor for later sexual victimization in relationships. Few researchers have empirically evaluated the first two explanations and little is known about whether sexual revictimization operates for men or across cultures. In this study, hierarchical linear modeling was used to investigate whether the status of women and adversarial sexual beliefs predicted differences in sexual coercion across 38 sites from around the world, and whether sexual revictimization operated across genders and cultures. Participants included 7,667 university students from 38 sites. Results showed that the relative status of women at each site predicted significant differences in levels of sexual victimization for men, in that the greater the status of women, the higher the level of forced sex against men. In addition, differences in adversarial sexual beliefs across sites significantly predicted both forced and verbal sexual coercion for both genders, such that greater levels of hostility towards women at a site predicted higher levels of forced and verbal coercion against women and greater levels of hostility towards men at a site predicted higher levels of forced and verbal coercion against men. Finally, sexual revictimization occurred for both genders and across all sites, suggesting that sexual revictimization is a cross-gender, cross-cultural phenomenon. Results are discussed in terms of their contributions to the literature, limitations of the current study, and suggestions for future research.

  5. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.

  6. Pattern Activity Clustering and Evaluation (PACE)

    NASA Astrophysics Data System (ADS)

    Blasch, Erik; Banas, Christopher; Paul, Michael; Bussjager, Becky; Seetharaman, Guna

    2012-06-01

    With the vast amount of network information available on activities of people (i.e. motions, transportation routes, and site visits) there is a need to explore the salient properties of data that detect and discriminate the behavior of individuals. Recent machine learning approaches include methods of data mining, statistical analysis, clustering, and estimation that support activity-based intelligence. We seek to explore contemporary methods in activity analysis using machine learning techniques that discover and characterize behaviors that enable grouping, anomaly detection, and adversarial intent prediction. To evaluate these methods, we describe the mathematics and potential information theory metrics to characterize behavior. A scenario is presented to demonstrate the concept and metrics that could be useful for layered sensing behavior pattern learning and analysis. We leverage work on group tracking, learning and clustering approaches; as well as utilize information theoretical metrics for classification, behavioral and event pattern recognition, and activity and entity analysis. The performance evaluation of activity analysis supports high-level information fusion of user alerts, data queries and sensor management for data extraction, relations discovery, and situation analysis of existing data.

  7. 5 CFR 2610.104 - Proceedings covered.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2610.104 Administrative Personnel OFFICE OF GOVERNMENT ETHICS ORGANIZATION AND PROCEDURES... part applies to adversary administrative adjudications conducted by the Office of Government Ethics... Ethics in Government Act of 1978, section 402(f)(2), 5 U.S.C. app., and subpart E of part 2638 of this...

  8. Collective Bargaining Can Enhance Quality of Worklife.

    ERIC Educational Resources Information Center

    Knott, Ildiko

    1984-01-01

    Examines elements of labor-management relationships in educational institutions, suggesting that communication on a noncrisis basis is crucial to healthy labor relations which are adversarial rather than confrontational. Describes a mature stage of labor-management relation and stresses the importance of sound grievance procedures. (LAL)

  9. USAF Posture Statement 2013

    DTIC Science & Technology

    2013-04-12

    request maintains investments in the DCGS, the MQ-1 Predator, the RC-135 Rivet Joint, the RQ-4 Global Hawk Block 40, and U-2 programs, and makes internal... electromagnetic jamming. Our potential adversaries are also making advances by electronically linking their own combat capabilities, creating new military

  10. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    DTIC Science & Technology

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  11. 29 CFR 2204.106 - Standards for awards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH REVIEW COMMISSION IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN PROCEEDINGS BEFORE THE OCCUPATIONAL SAFETY AND HEALTH REVIEW... failure to act by the Secretary upon which the adversary adjudication is based. The burden of persuasion...

  12. Working Together: The Collaborative Style of Bargaining.

    ERIC Educational Resources Information Center

    Smith, Stuart C.; And Others

    Although conventional collective bargaining has helped teachers achieve greater professional status, its win/lose approach causes participants to overlook shared educational objectives. Since the first experiments in win/win bargaining, the acrimony generated by the adversarial process has led an increasing number of school districts to…

  13. What to Expect During a Teachers' Strike.

    ERIC Educational Resources Information Center

    Long, Jerri

    1987-01-01

    This two-page table charts the range of union activities, their adversarial intent, and possible administrative counterstrategies during a typical teacher strike. Twenty-four activities are covered, from peaceful demonstrations (like picketing), marches, and candlelight vigils, to harassments like nails in tires and telephone threats. (MLH)

  14. Insist or Enlist?: Adultism versus Climates of Excellence

    ERIC Educational Resources Information Center

    Tate, Thomas F.; Copas, Randall L.

    2003-01-01

    Positive climates in youth-serving organizations abandon adversarial encounters and enlist youth as partners in empowerment. The authors describe this approach, drawing from the "Cultivating Productive Peer Relationships" curriculum in the "No Disposable Kids" training program. Adults need strategies to build respectful relationships and to…

  15. Coparenting within the Family System: Influences on Children's Development.

    ERIC Educational Resources Information Center

    Gable, Sara; And Others

    1994-01-01

    Focuses on coparenting, spouses as partners or adversaries in parenting role, in families raising toddler sons. Reviews preliminary longitudinal research findings concerning nature of coparenting and contextual determinants of different types of coparenting alliances. Proposes coparenting processes to interact with marital and parent-child…

  16. Trust Management and Accountability for Internet Security

    ERIC Educational Resources Information Center

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  17. Remarks to Eighth Annual State of Modeling and Simulation

    DTIC Science & Technology

    1999-06-04

    organization, training as well as materiel Discovery vice Verification Tolerance for Surprise Free play Red Team Iterative Process Push to failure...Account for responsive & innovative future adversaries – free play , adaptive strategies and tactics by professional red teams • Address C2 issues & human

  18. Operational Art in Cyber Defense

    DTIC Science & Technology

    2013-04-16

    a personal curiosity. I used the masculine when referring to the Commander and the adversary throughout this paper for brevity. Alanis 1...issue 63, (4th quarter 2011): 70-73. 13 Carl von Clausewitz, On War, ed. Michael Howard and Peter Paret, trans . Michael Howard and Peter Paret

  19. The Adversary System in Low-Level Soviet Economic Decisionmaking.

    DTIC Science & Technology

    1984-08-01

    34- ° .. 78 - capital or a few countertrade agreements, will solve their problems for them. This is markedly different from the overall Soviet pattern...currency countertrade practice, the considerations of this Note would permit further refinement of predictions of Soviet economic decisionmaking that

  20. Turbulent Arena: Global Effects Against Non-State Adversaries

    DTIC Science & Technology

    2005-06-01

    process efficiency to name a few. While a useful aspect of organizational diagnosis , this closed system approach neglects the simple reality that an... Organizational Diagnosis and Assessment: Bridging Theory and Practice (Thousand Oaks, CA: Sage Publications, 1999), 44. 13 Katz and Kahn, 262. 14 Daft

  1. Creating Turbulent Flow Realizations with Generative Adversarial Networks

    NASA Astrophysics Data System (ADS)

    King, Ryan; Graf, Peter; Chertkov, Michael

    2017-11-01

    Generating valid inflow conditions is a crucial, yet computationally expensive, step in unsteady turbulent flow simulations. We demonstrate a new technique for rapid generation of turbulent inflow realizations that leverages recent advances in machine learning for image generation using a deep convolutional generative adversarial network (DCGAN). The DCGAN is an unsupervised machine learning technique consisting of two competing neural networks that are trained against each other using backpropagation. One network, the generator, tries to produce samples from the true distribution of states, while the discriminator tries to distinguish between true and synthetic samples. We present results from a fully-trained DCGAN that is able to rapidly draw random samples from the full distribution of possible inflow states without needing to solve the Navier-Stokes equations, eliminating the costly process of spinning up inflow turbulence. This suggests a new paradigm in physics informed machine learning where the turbulence physics can be encoded in either the discriminator or generator. Finally, we also propose additional applications such as feature identification and subgrid scale modeling.

  2. Are leftists more emotion-driven than rightists? The interactive influence of ideology and emotions on support for policies.

    PubMed

    Pliskin, Ruthie; Bar-Tal, Daniel; Sheppes, Gal; Halperin, Eran

    2014-12-01

    Although emotions and ideology are important factors guiding policy support in conflict, their interactive influence remains unclear. Based on prior findings that ideological leftists' beliefs are more susceptible to change than rightists' beliefs, we tested a somewhat counterintuitive extension that leftists would be more susceptible to influence by their emotional reactions than rightists. In three laboratory studies, inducing positive and negative emotions affected Jewish-Israeli leftists', but not rightists', support for conciliatory policies toward an adversarial (Studies 1 and 3) and a non-adversarial (Study 2) outgroup. Three additional field studies showed that positive and negative emotions were related to leftists', but not rightists', policy support in positive as well as highly negative conflict-related contexts, among both Jewish (Studies 4 and 5) and Palestinian (Study 6) citizens of Israel. Across different conflicts, emotions, conflict-related contexts, and even populations, leftists' policy support changed in accordance with emotional reactions more than rightists' policy support. © 2014 by the Society for Personality and Social Psychology, Inc.

  3. Inherent secure communications using lattice based waveform design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the abilitymore » of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.« less

  4. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

    NASA Astrophysics Data System (ADS)

    Ristenpart, Thomas; Yilek, Scott

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.

  5. Loss-tolerant quantum secure positioning with weak laser sources

    DOE PAGES

    Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; ...

    2016-09-14

    Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less

  6. A continuous function model for path prediction of entities

    NASA Astrophysics Data System (ADS)

    Nanda, S.; Pray, R.

    2007-04-01

    As militaries across the world continue to evolve, the roles of humans in various theatres of operation are being increasingly targeted by military planners for substitution with automation. Forward observation and direction of supporting arms to neutralize threats from dynamic adversaries is one such example. However, contemporary tracking and targeting systems are incapable of serving autonomously for they do not embody the sophisticated algorithms necessary to predict the future positions of adversaries with the accuracy offered by the cognitive and analytical abilities of human operators. The need for these systems to incorporate methods characterizing such intelligence is therefore compelling. In this paper, we present a novel technique to achieve this goal by modeling the path of an entity as a continuous polynomial function of multiple variables expressed as a Taylor series with a finite number of terms. We demonstrate the method for evaluating the coefficient of each term to define this function unambiguously for any given entity, and illustrate its use to determine the entity's position at any point in time in the future.

  7. A Practical Guide for the Formulation of Propositions in the Bayesian Approach to DNA Evidence Interpretation in an Adversarial Environment.

    PubMed

    Gittelson, Simone; Kalafut, Tim; Myers, Steven; Taylor, Duncan; Hicks, Tacha; Taroni, Franco; Evett, Ian W; Bright, Jo-Anne; Buckleton, John

    2016-01-01

    The interpretation of complex DNA profiles is facilitated by a Bayesian approach. This approach requires the development of a pair of propositions: one aligned to the prosecution case and one to the defense case. This note explores the issue of proposition setting in an adversarial environment by a series of examples. A set of guidelines generalize how to formulate propositions when there is a single person of interest and when there are multiple individuals of interest. Additional explanations cover how to handle multiple defense propositions, relatives, and the transition from subsource level to activity level propositions. The propositions depend on case information and the allegations of each of the parties. The prosecution proposition is usually known. The authors suggest that a sensible proposition is selected for the defense that is consistent with their stance, if available, and consistent with a realistic defense if their position is not known. © 2015 American Academy of Forensic Sciences.

  8. Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.

    PubMed

    Mazicioglu, Dogucan; Merrick, Jason R W

    2018-05-01

    Attacker/defender models have primarily assumed that each decisionmaker optimizes the cost of the damage inflicted and its economic repercussions from their own perspective. Two streams of recent research have sought to extend such models. One stream suggests that it is more realistic to consider attackers with multiple objectives, but this research has not included the adaption of the terrorist with multiple objectives to defender actions. The other stream builds off experimental studies that show that decisionmakers deviate from optimal rational behavior. In this article, we extend attacker/defender models to incorporate multiple objectives that a terrorist might consider in planning an attack. This includes the tradeoffs that a terrorist might consider and their adaption to defender actions. However, we must also consider experimental evidence of deviations from the rationality assumed in the commonly used expected utility model in determining such adaption. Thus, we model the attacker's behavior using multiattribute prospect theory to account for the attacker's multiple objectives and deviations from rationality. We evaluate our approach by considering an attacker with multiple objectives who wishes to smuggle radioactive material into the United States and a defender who has the option to implement a screening process to hinder the attacker. We discuss the problems with implementing such an approach, but argue that research in this area must continue to avoid misrepresenting terrorist behavior in determining optimal defensive actions. © 2017 Society for Risk Analysis.

  9. The Brazilian World Cup: too hot for soccer?

    NASA Astrophysics Data System (ADS)

    Lucena, Rebecca Luna; Steinke, Ercília Torres; Pacheco, Christina; Vieira, Lucas Lima; Betancour, Maribel Olaya; Steinke, Valdir Adilson

    2017-12-01

    The main objective of this research was to analyze the climate data for the host cities of the soccer World Cup held in Brazil in June and July 2014. A great deal of criticism was expressed about the Brazilian climate in the national and international press and media in the run-up to the competition, suggesting that the air temperature and relative air humidity would be the main adversaries of the soccer teams, especially those from Europe, during the competition. An analysis of the weather was done at the places and times of each of the 64 matches held. A human thermal comfort index was calculated (discomfort index (DI)) for each of the matches in order to discover the real climatic conditions in the host cities during the 2014 World Cup and their potential influence on the teams and human comfort in general. During the 2014 World Cup, only two matches were played at temperatures above 30 °C, representing a negligible percentage of the total number of matches. The air temperature for over half the matches (53%) was 20-25 °C. The results showed the air temperature and relative humidity data analyzed here both individually and in the form of an index indicate that the World Cup held in Brazil in 2014 did not put any of the players at risk due to extreme heat.

  10. The Brazilian World Cup: too hot for soccer?

    PubMed

    Lucena, Rebecca Luna; Steinke, Ercília Torres; Pacheco, Christina; Vieira, Lucas Lima; Betancour, Maribel Olaya; Steinke, Valdir Adilson

    2017-12-01

    The main objective of this research was to analyze the climate data for the host cities of the soccer World Cup held in Brazil in June and July 2014. A great deal of criticism was expressed about the Brazilian climate in the national and international press and media in the run-up to the competition, suggesting that the air temperature and relative air humidity would be the main adversaries of the soccer teams, especially those from Europe, during the competition. An analysis of the weather was done at the places and times of each of the 64 matches held. A human thermal comfort index was calculated (discomfort index (DI)) for each of the matches in order to discover the real climatic conditions in the host cities during the 2014 World Cup and their potential influence on the teams and human comfort in general. During the 2014 World Cup, only two matches were played at temperatures above 30 °C, representing a negligible percentage of the total number of matches. The air temperature for over half the matches (53%) was 20-25 °C. The results showed the air temperature and relative humidity data analyzed here both individually and in the form of an index indicate that the World Cup held in Brazil in 2014 did not put any of the players at risk due to extreme heat.

  11. Video performance for high security applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Connell, Jack C.; Norman, Bradley C.

    2010-06-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivitymore » of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.« less

  12. Modeling urbanization patterns at a global scale with generative adversarial networks

    NASA Astrophysics Data System (ADS)

    Albert, A. T.; Strano, E.; Gonzalez, M.

    2017-12-01

    Current demographic projections show that, in the next 30 years, global population growth will mostly take place in developing countries. Coupled with a decrease in density, such population growth could potentially double the land occupied by settlements by 2050. The lack of reliable and globally consistent socio-demographic data, coupled with the limited predictive performance underlying traditional urban spatial explicit models, call for developing better predictive methods, calibrated using a globally-consistent dataset. Thus, richer models of the spatial interplay between the urban built-up land, population distribution and energy use are central to the discussion around the expansion and development of cities, and their impact on the environment in the context of a changing climate. In this talk we discuss methods for, and present an analysis of, urban form, defined as the spatial distribution of macroeconomic quantities that characterize a city, using modern machine learning methods and best-available remote-sensing data for the world's largest 25,000 cities. We first show that these cities may be described by a small set of patterns in radial building density, nighttime luminosity, and population density, which highlight, to first order, differences in development and land use across the world. We observe significant, spatially-dependent variance around these typical patterns, which would be difficult to model using traditional statistical methods. We take a first step in addressing this challenge by developing CityGAN, a conditional generative adversarial network model for simulating realistic urban forms. To guide learning and measure the quality of the simulated synthetic cities, we develop a specialized loss function for GAN optimization that incorporates standard spatial statistics used by urban analysis experts. Our framework is a stark departure from both the standard physics-based approaches in the literature (that view urban forms as fractals with a scale-free behavior), and the traditional statistical learning approaches (whereby values of individual pixels are modeled as functions of locally-defined, hand-engineered features). This is a first-of-its-kind analysis of urban forms using data at a planetary scale.

  13. The Military Utility of Understanding Adversary Culture

    DTIC Science & Technology

    2005-01-01

    squelching of Iraqi freedom of speech . Many members of the Coalition Provi- sional Authority (CPA) and Combined Joint Task Force 7 felt that anticoali- tion...an Iraqi perception that Americans do not really support freedom of speech despite their claims to the contrary, reinforcing their view of Americans

  14. Strategic War Game - Arctic Response

    DTIC Science & Technology

    2010-11-01

    Heather Hrychuk; DRDC CORA TM 2010-240; R & D pour la défense Canada – CARO; Novembre 2010. S1. La section d’Élaboration de concepts et de...10 2.4.3 Scoring System.................................................................................. 13 2.4.3.1 Air Force... 13 2.4.3.2 Adversary

  15. 12 CFR 308.172 - Eligibility of applicants.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... for remuneration for the applicant, under its direction and control, on the date the adversary... indirectly owns or controls a majority of the voting shares. The Board of Directors may, however, on the... addition, the Board of Directors may determine that financial relationships of the applicant other than...

  16. Incorporating Emotional Intelligence in Legal Education: A Theoretical Perspective

    ERIC Educational Resources Information Center

    Douglas, Susan

    2015-01-01

    "Thinking like a lawyer" is traditionally associated with rational-analytical problem solving and an adversarial approach to conflict. These features have been correlated with problems of psychological, or emotional, distress amongst lawyers and law students. These problems provide a strong argument for incorporating a consideration of…

  17. 7 CFR 1.203 - Payment of award.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Equal Access to Justice Act in Proceedings Before the Department Procedures for Considering Applications... decision in the United States courts. The agency will pay the amount awarded to the applicant within 60 days, unless judicial review of the award or of the underlying decision of the adversary adjudication...

  18. The Moral Obligation of the Government to Recover POWs

    DTIC Science & Technology

    2012-03-12

    Freedom by James Rowe, and Surviving Hell by Leo Thorsness, several of a great many primary sources that tell autobiographically of life as a POW. A...from the collective social memory , allowing the government to politically maneuver itself for the next adversarial engagement. The political climate

  19. U.S. Policy for Central America: A Briefing,

    DTIC Science & Technology

    1984-03-01

    do not promote upheavals else- waere or align with our global adversaries. For their part, nationalist leaders in and around Central America should...See Joseph H. Stodder and Kevin F. McCarthy, Profiles of the Caribbean Basin in 1960/1980: Changing Geopolitical and Geostrategic Dimcnsim.. The Rand

  20. Network Centric Warfare and Joint Force 2020

    DTIC Science & Technology

    2014-05-15

    enabled moving map programs, unified communications, and every other bell and whistle a smart phone or tablet provides a user. The early adopters who...create conditions where the adversary is frozen out of all options at all levels and is reduced to a condition of decision paralysis , cognitive

  1. Business and the Media.

    ERIC Educational Resources Information Center

    Barchie, Lisa

    By virtue of the different natures of the two institutions, the relationship between business and the media is simultaneously adversarial and symbiotic: the media see themselves as society's watchdog while business sees itself as society's driving economic force. Meanwhile, business relies on the media for information, and the media rely on…

  2. Civilizing Civil Procedure.

    ERIC Educational Resources Information Center

    Ticcioni, Daniel A.

    1981-01-01

    A "Civil Litigation Exercise" (a litigation simulation) conducted during the second semester of a first year procedure course at the New England School of Law is described. The purpose of the exercise is to simulate the real world of adversary pleading and practice. The Civil Procedure Litigation exercises are appended. (MLW)

  3. Unwrapping Rap: A Literacy of Lived Experience.

    ERIC Educational Resources Information Center

    Brown, Stephen G.

    The adversarial forces of governmental censorship, freedom of expression, and capitalistic appropriation are engaged in an acrimonious debate over "Gangsta' Rap" that is being played out in the public spaces of popular culture. However, as a literacy of lived experience, Gangsta' Rap warrants critical investigation. Many postmodern…

  4. Remote Detection of Covert Tactical Adversarial Intent of Individuals in Asymmetric Operations

    DTIC Science & Technology

    2010-04-01

    nameless people, and organizations not affiliated with any government, has occurred throughout human history but has recently become more prevalent. 2.1...hiding, and the terrorists are dispersed. Defeating such a faceless, nameless enemy embedding itself within a peaceful civilian population is a

  5. The Household School as Life-Span Learning Center.

    ERIC Educational Resources Information Center

    Warnat, Winifred I.

    A constructive, effective, and realistic national educational policy should be established which takes into account the contributions of the household school to individual learning in areas of life roles, feelings, values formation, and behavior development. The adversary relationship between formal educational institutions and the family will be…

  6. Beyond Mediation: Administrators as Advocates.

    ERIC Educational Resources Information Center

    McCutcheon, Aubrey V.

    Many educational administrators feel seriously lacking in advocacy training. They want to be able to deal with disruptive conflicts and adversary situations with legislative bodies, parent groups, and executive agencies. When 19 school administrators were polled informally, they asked for advocacy training to help them acquire the skills of…

  7. On the Complexity of Delaying an Adversary’s Project

    DTIC Science & Technology

    2005-01-01

    interdiction models for such problems and show that the resulting problem com- plexities run the gamut : polynomially solvable, weakly NP-complete, strongly...problems and show that the resulting problem complexities run the gamut : polynomially solvable, weakly NP-complete, strongly NP-complete or NP-hard. We

  8. Friendly Alternatives to the Argumentative Essay.

    ERIC Educational Resources Information Center

    Costanzo, William V.

    Many teachers would like to counter what Deborah Tannen calls "The Argument Culture." They recognize that teaching students traditional principles of argument may perpetuate the kind of adversarial thinking that erupts all too often: in aggressive newspaper headlines, on confrontational television shows, in court rooms, and in school…

  9. Photography/Digital Imaging: Parallel & Paradoxical Histories.

    ERIC Educational Resources Information Center

    Witte, Mary Stieglitz

    With the introduction of photography and photomechanical printing processes in the 19th century, the first age of machine pictures and reproductions emerged. The 20th century introduced computer image processing systems, creating a digital imaging revolution. Rather than concentrating on the adversarial aspects of the computer's influence on…

  10. The Risks to Patient Privacy from Publishing Data from Clinical Anesthesia Studies.

    PubMed

    O'Neill, Liam; Dexter, Franklin; Zhang, Nan

    2016-06-01

    In this article, we consider the privacy implications of posting data from small, randomized trials, observational studies, or case series in anesthesia from a few (e.g., 1-3) hospitals. Prior to publishing such data as supplemental digital content, the authors remove attributes that could be used to re-identify individuals, a process known as "anonymization." Posting health information that has been properly "de-identified" is assumed to pose no risks to patient privacy. Yet, computer scientists have demonstrated that this assumption is flawed. We consider various realistic scenarios of how the publication of such data could lead to breaches of patient privacy. Several examples of successful privacy attacks are reviewed, as well as the methods used. We survey the latest models and methods from computer science for protecting health information and their application to posting data from small anesthesia studies. To illustrate the vulnerability of such published data, we calculate the "population uniqueness" for patients undergoing one or more surgical procedures using data from the State of Texas. For a patient selected uniformly at random, the probability that an adversary could match this patient's record to a unique record in the state external database was 42.8% (SE < 0.1%). Despite the 42.8% being an unacceptably high level of risk, it underestimates the risk for patients from smaller states or provinces. We propose an editorial policy that greatly reduces the likelihood of a privacy breach, while supporting the goal of transparency of the research process.

  11. Business continuity strategies for cyber defence: battling time and information overload.

    PubMed

    Streufert, John

    2010-11-01

    Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.

  12. A qualitative analysis of the temptation to use force in sexual relationships.

    PubMed

    Schewe, Paul A; Adam, Najma M; Ryan, Kathryn M

    2009-01-01

    College males completed a survey that asked open-ended questions concerning instances in which they might have been tempted to use force to obtain sexual contact with another person. Participants also completed Malamuth's (1989a, 1989b) Attraction to Sexual Aggression scale, Mosher and Sirkin's (1984) Hypermasculinity Inventory. and Burt's (1980) Rape Myth Acceptance and Adversarial Sexual Beliefs scales. Of the 83 participants, 22 (27%) reported that they had been tempted to use force. Participants that indicated they had been tempted to use force scored significantly higher on attraction to sexual aggression and hypermasculinity than those who were never tempted. Reasons for temptation, circumstances of the tempting situations, and possible ties to sexual coercion were explored.

  13. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  14. 40 CFR 17.4 - Applicability to EPA proceedings.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...

  15. 40 CFR 17.4 - Applicability to EPA proceedings.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...

  16. 40 CFR 17.4 - Applicability to EPA proceedings.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...

  17. 40 CFR 17.4 - Applicability to EPA proceedings.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...

  18. 40 CFR 17.4 - Applicability to EPA proceedings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...

  19. Incorporating Science into Decision-Making

    USGS Publications Warehouse

    Karl, Herman A.; Turner, Christine E.

    2003-01-01

    Alan Leshner's Editorial “Public engagement with science” (14 Feb., p. 977) highlights a conundrum: Why is science often ignored in important societal decisions, even as the call for decisions based on sound science escalates? One reason is that decision-making is often driven by a variety of nonscientific, adversarial, and stakeholder dynamics

  20. Schools versus Students' Rights: Can Alternative Dispute Resolution Build a Community.

    ERIC Educational Resources Information Center

    Goldberg, Steven S.

    1995-01-01

    Schools' regulation by external forces has rendered the education process secondary to avoidance of litigation. Alternative dispute resolution (ADR) provides an answer to the adversarial process currently in place within education. ADR offers negotiation and mediation as methods to resolve conflict, avoid litigation, and increase the likelihood of…

  1. Problems and Issues Related to the Data Game.

    ERIC Educational Resources Information Center

    Huff, Robert A.

    Ways that data can be misused in establishing accountability of public higher education are described along with approaches to help alleviate the potential adversary relationships between postsecondary leaders and state agency personnel. It is suggested that scholars fear a future in which educational decisions may be made according to numbers or…

  2. A Policy-Based Approach to Technology Systems

    ERIC Educational Resources Information Center

    Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie

    2008-01-01

    Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…

  3. Uncommon Sense for Parents with Teenagers.

    ERIC Educational Resources Information Center

    Riera, Michael

    This guide to parenting high school-age adolescents is intended to help parents restructure the typically adversarial relationship between parent and teenager by replacing the "parent as manager" role with the "parent as consultant" role. The text is question-driven, comprised of a series of responses to questions commonly asked by parents and…

  4. On the Scientific Foundations of Level 2 Fusion

    DTIC Science & Technology

    2004-03-01

    Development of Decision Aids”, CMIF Report 2-99, Feb 1999 KN2-49 Theories of Groups, Teams, Coalitions, etc -Adaptive Behaviors- • There is a huge literature...Investigations of Trust-related System Vulnerabilities in Aided, Adversarial Decision Making”, CMIF Report, Jan 2000 KN2-53 Summarizing Algorithm re Thing

  5. 12 CFR 263.102 - Prevailing party.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Prevailing party. 263.102 Section 263.102 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES... Prevailing party. Only an eligible applicant that prevailed on the merits of an adversary proceeding may...

  6. Labor-Management Cooperation in Schools: An Idea Whose Time Has Come.

    ERIC Educational Resources Information Center

    Woods-Houston, Michelle; Miller, Rima

    This paper presents information useful to educational leaders considering a labor-management cooperation (LMC) process. LMC is a mechanism for changing attitudes and building an atmosphere of trust between two traditionally adversarial groups. The first section outlines categories and provides examples of LMC cooperative efforts, highlighting the…

  7. Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries

    DTIC Science & Technology

    2006-01-01

    based approach. In this paper, we propose a symmetric key-based protocol for authenticating the reprogramming process. Our protocol is based on the ... secret instantiation algorithm, which requires only O(log n) keys to be maintained at each sensor. We integrate this algorithm with the existing

  8. Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach

    DTIC Science & Technology

    2011-08-01

    enviromental factors, then it is very likely that the corresponding device has been compromised and controlled by an adversary. In this case, the report... Enviromental Factors in Faulty Case (b) Result of Policy Execution in Faulty Case Figure 7: Policy Execution in Faulty Case (a) Enviromental Factors

  9. 14 CFR 14.03 - Eligibility of applicants.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Agricultural Marketing Act (12 U.S.C. 1141j(a)) with not more than 500 employees at the time the adversary... relationship between the affiliated entities. In addition, the ALJ or adjudicative officer may determine that financial relationships of the applicant, other than those described in this paragraph, constitute special...

  10. 49 CFR 1016.105 - Eligibility of applicants.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... an adversary relationship to the position taken by agency counsel, and it must have prevailed on one... cooperative association as defined in section 15(a) of the Agricultural Marketing Act (12 U.S.C. 1141j(a... the actual relationship between the affiliated entities. In addition, the adjudicative officer may...

  11. The Road from a Quick Reaction Capability to a Program of Record

    DTIC Science & Technology

    2011-01-26

    Automated Biometric Identification System (DoD-ABIS) is to store, match, and share national biometric resources for adversary (red force) and neutral...Node Relationship Metrics 20090100021 28 MAJOR Mug Book and Lineups 20090100022 29 MAJOR US Persons Marking 20090100023 30 MAJOR Detention Data in

  12. 29 CFR 2201.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... FREEDOM OF INFORMATION ACT § 2201.1 Purpose and scope. This part prescribes procedures to obtain... the Freedom of Information Act (FOIA), 5 U.S.C. 552. It applies only to records or information of the Commission or in the Commission's custody. This part does not affect discovery in adversary proceedings...

  13. 10 CFR 12.102 - When the EAJA applies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false When the EAJA applies. 12.102 Section 12.102 Energy NUCLEAR REGULATORY COMMISSION IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN AGENCY PROCEEDINGS General Provisions § 12.102 When the EAJA applies. The EAJA applies to any covered adversary adjudication...

  14. Enculturation, Not Alchemy: Professionalizing Novice Writing Program Administrators.

    ERIC Educational Resources Information Center

    Peters, Bradley

    1998-01-01

    Discusses a process of acculturation in three stages by which fledgling Writing Program Administrators can be transformed into change agents: (1) critically reading the program to locate key allies, potential advocates, and proven adversaries; (2) implementing changes on an infrastructural level to convert positive relations among colleagues into…

  15. 15 CFR 18.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Definitions. 18.2 Section 18.2 Commerce and Foreign Trade Office of the Secretary of Commerce ATTORNEY'S FEES AND OTHER EXPENSES General Provisions § 18.2 Definitions. As used in this part: (a) Adversary adjudication means an adjudication under 5...

  16. 29 CFR 18.1104 - Effective date.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 1 2011-07-01 2011-07-01 false Effective date. 18.1104 Section 18.1104 Labor Office of the... ADMINISTRATIVE LAW JUDGES Rules of Evidence Applicability § 18.1104 Effective date. These rules are effective thirty days after date of publication with respect to formal adversarial adjudications as specified in...

  17. Managing Tensions in Educational Organizations: Trying for a Win-Win Approach.

    ERIC Educational Resources Information Center

    Grab, Rudi

    1996-01-01

    Constructive tension can be healthy for an organization. Although win-lose solutions based on adversarial strategies are common, the management of conflicts in schools should focus on win-win problem solving, which requires creativity. Identifies collaboration as the most desirable conflict resolution strategy, and discusses conflict management…

  18. Chemical ecology of the Thysanoptera

    Treesearch

    Murray S. Blum

    1991-01-01

    The chemical ecology of the Thysanoptera is identified with a variety of natural products discharged in anal droplets during confrontations with adversaries. These exudates are fortified with defensive allomones that may function as repellents, contact irritants, or in some cases, fumigants. Thrips synthesize a large diversity of allomonal products that include...

  19. Soviet Theater Nuclear Forces’ Issues.

    DTIC Science & Technology

    1979-12-01

    extinguish its mortal adversary or (ii) a golden opportunity to assist the tortuous processes of history.5 5 In either case there must be a strong feeling...the Chinese Ocommunist " jackals ," and respect and fear West Germans and Americans. (Americans they tend to like, but their genuine respect for

  20. Proceduralism and Bureaucracy: Due Process in the School Setting

    ERIC Educational Resources Information Center

    Kirp, David L.

    1976-01-01

    The likely consequences of applying traditional due process standards, expecially formal adversary hearings, to the public school are examined. The ruling in Goss v. Lopez suggests that fair treatment can still be expected if the hearings are treated as opportunities for candid and informal exchange rather than prepunishment ceremonies. (LBH)

  1. 12 CFR 263.105 - Statement of net worth.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... initiation of the adversary adjudication. Unaudited financial statements are acceptable for individual... judge or the Board otherwise requires. Financial statements or reports filed with or reported to a... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Statement of net worth. 263.105 Section 263.105...

  2. Better for Both--Thoughts on Teacher-Pupil Interaction.

    ERIC Educational Resources Information Center

    Kilburn, John

    1978-01-01

    To remove the adversary emphasis from pupil-teacher interactions, the author presents a simple model, showing how an intervention can potentially make a situation better, worse, or unchanged for the pupil and the teacher. A sample scenario is provided of two teachers dealing with a misbehaving child. (SJL)

  3. Use of Third-Party Credibility in Hostile Situations.

    ERIC Educational Resources Information Center

    Gorney, Carole M.

    A study analyzed the use of third-party credibility as a deliberate and systematic public relations strategy to regain credibility for an organization faced with public hostility. Four types of third-party usage are: citizen participation, outside investigation, adversarial advocacy, and employee dissemination. Third-party credibility as a public…

  4. INTELLIGENCE SUPPORT TO JOINT TARGETING IN THE A2/AD ENVIRONMENT

    DTIC Science & Technology

    2016-02-10

    budgets. Finally, the dismal state of targeting personnel training and development must be rectified . These steps must be taken before the United... rectified . These steps must be taken before the United States faces a near-peer adversary employing A2/AD capabilities. Bibliography ACC/A2. Air Force

  5. Restorative Practices as a Tool for Organizational Change

    ERIC Educational Resources Information Center

    Boulton, John; Mirsky, Laura

    2006-01-01

    Restorative practices focus on repairing the harm to relationships rather than piling on more punishment for violations. Originally popularized in formal conferences between a victim and offender in the justice system, restorative practices have been extended to educational and treatment settings. This article describes how the adversarial climate…

  6. Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students

    ERIC Educational Resources Information Center

    Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.

    2017-01-01

    The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…

  7. Spatially Informed Plant PRA Models for Security Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Thomas, Willard; Thornsbury, Eric

    2006-07-01

    Traditional risk models can be adapted to evaluate plant response for situations where plant systems and structures are intentionally damaged, such as from sabotage or terrorism. This paper describes a process by which traditional risk models can be spatially informed to analyze the effects of compound and widespread harsh environments through the use of 'damage footprints'. A 'damage footprint' is a spatial map of regions of the plant (zones) where equipment could be physically destroyed or disabled as a direct consequence of an intentional act. The use of 'damage footprints' requires that the basic events from the traditional probabilistic riskmore » assessment (PRA) be spatially transformed so that the failure of individual components can be linked to the destruction of or damage to specific spatial zones within the plant. Given the nature of intentional acts, extensive modifications must be made to the risk models to account for the special nature of the 'initiating events' associated with deliberate adversary actions. Intentional acts might produce harsh environments that in turn could subject components and structures to one or more insults, such as structural, fire, flood, and/or vibration and shock damage. Furthermore, the potential for widespread damage from some of these insults requires an approach that addresses the impacts of these potentially severe insults even when they occur in locations distant from the actual physical location of a component or structure modeled in the traditional PRA. (authors)« less

  8. The Case for GEO Hosted SSA Payloads

    NASA Astrophysics Data System (ADS)

    Welsch, C.; Armand, B.; Repp, M.; Robinson, A.

    2014-09-01

    Space situational awareness (SSA) in the geosynchronous earth orbit (GEO) belt presents unique challenges, and given the national importance and high value of GEO satellites, is increasingly critical as space becomes more congested and contested. Space situational awareness capabilities can serve as an effective deterrent against potential adversaries if they provide accurate, timely, and persistent information and are resilient to the threat environment. This paper will demonstrate how simple optical SSA payloads hosted on GEO commercial and government satellites can complement the SSA mission and data provided by Space-Based Space Surveillance (SBSS) and the Geosynchronous Space Situational Awareness Program (GSSAP). GSSAP is built by Orbital Sciences Corporation and launched on July 28, 2014. Analysis performed for this paper will show how GEO hosted SSA payloads, working in combination with SBSS and GSSAP, can increase persistence and timely coverage of high value assets in the GEO belt. The potential to further increase GEO object identification and tracking accuracy by integrating SSA data from multiple sources across different viewing angles including GEO hosted SSA sources will be addressed. Hosting SSA payloads on GEO platforms also increases SSA mission architecture resiliency as the sensors are by distributed across multiple platforms including commercial platforms. This distributed architecture presents a challenging target for an adversary to attempt to degrade or disable. We will present a viable concept of operations to show how data from hosted SSA sensors could be integrated with SBSS and GSSAP data to present a comprehensive and more accurate data set to users. Lastly, we will present an acquisition approach using commercial practices and building on lessons learned from the Commercially Hosted Infra Red Payload CHIRP to demonstrate the affordability of GEO hosted SSA payloads.

  9. TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH, SESSION VIII: TECHNOLOGY FORUM FOCUS GROUPS.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    INDUSI,J.P.

    2003-06-16

    Since the events of 9/11, there have been considerable concerns and associated efforts to prevent or respond to acts of terrorism. Very often we hear calls to reduce the threat from or correct vulnerabilities to various terrorist acts. Others fall victim to anxiety over potential scenarios with the gravest of consequences involving hundreds of thousands of casualties. The problem is complicated by the fact that planners have limited, albeit in some cases significant, resources and less than perfect intelligence on potential terrorist plans. However, valuable resources must be used prudently to reduce the overall risk to the nation. A systematicmore » approach to this process of asset allocation is to reduce the overall risk and not just an individual element of risk such as vulnerabilities. Hence, we define risk as a function of three variables: the threat (the likelihood and scenario of the terrorist act), the vulnerability (the vulnerability of potential targets to the threat), and the consequences (health and safety, economic, etc.) resulting from a successful terrorist scenario. Both the vulnerability and consequences from a postulated adversary scenario can be reasonably well estimated. However, the threat likelihood and scenarios are much more difficult to estimate. A possible path forward is to develop scenarios for each potential target in question using experts from many disciplines. This should yield a finite but large number of target-scenario pairs. The vulnerabilities and consequences for each are estimated and then ranked relative to one another. The resulting relative risk ranking will have targets near the top of the ranking for which the threat is estimated to be more likely, the vulnerability greatest, and the consequences the most grave. In the absence of perfect intelligence, this may be the best we can do.« less

  10. Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.

    PubMed

    Raisaro, Jean Louis; Tramèr, Florian; Ji, Zhanglong; Bu, Diyue; Zhao, Yongan; Carey, Knox; Lloyd, David; Sofia, Heidi; Baker, Dixie; Flicek, Paul; Shringarpure, Suyash; Bustamante, Carlos; Wang, Shuang; Jiang, Xiaoqian; Ohno-Machado, Lucila; Tang, Haixu; Wang, XiaoFeng; Hubaux, Jean-Pierre

    2017-07-01

    The Global Alliance for Genomics and Health (GA4GH) created the Beacon Project as a means of testing the willingness of data holders to share genetic data in the simplest technical context-a query for the presence of a specified nucleotide at a given position within a chromosome. Each participating site (or "beacon") is responsible for assuring that genomic data are exposed through the Beacon service only with the permission of the individual to whom the data pertains and in accordance with the GA4GH policy and standards.While recognizing the inference risks associated with large-scale data aggregation, and the fact that some beacons contain sensitive phenotypic associations that increase privacy risk, the GA4GH adjudged the risk of re-identification based on the binary yes/no allele-presence query responses as acceptable. However, recent work demonstrated that, given a beacon with specific characteristics (including relatively small sample size and an adversary who possesses an individual's whole genome sequence), the individual's membership in a beacon can be inferred through repeated queries for variants present in the individual's genome.In this paper, we propose three practical strategies for reducing re-identification risks in beacons. The first two strategies manipulate the beacon such that the presence of rare alleles is obscured; the third strategy budgets the number of accesses per user for each individual genome. Using a beacon containing data from the 1000 Genomes Project, we demonstrate that the proposed strategies can effectively reduce re-identification risk in beacon-like datasets. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  11. Performing private database queries in a real-world environment using a quantum protocol.

    PubMed

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-06-10

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.

  12. Certified Training for Nuclear and Radioactive Source Security Management.

    PubMed

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Performing private database queries in a real-world environment using a quantum protocol

    PubMed Central

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-01-01

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129

  14. Academic Librarians and Publishers: Customers versus Producers or Partners in the Planning of Electronic Publishing?

    ERIC Educational Resources Information Center

    Hunter, Karen

    1988-01-01

    Proposes that academic librarians and publishers should view themselves as partners rather than adversaries. Following a discussion of premises, problems, and attitudes related to librarian-publisher cooperation, several areas for joint development are suggested: new products and services; CD-ROM; electronic document delivery; scholarly book…

  15. The Influence of Informal Power Structures on School Board-Teacher Union Contract Negotiations.

    ERIC Educational Resources Information Center

    Miller-Whitehead, Marie

    A study examined behaviors of participants trained in a nonadversarial model of contract negotiation, focusing on possible influences of formal and informal power structures, written and unwritten rules, and firmly entrenched adversarial behavior on the bargaining process. Participants were representatives of a district's teacher union and board…

  16. Satisfaction With the Legal System and Adjustment to Marital Separation.

    ERIC Educational Resources Information Center

    Anderson, Elaine A.

    The rise in the American divorce rate since the early 1960's emphasizes the need to examine the factors associated with adjustment to marital separation. The impact of the legal system upon post-separation adjustment in Pennsylvania, which has adversary divorce statutes, is explored with 205 individuals, separated 26 months or less. Satisfaction…

  17. 76 FR 10926 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-28

    ..., Chief Financial Officer dated September 8, 2010 (``Georgetown, Texas Letter''); and Portland Letter... the financial advisor are separate, adversarial roles and cannot be provided by the same party.'' One..., President and Chief Executive Officer dated September 29, 2010 (``D.A. Davidson Letter''); and J.J.B...

  18. Navy Cyber Power 2020. Sustaining U.S. Global Leadership: Priorities for 21st Century Defense

    DTIC Science & Technology

    2012-11-01

    to achieve superior operational outcomes at the time and place of our choosing. Cyberspace operations are a critical component of Information ... Dominance , and carefully coordinated, will provide Navy and Joint Commanders with the necessary elements to achieve and maintain an operational advantage over our adversaries in all domains.

  19. Research Directions in Remote Detection of Covert Tactical Adversarial Intent of Individuals in Asymmetric Operations

    DTIC Science & Technology

    2010-07-01

    To be successful, the research needs to integrate kinesiological , neurophysiological, psychological, and cognitive science, and sociocultural... kinesiological neurophysiological, psychological, and cognitive science and sociocultural anthropology and information science components. Research and...successful, the research needs to integrate kinesiological , neurophysiological, psychological, and cognitive science, and sociocultural

  20. Joint Urban Operations

    DTIC Science & Technology

    2009-11-08

    travel routes, holidays, festivals, sports, and other events; climate and weather; and water. Planning Planning must give appropriate weight...they can be manipulated rather easily, they are militarily significant. (1) Physical patterns such as market locations and travel routes may provide...cycle, cutting or controlling intercity and intracity mobility and communications, triggering an adversary response, or positioning forces to conduct

  1. Management Challenges Fiscal Year 2016

    DTIC Science & Technology

    2017-01-01

    of Office of Inspector General Management Challenges 14 │ FY 2016 classified information revealed “methods to our adversaries that could impact our...electronic data to perform operations and to process, maintain, and report essential information . Office of Inspector General Management ...that collects, processes, stores, disseminates, and manages critical information . It includes owned and leased communications and computing

  2. The Search for a Legal Ethic: The Adversary System, Liberalism and Beyond

    ERIC Educational Resources Information Center

    Verkuil, Paul R.

    1977-01-01

    The Code of Professional Responsibility of lawyers is examined in terms of ethical responsibility. Two major questions are addressed: to what degree does the profession understand and act consistently with its own ethic; and to what extent should legal ethics relate to larger questions of societal and political ethics? (LBH)

  3. Personality and Situational Factors Influencing the Advertising Sales Interaction.

    ERIC Educational Resources Information Center

    Scarfo, Lauranell; Rogus, Mary T.

    Focusing on situational and personality factors as predictors of two common types of sales behavior (the customer-oriented/marketing approach, and the adversarial/bottom-line approach), a study conducted a national survey of advertising sales people and media buyers in the summer and fall of 1987. A total of 3669 questionnaires were sent to…

  4. Site-Based Management in a Collective Bargaining Environment: Can We Mix Oil and Water?

    ERIC Educational Resources Information Center

    Fossey, Richard

    Site-based management has become a popular school reform strategy. However, conflicts can arise when school districts with collective bargaining try to implement site-based management. Site-based management depends on collaboration and cooperation among educators, both of which conflict with collective bargaining's adversarial nature. There is…

  5. Disorder in the Courtroom? Child Witnesses under Cross-Examination

    ERIC Educational Resources Information Center

    Zajac, Rachel; O'Neill, Sarah; Hayne, Harlene

    2012-01-01

    When a witness gives evidence in an adversarial criminal trial, there are two main questioning phases: direct examination and cross-examination. Special provisions are sometimes made for children to give direct evidence, but the majority of child witnesses are still cross-examined. While several decades of research have demonstrated how to elicit…

  6. Mediation, Fact-finding, and Impasse.

    ERIC Educational Resources Information Center

    Dubel, Robert Y.

    Since collective bargaining in public education is here to stay, boards of education should learn to accept it for what it is--an adversary process. The author contends that striking is not a very viable weapon in the arsenal of the teachers' union because the schools will continue to operate, and public pressure against prolonged strikes and…

  7. Active-Vision Control Systems for Complex Adversarial 3-D Environments

    DTIC Science & Technology

    2009-03-01

    Control Systems MURI Final Report 36 51. D. Nain, S. Haker , A. Bobick, A. Tannenbaum, "Multiscale 3D shape representation and segmentation using...Conference, August 2008. 99. L. Zhu, Y. Yang, S. Haker , and A. Tannenbaum, "An image morphing technique based on optimal mass preserving mapping," IEEE

  8. 15 CFR 18.3 - When the Act applies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false When the Act applies. 18.3 Section 18.3 Commerce and Foreign Trade Office of the Secretary of Commerce ATTORNEY'S FEES AND OTHER EXPENSES General Provisions § 18.3 When the Act applies. The Act applies to any adversary adjudication pending or...

  9. The Professional Negotiator: Role Conflict, Role Ambiguity and Motivation To Work.

    ERIC Educational Resources Information Center

    Medford, Robert E.; Miskel, Cecil

    The investigation examined the relationship among role conflict, role ambiguity, and motivation to work of teacher-negotiators. The theoretical rationale for the study was formulated from the finding of Walton and McKersie, Deutsch, Vidmar and McGrath, and Blum concerning the negotiator's conflict with his adversary, his dependence on his…

  10. The Coach-Team Approach: An Introductory Accounting Instructional Alternative

    ERIC Educational Resources Information Center

    Wood, Lynette I.

    2012-01-01

    Many students approach the introductory accounting course with a great deal of apprehension. For the most part, the course is populated by non-accounting majors who often perceive accounting to be extremely difficult and may view the instructor-student relationship as adversarial. As a result, such students may be inclined to express their…

  11. Agent-Based Computing in Distributed Adversarial Planning

    DTIC Science & Technology

    2010-08-09

    plans. An agent is expected to agree to deviate from its optimal uncoordinated plan only if it improves its position. - process models for opponent...Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.2 Improvements ...plan only if it improves its position. – process models for opponent modeling – We have analyzed the suitability of business process models for creating

  12. 19 CFR 212.01 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 3 2011-04-01 2011-04-01 false Purpose. 212.01 Section 212.01 Customs Duties... Justice Act, 5 U.S.C. 504 (called “the Act” in this part), provides for the award of attorney fees and... proceedings (called “adversary adjudications”) before an agency. Under the Act an eligible party may receive...

  13. Newjack: Teaching in a Failing Middle School

    ERIC Educational Resources Information Center

    Sipe, Peter

    2004-01-01

    In this article, Peter Sipe compares his first year as a middle school teacher in Brooklyn, New York, to that of a rookie corrections officer at Sing Sing prison. Sipe explores what he considers to be disturbing similarities in these experiences, namely, a preoccupation with control, immersion in an adversarial social dynamic, and the prevalence…

  14. Teachers Unions as Partners, Not Adversaries

    ERIC Educational Resources Information Center

    Catone, Keith

    2013-01-01

    Chicago has long been one of the national epicenters for public school reform. In many ways the reform efforts of the past decade in the Windy City have served as the blueprint for the current focus of federal education priorities. In particular, federal policy for school turnaround and transformation takes clear cues from the efforts that current…

  15. hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

    NASA Astrophysics Data System (ADS)

    Li, Shujun; Sadeghi, Ahmad-Reza; Schmitz, Roland

    We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user's computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module.

  16. Literacy Teaching Method and Peace Building in Multi-Ethnic Communities of Nigeria

    ERIC Educational Resources Information Center

    Adelore, Omobola; Majaro-Majesty, Henry

    2008-01-01

    The challenge of peace building in Nigeria is increasing as communities continue to show adversary tendencies. This is happening even after many third party conflict transformation efforts have been expended to resolve and set a conducive climate for stakeholders to sustain peace. Some peace building assessment projects have indicated that the…

  17. Minimum Competency Testing Clarification Hearing (July 9th, 1981).

    ERIC Educational Resources Information Center

    National Inst. of Education (ED), Washington, DC.

    Barbara Jordan served as the hearing officer for three-day adversary evaluation hearings about the pros and cons of minimum competency testing (MCT). This report is the complete transcript of the second day of proceedings. The pro team, lead by James Popham, began by presenting representatives of four states (Florida, California, Texas, and…

  18. Child Custody Evaluations: A Rational Process for an Emotion-Laden Event.

    ERIC Educational Resources Information Center

    Barnard, Charles P.; Jenson, Gust, III

    1984-01-01

    Presents a consultation model that can serve to diminish the destructive impact of the adversarial process in child custody decisions. The process and procedures described are consonant with what most state statutes suggest as criteria for consideration in custody decisions and promote the best interests of the children. (JAC)

  19. More Important than the Contract Is the Relationship

    ERIC Educational Resources Information Center

    Burch, Patricia; Good, Annalee

    2015-01-01

    What should a school district procurement officer ask when he or she sits down with a sales representative from a vendor of digital education products? Who else should be at the table? How do districts and providers become partners in instruction, rather than adversaries in negotiation? These are increasingly critical questions as public school…

  20. External Labeling as a Framework for Access Control

    ERIC Educational Resources Information Center

    Rozenbroek, Thomas H.

    2012-01-01

    With the ever increasing volume of data existing on and passing through on-line resources together with a growing number of legitimate users of that information and potential adversaries, the need for better security and safeguards is immediate and critical. Currently, most of the security and safeguards afforded on-line information are provided…

  1. Corporate Social Responsibility: Case Study of Community Expectations and the Administrative Systems, Niger Delta

    ERIC Educational Resources Information Center

    Ogula, David

    2012-01-01

    Poor community-company relations in the Niger Delta have drawn attention to the practice of corporate social responsibility (CSR) in the region. Since the 1960s, transnational oil corporations operating in the Niger Delta have adopted various CSR strategies, yet community-company relations remain adversarial. This article examines community…

  2. Enforcing Hardware-Assisted Integrity for Secure Transactions from Commodity Operating Systems

    DTIC Science & Technology

    2015-08-17

    OS. First, we dedicate one hard disk to each OS. A System Management Mode ( SMM )-based monitoring module monitors if an OS is accessing another hard...hypervisor- based systems. An adversary can only target the BIOS-anchored SMM code, which is tiny, and without any need for foreign code (i.e. third

  3. The Effects of Sacred Value Networks Within an Evolutionary, Adversarial Game

    NASA Astrophysics Data System (ADS)

    McCalla, Scott G.; Short, Martin B.; Brantingham, P. Jeffrey

    2013-05-01

    The effects of personal relationships and shared ideologies on levels of crime and the formation of criminal coalitions are studied within the context of an adversarial, evolutionary game first introduced in Short et al. (Phys. Rev. E 82:066114, 2010). Here, we interpret these relationships as connections on a graph of N players. These connections are then used in a variety of ways to define each player's "sacred value network"—groups of individuals that are subject to special consideration or treatment by that player. We explore the effects on the dynamics of the system that these networks introduce, through various forms of protection from both victimization and punishment. Under local protection, these networks introduce a new fixed point within the game dynamics, which we find through a continuum approximation of the discrete game. Under more complicated, extended protection, we numerically observe the emergence of criminal coalitions, or "gangs". We also find that a high-crime steady state is much more frequent in the context of extended protection networks, in both the case of Erdős-Rényi and small world random graphs.

  4. A private DNA motif finding algorithm.

    PubMed

    Chen, Rui; Peng, Yun; Choi, Byron; Xu, Jianliang; Hu, Haibo

    2014-08-01

    With the increasing availability of genomic sequence data, numerous methods have been proposed for finding DNA motifs. The discovery of DNA motifs serves a critical step in many biological applications. However, the privacy implication of DNA analysis is normally neglected in the existing methods. In this work, we propose a private DNA motif finding algorithm in which a DNA owner's privacy is protected by a rigorous privacy model, known as ∊-differential privacy. It provides provable privacy guarantees that are independent of adversaries' background knowledge. Our algorithm makes use of the n-gram model and is optimized for processing large-scale DNA sequences. We evaluate the performance of our algorithm over real-life genomic data and demonstrate the promise of integrating privacy into DNA motif finding. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Donnelly, H.; Fullwood, R.; Glancy, J.

    This is the second volume of a two volume report on the VISA method for evaluating safeguards at fixed-site facilities. This volume contains appendices that support the description of the VISA concept and the initial working version of the method, VISA-1, presented in Volume I. The information is separated into four appendices, each describing details of one of the four analysis modules that comprise the analysis sections of the method. The first appendix discusses Path Analysis methodology, applies it to a Model Fuel Facility, and describes the computer codes that are being used. Introductory material on Path Analysis given inmore » Chapter 3.2.1 and Chapter 4.2.1 of Volume I. The second appendix deals with Detection Analysis, specifically the schemes used in VISA-1 for classifying adversaries and the methods proposed for evaluating individual detection mechanisms in order to build the data base required for detection analysis. Examples of evaluations on identity-access systems, SNM portal monitors, and intrusion devices are provided. The third appendix describes the Containment Analysis overt-segment path ranking, the Monte Carlo engagement model, the network simulation code, the delay mechanism data base, and the results of a sensitivity analysis. The last appendix presents general equations used in Interruption Analysis for combining covert-overt segments and compares them with equations given in Volume I, Chapter 3.« less

  6. Supplanting the Venom of Litigation with Alternative Dispute Resolution: The Role of Counsellors and Guidance Professionals

    ERIC Educational Resources Information Center

    Udoh, Nsisong Anthony; Sanni, Kudirat Bimbo

    2015-01-01

    This literature review attempts to interface counselling with alternative legal practice. The authors proceed by contrasting the adversarial nature of litigation with the conciliatory nature of alternative dispute resolution (ADR) with a view to encouraging seekers of dispute resolution to opt for ADR in lieu of litigation. The paper discusses the…

  7. Myths and Realities: U.S. Nuclear Strategy. Occasional Paper 32.

    ERIC Educational Resources Information Center

    Beres, Louis Rene

    To survive into the future, the United States must learn to recognize that its Soviet adversary has much to gain from a mutual and graduated process of de-escalation and conflict reduction. While this country must continue to ensure the survivability of its strategic triad, it is altogether clear that this objective can be satisfied without moving…

  8. Effectiveness Of The Individual Riflemen In An Infantry Squad

    DTIC Science & Technology

    2017-12-01

    adversaries. 14. SUBJECT TERMS individual carbine, interim combat service rifle, squad designated marksman rifle, commercial- off-the-shelf...7 5th–95th Percentile. Source: El Creative Advertising and Design (2007...but does not have overwhelming firepower compared to enemy infantry supported by an armored or 4 motorized assets (DA, 2006b). In order to achieve

  9. 78 FR 44036 - Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Intent To Establish the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-23

    ... that ``adversarial rulemaking deprives the affected parties and the public of the benefits of face-to-face negotiations and cooperation in developing and reaching agreement on a rule. It also deprives them... has the dedicated resources it requires to complete its work in a timely fashion. Specifically, DOE...

  10. Forging a New Partnership: The Story of Teacher Union and School District Collaboration in Pittsburgh

    ERIC Educational Resources Information Center

    Hamill, Sean D.

    2011-01-01

    This paper documents Pittsburgh's transformation from a typical, adversarial district-union dynamic to one of deep, substantive collaboration over the course of several years. This work has catapulted Pittsburgh to the vanguard of efforts to improve teacher effectiveness, and helped secure more than $80 million in philanthropic and federal grants.…

  11. 10 CFR 12.103 - Proceedings covered.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... under the Program Fraud Civil Remedies Act (31 U.S.C. 3801-12); (2) Any appeal of a decision made... contract appeals as provided in section 8 of that Act (41 U.S.C. 607); and (3) Adversary adjudications...” under 5 U.S.C. 504(b)(1)(C). (b) The Commission's failure to identify a type of proceeding as an...

  12. Sense of Humor Preferred

    ERIC Educational Resources Information Center

    Barden, Dennis M.

    2007-01-01

    Humor is a powerful tool. It can disarm an adversary. It can leaven the purposefully self-aggrandizing nature of a job interview. Perhaps most important, it can serve as a window to personality in the same way that a resume is a window to experience. In this article, the author emphasizes the value of having a sense of humor. He emphasizes that it…

  13. Marriage and Family Therapy and the Law: Discovering Systemic Common Ground

    ERIC Educational Resources Information Center

    Richards, Jason C.

    2017-01-01

    Many important decisions regarding couples and families are made by the legal system. However, this system's adversarial nature often results in relational losses for clients, even when one "wins" a case. Some believe a solution may exist in legally-minded marriage and family therapists, who, as experts in family systems theory, are in a…

  14. Seven Defense Priorities for the New Administration

    DTIC Science & Technology

    2016-12-01

    building consume human and financial military resources for decades. New weapons like cyber and autonomous systems are aimed at the heart of the U.S...information infrastructure enables for adversaries and for the U.S.; 5. Anticipating intelligent systems and autonomy including numbers and...challenging in a complex electromagnetic environment ...............................................37 Space and the global positioning system play a

  15. Integrated planning for United Action in Phase Zero

    DTIC Science & Technology

    2007-05-24

    Allocations by Country Category and Objective .............. 24 Figure 9 - USAID Funtional Bureau DCHA Organization...interagency activities are performed to dissuade or deter potential adversaries and to assure or solidify relationships with friends and allies. They...Shaping Operations, it must be recognized that a cluster of capabilities are described as central for both and found in each. The relationship

  16. Foundations of Neuromorphic Computing

    DTIC Science & Technology

    2013-05-01

    make informed decisions quicker than our adversaries. 2.0 INTRODUCTION The increasing resolution and speed of today’s advanced sensor ...limited information about the location, access to global positioning satellite information (GPS) to aid in navigation is impeded, and communications...more autonomous capability. This is where neuromorphic computing and other bio -inspired technologies for SWaP constrained environments can play a

  17. Quasiregularity and Its Discontents: The Legacy of the Past Tense Debate

    ERIC Educational Resources Information Center

    Seidenberg, Mark S.; Plaut, David C.

    2014-01-01

    Rumelhart and McClelland's chapter about learning the past tense created a degree of controversy extraordinary even in the adversarial culture of modern science. It also stimulated a vast amount of research that advanced the understanding of the past tense, inflectional morphology in English and other languages, the nature of linguistic…

  18. 76 FR 23513 - Public and Closed Meeting To Discuss Comments on Draft Regulatory Basis for Rulemaking Revising...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ..., ``Security Performance (Adversary) Characteristics for Physical Security Programs for 10 CFR [Title 10 of the..., ``Physical Protection of Plants and Materials,'' that would apply during the storage of SNF at an ISFSI and... facilities licensed to store SNF through a combination of these existing security regulations and the...

  19. Preparation for Bargaining: Negotiation and Administration of the Contract.

    ERIC Educational Resources Information Center

    Higginbotham, Richard L.

    Every state will soon have some negotiation law covering school employees. If negotiation is an adversary process between two powers, then there has to be a balance of power between the school board and union. Today unions have more actual and potential power than school management. Unions spend great sums of money preparing for negotiations and…

  20. Gendered Practices in the Contemporary Workplace: A Critique of What Often Constitutes Front Page News in "The Wall Street Journal."

    ERIC Educational Resources Information Center

    Buzzanell, Patrice M.

    2001-01-01

    Analyzes and critiques a front-page article in the "Wall Street Journal." Finds that, underlying an image of fun and equitable workplace, is a disquieting depiction of adversarial gendered relationships, and of career advice that can damage the competence assessments and long-term advancement of women. (SR)

  1. A Combined Arms Approach to Defending Army Networks

    DTIC Science & Technology

    2012-01-01

    GIG operates, through cyberspace, as a globally interconnected, end...operations from the friendly to adversary box increases the situational awareness and unity of effort the Army lacks, and creates an economy of force that...indica- tions and warnings • Present a timely and accurate estimate of technical impact result- ing from the threat activity and determine

  2. A First-cut Concept Map: The Irregular Adversary (Insurgent)

    DTIC Science & Technology

    2012-12-01

    conceptuel des AANE aidera le spécialiste du renseignement militaire à brosser pour le commandant un tableau plus global des AANE dans leur...Crandall et al. (2006), « il est sage de toujours considérer les schémas conceptuels comme des représentations « vivantes » plutôt que des « produits

  3. Electronic Warfare

    DTIC Science & Technology

    2012-02-08

    EMOE is the background electromagnetic environment and the friendly, neutral, and adversarial electronic order of battle within the...X-RayELF VLF MF VHF SHFLF HF Radio Spectrum Visible Spectrum UHF EHF Gamma Ray Cosmic Ray The top bar shows how the electromagnetic spectrum is...effects of sunspots, lightning, and precipitation static. Essentially, the EME is the global EM background . Figure I-2. Electromagnetic Environment

  4. Users guide for EASI graphics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sasser, D.W.

    1978-03-01

    EASI (Estimate of Adversary Sequence Interruption) is an analytical technique for measuring the effectiveness of physical protection systems. EASI Graphics is a computer graphics extension of EASI which provides a capability for performing sensitivity and trade-off analyses of the parameters of a physical protection system. This document reports on the implementation of EASI Graphics and illustrates its application with some examples.

  5. The Failure of Legalization in Education: Alternative Dispute Resolution and the Education for All Handicapped Children Act of 1975.

    ERIC Educational Resources Information Center

    Goldberg, Steven S.

    1989-01-01

    A federal statute provided that parents may use the judicial process to challenge educators' decisions. Describes the intent of legalization; how reaction to an adversarial system led to the use of mediation in most states; and why this alternative model is not appropriate for resolving education questions. (MLF)

  6. Love's Labor Lost: Emotional Agency in a School Worker's Story of Family Advocacy

    ERIC Educational Resources Information Center

    Naraian, Srikala

    2015-01-01

    This study reports on the dilemmas of practice experienced by a parent-school facilitator, Melanie, within a large urban school district. Melanie struggled to reconcile her commitment to families in her school with the demands placed on her by an administrative ideology that viewed families as adversaries. Her attempts to manage the conflicts…

  7. Creating Schools of Peace and Nonviolence in a Time of War and Violence

    ERIC Educational Resources Information Center

    Cavanagh, Tom

    2009-01-01

    In this post 9/11 era Western cultures are focusing on values that support war and violence. In this article an ethnographer explores the impact of these values on schools. These values, seen through the lens of restorative justice, include: (a) punishment, (b) adversarial relationships, (c) monopolization of power, (d) problemization and…

  8. Restorative Justice as Social Justice for Victims of Gendered Violence: A Standpoint Feminist Perspective

    ERIC Educational Resources Information Center

    van Wormer, Katherine

    2009-01-01

    This article provides an overview of restorative justice as a process and examines its relevance to women who have been victimized by physical and sexual abuse. The starting point is the justice system with its roots in adversarial, offender-oriented practices of obtaining justice. The widespread dissatisfaction by battered women and rape victims…

  9. History’s Role in Operational Design and Planning: How Germany’s Failed Invasion Provides Insight into US and Chinese Perspectives on A2AD

    DTIC Science & Technology

    2013-04-21

    Britain. Third, Rumania, Bulgaria, Hungary, and Yugoslavia began aligning with the Axis. Fourth, Germany dominated Scandinavia through an occupation of...during the air campaigns supporting the conquests of Poland, Scandinavia , and Western Europe. Likewise, the Luftwaffe never fought an adversary that

  10. Decoherence estimation in quantum theory and beyond

    NASA Astrophysics Data System (ADS)

    Pfister, Corsin

    The quantum physics literature provides many different characterizations of decoherence. Most of them have in common that they describe decoherence as a kind of influence on a quantum system upon interacting with an another system. In the spirit of quantum information theory, we adapt a particular viewpoint on decoherence which describes it as the loss of information into a system that is possibly controlled by an adversary. We use a quantitative framework for decoherence that builds on operational characterizations of the min-entropy that have been developed in the quantum information literature. It characterizes decoherence as an influence on quantum channels that reduces their suitability for a variety of quantifiable tasks such as the distribution of secret cryptographic keys of a certain length or the distribution of a certain number of maximally entangled qubit pairs. This allows for a quantitative and operational characterization of decoherence via operational characterizations of the min-entropy. In this thesis, we present a series of results about the estimation of the minentropy, subdivided into three parts. The first part concerns the estimation of a quantum adversary's uncertainty about classical information--expressed by the smooth min-entropy--as it is done in protocols for quantum key distribution (QKD). We analyze this form of min-entropy estimation in detail and find that some of the more recently suggested QKD protocols have previously unnoticed security loopholes. We show that the specifics of the sifting subroutine of a QKD protocol are crucial for security by pointing out mistakes in the security analysis in the literature and by presenting eavesdropping attacks on those problematic protocols. We provide solutions to the identified problems and present a formalized analysis of the min-entropy estimate that incorporates the sifting stage of QKD protocols. In the second part, we extend ideas from QKD to a protocol that allows to estimate an adversary's uncertainty about quantum information, expressed by the fully quantum smooth min-entropy. Roughly speaking, we show that a protocol that resembles the parallel execution of two QKD protocols can be used to lower bound the min-entropy of some unmeasured qubits. We explain how this result may influence the ongoing search for protocols for entanglement distribution. The third part is dedicated to the development of a framework that allows the estimation of decoherence even in experiments that cannot be correctly described by quantum theory. Inspired by an equivalent formulation of the min-entropy that relates it to the fidelity with a maximally entangled state, we define a decoherence quantity for a very general class of probabilistic theories that reduces to the min-entropy in the special case of quantum theory. This entails a definition of maximal entanglement for generalized probabilistic theories. Using techniques from semidefinite and linear programming, we show how bounds on this quantity can be estimated through Bell-type experiments. This allows to test models for decoherence that cannot be described by quantum theory. As an example application, we devise an experimental test of a model for gravitational decoherence that has been suggested in the literature.

  11. [Beliefs about the adversary, political violence and peace processes].

    PubMed

    Borja, Henry; Barreto, Idaly; Alzate, Mónica; Sabucedo, José Manuel; López López, Wilson

    2009-11-01

    The aim of this study is to test in a real political context whether or not a change in the beliefs which were fueling the political violence in question is required during the advent of a peace process. Two hypothesis are considered: a) in the case of these beliefs not being modified, there will be difficulties to reach an atmosphere of trust between both parts and the process will fail, and b) if this happens, the groups will develop more extreme beliefs against the opponent. The results obtained through a textual analysis support both hypotheses. During the failure of the peace process, neither the strategy of the delegitimization of the opponent nor the identities in conflict were modified. Consequently, when the process failed, responsibility for this failure was attributed to the opponent, and, at the same time, delegitimization against the opponent intensified.

  12. A Half-Century of Change on College Hill: Institutional Growth, Historic Preservation, and the College Hill Study

    ERIC Educational Resources Information Center

    Gast, Frances M.

    2011-01-01

    One of the epicenters of the historic preservation movement in the United States, the east side of Providence is also home to Brown University and Rhode Island School of Design. Preservation leaders and institutional leaders--sometimes adversaries, sometimes partners--took a meandering path toward the expansive notion of Historic Providence that…

  13. Combating Terrorism Technical Support Office. 2008 Review

    DTIC Science & Technology

    2009-01-15

    threat object displayed at the operator control unit of the robotic platform. Remote Utility Conversion Kit The Remote Utility Conversion Kit (RUCK) is a...three- dimensional and isometric simulations and games. Develop crowd models, adversarial behavior models, network-based simulations, mini-simulations...Craft-Littoral The modular unmanned surface craft-littoral ( MUSCL ) is a spin- off of EOD/LIC’s Unmanned Reconnaissance Observation Craft, developed

  14. Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop

    DTIC Science & Technology

    2015-12-01

    simulation) perspective. This would be natural, considering that the cybersecurity problem is highly adversarial in nature. Because it involves intelligent ...be formulated as a partial information game; artificial intelligence techniques might help here. Yet another style of problem formulation that...computational information processing for weapons, intelligence , communication, and logistics systems continues to increase the vulnerability of

  15. Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization

    DTIC Science & Technology

    2016-05-30

    Hide and Seek: Exploiting and Hardening Leakage -Resilient Code Randomization Robert Rudd MIT Lincoln Laboratory Thomas Hobson MIT Lincoln Laboratory...Irvine Ahmad-Reza Sadeghi TU Darmstadt Hamed Okhravi MIT Lincoln Laboratory Abstract Information leakage vulnerabilities can allow adversaries to...bypass mitigations based on code randomization. This discovery motivates numerous techniques that diminish direct and indirect information leakage : (i

  16. Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization

    DTIC Science & Technology

    2016-03-30

    Hide and Seek: Exploiting and Hardening Leakage -Resilient Code Randomization Robert Rudd MIT Lincoln Laboratory Thomas Hobson MIT Lincoln Laboratory...Irvine Ahmad-Reza Sadeghi TU Darmstadt Hamed Okhravi MIT Lincoln Laboratory Abstract Information leakage vulnerabilities can allow adversaries to...bypass mitigations based on code randomization. This discovery motivates numerous techniques that diminish direct and indirect information leakage : (i

  17. Influence of rock videos on attitudes of violence against women.

    PubMed

    Peterson, D L; Pfost, K S

    1989-02-01

    144 undergraduate men viewed rock videos which contained content that was erotic-violent, erotic-nonviolent, nonerotic-violent, or nonerotic-nonviolent. Exposure to nonerotic-violent rock videos resulted in significantly higher Adversarial Sexual Beliefs scores and ratings of negative affect. These and other findings are discussed in terms of Bandura's concept of emotional incompatibility and the frustration-aggression model.

  18. Adversaries and Allies: Rival National Suffrage Groups and the 1882 Nebraska Woman Suffrage Campaign

    ERIC Educational Resources Information Center

    Heider, Carmen

    2005-01-01

    In September 1882, Nebraska was the setting for a significant moment in the history of the United States women's rights movement: the two rival suffrage organizations, the American Woman Suffrage Association (AWSA) and the National Woman Suffrage Association (NWSA), both held their annual conventions in Omaha. The alliance of the AWSA and the NWSA…

  19. Recent Acquisition Reform Through Technology and Workforce Improvements

    DTIC Science & Technology

    2016-09-01

    HMMWV High Mobility Multipurpose Wheeled Vehicle IED Improvised Explosive Device IRAD Independent Research And Development JCIDS Joint...their specific field within the acquisition community (Eide & Allen, 2012). In 1993, the Government Performance and Results Act (GPRA) was enacted...need arises as the nation’s “adversaries are modernizing at a significant rate, and they are responding rapidly to our development programs and fielded

  20. United States and Cuban Governments' Response to a New International Exchange Program: Lessons Learned

    ERIC Educational Resources Information Center

    Cristol, Dean

    2004-01-01

    For more than forty years the governments of the United States and Cuba have maintained an adversarial relationship toward one another. Much of the negativity is expressed through verbal accusations, but at times there have been several destabilizing and sometimes dangerous actions by one or both governments such as the 1962 Missile Crisis,…

Top