Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
2013-11-01
the number of TorPS samples, and let D (x) be the absolute difference between the empirical CDF and the true CDF at x. The Dvoretzky– Kiefer–Wolfowitz...0.05 0.06 0.07 Fraction of streams 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Cu m ul at iv e pr ob ab ili ty typical bittorrent irc worst best ( d ...Adversaries) IRC (2 Adversaries) IRC (3 Adversaries) Typical (1 Adversary) Typical (2 Adversaries) Typical (3 Adversaries) ( d ) Varying time to first
Guikema, Seth
2012-07-01
Intelligent adversary modeling has become increasingly important for risk analysis, and a number of different approaches have been proposed for incorporating intelligent adversaries in risk analysis models. However, these approaches are based on a range of often-implicit assumptions about the desirable properties of intelligent adversary models. This "Perspective" paper aims to further risk analysis for situations involving intelligent adversaries by fostering a discussion of the desirable properties for these models. A set of four basic necessary conditions for intelligent adversary models is proposed and discussed. These are: (1) behavioral accuracy to the degree possible, (2) computational tractability to support decision making, (3) explicit consideration of uncertainty, and (4) ability to gain confidence in the model. It is hoped that these suggested necessary conditions foster discussion about the goals and assumptions underlying intelligent adversary modeling in risk analysis. © 2011 Society for Risk Analysis.
The Adversarial Route Analysis Tool: A Web Application
DOE Office of Scientific and Technical Information (OSTI.GOV)
Casson, William H. Jr.
2012-08-02
The Adversarial Route Analysis Tool is a type of Google maps for adversaries. It's a web-based Geospatial application similar to Google Maps. It helps the U.S. government plan operations that predict where an adversary might be. It's easily accessible and maintainble and it's simple to use without much training.
Adversarial reasoning: challenges and approaches
NASA Astrophysics Data System (ADS)
Kott, Alexander; Ownby, Michael
2005-05-01
This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-world problems, the paper explores the lessons learned in the CADET -- a battle planning system that focuses on brigade-level ground operations and involves adversarial reasoning. From this example of current capabilities, the paper proceeds to describe RAID -- a DARPA program that aims to build capabilities in adversarial reasoning, and how such capabilities would address practical requirements in Defense and other application areas.
Recent Trends in Adversarial Attitudes among American Newspaper Journalists: A Cohort Analysis.
ERIC Educational Resources Information Center
Zhu, Jian-Hua
A study explored the question of whether there is an adversary press, by examining the recent trends in adversarial attitudes among newspaper journalists in the United States. Using a differentiation model for delineating the nature and boundaries of American adversarial journalism, the study re-analyzed the data from two national surveys. The…
Proposed Doctrine Based Structure of the Armored Reconnaissance Squadron
2017-06-09
adversarial, non -state non -adversarial and International Organizations (IO). Non -state adversarial are groups that oppose the interest and priorities of...Canada and its partners; these groups include violent extremist organizations and criminal organizations. Non - state non -adversarial are groups that... Grouping can be executed to facilitate control , communications, function or output of a collection. Recall, that for the purpose of this analysis
Adaptation of a multi-resolution adversarial model for asymmetric warfare
NASA Astrophysics Data System (ADS)
Rosenberg, Brad; Gonsalves, Paul G.
2006-05-01
Recent military operations have demonstrated the use by adversaries of non-traditional or asymmetric military tactics to offset US military might. Rogue nations with links to trans-national terrorists have created a highly unpredictable and potential dangerous environment for US military operations. Several characteristics of these threats include extremism in beliefs, global in nature, non-state oriented, and highly networked and adaptive, thus making these adversaries less vulnerable to conventional military approaches. Additionally, US forces must also contend with more traditional state-based threats that are further evolving their military fighting strategies and capabilities. What are needed are solutions to assist our forces in the prosecution of operations against these diverse threat types and their atypical strategies and tactics. To address this issue, we present a system that allows for the adaptation of a multi-resolution adversarial model. The developed model can then be used to support both training and simulation based acquisition requirements to effectively respond to such an adversary. The described system produces a combined adversarial model by merging behavior modeling at the individual level with aspects at the group and organizational level via network analysis. Adaptation of this adversarial model is performed by means of an evolutionary algorithm to build a suitable model for the chosen adversary.
Secure Localization in the Presence of Colluders in WSNs
Barbeau, Michel; Corriveau, Jean-Pierre; Garcia-Alfaro, Joaquin; Yao, Meng
2017-01-01
We address the challenge of correctly estimating the position of wireless sensor network (WSN) nodes in the presence of malicious adversaries. We consider adversarial situations during the execution of node localization under three classes of colluding adversaries. We describe a decentralized algorithm that aims at determining the position of nodes in the presence of such colluders. Colluders are assumed to either forge or manipulate the information they exchange with the other nodes of the WSN. This algorithm allows location-unknown nodes to successfully detect adversaries within their communication range. Numeric simulation is reported to validate the approach. Results show the validity of the proposal, both in terms of localization and adversary detection. PMID:28817077
1998-04-01
34AFRL-HE-WP-TR-1999-0216 UNITED STATES AIR FORCE RESEARCH LABORATORY STUDIES AND ANALYSES OF AIDED ADVERSARIAL DECISION MAKING PHASE 2: RESEARCH ON...Analyses of Aided Adversarial Decision Making . C: F41624-94-D-6000 Phase 2: Research on Human Trust in Automation PE: 62202F PR: 7184 6. AUTHOR(S) TA...Buffalo. This work focused on Aided Adversarial Decision Making (AADM) in Information Warfare (1W) environments. Previous work examined informational
An analytic approach to cyber adversarial dynamics
NASA Astrophysics Data System (ADS)
Sweeney, Patrick; Cybenko, George
2012-06-01
To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.
Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyers, C A; Powers, S S; Faissol, D M
In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform futuremore » studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.« less
I feel good whether my friends win or my foes lose: brain mechanisms underlying feeling similarity.
Aue, Tatjana
2014-07-01
People say they enjoy both seeing a preferred social group succeed and seeing an adversary social group fail. At the same time, they state they dislike seeing a preferred social group fail and seeing an adversary social group succeed. The current magnetic resonance imaging study investigated whether-and if so, how-such similarities in reported feeling states are reflected in neural activities. American football fans anticipated success and failure situations for their favorite or their adversary teams. The data support the idea that feeling similarities and divergences expressed in verbal reports carry with them significant neural similarities and differences, respectively. Desired (favorite team likely to win and adversary team likely to lose) rather than undesired (favorite team likely to lose and adversary team likely to win) outcomes were associated with heightened activity in the supramarginal gyrus, posterior cingulate cortex, insula, and cerebellum. Precuneus activity additionally distinguished anticipated desirable outcomes for favorite versus adversary teams. Copyright © 2014 Elsevier Ltd. All rights reserved.
A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nithyanand, Rishab; Solis, John H.
2011-09-01
Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributionsmore » are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-11
... DEPARTMENT OF STATE [Public Notice 8464] Culturally Significant Objects Imported for Exhibition Determinations: ``American Adversaries: West and Copley in a Transatlantic World'' SUMMARY: Notice is hereby... objects to be included in the exhibition ``American Adversaries: West and Copley in a Transatlantic World...
Arguing with Adversaries: Aikido, Rhetoric, and the Art of Peace
ERIC Educational Resources Information Center
Kroll, Barry M.
2008-01-01
The Japanese martial art of aikido affords a framework for understanding argument as harmonization rather than confrontation. Two movements, circling away ("tenkan") and entering in ("irimi"), suggest tactics for arguing with adversaries. The ethical imperative of aikido involves protecting one's adversary from harm, using the least force…
A Forensically Sound Adversary Model for Mobile Devices.
Do, Quang; Martini, Ben; Choo, Kim-Kwang Raymond
2015-01-01
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device.
A Forensically Sound Adversary Model for Mobile Devices
Choo, Kim-Kwang Raymond
2015-01-01
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device. PMID:26393812
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-02-24
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor.
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †
Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu
2018-01-01
Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries. In addition, we extend our game model and analyze the extortion strategy, which can enable one participant to obtain more payoff by extorting his/her opponents. The evaluation results show that the defender can combat this strategy by encouraging competition among the adversaries, and significantly suppress the total payoff of the adversaries via setting the proper penalty factor. PMID:29495291
Generative Adversarial Networks for Noise Reduction in Low-Dose CT.
Wolterink, Jelmer M; Leiner, Tim; Viergever, Max A; Isgum, Ivana
2017-12-01
Noise is inherent to low-dose CT acquisition. We propose to train a convolutional neural network (CNN) jointly with an adversarial CNN to estimate routine-dose CT images from low-dose CT images and hence reduce noise. A generator CNN was trained to transform low-dose CT images into routine-dose CT images using voxelwise loss minimization. An adversarial discriminator CNN was simultaneously trained to distinguish the output of the generator from routine-dose CT images. The performance of this discriminator was used as an adversarial loss for the generator. Experiments were performed using CT images of an anthropomorphic phantom containing calcium inserts, as well as patient non-contrast-enhanced cardiac CT images. The phantom and patients were scanned at 20% and 100% routine clinical dose. Three training strategies were compared: the first used only voxelwise loss, the second combined voxelwise loss and adversarial loss, and the third used only adversarial loss. The results showed that training with only voxelwise loss resulted in the highest peak signal-to-noise ratio with respect to reference routine-dose images. However, CNNs trained with adversarial loss captured image statistics of routine-dose images better. Noise reduction improved quantification of low-density calcified inserts in phantom CT images and allowed coronary calcium scoring in low-dose patient CT images with high noise levels. Testing took less than 10 s per CT volume. CNN-based low-dose CT noise reduction in the image domain is feasible. Training with an adversarial network improves the CNNs ability to generate images with an appearance similar to that of reference routine-dose CT images.
Gender Identity and Adversarial Sexual Beliefs as Predictors of Attitudes toward Sexual Harassment.
ERIC Educational Resources Information Center
Murrell, Audrey J.; Dietz-Uhler, Beth L.
1993-01-01
Examines impact of gender identity and adversarial sexual beliefs as predictors of attitudes toward sexual harassment for 52 female and 55 male college students. Adversarial beliefs and experience with sexual harassment predict less tolerant attitudes toward harassment for males, whereas strong gender group identity and experience with harassment…
Multipath Very-Simplified Estimate of Adversary Sequence Interruption v. 2.1
DOE Office of Scientific and Technical Information (OSTI.GOV)
Snell, Mark K.
2017-10-10
MP VEASI is a training tool that models physical protection systems for fixed sites using Adversary Sequence Diagrams (ASDs) and then uses the ASD to find most-vulnerable adversary paths through the ASD. The identified paths have the lowest Probability of Interruption among all the paths through the ASD.
Adversarial Feature Selection Against Evasion Attacks.
Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio
2016-03-01
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Rajivan, Prashanth; Gonzalez, Cleotilde
2018-01-01
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in emails. PMID:29515478
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heineke, J.M.
1978-12-20
This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)
2008-03-01
Adversarial Tripolarity ................................................................................... VII-1 VIII. Fallen Nuclear Dominoes...power dimension, it is possible to imagine a best case (deep concert) and a worst case (adversarial tripolarity ) and some less extreme outcomes, one...vanquished and the sub-regions have settled into relative stability). 5. Adversarial U.S.-Russia-China tripolarity : In this world, the regional
Potential criminal adversaries of nuclear programs: a portrait
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jenkins, B.M.
1980-07-01
This paper examines the possibility that terrorists or other kinds of criminals might attempt to seize or sabotage a nuclear facility, steal nuclear material, or carry out other criminal activities in the nuclear domain which has created special problems for the security of nuclear programs. This paper analyzes the potential threat. Our tasks was to describe the potential criminal adversary, or rather the spectrum of potential adversaries who conceivably might carry out malevolent criminal actions against nuclear programs and facilities. We were concerned with both the motivations as well as the material and operational capabilities likely to be displayed bymore » various categories of potential nuclear adversaries.« less
On deception detection in multi-agent systems and deception intent
NASA Astrophysics Data System (ADS)
Santos, Eugene, Jr.; Li, Deqing; Yuan, Xiuqing
2008-04-01
Deception detection plays an important role in the military decision-making process, but detecting deception is a challenging task. The deception planning process involves a number of human factors. It is intent-driven where intentions are usually hidden or not easily observable. As a result, in order to detect deception, any adversary model must have the capability to capture the adversary's intent. This paper discusses deception detection in multi-agent systems and in adversary modeling. We examined psychological and cognitive science research on deception and implemented various theories of deception within our approach. First, in multi-agent expert systems, one detection method uses correlations between agents to predict reasonable opinions/responses of other agents (Santos & Johnson, 2004). We further explore this idea and present studies that show the impact of different factors on detection success rate. Second, from adversary modeling, our detection method focuses on inferring adversary intent. By combining deception "branches" with intent inference models, we can estimate an adversary's deceptive activities and at the same time enhance intent inference. Two major kinds of deceptions are developed in this approach in different fashions. Simulative deception attempts to find inconsistency in observables, while dissimulative deception emphasizes the inference of enemy intentions.
Achieving the physical limits of the bounded-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mandayam, Prabha; Wehner, Stephanie; Centre for Quantum Technologies, National University of Singapore, 2 Science Drive 3, 117543 Singapore
2011-02-15
Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security canmore » be extended to a larger class of noisy quantum memories.« less
ART OF THE POSSIBLE: SECURING AIR FORCE SPACE COMMAND MISSION SYSTEMS FOR THE WARFIGHTER
2016-10-23
Initiation (Adversarial)…….…17 Table 2. Assessment Scale-Likelihood of Threat Event Occurrence ( Non -Adversarial).17 Table 3. Assessment Scale...action to thwart the attacks from adversarial nation states and non -state actors alike. While there are numerous cybersecurity concerns, or non ...compliant cybersecurity controls across all weapon systems, not all non -compliant controls contribute equally to the cyber-attack surface and overall
No-Regret Learning and a Mechanism for Distributed Multiagent Planning
2008-02-01
adversarial agents who influence prices for the resources. The adversarial agents benefit from arbitrage : that is, their incentive is to uncover ...who influence prices for the resources. The adversarial agents benefit from arbitrage : that is, their incentive is to uncover violations of the resource...2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE No-Regret Learning and a Mechanism for Distributed Multiagent
Aguayo, Joseph; Regeczkey, Agnes
2016-07-01
The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968. © 2016 The Psychoanalytic Quarterly, Inc.
12 CFR 1071.202 - Documentation of fees and expenses.
Code of Federal Regulations, 2013 CFR
2013-01-01
... initiation of the adversary adjudication, including the cost of any study, engineering report, test, or... incurred after initiation of the adversary adjudication, including the cost of any study, engineering...
Using Machine Learning in Adversarial Environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warren Leon Davis
Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approachesmore » only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.« less
Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Darby, John L.
Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using anmore » adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.« less
Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?
2016-01-01
This survey of 206 forensic psychologists tested the “filtering” effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the “allegiance effect” in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process. PMID:27124416
Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde
2013-06-01
To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.
Optimal space-time attacks on system state estimation under a sparsity constraint
NASA Astrophysics Data System (ADS)
Lu, Jingyang; Niu, Ruixin; Han, Puxiao
2016-05-01
System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.
Scientific method, adversarial system, and technology assessment
NASA Technical Reports Server (NTRS)
Mayo, L. H.
1975-01-01
A basic framework is provided for the consideration of the purposes and techniques of scientific method and adversarial systems. Similarities and differences in these two techniques of inquiry are considered with reference to their relevance in the performance of assessments.
NASA Technical Reports Server (NTRS)
Berg, Melanie; Label, Kenneth
2018-01-01
The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.
The Application of materials attractiveness in a graded approach to nuclear materials security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ebbinghaus, B.; Bathke, C.; Dalton, D.
2013-07-01
The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that ismore » necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.« less
Active Detection for Exposing Intelligent Attacks in Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Ozel, Omur; Griffioen, Paul
In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detectmore » the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.« less
Decorrelated jet substructure tagging using adversarial neural networks
NASA Astrophysics Data System (ADS)
Shimmin, Chase; Sadowski, Peter; Baldi, Pierre; Weik, Edison; Whiteson, Daniel; Goul, Edward; Søgaard, Andreas
2017-10-01
We describe a strategy for constructing a neural network jet substructure tagger which powerfully discriminates boosted decay signals while remaining largely uncorrelated with the jet mass. This reduces the impact of systematic uncertainties in background modeling while enhancing signal purity, resulting in improved discovery significance relative to existing taggers. The network is trained using an adversarial strategy, resulting in a tagger that learns to balance classification accuracy with decorrelation. As a benchmark scenario, we consider the case where large-radius jets originating from a boosted resonance decay are discriminated from a background of nonresonant quark and gluon jets. We show that in the presence of systematic uncertainties on the background rate, our adversarially trained, decorrelated tagger considerably outperforms a conventionally trained neural network, despite having a slightly worse signal-background separation power. We generalize the adversarial training technique to include a parametric dependence on the signal hypothesis, training a single network that provides optimized, interpolatable decorrelated jet tagging across a continuous range of hypothetical resonance masses, after training on discrete choices of the signal mass.
GANViz: A Visual Analytics Approach to Understand the Adversarial Game.
Wang, Junpeng; Gou, Liang; Yang, Hao; Shen, Han-Wei
2018-06-01
Generative models bear promising implications to learn data representations in an unsupervised fashion with deep learning. Generative Adversarial Nets (GAN) is one of the most popular frameworks in this arena. Despite the promising results from different types of GANs, in-depth understanding on the adversarial training process of the models remains a challenge to domain experts. The complexity and the potential long-time training process of the models make it hard to evaluate, interpret, and optimize them. In this work, guided by practical needs from domain experts, we design and develop a visual analytics system, GANViz, aiming to help experts understand the adversarial process of GANs in-depth. Specifically, GANViz evaluates the model performance of two subnetworks of GANs, provides evidence and interpretations of the models' performance, and empowers comparative analysis with the evidence. Through our case studies with two real-world datasets, we demonstrate that GANViz can provide useful insight into helping domain experts understand, interpret, evaluate, and potentially improve GAN models.
Constructing Learning: Adversarial and Collaborative Working in the British Construction Industry
ERIC Educational Resources Information Center
Bishop, Dan; Felstead, Alan; Fuller, Alison; Jewson, Nick; Unwin, Lorna; Kakavelakis, Konstantinos
2009-01-01
This paper examines two competing systems of work organisation in the British construction industry and their consequences for learning. Under the traditional "adversarial" system, conflict, hostility and litigation between contractors are commonplace. Such a climate actively militates against collective learning and knowledge sharing between…
Context-Aware Generative Adversarial Privacy
NASA Astrophysics Data System (ADS)
Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram
2017-12-01
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.
Procedural Justice in Family Court: Does the Adversary Model Make Sense?
ERIC Educational Resources Information Center
Melton, Gary B.; Lind, E. Allan
1982-01-01
Reviews research and theory on procedural justice concerning family disputes, and discusses existing proposals for reform of family court procedures. Holds that adversary proceedings in custody disputes may be more beneficial to older children and disputing parents than nonadversary procedures. Identifies areas for needed research in procedural…
Networking in the Presence of Adversaries
2014-09-12
a topological graph with linear algebraic constraints. As a practical example, such a model arises from an electric power system in which the power...flow is governed by the Kirchhoff law. When an adversary launches an MiM data attack, part of the sensor data are intercepted and substituted with
Resilient Distributed Estimation Through Adversary Detection
NASA Astrophysics Data System (ADS)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2018-05-01
This paper studies resilient multi-agent distributed estimation of an unknown vector parameter when a subset of the agents is adversarial. We present and analyze a Flag Raising Distributed Estimator ($\\mathcal{FRDE}$) that allows the agents under attack to perform accurate parameter estimation and detect the adversarial agents. The $\\mathcal{FRDE}$ algorithm is a consensus+innovations estimator in which agents combine estimates of neighboring agents (consensus) with local sensing information (innovations). We establish that, under $\\mathcal{FRDE}$, either the uncompromised agents' estimates are almost surely consistent or the uncompromised agents detect compromised agents if and only if the network of uncompromised agents is connected and globally observable. Numerical examples illustrate the performance of $\\mathcal{FRDE}$.
Adversarial Risk Analysis for Urban Security Resource Allocation.
Gil, César; Rios Insua, David; Rios, Jesus
2016-04-01
Adversarial risk analysis (ARA) provides a framework to deal with risks originating from intentional actions of adversaries. We show how ARA may be used to allocate security resources in the protection of urban spaces. We take into account the spatial structure and consider both proactive and reactive measures, in that we aim at both trying to reduce criminality as well as recovering as best as possible from it, should it happen. We deal with the problem by deploying an ARA model over each spatial unit, coordinating the models through resource constraints, value aggregation, and proximity. We illustrate our approach with an example that uncovers several relevant policy issues. © 2016 Society for Risk Analysis.
Adversarial risk analysis with incomplete information: a level-k approach.
Rothschild, Casey; McLay, Laura; Guikema, Seth
2012-07-01
This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.
34 CFR 21.10 - Adversary adjudications covered by the Act.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 34 Education 1 2010-07-01 2010-07-01 false Adversary adjudications covered by the Act. 21.10 Section 21.10 Education Office of the Secretary, Department of Education EQUAL ACCESS TO JUSTICE Which... Assistance for Local Educational Agencies in Areas Affected by Federal Activity) (20 U.S.C. 240(g)). (2...
Liberal Democracy and Objective Journalism: Partners or Adversaries?
ERIC Educational Resources Information Center
Reeb, Richard H., Jr.
Contemporary journalism, although claiming to be politically objective and neutral, has become a powerful critic of the conduct of the government, often seeming to be a force for the reordering of national priorities along leftist lines. This "adversary journalism" of the past 15 years has strayed a long way from the neutral journalism…
Revitalizing Adversary Evaluation: Deep Dark Deficits or Muddled Mistaken Musings
ERIC Educational Resources Information Center
Thurston, Paul
1978-01-01
The adversary evaluation model consists of utilizing the judicial process as a metaphor for educational evaluation. In this article, previous criticism of the model is addressed and its fundamental problems are detailed. It is speculated that the model could be improved by borrowing ideas from other legal forms of inquiry. (Author/GC)
The Effects of an Adversarial Process on Adoption Decisions.
ERIC Educational Resources Information Center
Ryburn, Murray
1993-01-01
Examines the legal and social work process in contested adoption proceedings, and argues that there are moral grounds for repealing provisions in British legislation on forced adoption. Considers the adversarial process that characterizes adoption hearings, the role of poverty in the lives of families whose children are admitted to foster care,…
Cooperation and punishment in an adversarial game: How defectors pave the way to a peaceful society
NASA Astrophysics Data System (ADS)
Short, M. B.; Brantingham, P. J.; D'Orsogna, M. R.
2010-12-01
The evolution of human cooperation has been the subject of much research, especially within the framework of evolutionary public goods games, where several mechanisms have been proposed to account for persistent cooperation. Yet, in addressing this issue, little attention has been given to games of a more adversarial nature, in which defecting players, rather than simply free riding, actively seek to harm others. Here, we develop an adversarial evolutionary game using the specific example of criminal activity, recasting the familiar public goods strategies of punishers, cooperators, and defectors in this light. We then introduce a strategy—the informant—with no clear analog in public goods games and show that individuals employing this strategy are a key to the emergence of systems where cooperation dominates. We also find that a defection-dominated regime may be transitioned to one that is cooperation-dominated by converting an optimal number of players into informants. We discuss these findings, the role of informants, and possible intervention strategies in extreme adversarial societies, such as those marred by wars and insurgencies.
Quantum tagging for tags containing secret classical data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian
Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less
Evaluating the risk of patient re-identification from adverse drug event reports
2013-01-01
Background Our objective was to develop a model for measuring re-identification risk that more closely mimics the behaviour of an adversary by accounting for repeated attempts at matching and verification of matches, and apply it to evaluate the risk of re-identification for Canada’s post-marketing adverse drug event database (ADE).Re-identification is only demonstrably plausible for deaths in ADE. A matching experiment between ADE records and virtual obituaries constructed from Statistics Canada vital statistics was simulated. A new re-identification risk is considered, it assumes that after gathering all the potential matches for a patient record (all records in the obituaries that are potential matches for an ADE record), an adversary tries to verify these potential matches. Two adversary scenarios were considered: (a) a mildly motivated adversary who will stop after one verification attempt, and (b) a highly motivated adversary who will attempt to verify all the potential matches and is only limited by practical or financial considerations. Methods The mean percentage of records in ADE that had a high probability of being re-identified was computed. Results Under scenario (a), the risk of re-identification from disclosing the province, age at death, gender, and exact date of the report is quite high, but the removal of province brings down the risk significantly. By only generalizing the date of reporting to month and year and including all other variables, the risk is always low. All ADE records have a high risk of re-identification under scenario (b), but the plausibility of that scenario is limited because of the financial and practical deterrent even for highly motivated adversaries. Conclusions It is possible to disclose Canada’s adverse drug event database while ensuring that plausible re-identification risks are acceptably low. Our new re-identification risk model is suitable for such risk assessments. PMID:24094134
GalaxyGAN: Generative Adversarial Networks for recovery of galaxy features
NASA Astrophysics Data System (ADS)
Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Krishnan Santhanam, Gokula
2017-02-01
GalaxyGAN uses Generative Adversarial Networks to reliably recover features in images of galaxies. The package uses machine learning to train on higher quality data and learns to recover detailed features such as galaxy morphology by effectively building priors. This method opens up the possibility of recovering more information from existing and future imaging data.
Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning
ERIC Educational Resources Information Center
Brennan, Michael
2012-01-01
Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…
On the Uses of Cultural Knowledge
2007-11-01
awareness that a cultural understanding of an adversary society is imperative if counterinsurgency is to succeed. This monograph, by Dr. Sheila...cultural awareness and understanding of adversary societies has been widely recognized as essential to operations and tactics on the battlefield, Dr...levels of warfare—strategy, operations, and tactics. Although not mutually exclusive, cultural knowledge informs these distinct levels in different
Key Elements of Protection for Military Textiles
2010-10-15
responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would...future for each aspect of protection are given. Aspects of protection considered are limited to threats from human adversaries and include camouflage...of protection considered are limited to threats from human adversaries and include camoufl age, ballistic protection and protection from toxic
An Adversarial Exchange on Adversarial Ethics: Text, Subtext, and Context.
ERIC Educational Resources Information Center
Rhode, Deborah L.
1991-01-01
Presented in the form of a debate and rebuttals are both sides of the issue, first stated by Lord Brougham in 1820, of a client's legal and moral rights to his counsel's total support. It is concluded that advocacy in law does not carry some special authority or excuse the lawyer from accepting moral responsibility for his professional choices.…
Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kirkwood, C.W.; Pollock, S.M.
1978-11-01
The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems.
Expanding Combat Power Through Military Cyberpower Theory
2015-04-02
systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to
CARA: Cognitive Architecture for Reasoning About Adversaries
2012-01-20
synthesis approach taken here the KIDS principle (Keep It Descriptive, Stupid ) applies, and agents and organizations are profiled in great detail...developed two algorithms to make forecasts about adversarial behavior. We developed game-theoretical approaches to reason about group behavior. We...to automatically make forecasts about group behavior together with methods to quantify the uncertainty inherent in such forecasts; • Developed
Extracting Knowledge from Graph Data in Adversarial Settings
NASA Astrophysics Data System (ADS)
Skillicorn, David
Graph data captures connections and relationships among individuals, and between individuals and objects, places, and times. Because many of the properties f graphs are emergent, they are resistant to manipulation by adversaries. This robustness comes at the expense of more-complex analysis algorithms. We describe several approaches to analysing graph data, illustrating with examples from the relationships within al Qaeda.
NASA Astrophysics Data System (ADS)
Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty
2014-06-01
Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.
Ryan, Matthew
2003-06-01
This discussion aims to provide the occasional medical expert witness with background knowledge of the adversarial court system and the role of the medical expert witness within it. The parallel evolution of the adversarial and inquisitorial legal systems has been more out of tradition rather than any systematic review of the effectiveness of one system or the other. Both legal systems have their merits and limitations. Witnesses within the adversarial system are required to present evidence in a structured and highly stylized format consisting of 'evidence in chief' followed by 'cross-examination'. This format is an attempt to exclude unreliable evidence. The medical witness is an 'expert' by means of specialized knowledge not possessed by the general public. This distinction allows the expert medical witness to offer his or her opinion as evidence. There remain several limitations to the expert's evidence and these relate to common knowledge, field of expertise and the 'ultimate issue'. The current practice of selection of expert medical witnesses is seriously flawed with several pressures operating to maximise bias and inaccurate testimony. Doctors should not only anticipate change in this area they should lead reform in this area.
Understanding the operational environment: implications for advanced visualizations
NASA Astrophysics Data System (ADS)
Aleva, Denise; Fitzhugh, Elisabeth; Dixon, Sharon
2009-05-01
With the changing character of warfare, information superiority is a high priority. Given the complexity of current and future operating environments, analysts, strategists and planners need a multidimensional understanding of the battlespace. Asymmetric warfare necessitates that our strategists look beyond targets-based operations, where we simply identify and destroy enemy entities. Effects-based operations models the enemy as a system which reacts to our actions. This requires the capability to predict the adversary response to a selected action. Actions may be diplomatic, information, military or economic (DIME). Effects may be political, military, economic, social, information or infrastructure (PMESII). Timing must be explicitly considered and effects dynamically assessed. Visualizations of intelligence information are needed which will promote full understanding of all aspects of adversary strengths and weaknesses by providing the extensive data about adversary forces, organic essentials, infrastructure, leadership, population, and science and technology in an easily accessible and understandable format. This will enhance Effectsbased operations, and therefore, the capability to predict and counter adversary courses of action. This paper outlines a systems engineering approach to designing visualizations which convey the multidimensional information to decision makers. Visualization issues inherent in understanding the multidimensional operational environment will be discussed.
Learning consensus in adversarial environments
NASA Astrophysics Data System (ADS)
Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.
2013-05-01
This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.
Insecurity of position-based quantum-cryptography protocols against entanglement attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lau, Hoi-Kwan; Lo, Hoi-Kwong
2011-01-15
Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less
SUSTAINING NAVAL SURFACE COMBATANT VERTICAL LAUNCH SYSTEM MUNITIONS DURING JOINT OPERATIONS
2017-04-21
permission of the author. 14. ABSTRACT Maintaining maritime dominance against near peer adversaries will tax an already complex logistics structure...This page intentionally blank i ABSTRACT Maintaining maritime dominance against near peer adversaries will tax an already complex logistics...140725-N-EW716- 002.jpg 40 California to Guam, approximately eight days would be required but this does not account for delay to conduct refueling
Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments
2006-08-14
COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN ADVERSARIAL ENVIRONMENTS Grant #F49620–01–1–0361 Final Report Jeff Shamma Department of...CONTRACT NUMBER F49620-01-1-0361 5b. GRANT NUMBER 4. TITLE AND SUBTITLE COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN...single dominant language or a distribution of languages. A relation to multivehicle systems is understanding how highly autonomous vehicles on extended
2009-05-01
adversary. This method is also known as definition by genus and differentia, acknowledging its roots in the Aristotelian method of classification. To define...a term, one begins by naming the larger group ( genus ) with which the phenomenon shares a common characteristic, then stating the specific...sets out the genus as agent11 (“one who, or that which”) and the differentia – that is, the attribute which distinguishes an adversary from other
Extended Deterrence and Allied Assurance: Key Concepts and Current Challenges for U.S. Policy
2013-09-01
include adversary nuclear forces and stockpiles) in the pre- satellite era required a strategy using large numbers of bombers, large numbers of...radar and sensor capabilities related to TMD, activities Canberra considered important to “bolstering 59 the [U.S.-Australia] alliance.” 146 In...external attack; with potential adversaries developing anti- satellite 90 capabilities, and conducting cyber incursions and attacks against U.S. and
Toward Adversarial Online Learning and the Science of Deceptive Machines
2015-11-14
noise . Adver- saries can take advantage of this inherent blind spot to avoid detection (mimicry). Adversarial label noise is the intentional switching...of classification labels leading to de- terministic noise , error that the model cannot capture due to its generalization bias. An experiment in user...potentially infinite and with imperfect information. We will combine Monte-Carlo tree search ( MCTS ) with rein- forcement learning because the manipulation
Toward a Developmentally-Informed Approach to Parenting Interventions: Seeking Hidden Effects
Brock, Rebecca L.; Kochanska, Grazyna
2015-01-01
Drawing from developmental psychology and psychopathology, we propose a new, developmentally-informed approach to parenting interventions that focuses on elucidating changes in the unfolding developmental process between the parent and child. We present data from 186 low-income mothers of toddlers, randomly assigned to Child-Oriented Play group or Play-as-Usual group. We examined the maladaptive cascade from child difficulty to mother adversarial, negative parenting to child maladjustment, well documented in the literature. The measures incorporated multiple observations and reports. As expected, the sequence from child difficulty (Pretest) to mother adversarial, negative parenting (Posttest 1, after 3-month intervention) to child maladjustment (Posttest 2, 6 months later) was present in Play-as-Usual group, but absent, or defused, in Child-Oriented Play group. The findings are consistent with a view of intervention presumably enhancing the mother-child relationship, which in turn served to moderate future mother-child dynamics, altering its otherwise anticipated negative trajectory. A closer examination of the cascade revealed that, at Posttest 1, mothers in Play-as-Usual group engaged in more adversarial, negative parenting (controlling for Pretest) than mothers in Child-Oriented Play group when their children were of high difficulty. The intervention appears to exert its primary influence on the cascade by weakening the link between child difficulty and maternal adversarial, negative parenting. PMID:27063895
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane
The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversarys task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significantmore » funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.« less
Shoshani, Anat; Slone, Michelle
2016-01-01
This study examined whether attitudinal and emotional responses to broadcasts of images of terrorist events differ according to ethnic group (Jewish and Arab Israelis) and outgroup affiliation during an intense wave of terrorism that occurred in Israel during 2015. Participants were 118 Jewish and 110 Arab-Israelis adults randomly allocated to a terrorism or criminal violence television broadcast. State anxiety, state anger, stereotypes, and negative attitudes toward an adversary were examined prior and subsequent to the media exposure. Findings showed significant increases in anxiety, anger, stereotypes, and negative adversary perceptions in the terrorism exposure group compared to only anxiety increases in the criminal violence exposure. In the terrorism exposure group, Jewish participants showed greater increases in negative adversary perceptions of the Palestinians than Arab Israeli participants, but both groups showed similar significant increases in levels of anxiety and anger. Exposure to broadcasts of terrorism increased willingness to negotiate with the adversary among the Arab participants, but not among the Jewish participants. In the terrorism exposure group, both Jewish and Arab Israelis with high affiliation with the Palestinian cause showed less increases in stereotypes than those with low affiliation. Findings emphasize the role of ethnicity and outgroup affiliation in responses to media exposure to terrorism images. PMID:28018258
Shoshani, Anat; Slone, Michelle
2016-01-01
This study examined whether attitudinal and emotional responses to broadcasts of images of terrorist events differ according to ethnic group (Jewish and Arab Israelis) and outgroup affiliation during an intense wave of terrorism that occurred in Israel during 2015. Participants were 118 Jewish and 110 Arab-Israelis adults randomly allocated to a terrorism or criminal violence television broadcast. State anxiety, state anger, stereotypes, and negative attitudes toward an adversary were examined prior and subsequent to the media exposure. Findings showed significant increases in anxiety, anger, stereotypes, and negative adversary perceptions in the terrorism exposure group compared to only anxiety increases in the criminal violence exposure. In the terrorism exposure group, Jewish participants showed greater increases in negative adversary perceptions of the Palestinians than Arab Israeli participants, but both groups showed similar significant increases in levels of anxiety and anger. Exposure to broadcasts of terrorism increased willingness to negotiate with the adversary among the Arab participants, but not among the Jewish participants. In the terrorism exposure group, both Jewish and Arab Israelis with high affiliation with the Palestinian cause showed less increases in stereotypes than those with low affiliation. Findings emphasize the role of ethnicity and outgroup affiliation in responses to media exposure to terrorism images.
Theory to Strategy: War Insight for the Strategic Soldier
2008-05-22
Library Typography , New York, 1993, 162. 3 Additionally, these models may provide insights as to what an adversary may do depending on the nature of...11. 7 Carl Von Clausewitz, On War (edited and translated by Michael Howard and Peter Paret), Everyman’s Library Typography , New York, 1993, 73...Paret), Everyman’s Library Typography , New York, 1993, 88. 8 common enemy. Minimizing the amount of allies an adversary has may also limit its
Optimizing Adversary Training and the Structure of the Navy Adversary Fleet
2013-09-01
ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) OPNAV N98 2000 Navy Pentagon , Room 5C469 Washington DC, 20350...an overhaul of existing computers and encryption in the range operations centers (CDR R. Van Diepen, OPNAV Simulator Requirements Officer, personal...1.0. Using a simulated annealing heuristic algorithm in conjunction with the utility assignments, CNA found, in order of priority, that the following
Bring a gun to a gunfight: armed adversaries and violence across nations.
Felson, Richard B; Berg, Mark T; Rogers, Meghan L
2014-09-01
We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms. Copyright © 2014 Elsevier Inc. All rights reserved.
Secured network sensor-based defense system
NASA Astrophysics Data System (ADS)
Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.
Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy
2016-01-01
The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. Copyright © 2015 Elsevier B.V. All rights reserved.
Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.
Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien
2016-06-01
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.
Computer network defense system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Urias, Vincent; Stout, William M. S.; Loverro, Caleb
A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less
The DTIC Review; Volume 3 Number 4. Antimissile Defense: Strategic Interceptor
1997-12-01
threat by pursuing policies and initiatives designed to both prevent and limit this aggression. Plans to improve the interception of missiles will...to this threat by pursuing policies and initiatives designed to both prevent and limit it. Plans to improve the interception of missiles will depend...the 21st Century, it must be able to deter adversaries possessing or planning to possess WMD. If not, threats of WMD use by adversaries will prevent
A System Dynamics Model of the Essential Tension Between Self-Synchronization and C2
2006-06-01
Model of the Essential Tension Between Self- Synchronization and C2 CCRTS June 20 - 22, 2006 Bob Wiebe Dan Compton Dave Garvey Report Documentation Page...DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE A System Dynamics Model of the Essential Tension Between Self- Synchronization and... synchronicity (being hit all at once), and the degree (surprise) 1 pushing the adversary into unfamiliar territory (adversary situational change) 1 Synergy of
Government - contractor interaction
NASA Technical Reports Server (NTRS)
Thomas, D. M.
1983-01-01
The development of the Administrative Contracting Officer represents an advance in the Government system of contract management because it provides an individual with knowledge, time, and a specialized function to insure performance of Government contracts. However, the development has created a dichotomy between the award and the post-award function which increases the adversary relationship with Government contractors. This paper advocates that this adversary relationship can be decreased if PCOs and ACOs are provided with opportunities to serve in the assignments of the other.
The Effect of Adversary Unmanned Aerial Systems on the US Concept of Air Superiority
2014-12-04
impact on the US concept of air superiority. Politically, psychologically , and operationally, air superiority is important. UAS are capable of attack...challenge to the US concept of air superiority. Adversary drones have the potential to be a sporadic but deadly and psychologically powerful weapon that...toll they took in lives and equipment, kamikaze attacks also had a psychological impact. Dr. Alvin D. Coox, a professor of history and Asian studies
Reinforced Adversarial Neural Computer for de Novo Molecular Design.
Putin, Evgeny; Asadulaev, Arip; Ivanenkov, Yan; Aladinskiy, Vladimir; Sanchez-Lengeling, Benjamin; Aspuru-Guzik, Alán; Zhavoronkov, Alex
2018-06-12
In silico modeling is a crucial milestone in modern drug design and development. Although computer-aided approaches in this field are well-studied, the application of deep learning methods in this research area is at the beginning. In this work, we present an original deep neural network (DNN) architecture named RANC (Reinforced Adversarial Neural Computer) for the de novo design of novel small-molecule organic structures based on the generative adversarial network (GAN) paradigm and reinforcement learning (RL). As a generator RANC uses a differentiable neural computer (DNC), a category of neural networks, with increased generation capabilities due to the addition of an explicit memory bank, which can mitigate common problems found in adversarial settings. The comparative results have shown that RANC trained on the SMILES string representation of the molecules outperforms its first DNN-based counterpart ORGANIC by several metrics relevant to drug discovery: the number of unique structures, passing medicinal chemistry filters (MCFs), Muegge criteria, and high QED scores. RANC is able to generate structures that match the distributions of the key chemical features/descriptors (e.g., MW, logP, TPSA) and lengths of the SMILES strings in the training data set. Therefore, RANC can be reasonably regarded as a promising starting point to develop novel molecules with activity against different biological targets or pathways. In addition, this approach allows scientists to save time and covers a broad chemical space populated with novel and diverse compounds.
Toward a developmentally informed approach to parenting interventions: Seeking hidden effects.
Brock, Rebecca L; Kochanska, Grazyna
2016-05-01
Drawing from developmental psychology and psychopathology, we propose a new, developmentally informed approach to parenting interventions that focuses on elucidating changes in the unfolding developmental process between the parent and child. We present data from 186 low-income mothers of toddlers, randomly assigned to a child-oriented play group or a play-as-usual group. We examined the maladaptive cascade from child difficulty to mother adversarial, negative parenting to child maladjustment, well documented in the literature. The measures incorporated multiple observations and reports. As expected, the sequence from child difficulty (pretest) to mother adversarial, negative parenting (Posttest 1, after 3-month intervention) to child maladjustment (Posttest 2, 6 months later) was present in the play-as-usual group, but absent, or defused, in the child-oriented play group. The findings are consistent with a view of intervention presumably enhancing the mother-child relationship, which in turn served to moderate future mother-child dynamics, altering its otherwise anticipated negative trajectory. A closer examination of the cascade revealed that, at Posttest 1, mothers in the play-as-usual group engaged in more adversarial, negative parenting (controlling for pretest) than did mothers in the child-oriented play group when their children were of high difficulty. The intervention appears to exert its primary influence on the cascade by weakening the link between child difficulty and maternal adversarial, negative parenting.
2005-03-01
influence on the actions of the public (Hill, 1997). Both the U.S. government and its adversaries have taken advantage of the effects the media has on...public opinion to gain political advantage (Snyder, 2003). Furthermore, media reports may contain sensitive DoD information which our adversaries...could use to their advantage (McHugh, 1997). DoD public affairs policy has been created to supply the news media with the support it needs for
2010-03-01
policy (Achen & Snidal, 1989). Huth and Russett (1984) emphasize : “if we do not know how deterrence works when it is most needed, policies assigned...application of deterrence to U.S. adversaries in these policies. Analysis of risk propensity and relative emphases on loss/gain of those actors...research, the strategic environment. Evidence of such assessment may reflect an adversary’s risk propensities and relative emphases on loss/gain; however
The art of negotiation. A delicate balance.
Rehberg, C; Sullivan, G
1997-01-01
Successful negotiation is the art of gentle persuasion, not a "winner-take-all" showdown. Accordingly, it is essential to begin the process with a positive outlook and with the goal of reaching an agreement that is acceptable to all parties involved. Although the term "opponent" is used in this article to describe the person or group with whom you are negotiating, it is not used in the adversarial context. It is important to maintain a non-adversarial relationship, to the extent possible.
Device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Hänggi, Esther
2010-12-01
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.
A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.
Hao, Zhuo; Zhong, Sheng; Yu, Nenghai
2013-01-01
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Yu, Nenghai
2013-01-01
A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725
Justice foundations for the Comprehensive Law Movement.
Dewhurst, Dale
2010-01-01
Authors examining the developing dispute resolution alternatives to the adversarial system have identified nine converging "vectors" or alternatives in what has been termed the Comprehensive Law Movement. These authors have sought to understand how the developing vectors can remain separate and vibrant movements while sharing common ground. Some analyze these developments as being within law and legal practice, others see them as alternative approaches to law, and still others take a combined approach. It will be impossible to understand how these vectors have meaningful differences from law and legal practice if the search is limited to looking within law and legal practice. It will be impossible to understand how these vectors have meaningful commonalities with law and legal practice if the search is limited to looking external to law and legal practice. Instead of comparing the vectors with the adversarial system, higher order criteria are required. What is needed is a comprehensive and internally consistent super-system of norms; one that can be used to evaluate the adversarial system and the evolving vectors on an equal footing. An Aristotelian natural law virtue theory of justice can: (a) provide a functional guiding definition of justice; (b) serve as a comprehensive and internally consistent super-system of norms; and (c) provide the theoretical and evaluative foundation required to clarify the relationships among the adversarial system and the developing vectors. Finally, it will become clear why the Comprehensive Law Movement might be more appropriately conceptualized as the Comprehensive Justice Movement. Copyright © 2010 Elsevier Ltd. All rights reserved.
Sacred bounds on rational resolution of violent political conflict
Ginges, Jeremy; Atran, Scott; Medin, Douglas; Shikaki, Khalil
2007-01-01
We report a series of experiments carried out with Palestinian and Israeli participants showing that violent opposition to compromise over issues considered sacred is (i) increased by offering material incentives to compromise but (ii) decreased when the adversary makes symbolic compromises over their own sacred values. These results demonstrate some of the unique properties of reasoning and decision-making over sacred values. We show that the use of material incentives to promote the peaceful resolution of political and cultural conflicts may backfire when adversaries treat contested issues as sacred values. PMID:17460042
Using adversary text to detect adversary phase changes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Speed, Ann Elizabeth; Doser, Adele Beatrice; Warrender, Christina E.
2009-05-01
The purpose of this work was to help develop a research roadmap and small proof ofconcept for addressing key problems and gaps from the perspective of using text analysis methods as a primary tool for detecting when a group is undergoing a phase change. Self- rganizing map (SOM) techniques were used to analyze text data obtained from the tworld-wide web. Statistical studies indicate that it may be possible to predict phase changes, as well as detect whether or not an example of writing can be attributed to a group of interest.
Probabilistic Characterization of Adversary Behavior in Cyber Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyers, C A; Powers, S S; Faissol, D M
2009-10-08
The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.
Privacy Vulnerability of Published Anonymous Mobility Traces
Ma, Chris Y. T.; Yau, David K. Y.; Yip, Nung Kwan; ...
2013-06-01
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes’ location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers,more » or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces. For instance, an adversary is able to identify the trace of 30%-50% of the victims when she has collected 10 pieces of side information about a victim.« less
Kim, Sanghag; Kochanska, Grazyna
2014-01-01
Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children’s negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers’ responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children’s negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children’s behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children’s negative, adversarial orientation to future behavior problems was present when mothers’ responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483
Kim, Sanghag; Kochanska, Grazyna
2015-02-01
Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PsycINFO Database Record (c) 2015 APA, all rights reserved.
AGATE: Adversarial Game Analysis for Tactical Evaluation
NASA Technical Reports Server (NTRS)
Huntsberger, Terrance L.
2013-01-01
AGATE generates a set of ranked strategies that enables an autonomous vehicle to track/trail another vehicle that is trying to break the contact using evasive tactics. The software is efficient (can be run on a laptop), scales well with environmental complexity, and is suitable for use onboard an autonomous vehicle. The software will run in near-real-time (2 Hz) on most commercial laptops. Existing software is usually run offline in a planning mode, and is not used to control an unmanned vehicle actively. JPL has developed a system for AGATE that uses adversarial game theory (AGT) methods (in particular, leader-follower and pursuit-evasion) to enable an autonomous vehicle (AV) to maintain tracking/ trailing operations on a target that is employing evasive tactics. The AV trailing, tracking, and reacquisition operations are characterized by imperfect information, and are an example of a non-zero sum game (a positive payoff for the AV is not necessarily an equal loss for the target being tracked and, potentially, additional adversarial boats). Previously, JPL successfully applied the Nash equilibrium method for onboard control of an autonomous ground vehicle (AGV) travelling over hazardous terrain.
Nasie, Meytal; Bar-Tal, Daniel; Pliskin, Ruthie; Nahhas, Eman; Halperin, Eran
2014-11-01
One significant socio-psychological barrier for peaceful resolution of conflicts is each party's adherence to its own collective narrative. We hypothesized that raising awareness to the psychological bias of naïve realism and its identification in oneself would provide a path to overcoming this barrier, thus increasing openness to the adversary's narrative. We conducted three experimental studies in the context of the Israeli-Palestinian conflict. Studies 1 and 2, conducted among Jewish Israelis and Palestinian Israelis, respectively, revealed that participants with hawkish political ideology reported greater openness to the adversary's narrative when they were made aware of naïve realism bias. Study 3 revealed that hawkish participants at the baseline adhered to the ingroup narrative and resisted the adversary's narrative more than dovish participants. They were also more able to identify the bias in themselves upon learning about it. This identification may explain why the manipulation led to bias correction only among hawkish participants. © 2014 by the Society for Personality and Social Psychology, Inc.
NASA Astrophysics Data System (ADS)
Nelson, Kevin; Corbin, George; Blowers, Misty
2014-05-01
Machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algorithm development, data processing, and optimization. Lately, a subset of research has emerged which explores issues related to security. This research is gaining traction as systems employing these methods are being applied to both secure and adversarial environments. One of machine learning's biggest benefits, its data-driven versus logic-driven approach, is also a weakness if the data on which the models rely are corrupted. Adversaries could maliciously influence systems which address drift and data distribution changes using re-training and online learning. Our work is focused on exploring the resilience of various machine learning algorithms to these data-driven attacks. In this paper, we present our initial findings using Monte Carlo simulations, and statistical analysis, to explore the maximal achievable shift to a classification model, as well as the required amount of control over the data.
A spatial model for conflict incorporating within- and between-actor effects
NASA Astrophysics Data System (ADS)
Knipl, Diána; Davies, Toby; Baudains, Peter
2017-10-01
The application of ecological models to human conflict scenarios has given rise to a number of models which describe antagonistic relationships between adversaries. Recent work demonstrates that the spatial disaggregation of such models is not only well-motivated but also gives rise to interesting dynamic behaviour, particularly with respect to the spatial distribution of resources. One feature which is largely absent from previous models, however, is the ability of an adversary to coordinate activity across its various locations. Most immediately, this corresponds to the notion of 'support' - the reallocation of resources from one site to another according to need - which plays an important role in real-world conflict. In this paper, we generalise a spatially-disaggregated form of the classic Richardson model of conflict escalation by adding a cross-location interaction term for the within-adversary dynamics at each location. We explore the model analytically, giving conditions for the stability of the balanced equilibrium state. We then also carry out a number of numerical simulations which correspond to stylised real-world conflict scenarios. Potential further applications of the model, and its implications for policy, are then discussed.
The macroeconomics of Dr. Strangelove
DOE Office of Scientific and Technical Information (OSTI.GOV)
John, A.A.; Pecchenino, R.A.; Schreft, S.L.
1993-03-01
This paper examines the weapons-accumulation decisions of two adversarial countries in the context of a deterrence/conflict initiation game embedded in an overlapping-generations model. The demographic structure permits analysis of both within- and between-country intergenerational externalities caused by past weapons-accumulation decisions, as well as of intragenerational externalities from the adversary's current weapons accumulation. Zero accumulation is a possible equilibrium with both noncooperative and cooperative behavior. Countries may also accumulate weapons to the point where conflict initiation never occurs. Pareto-improving policies are generally available, but international cooperation need not be Pareto-improving. 15 refs., 12 figs.
Vehicle barrier with access delay
Swahlan, David J; Wilke, Jason
2013-09-03
An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.
Data Retention and Anonymity Services
NASA Astrophysics Data System (ADS)
Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.
Adversarial Threshold Neural Computer for Molecular de Novo Design.
Putin, Evgeny; Asadulaev, Arip; Vanhaelen, Quentin; Ivanenkov, Yan; Aladinskaya, Anastasia V; Aliper, Alex; Zhavoronkov, Alex
2018-03-30
In this article, we propose the deep neural network Adversarial Threshold Neural Computer (ATNC). The ATNC model is intended for the de novo design of novel small-molecule organic structures. The model is based on generative adversarial network architecture and reinforcement learning. ATNC uses a Differentiable Neural Computer as a generator and has a new specific block, called adversarial threshold (AT). AT acts as a filter between the agent (generator) and the environment (discriminator + objective reward functions). Furthermore, to generate more diverse molecules we introduce a new objective reward function named Internal Diversity Clustering (IDC). In this work, ATNC is tested and compared with the ORGANIC model. Both models were trained on the SMILES string representation of the molecules, using four objective functions (internal similarity, Muegge druglikeness filter, presence or absence of sp 3 -rich fragments, and IDC). The SMILES representations of 15K druglike molecules from the ChemDiv collection were used as a training data set. For the different functions, ATNC outperforms ORGANIC. Combined with the IDC, ATNC generates 72% of valid and 77% of unique SMILES strings, while ORGANIC generates only 7% of valid and 86% of unique SMILES strings. For each set of molecules generated by ATNC and ORGANIC, we analyzed distributions of four molecular descriptors (number of atoms, molecular weight, logP, and tpsa) and calculated five chemical statistical features (internal diversity, number of unique heterocycles, number of clusters, number of singletons, and number of compounds that have not been passed through medicinal chemistry filters). Analysis of key molecular descriptors and chemical statistical features demonstrated that the molecules generated by ATNC elicited better druglikeness properties. We also performed in vitro validation of the molecules generated by ATNC; results indicated that ATNC is an effective method for producing hit compounds.
SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation.
Xue, Yuan; Xu, Tao; Zhang, Han; Long, L Rodney; Huang, Xiaolei
2018-05-03
Inspired by classic Generative Adversarial Networks (GANs), we propose a novel end-to-end adversarial neural network, called SegAN, for the task of medical image segmentation. Since image segmentation requires dense, pixel-level labeling, the single scalar real/fake output of a classic GAN's discriminator may be ineffective in producing stable and sufficient gradient feedback to the networks. Instead, we use a fully convolutional neural network as the segmentor to generate segmentation label maps, and propose a novel adversarial critic network with a multi-scale L 1 loss function to force the critic and segmentor to learn both global and local features that capture long- and short-range spatial relationships between pixels. In our SegAN framework, the segmentor and critic networks are trained in an alternating fashion in a min-max game: The critic is trained by maximizing a multi-scale loss function, while the segmentor is trained with only gradients passed along by the critic, with the aim to minimize the multi-scale loss function. We show that such a SegAN framework is more effective and stable for the segmentation task, and it leads to better performance than the state-of-the-art U-net segmentation method. We tested our SegAN method using datasets from the MICCAI BRATS brain tumor segmentation challenge. Extensive experimental results demonstrate the effectiveness of the proposed SegAN with multi-scale loss: on BRATS 2013 SegAN gives performance comparable to the state-of-the-art for whole tumor and tumor core segmentation while achieves better precision and sensitivity for Gd-enhance tumor core segmentation; on BRATS 2015 SegAN achieves better performance than the state-of-the-art in both dice score and precision.
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
Generative Adversarial Networks: An Overview
NASA Astrophysics Data System (ADS)
Creswell, Antonia; White, Tom; Dumoulin, Vincent; Arulkumaran, Kai; Sengupta, Biswa; Bharath, Anil A.
2018-01-01
Generative adversarial networks (GANs) provide a way to learn deep representations without extensively annotated training data. They achieve this through deriving backpropagation signals through a competitive process involving a pair of networks. The representations that can be learned by GANs may be used in a variety of applications, including image synthesis, semantic image editing, style transfer, image super-resolution and classification. The aim of this review paper is to provide an overview of GANs for the signal processing community, drawing on familiar analogies and concepts where possible. In addition to identifying different methods for training and constructing GANs, we also point to remaining challenges in their theory and application.
Efficient spatial privacy preserving scheme for sensor network
NASA Astrophysics Data System (ADS)
Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar
2013-03-01
The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.
2018-01-01
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one. PMID:29695066
Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon
2018-04-24
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.
Quantifying Differential Privacy under Temporal Correlations.
Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li
2017-04-01
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.
Translation-aware semantic segmentation via conditional least-square generative adversarial networks
NASA Astrophysics Data System (ADS)
Zhang, Mi; Hu, Xiangyun; Zhao, Like; Pang, Shiyan; Gong, Jinqi; Luo, Min
2017-10-01
Semantic segmentation has recently made rapid progress in the field of remote sensing and computer vision. However, many leading approaches cannot simultaneously translate label maps to possible source images with a limited number of training images. The core issue is insufficient adversarial information to interpret the inverse process and proper objective loss function to overcome the vanishing gradient problem. We propose the use of conditional least squares generative adversarial networks (CLS-GAN) to delineate visual objects and solve these problems. We trained the CLS-GAN network for semantic segmentation to discriminate dense prediction information either from training images or generative networks. We show that the optimal objective function of CLS-GAN is a special class of f-divergence and yields a generator that lies on the decision boundary of discriminator that reduces possible vanished gradient. We also demonstrate the effectiveness of the proposed architecture at translating images from label maps in the learning process. Experiments on a limited number of high resolution images, including close-range and remote sensing datasets, indicate that the proposed method leads to the improved semantic segmentation accuracy and can simultaneously generate high quality images from label maps.
Modeling Opponents in Adversarial Risk Analysis.
Rios Insua, David; Banks, David; Rios, Jesus
2016-04-01
Adversarial risk analysis has been introduced as a framework to deal with risks derived from intentional actions of adversaries. The analysis supports one of the decisionmakers, who must forecast the actions of the other agents. Typically, this forecast must take account of random consequences resulting from the set of selected actions. The solution requires one to model the behavior of the opponents, which entails strategic thinking. The supported agent may face different kinds of opponents, who may use different rationality paradigms, for example, the opponent may behave randomly, or seek a Nash equilibrium, or perform level-k thinking, or use mirroring, or employ prospect theory, among many other possibilities. We describe the appropriate analysis for these situations, and also show how to model the uncertainty about the rationality paradigm used by the opponent through a Bayesian model averaging approach, enabling a fully decision-theoretic solution. We also show how as we observe an opponent's decision behavior, this approach allows learning about the validity of each of the rationality models used to predict his decision by computing the models' (posterior) probabilities, which can be understood as a measure of their validity. We focus on simultaneous decision making by two agents. © 2015 Society for Risk Analysis.
Generative adversarial network based telecom fraud detection at the receiving bank.
Zheng, Yu-Jun; Zhou, Xiao-Han; Sheng, Wei-Guo; Xue, Yu; Chen, Sheng-Yong
2018-06-01
Recently telecom fraud has become a serious problem especially in developing countries such as China. At present, it can be very difficult to coordinate different agencies to prevent fraud completely. In this paper we study how to detect large transfers that are sent from victims deceived by fraudsters at the receiving bank. We propose a new generative adversarial network (GAN) based model to calculate for each large transfer a probability that it is fraudulent, such that the bank can take appropriate measures to prevent potential fraudsters to take the money if the probability exceeds a threshold. The inference model uses a deep denoising autoencoder to effectively learn the complex probabilistic relationship among the input features, and employs adversarial training that establishes a minimax game between a discriminator and a generator to accurately discriminate between positive samples and negative samples in the data distribution. We show that the model outperforms a set of well-known classification methods in experiments, and its applications in two commercial banks have reduced losses of about 10 million RMB in twelve weeks and significantly improved their business reputation. Copyright © 2018 Elsevier Ltd. All rights reserved.
Kadurin, Artur; Aliper, Alexander; Kazennov, Andrey; Mamoshina, Polina; Vanhaelen, Quentin; Khrabrov, Kuzma; Zhavoronkov, Alex
2017-01-01
Recent advances in deep learning and specifically in generative adversarial networks have demonstrated surprising results in generating new images and videos upon request even using natural language as input. In this paper we present the first application of generative adversarial autoencoders (AAE) for generating novel molecular fingerprints with a defined set of parameters. We developed a 7-layer AAE architecture with the latent middle layer serving as a discriminator. As an input and output the AAE uses a vector of binary fingerprints and concentration of the molecule. In the latent layer we also introduced a neuron responsible for growth inhibition percentage, which when negative indicates the reduction in the number of tumor cells after the treatment. To train the AAE we used the NCI-60 cell line assay data for 6252 compounds profiled on MCF-7 cell line. The output of the AAE was used to screen 72 million compounds in PubChem and select candidate molecules with potential anti-cancer properties. This approach is a proof of concept of an artificially-intelligent drug discovery engine, where AAEs are used to generate new molecular fingerprints with the desired molecular properties. PMID:28029644
Context Sensing System Analysis for Privacy Preservation Based on Game Theory.
Wang, Shengling; Li, Luyun; Sun, Weiman; Guo, Junqi; Bie, Rongfang; Lin, Kai
2017-02-10
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user's contexts, based on which it provides personalized services. However, the application may sell the user's contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.
Personal and organizational predictors of workplace sexual harassment of women by men.
Dekker, I; Barling, J
1998-01-01
The authors investigated the predictors of workplace sexual harassment in 278 male university faculty and staff (M age = 45 years). Workplace variables (perceptions of organizational sanctions against harassment and perceptions of a sexualized workplace) and personal variables (adversarial sexual beliefs, sexual harassment beliefs, perspective taking, and self-esteem) were studied as predictors of sexualized and gender harassment. Social desirability was controlled. Both organizational variables and beliefs about sexual harassment predicted gender harassment and sexualized harassment. Perspective taking, adversarial sexual beliefs, and sexual harassment beliefs moderated the effects of perceived organizational sanctions against harassment on sexualized harassment. Findings are discussed as they relate to organizational efforts to reduce or prevent sexual harassment.
The effects of gender and music video imagery on sexual attitudes.
Kalof, L
1999-06-01
This study examined the influence of gender and exposure to gender-stereo-typed music video imagery on sexual attitudes (adversarial sexual beliefs, acceptance of rape myths, acceptance of interpersonal violence, and gender role stereotyping). A group of 44 U.S. college students were randomly assigned to 1 of 2 groups that viewed either a video portraying stereotyped sexual imagery or a video that excluded all sexual images. Exposure to traditional sexual imagery had a significant main effect on attitudes about adversarial sexual relationships, and gender had main effects on 3 of 4 sexual attitudes. There was some evidence of an interaction between gender and exposure to traditional sexual imagery on the acceptance of interpersonal violence.
Fine-Tuning Neural Patient Question Retrieval Model with Generative Adversarial Networks.
Tang, Guoyu; Ni, Yuan; Wang, Keqiang; Yong, Qin
2018-01-01
The online patient question and answering (Q&A) system attracts an increasing amount of users in China. Patient will post their questions and wait for doctors' response. To avoid the lag time involved with the waiting and to reduce the workload on the doctors, a better method is to automatically retrieve the semantically equivalent question from the archive. We present a Generative Adversarial Networks (GAN) based approach to automatically retrieve patient question. We apply supervised deep learning based approaches to determine the similarity between patient questions. Then a GAN framework is used to fine-tune the pre-trained deep learning models. The experiment results show that fine-tuning by GAN can improve the performance.
About the bears and the bees: Adaptive responses to asymmetric warfare
NASA Astrophysics Data System (ADS)
Ryan, Alex
Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a 'game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.
About the bears and the bees: Adaptive responses to asymmetric warfare
NASA Astrophysics Data System (ADS)
Ryan, Alex
Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a `game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.
Quantifying Differential Privacy under Temporal Correlations
Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li
2017-01-01
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711
Device independence for two-party cryptography and position verification with memoryless devices
NASA Astrophysics Data System (ADS)
Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie
2018-06-01
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
ICADx: interpretable computer aided diagnosis of breast masses
NASA Astrophysics Data System (ADS)
Kim, Seong Tae; Lee, Hakmin; Kim, Hak Gu; Ro, Yong Man
2018-02-01
In this study, a novel computer aided diagnosis (CADx) framework is devised to investigate interpretability for classifying breast masses. Recently, a deep learning technology has been successfully applied to medical image analysis including CADx. Existing deep learning based CADx approaches, however, have a limitation in explaining the diagnostic decision. In real clinical practice, clinical decisions could be made with reasonable explanation. So current deep learning approaches in CADx are limited in real world deployment. In this paper, we investigate interpretability in CADx with the proposed interpretable CADx (ICADx) framework. The proposed framework is devised with a generative adversarial network, which consists of interpretable diagnosis network and synthetic lesion generative network to learn the relationship between malignancy and a standardized description (BI-RADS). The lesion generative network and the interpretable diagnosis network compete in an adversarial learning so that the two networks are improved. The effectiveness of the proposed method was validated on public mammogram database. Experimental results showed that the proposed ICADx framework could provide the interpretability of mass as well as mass classification. It was mainly attributed to the fact that the proposed method was effectively trained to find the relationship between malignancy and interpretations via the adversarial learning. These results imply that the proposed ICADx framework could be a promising approach to develop the CADx system.
Security of practical private randomness generation
NASA Astrophysics Data System (ADS)
Pironio, Stefano; Massar, Serge
2013-01-01
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness in a device-independent way, i.e., without making detailed assumptions about the internal working of the quantum devices used to generate the random numbers. Furthermore these numbers are also private; i.e., they appear random not only to the user but also to any adversary that might possess a perfect description of the devices. Since this process requires a small initial random seed to sample the behavior of the quantum devices and to extract uniform randomness from the raw outputs of the devices, one usually speaks of device-independent randomness expansion. The purpose of this paper is twofold. First, we point out that in most real, practical situations, where the concept of device independence is used as a protection against unintentional flaws or failures of the quantum apparatuses, it is sufficient to show that the generated string is random with respect to an adversary that holds only classical side information; i.e., proving randomness against quantum side information is not necessary. Furthermore, the initial random seed does not need to be private with respect to the adversary, provided that it is generated in a way that is independent from the measured systems. The devices, however, will generate cryptographically secure randomness that cannot be predicted by the adversary, and thus one can, given access to free public randomness, talk about private randomness generation. The theoretical tools to quantify the generated randomness according to these criteria were already introduced in S. Pironio [Nature (London)NATUAS0028-083610.1038/nature09008 464, 1021 (2010)], but the final results were improperly formulated. The second aim of this paper is to correct this inaccurate formulation and therefore lay out a precise theoretical framework for practical device-independent randomness generation.
Settlement Documents: Anadarko Fraudulent Conveyance Litigation
Settlement agreement to resolve adversary proceedings related to the fraudulent conveyance litigation with Kerr-McGee and Anadarko Petroleum Corporation associated with the Tronox bankruptcy proceedings
Energy Theft in the Advanced Metering Infrastructure
NASA Astrophysics Data System (ADS)
McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
Game theoretic analysis of physical protection system design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canion, B.; Schneider, E.; Bickel, E.
The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less
Modern Air&Space Power and political goals at war
NASA Astrophysics Data System (ADS)
Özer, Güngör.
2014-05-01
Modern AirandSpace Power is increasingly becoming a political tool. In this article, AirandSpacePower as a political tool will be discussed. The primary purpose of this article is to search how AirandSpacePower can provide contributions to security and also determine if it may reach the political goals on its own at war by SWOT Analysis Method and analysing the role of AirandSpace Power in Operation Unified Protector (Libya) as a case study. In conclusion, AirandSpacePower may not be sufficient to win the political goals on its own. However it may reach the political aims partially against the adversary on its own depending upon the situations. Moreover it can alone persuade the adversary to alter its behavior(s) in war.
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy; Shabarekh, Charlotte; Furjanic, Caitlin
2011-06-01
In this paper, we present results of adversarial activity recognition using data collected in the Empire Challenge (EC 09) exercise. The EC09 experiment provided an opportunity to evaluate our probabilistic spatiotemporal mission recognition algorithms using the data from live air-born and ground sensors. Using ambiguous and noisy data about locations of entities and motion events on the ground, the algorithms inferred the types and locations of OPFOR activities, including reconnaissance, cache runs, IED emplacements, logistics, and planning meetings. In this paper, we present detailed summary of the validation study and recognition accuracy results. Our algorithms were able to detect locations and types of over 75% of hostile activities in EC09 while producing 25% false alarms.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shue, Craig A; Gupta, Prof. Minaxi
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active ormore » passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.« less
Collaborative Divorce: An Effort to Reduce the Damage of Divorce.
Alba-Fisch, Maria
2016-05-01
Divorce has been trapped in the adversarial system of the courts, a system ill suited to the needs of a family attempting to reorganize itself and still safeguard the well-being of its members. Collaborative divorce (CD) is a relatively new approach comprising an interdisciplinary professional team trained to help the divorcing family arrive at a financial, legal, and emotional settlement. The CD approach is designed to assist both members of the couple and their children transition into a more constructive future wherein they can still be a family. The structure and adversarial approach of the courts have been replaced by collaborative structures and principles developed to encourage honesty and cooperation. The case presented illustrates how this actually works. © 2016 Wiley Periodicals, Inc.
Besser, Avi; Neria, Yuval
2009-08-01
Few studies have examined the consequences of exposure to ongoing missile attacks in civilian populations. The authors examine the relationships between such exposure, and posttraumatic stress disorder (PTSD), satisfaction with life, and prejudicial attitudes toward the adversary. By using a stratified probability sampling, 160 adults, exposed to repeated missile attacks in southern Israel, were compared to 181 adults from areas outside the range of these attacks. Exposed participants reported more PTSD symptoms and less satisfaction with life, as compared to unexposed participants. The associations between PTSD and satisfaction with life and between PTSD and prejudicial attitudes were significantly stronger among the exposed participants, as compared to those who were not exposed to the attacks. Theoretical and clinical implications of the findings are discussed.
Influence versus intent for predictive analytics in situation awareness
NASA Astrophysics Data System (ADS)
Cui, Biru; Yang, Shanchieh J.; Kadar, Ivan
2013-05-01
Predictive analytics in situation awareness requires an element to comprehend and anticipate potential adversary activities that might occur in the future. Most work in high level fusion or predictive analytics utilizes machine learning, pattern mining, Bayesian inference, and decision tree techniques to predict future actions or states. The emergence of social computing in broader contexts has drawn interests in bringing the hypotheses and techniques from social theory to algorithmic and computational settings for predictive analytics. This paper aims at answering the question on how influence and attitude (some interpreted such as intent) of adversarial actors can be formulated and computed algorithmically, as a higher level fusion process to provide predictions of future actions. The challenges in this interdisciplinary endeavor include drawing existing understanding of influence and attitude in both social science and computing fields, as well as the mathematical and computational formulation for the specific context of situation to be analyzed. The study of `influence' has resurfaced in recent years due to the emergence of social networks in the virtualized cyber world. Theoretical analysis and techniques developed in this area are discussed in this paper in the context of predictive analysis. Meanwhile, the notion of intent, or `attitude' using social theory terminologies, is a relatively uncharted area in the computing field. Note that a key objective of predictive analytics is to identify impending/planned attacks so their `impact' and `threat' can be prevented. In this spirit, indirect and direct observables are drawn and derived to infer the influence network and attitude to predict future threats. This work proposes an integrated framework that jointly assesses adversarial actors' influence network and their attitudes as a function of past actions and action outcomes. A preliminary set of algorithms are developed and tested using the Global Terrorism Database (GTD). Our results reveals the benefits to perform joint predictive analytics with both attitude and influence. At the same time, we discover significant challenges in deriving influence and attitude from indirect observables for diverse adversarial behavior. These observations warrant further investigation of optimal use of influence and attitude for predictive analytics, as well as the potential inclusion of other environmental or capability elements for the actors.
Asymptotically Optimal and Private Statistical Estimation
NASA Astrophysics Data System (ADS)
Smith, Adam
Differential privacy is a definition of "privacy" for statistical databases. The definition is simple, yet it implies strong semantics even in the presence of an adversary with arbitrary auxiliary information about the database.
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
Ensuring Adversarial Process in the FISA Court Act
Rep. Schiff, Adam B. [D-CA-28
2013-09-20
House - 01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
U.S. Regional Deterrence Strategies
1995-01-01
MOTIVATIONS OF REGIONAL ADVERSARIES ............................. 27 Regime Types ................................. 27 Domestic Political Instability...32 Historical Cases Illustrating the influence of Domestic Politics .................................. 36 China, 1950... Political Constraints ............................. 86 Military Constraints ............. II................89 Deterrence in U.S. Regional Strategy
Random patterns and biometrics for counterfeit deterrence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tolk, K.M.
1993-12-31
Sandia National Laboratories (SNL) has been working on non-counterfeitable seals, tags, and documents for over fifteen years. During that time, several technologies have been developed that can be applied to deter counterfeiting of identification documents such as ID cards, passports, and possibly credit cards. Two technologies are presented in some detail. The first is reflective particle tagging technology that was developed to help verify treaties limiting the numbers of nuclear weapons that participating parties may possess. This approach uses the random locations and orientations of reflective particles applied to the surface of an item to uniquely identify the item. Themore » resulting tags are secure against even the most determined adversaries. The second technology uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals.« less
High-Speed Device-Independent Quantum Random Number Generation without a Detection Loophole
NASA Astrophysics Data System (ADS)
Liu, Yang; Yuan, Xiao; Li, Ming-Han; Zhang, Weijun; Zhao, Qi; Zhong, Jiaqiang; Cao, Yuan; Li, Yu-Huai; Chen, Luo-Kan; Li, Hao; Peng, Tianyi; Chen, Yu-Ao; Peng, Cheng-Zhi; Shi, Sheng-Cai; Wang, Zhen; You, Lixing; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei
2018-01-01
Quantum mechanics provides the means of generating genuine randomness that is impossible with deterministic classical processes. Remarkably, the unpredictability of randomness can be certified in a manner that is independent of implementation devices. Here, we present an experimental study of device-independent quantum random number generation based on a detection-loophole-free Bell test with entangled photons. In the randomness analysis, without the independent identical distribution assumption, we consider the worst case scenario that the adversary launches the most powerful attacks against the quantum adversary. After considering statistical fluctuations and applying an 80 Gb ×45.6 Mb Toeplitz matrix hashing, we achieve a final random bit rate of 114 bits /s , with a failure probability less than 10-5. This marks a critical step towards realistic applications in cryptography and fundamental physics tests.
Saliency detection by conditional generative adversarial network
NASA Astrophysics Data System (ADS)
Cai, Xiaoxu; Yu, Hui
2018-04-01
Detecting salient objects in images has been a fundamental problem in computer vision. In recent years, deep learning has shown its impressive performance in dealing with many kinds of vision tasks. In this paper, we propose a new method to detect salient objects by using Conditional Generative Adversarial Network (GAN). This type of network not only learns the mapping from RGB images to salient regions, but also learns a loss function for training the mapping. To the best of our knowledge, this is the first time that Conditional GAN has been used in salient object detection. We evaluate our saliency detection method on 2 large publicly available datasets with pixel accurate annotations. The experimental results have shown the significant and consistent improvements over the state-of-the-art method on a challenging dataset, and the testing speed is much faster.
System for training and evaluation of security personnel in use of firearms
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, H.F.
This patent describes an interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has drawn anmore » infrared laser handgun from his holster, fired his laser handgun, taken cover, advanced or retreated from the adversary on the screen, and when the adversary has fired his gun at the trainee.« less
System for training and evaluation of security personnel in use of firearms
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, H.F.
An interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has drawn an infrared laser handgunmore » from high holster, fired his laser handgun, taken cover, advanced or retreated from the adversary on the screen, and when the adversary has fired his gun at the trainee. 8 figs.« less
Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.
Biddle, Justin
2013-12-01
There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others.
Cryptography in the Bounded-Quantum-Storage Model
NASA Astrophysics Data System (ADS)
Schaffner, Christian
2007-09-01
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.
System for training and evaluation of security personnel in use of firearms
Hall, Howard F.
1990-01-01
An interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has (1) drawn an infrared laser handgun from his holster, (2) fired his laser handgun, (3) taken cover, (4) advanced or retreated from the adversary on the screen, and (5) when the adversary has fired his gun at the trainee.
Measurement device-independent quantum dialogue
NASA Astrophysics Data System (ADS)
Maitra, Arpita
2017-12-01
Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).
Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang
2018-03-27
Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.
Adversarial allegiance: The devil is in the evidence details, not just on the witness stand.
McAuliff, Bradley D; Arter, Jeana L
2016-10-01
This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5-year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on prodefense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Prosecution-retained experts shifted their focus from prodefense aspects of the case in the high suggestibility interview to proprosecution aspects in the low suggestibility interview; defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and police interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts because of negativity bias and positive testing strategies associated with confirmation bias. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Adversarial Allegiance: The Devil is in the Evidence Details, Not Just on the Witness Stand
McAuliff, Bradley D.; Arter, Jeana L.
2016-01-01
This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5 year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on pro-defense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Unlike prosecution-retained experts who shifted their focus from pro-defense aspects of the case in the high suggestibility interview to pro-prosecution aspects in the low suggestibility interview, defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts due to negativity bias and positive testing strategies associated with confirmation bias. PMID:27243362
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
New threats to health data privacy.
Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y
2011-11-24
Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
New threats to health data privacy
2011-01-01
Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection. PMID:22168526
Reconstruction of three-dimensional porous media using generative adversarial neural networks
NASA Astrophysics Data System (ADS)
Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.
2017-10-01
To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.
Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang
2018-01-01
Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679
Coping with Opposition Groups.
ERIC Educational Resources Information Center
Lesly, Philip
1992-01-01
Discusses how organizations can cope with opposition and thwart unsound pressures for change. Advocates knowing the situation and the climate, knowing the people involved, knowing the adversaries, knowing what to do, and knowing how to do it. (SR)
Streaming PCA with many missing entries.
DOT National Transportation Integrated Search
2015-12-01
This paper considers the problem of matrix completion when some number of the columns are : completely and arbitrarily corrupted, potentially by a malicious adversary. It is well-known that standard : algorithms for matrix completion can return arbit...
Cybersecurity Roadmap for the United States
2010-04-01
economic, political, and military world. This unprecedented capability to connect a globalized world carries significant risk and opportunity for cyber ... criminals , spies, and state or non-state adversaries to exploit cybersecurity weaknesses for their own gain.
78 FR 62590 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
.... Japan is one of the major political and economic powers in East Asia and the Western Pacific and a key... material will be classified Secret. 6. If a technologically advanced adversary were to obtain knowledge of...
16 CFR 1052.3 - Conduct of oral presentation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the Commission of relevant data, views and arguments. (b) The oral presentation, which shall be taped or transcribed, shall be an informal, non-adversarial legislative-type proceeding at which there will... presentation of data, views or arguments. ...
GEOSTATISTICAL SAMPLING DESIGNS FOR HAZARDOUS WASTE SITES
This chapter discusses field sampling design for environmental sites and hazardous waste sites with respect to random variable sampling theory, Gy's sampling theory, and geostatistical (kriging) sampling theory. The literature often presents these sampling methods as an adversari...
Sensor Compromise Detection in Multiple-Target Tracking Systems
Doucette, Emily A.; Curtis, Jess W.
2018-01-01
Tracking multiple targets using a single estimator is a problem that is commonly approached within a trusted framework. There are many weaknesses that an adversary can exploit if it gains control over the sensors. Because the number of targets that the estimator has to track is not known with anticipation, an adversary could cause a loss of information or a degradation in the tracking precision. Other concerns include the introduction of false targets, which would result in a waste of computational and material resources, depending on the application. In this work, we study the problem of detecting compromised or faulty sensors in a multiple-target tracker, starting with the single-sensor case and then considering the multiple-sensor scenario. We propose an algorithm to detect a variety of attacks in the multiple-sensor case, via the application of finite set statistics (FISST), one-class classifiers and hypothesis testing using nonparametric techniques. PMID:29466314
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
On localization attacks against cloud infrastructure
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali
2013-05-01
One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
High-Speed Device-Independent Quantum Random Number Generation without a Detection Loophole.
Liu, Yang; Yuan, Xiao; Li, Ming-Han; Zhang, Weijun; Zhao, Qi; Zhong, Jiaqiang; Cao, Yuan; Li, Yu-Huai; Chen, Luo-Kan; Li, Hao; Peng, Tianyi; Chen, Yu-Ao; Peng, Cheng-Zhi; Shi, Sheng-Cai; Wang, Zhen; You, Lixing; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei
2018-01-05
Quantum mechanics provides the means of generating genuine randomness that is impossible with deterministic classical processes. Remarkably, the unpredictability of randomness can be certified in a manner that is independent of implementation devices. Here, we present an experimental study of device-independent quantum random number generation based on a detection-loophole-free Bell test with entangled photons. In the randomness analysis, without the independent identical distribution assumption, we consider the worst case scenario that the adversary launches the most powerful attacks against the quantum adversary. After considering statistical fluctuations and applying an 80 Gb×45.6 Mb Toeplitz matrix hashing, we achieve a final random bit rate of 114 bits/s, with a failure probability less than 10^{-5}. This marks a critical step towards realistic applications in cryptography and fundamental physics tests.
Quantum-secure covert communication on bosonic channels.
Bash, Boulat A; Gheorghe, Andrei H; Patel, Monika; Habif, Jonathan L; Goeckel, Dennis; Towsley, Don; Guha, Saikat
2015-10-19
Computational encryption, information-theoretic secrecy and quantum cryptography offer progressively stronger security against unauthorized decoding of messages contained in communication transmissions. However, these approaches do not ensure stealth--that the mere presence of message-bearing transmissions be undetectable. We characterize the ultimate limit of how much data can be reliably and covertly communicated over the lossy thermal-noise bosonic channel (which models various practical communication channels). We show that whenever there is some channel noise that cannot in principle be controlled by an otherwise arbitrarily powerful adversary--for example, thermal noise from blackbody radiation--the number of reliably transmissible covert bits is at most proportional to the square root of the number of orthogonal modes (the time-bandwidth product) available in the transmission interval. We demonstrate this in a proof-of-principle experiment. Our result paves the way to realizing communications that are kept covert from an all-powerful quantum adversary.
Secret-key expansion from covert communication
NASA Astrophysics Data System (ADS)
Arrazola, Juan Miguel; Amiri, Ryan
2018-02-01
Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less
'Meatball searching' - The adversarial approach to online information retrieval
NASA Technical Reports Server (NTRS)
Jack, R. F.
1985-01-01
It is proposed that the different styles of online searching can be described as either formal (highly precise) or informal with the needs of the client dictating which is most applicable at a particular moment. The background and personality of the searcher also come into play. Particular attention is focused on meatball searching which is a form of online searching characterized by deliberate vagueness. It requires generally comprehensive searches, often on unusual topics and with tight deadlines. It is most likely to occur in search centers serving many different disciplines and levels of client information sophistication. Various information needs are outlined as well as the laws of meatball searching and the adversarial approach. Traits and characteristics important to sucessful searching include: (1) concept analysis, (2) flexibility of thinking, (3) ability to think in synonyms and (4) anticipation of variant word forms and spellings.
Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong
Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.
Realistic noise-tolerant randomness amplification using finite number of devices.
Brandão, Fernando G S L; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-04-21
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.
Realistic noise-tolerant randomness amplification using finite number of devices
NASA Astrophysics Data System (ADS)
Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-04-01
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology.
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purvine, Emilie AH; Johnson, John R.; Lo, Chaomei
Most cyber network attacks begin with an adversary gain- ing a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signa- ture of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typ- ically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reach- ability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolvemore » over time. We use this reacha- bility graph to develop dynamic machine-level and network- level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.« less
Curiac, Daniel-Ioan; Volosencu, Constantin
2015-10-08
Providing unpredictable trajectories for patrol robots is essential when coping with adversaries. In order to solve this problem we developed an effective approach based on the known protean behavior of individual prey animals-random zig-zag movement. The proposed bio-inspired method modifies the normal robot's path by incorporating sudden and irregular direction changes without jeopardizing the robot's mission. Such a tactic is aimed to confuse the enemy (e.g. a sniper), offering less time to acquire and retain sight alignment and sight picture. This idea is implemented by simulating a series of fictive-temporary obstacles that will randomly appear in the robot's field of view, deceiving the obstacle avoiding mechanism to react. The new general methodology is particularized by using the Arnold's cat map to obtain the timely random appearance and disappearance of the fictive obstacles. The viability of the proposed method is confirmed through an extensive simulation case study.
Loss-tolerant quantum secure positioning with weak laser sources
NASA Astrophysics Data System (ADS)
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing
2016-09-01
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.
Finkel, Eli J; Norton, Michael I; Reis, Harry T; Ariely, Dan; Caprariello, Peter A; Eastwick, Paul W; Frost, Jeana H; Maniaci, Michael R
2015-01-01
This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our conceptualizations of the familiarity-attraction link, as well as the limitations of prior research, were masking a set of higher order principles capable of integrating these diverse conceptualizations. This realization led us to adopt a broader perspective, which focuses on three distinct relationship stages-awareness, surface contact, and mutuality-and suggests that the influence of familiarity on attraction depends on both the nature and the stage of the relationship between perceivers and targets. This article introduces the framework that emerged from our discussions and suggests directions for research to investigate its validity. © The Author(s) 2014.
Realistic noise-tolerant randomness amplification using finite number of devices
Brandão, Fernando G. S. L.; Ramanathan, Ravishankar; Grudka, Andrzej; Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Szarek, Tomasz; Wojewódka, Hanna
2016-01-01
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification is a realistic task, as the existing proposals either do not tolerate noise or require an unbounded number of different devices. Here we provide an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. The correctness of the protocol is assessed by violating a Bell inequality, with the degree of violation determining the noise tolerance threshold. An experimental realization of the protocol is within reach of current technology. PMID:27098302
NASA Astrophysics Data System (ADS)
Curiac, Daniel-Ioan; Volosencu, Constantin
2014-10-01
The path-planning algorithm represents a crucial issue for every autonomous mobile robot. In normal circumstances a patrol robot will compute an optimal path to ensure its task accomplishment, but in adversarial conditions the problem is getting more complicated. Here, the robot’s trajectory needs to be altered into a misleading and unpredictable path to cope with potential opponents. Chaotic systems provide the needed framework for obtaining unpredictable motion in all of the three basic robot surveillance missions: area, points of interests and boundary monitoring. Proficient approaches have been provided for the first two surveillance tasks, but for boundary patrol missions no method has been reported yet. This paper addresses the mentioned research gap by proposing an efficient method, based on chaotic dynamic of the Hénon system, to ensure unpredictable boundary patrol on any shape of chosen closed contour.
Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paul, Nathanael R; Shue, Craig; Taylor, Curtis
While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless localmore » area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.« less
Yang, Guang; Yu, Simiao; Dong, Hao; Slabaugh, Greg; Dragotti, Pier Luigi; Ye, Xujiong; Liu, Fangde; Arridge, Simon; Keegan, Jennifer; Guo, Yike; Firmin, David; Keegan, Jennifer; Slabaugh, Greg; Arridge, Simon; Ye, Xujiong; Guo, Yike; Yu, Simiao; Liu, Fangde; Firmin, David; Dragotti, Pier Luigi; Yang, Guang; Dong, Hao
2018-06-01
Compressed sensing magnetic resonance imaging (CS-MRI) enables fast acquisition, which is highly desirable for numerous clinical applications. This can not only reduce the scanning cost and ease patient burden, but also potentially reduce motion artefacts and the effect of contrast washout, thus yielding better image quality. Different from parallel imaging-based fast MRI, which utilizes multiple coils to simultaneously receive MR signals, CS-MRI breaks the Nyquist-Shannon sampling barrier to reconstruct MRI images with much less required raw data. This paper provides a deep learning-based strategy for reconstruction of CS-MRI, and bridges a substantial gap between conventional non-learning methods working only on data from a single image, and prior knowledge from large training data sets. In particular, a novel conditional Generative Adversarial Networks-based model (DAGAN)-based model is proposed to reconstruct CS-MRI. In our DAGAN architecture, we have designed a refinement learning method to stabilize our U-Net based generator, which provides an end-to-end network to reduce aliasing artefacts. To better preserve texture and edges in the reconstruction, we have coupled the adversarial loss with an innovative content loss. In addition, we incorporate frequency-domain information to enforce similarity in both the image and frequency domains. We have performed comprehensive comparison studies with both conventional CS-MRI reconstruction methods and newly investigated deep learning approaches. Compared with these methods, our DAGAN method provides superior reconstruction with preserved perceptual image details. Furthermore, each image is reconstructed in about 5 ms, which is suitable for real-time processing.
Divorce Mediation and Its Emotional Impact on the Couple and Their Children.
ERIC Educational Resources Information Center
Kaslow, Florence W.
1984-01-01
Discusses the influence of development on divorce, and presents a diaclectic model of divorce stages. Suggests mediation as an alternative dispute resolution strategy and describes contraindications for both mediation and the adversarial approach. (JAC)
Advanced Agent Methods in Adversarial Environment
2005-11-30
2 Contents Contents 1 Introduction – Technical Statement of Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.1...37 5.4.1 Deriving Trust Observations from Coalition Cooperation Results . . . . . . . . . . . 37 Contents 3 5.4.2 Iterative Learning of...85 4 Contents A.3.5 Class Finder
False Dichotomy? "Western" and "Confucian" Concepts of Scholarship and Learning
ERIC Educational Resources Information Center
Ryan, Janette; Louie, Kam
2007-01-01
Discourses of "internationalisation" of the curriculum of Western universities often describe the philosophies and paradigms of "Western" and "Eastern" scholarship in binary terms, such as "deep/surface", "adversarial/harmonious", and "independent/dependent". In practice, such dichotomies…
76 FR 10627 - Assumption Buster Workshop: Trust Anchors Are Invulnerable
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-25
.... The goal is to engage in robust debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat...
2012-01-01
destroy information; disrupt networks or communications; or deny service. In military terms, cyberspace is a contested environment. Hactivists, cyber ... criminals , terrorists, and adversarial nations are active in cyberspace networks across the globe; our military networks are no excep tion. DoD
2015-01-01
can be used to dehumanize the enemy. Dehumanizing the enemy reduces the perceived moral and psychological costs of killing the adversary.12 The...organizationally condoned, the opposition can use this information to further dehumanize the enemy. While dehumanization can lead to underestimation
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
28 CFR 24.305 - Extensions of time.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Judicial Administration DEPARTMENT OF JUSTICE IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN DEPARTMENT OF JUSTICE ADMINISTRATIVE PROCEEDINGS Procedures for Considering Applications § 24.305 Extensions... shall be conducted pursuant to the procedural rules governing adversary adjudications conducted by the...
Environment and Alternative Development.
ERIC Educational Resources Information Center
Kothari, Rajni
Stressing the global dimension to the adversary relationship between economic development and environmental conservation, this monograph examines the philosophical, historical, cultural, and ethnic underpinnings of modern science and technology. In addition, the monograph spells out policy implications of an alternative concept of development and…
Code of Federal Regulations, 2010 CFR
2010-04-01
...”, as used in this part, are interchangeable. Alternative Dispute Resolution (ADR) means a variety of approaches used to resolve conflict rather than traditional adjudicatory or adversarial methods such as... of an organizational unit that is analogous to that headed by an Assistant Secretary. Conflict-of...
Course Design for Critical Thinking.
ERIC Educational Resources Information Center
Furedy, John J.; Furedy, Christine
1979-01-01
A fourth year honors thesis research course in psychology at the University of Toronto uses the device of adversarial interaction to improve critical thinking. Course components, including thesis submission, research seminar, student relations, and supervision, are designed to simulate the constraints, criticism, and relationships of actual…
Decision Space Operations: Campaign Design Aimed at an Adversary’s Decision Making
2003-01-01
14 Figure 3: Reflexive control, Initial situation (physical reality ...20 Figure 4: Reflexive control, reality as X imagines it to be...20 Figure 5: Reflexive control, reality as Y imagines it to be .......................................................21 Figure 6: Reflexive
1993-06-08
size, with some of its industrial wares entering international markets. Overall, however, because of the shortage of capital and some irrational ...time. Japan’s exuberance makes it a formidable adversary of the United States and the USSR in the scientific and high technology fields. The grim
76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-12
... debate of topics generally believed to be true to determine to what extent that claim is warranted. The adversarial nature of these debates is meant to ensure the threat environment is reflected in the discussion...
Code of Federal Regulations, 2010 CFR
2010-04-01
...-adversarial proceeding. In making a determination or decision on your claim, we conduct the administrative... CLAIMS Introduction, General Description, and Definitions § 405.1 Introduction. (a) General. This part... before an administrative law judge. If you are dissatisfied with a decision made by the Federal reviewing...
Prospects for improved detection of chemical, biological, radiological, and nuclear threats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wuest, Craig R.; Hart, Brad; Slezak, Thomas R.
2012-07-31
Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.
Legality in Cyberspace: An Adversary View
2014-03-01
Internet, one might assume that Russia would represent an implacably hostile environment for cyber criminals . Yet the Russian Federation has become one...figures. The reason, while unspoken, is largely understood. Russian cyber criminals are free . . . provided the tar- 19 get of [their] attacks are
Space and Cyber: Shared Challenges, Shared Opportunities
2011-11-15
adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue
Massachusetts Superintendents' Perceptions of Teacher Bargaining Practices
ERIC Educational Resources Information Center
Borstel, Scott L.
2010-01-01
For five decades, collective bargaining has been implemented in American public schools (Loveless, 2000). It has protected the rights of teachers; and teacher work conditions issues and compensation have improved (Hannaway & Rotherham, 2006). However, improvements have created adversarial labor-management relationships, resulted in excessive…
Evaluating Moving Target Defense with PLADD
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Stephen T.; Outkin, Alexander V.; Gearhart, Jared Lee
This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. Wemore » show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.« less
Learning Physics-based Models in Hydrology under the Framework of Generative Adversarial Networks
NASA Astrophysics Data System (ADS)
Karpatne, A.; Kumar, V.
2017-12-01
Generative adversarial networks (GANs), that have been highly successful in a number of applications involving large volumes of labeled and unlabeled data such as computer vision, offer huge potential for modeling the dynamics of physical processes that have been traditionally studied using simulations of physics-based models. While conventional physics-based models use labeled samples of input/output variables for model calibration (estimating the right parametric forms of relationships between variables) or data assimilation (identifying the most likely sequence of system states in dynamical systems), there is a greater opportunity to explore the full power of machine learning (ML) methods (e.g, GANs) for studying physical processes currently suffering from large knowledge gaps, e.g. ground-water flow. However, success in this endeavor requires a principled way of combining the strengths of ML methods with physics-based numerical models that are founded on a wealth of scientific knowledge. This is especially important in scientific domains like hydrology where the number of data samples is small (relative to Internet-scale applications such as image recognition where machine learning methods has found great success), and the physical relationships are complex (high-dimensional) and non-stationary. We will present a series of methods for guiding the learning of GANs using physics-based models, e.g., by using the outputs of physics-based models as input data to the generator-learner framework, and by using physics-based models as generators trained using validation data in the adversarial learning framework. These methods are being developed under the broad paradigm of theory-guided data science that we are developing to integrate scientific knowledge with data science methods for accelerating scientific discovery.
Identifying quantum phase transitions with adversarial neural networks
NASA Astrophysics Data System (ADS)
Huembeli, Patrick; Dauphin, Alexandre; Wittek, Peter
2018-04-01
The identification of phases of matter is a challenging task, especially in quantum mechanics, where the complexity of the ground state appears to grow exponentially with the size of the system. Traditionally, physicists have to identify the relevant order parameters for the classification of the different phases. We here follow a radically different approach: we address this problem with a state-of-the-art deep learning technique, adversarial domain adaptation. We derive the phase diagram of the whole parameter space starting from a fixed and known subspace using unsupervised learning. This method has the advantage that the input of the algorithm can be directly the ground state without any ad hoc feature engineering. Furthermore, the dimension of the parameter space is unrestricted. More specifically, the input data set contains both labeled and unlabeled data instances. The first kind is a system that admits an accurate analytical or numerical solution, and one can recover its phase diagram. The second type is the physical system with an unknown phase diagram. Adversarial domain adaptation uses both types of data to create invariant feature extracting layers in a deep learning architecture. Once these layers are trained, we can attach an unsupervised learner to the network to find phase transitions. We show the success of this technique by applying it on several paradigmatic models: the Ising model with different temperatures, the Bose-Hubbard model, and the Su-Schrieffer-Heeger model with disorder. The method finds unknown transitions successfully and predicts transition points in close agreement with standard methods. This study opens the door to the classification of physical systems where the phase boundaries are complex such as the many-body localization problem or the Bose glass phase.
5 CFR 2610.104 - Proceedings covered.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 2610.104 Administrative Personnel OFFICE OF GOVERNMENT ETHICS ORGANIZATION AND PROCEDURES... part applies to adversary administrative adjudications conducted by the Office of Government Ethics... Ethics in Government Act of 1978, section 402(f)(2), 5 U.S.C. app., and subpart E of part 2638 of this...
Collective Bargaining Can Enhance Quality of Worklife.
ERIC Educational Resources Information Center
Knott, Ildiko
1984-01-01
Examines elements of labor-management relationships in educational institutions, suggesting that communication on a noncrisis basis is crucial to healthy labor relations which are adversarial rather than confrontational. Describes a mature stage of labor-management relation and stresses the importance of sound grievance procedures. (LAL)
2013-04-12
request maintains investments in the DCGS, the MQ-1 Predator, the RC-135 Rivet Joint, the RQ-4 Global Hawk Block 40, and U-2 programs, and makes internal... electromagnetic jamming. Our potential adversaries are also making advances by electronically linking their own combat capabilities, creating new military
Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats
1998-04-01
story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched
29 CFR 2204.106 - Standards for awards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH REVIEW COMMISSION IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN PROCEEDINGS BEFORE THE OCCUPATIONAL SAFETY AND HEALTH REVIEW... failure to act by the Secretary upon which the adversary adjudication is based. The burden of persuasion...
Working Together: The Collaborative Style of Bargaining.
ERIC Educational Resources Information Center
Smith, Stuart C.; And Others
Although conventional collective bargaining has helped teachers achieve greater professional status, its win/lose approach causes participants to overlook shared educational objectives. Since the first experiments in win/win bargaining, the acrimony generated by the adversarial process has led an increasing number of school districts to…
What to Expect During a Teachers' Strike.
ERIC Educational Resources Information Center
Long, Jerri
1987-01-01
This two-page table charts the range of union activities, their adversarial intent, and possible administrative counterstrategies during a typical teacher strike. Twenty-four activities are covered, from peaceful demonstrations (like picketing), marches, and candlelight vigils, to harassments like nails in tires and telephone threats. (MLH)
Insist or Enlist?: Adultism versus Climates of Excellence
ERIC Educational Resources Information Center
Tate, Thomas F.; Copas, Randall L.
2003-01-01
Positive climates in youth-serving organizations abandon adversarial encounters and enlist youth as partners in empowerment. The authors describe this approach, drawing from the "Cultivating Productive Peer Relationships" curriculum in the "No Disposable Kids" training program. Adults need strategies to build respectful relationships and to…
Coparenting within the Family System: Influences on Children's Development.
ERIC Educational Resources Information Center
Gable, Sara; And Others
1994-01-01
Focuses on coparenting, spouses as partners or adversaries in parenting role, in families raising toddler sons. Reviews preliminary longitudinal research findings concerning nature of coparenting and contextual determinants of different types of coparenting alliances. Proposes coparenting processes to interact with marital and parent-child…
Trust Management and Accountability for Internet Security
ERIC Educational Resources Information Center
Liu, Wayne W.
2011-01-01
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…
Remarks to Eighth Annual State of Modeling and Simulation
1999-06-04
organization, training as well as materiel Discovery vice Verification Tolerance for Surprise Free play Red Team Iterative Process Push to failure...Account for responsive & innovative future adversaries – free play , adaptive strategies and tactics by professional red teams • Address C2 issues & human
Operational Art in Cyber Defense
2013-04-16
a personal curiosity. I used the masculine when referring to the Commander and the adversary throughout this paper for brevity. Alanis 1...issue 63, (4th quarter 2011): 70-73. 13 Carl von Clausewitz, On War, ed. Michael Howard and Peter Paret, trans . Michael Howard and Peter Paret
Anticipatory Understanding of Adversary Intent: A Signature-Based Knowledge System
2009-06-01
concept of logical positivism has been applied more recently to all human knowledge and reflected in current data fusion research, information mining...this work has been successfully translated into useful analytical tools that can provide a rigorous and quantitative basis for predictive analysis
The Adversary System in Low-Level Soviet Economic Decisionmaking.
1984-08-01
34- ° .. 78 - capital or a few countertrade agreements, will solve their problems for them. This is markedly different from the overall Soviet pattern...currency countertrade practice, the considerations of this Note would permit further refinement of predictions of Soviet economic decisionmaking that
Turbulent Arena: Global Effects Against Non-State Adversaries
2005-06-01
process efficiency to name a few. While a useful aspect of organizational diagnosis , this closed system approach neglects the simple reality that an... Organizational Diagnosis and Assessment: Bridging Theory and Practice (Thousand Oaks, CA: Sage Publications, 1999), 44. 13 Katz and Kahn, 262. 14 Daft
Creating Turbulent Flow Realizations with Generative Adversarial Networks
NASA Astrophysics Data System (ADS)
King, Ryan; Graf, Peter; Chertkov, Michael
2017-11-01
Generating valid inflow conditions is a crucial, yet computationally expensive, step in unsteady turbulent flow simulations. We demonstrate a new technique for rapid generation of turbulent inflow realizations that leverages recent advances in machine learning for image generation using a deep convolutional generative adversarial network (DCGAN). The DCGAN is an unsupervised machine learning technique consisting of two competing neural networks that are trained against each other using backpropagation. One network, the generator, tries to produce samples from the true distribution of states, while the discriminator tries to distinguish between true and synthetic samples. We present results from a fully-trained DCGAN that is able to rapidly draw random samples from the full distribution of possible inflow states without needing to solve the Navier-Stokes equations, eliminating the costly process of spinning up inflow turbulence. This suggests a new paradigm in physics informed machine learning where the turbulence physics can be encoded in either the discriminator or generator. Finally, we also propose additional applications such as feature identification and subgrid scale modeling.
Pliskin, Ruthie; Bar-Tal, Daniel; Sheppes, Gal; Halperin, Eran
2014-12-01
Although emotions and ideology are important factors guiding policy support in conflict, their interactive influence remains unclear. Based on prior findings that ideological leftists' beliefs are more susceptible to change than rightists' beliefs, we tested a somewhat counterintuitive extension that leftists would be more susceptible to influence by their emotional reactions than rightists. In three laboratory studies, inducing positive and negative emotions affected Jewish-Israeli leftists', but not rightists', support for conciliatory policies toward an adversarial (Studies 1 and 3) and a non-adversarial (Study 2) outgroup. Three additional field studies showed that positive and negative emotions were related to leftists', but not rightists', policy support in positive as well as highly negative conflict-related contexts, among both Jewish (Studies 4 and 5) and Palestinian (Study 6) citizens of Israel. Across different conflicts, emotions, conflict-related contexts, and even populations, leftists' policy support changed in accordance with emotional reactions more than rightists' policy support. © 2014 by the Society for Personality and Social Psychology, Inc.
Inherent secure communications using lattice based waveform design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pugh, Matthew Owen
2013-12-01
The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the abilitymore » of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.« less
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
NASA Astrophysics Data System (ADS)
Ristenpart, Thomas; Yilek, Scott
Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.
Loss-tolerant quantum secure positioning with weak laser sources
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; ...
2016-09-14
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less
A continuous function model for path prediction of entities
NASA Astrophysics Data System (ADS)
Nanda, S.; Pray, R.
2007-04-01
As militaries across the world continue to evolve, the roles of humans in various theatres of operation are being increasingly targeted by military planners for substitution with automation. Forward observation and direction of supporting arms to neutralize threats from dynamic adversaries is one such example. However, contemporary tracking and targeting systems are incapable of serving autonomously for they do not embody the sophisticated algorithms necessary to predict the future positions of adversaries with the accuracy offered by the cognitive and analytical abilities of human operators. The need for these systems to incorporate methods characterizing such intelligence is therefore compelling. In this paper, we present a novel technique to achieve this goal by modeling the path of an entity as a continuous polynomial function of multiple variables expressed as a Taylor series with a finite number of terms. We demonstrate the method for evaluating the coefficient of each term to define this function unambiguously for any given entity, and illustrate its use to determine the entity's position at any point in time in the future.
Gittelson, Simone; Kalafut, Tim; Myers, Steven; Taylor, Duncan; Hicks, Tacha; Taroni, Franco; Evett, Ian W; Bright, Jo-Anne; Buckleton, John
2016-01-01
The interpretation of complex DNA profiles is facilitated by a Bayesian approach. This approach requires the development of a pair of propositions: one aligned to the prosecution case and one to the defense case. This note explores the issue of proposition setting in an adversarial environment by a series of examples. A set of guidelines generalize how to formulate propositions when there is a single person of interest and when there are multiple individuals of interest. Additional explanations cover how to handle multiple defense propositions, relatives, and the transition from subsource level to activity level propositions. The propositions depend on case information and the allegations of each of the parties. The prosecution proposition is usually known. The authors suggest that a sensible proposition is selected for the defense that is consistent with their stance, if available, and consistent with a realistic defense if their position is not known. © 2015 American Academy of Forensic Sciences.
Development of nonproliferation and assessment scenarios.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Finley, Melissa; Barnett, Natalie Beth
2005-10-01
The overall objective of the Nonproliferation and Assessments Scenario Development project is to create and analyze potential and plausible scenarios that would lead to an adversary's ability to acquire and use a biological weapon. The initial three months of funding was intended to be used to develop a scenario to demonstrate the efficacy of this analysis methodology; however, it was determined that a substantial amount of preliminary data collection would be needed before a proof of concept scenario could be developed. We have dedicated substantial effort to determine the acquisition pathways for Foot and Mouth Disease Virus, and similar processesmore » will be applied to all pathogens of interest. We have developed a biosecurity assessments database to capture information on adversary skill locales, available skill sets in specific regions, pathogen sources and regulations involved in pathogen acquisition from legitimate facilities. FY06 funding, once released, will be dedicated to data collection on acquisition, production and dissemination requirements on a pathogen basis. Once pathogen data has been collected, scenarios will be developed and scored.« less
The Military Utility of Understanding Adversary Culture
2005-01-01
squelching of Iraqi freedom of speech . Many members of the Coalition Provi- sional Authority (CPA) and Combined Joint Task Force 7 felt that anticoali- tion...an Iraqi perception that Americans do not really support freedom of speech despite their claims to the contrary, reinforcing their view of Americans
Strategic War Game - Arctic Response
2010-11-01
Heather Hrychuk; DRDC CORA TM 2010-240; R & D pour la défense Canada – CARO; Novembre 2010. S1. La section d’Élaboration de concepts et de...10 2.4.3 Scoring System.................................................................................. 13 2.4.3.1 Air Force... 13 2.4.3.2 Adversary
12 CFR 308.172 - Eligibility of applicants.
Code of Federal Regulations, 2010 CFR
2010-01-01
... for remuneration for the applicant, under its direction and control, on the date the adversary... indirectly owns or controls a majority of the voting shares. The Board of Directors may, however, on the... addition, the Board of Directors may determine that financial relationships of the applicant other than...
Incorporating Emotional Intelligence in Legal Education: A Theoretical Perspective
ERIC Educational Resources Information Center
Douglas, Susan
2015-01-01
"Thinking like a lawyer" is traditionally associated with rational-analytical problem solving and an adversarial approach to conflict. These features have been correlated with problems of psychological, or emotional, distress amongst lawyers and law students. These problems provide a strong argument for incorporating a consideration of…
7 CFR 1.203 - Payment of award.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Equal Access to Justice Act in Proceedings Before the Department Procedures for Considering Applications... decision in the United States courts. The agency will pay the amount awarded to the applicant within 60 days, unless judicial review of the award or of the underlying decision of the adversary adjudication...
The Moral Obligation of the Government to Recover POWs
2012-03-12
Freedom by James Rowe, and Surviving Hell by Leo Thorsness, several of a great many primary sources that tell autobiographically of life as a POW. A...from the collective social memory , allowing the government to politically maneuver itself for the next adversarial engagement. The political climate
U.S. Policy for Central America: A Briefing,
1984-03-01
do not promote upheavals else- waere or align with our global adversaries. For their part, nationalist leaders in and around Central America should...See Joseph H. Stodder and Kevin F. McCarthy, Profiles of the Caribbean Basin in 1960/1980: Changing Geopolitical and Geostrategic Dimcnsim.. The Rand
Network Centric Warfare and Joint Force 2020
2014-05-15
enabled moving map programs, unified communications, and every other bell and whistle a smart phone or tablet provides a user. The early adopters who...create conditions where the adversary is frozen out of all options at all levels and is reduced to a condition of decision paralysis , cognitive
ERIC Educational Resources Information Center
Barchie, Lisa
By virtue of the different natures of the two institutions, the relationship between business and the media is simultaneously adversarial and symbiotic: the media see themselves as society's watchdog while business sees itself as society's driving economic force. Meanwhile, business relies on the media for information, and the media rely on…
ERIC Educational Resources Information Center
Ticcioni, Daniel A.
1981-01-01
A "Civil Litigation Exercise" (a litigation simulation) conducted during the second semester of a first year procedure course at the New England School of Law is described. The purpose of the exercise is to simulate the real world of adversary pleading and practice. The Civil Procedure Litigation exercises are appended. (MLW)
Unwrapping Rap: A Literacy of Lived Experience.
ERIC Educational Resources Information Center
Brown, Stephen G.
The adversarial forces of governmental censorship, freedom of expression, and capitalistic appropriation are engaged in an acrimonious debate over "Gangsta' Rap" that is being played out in the public spaces of popular culture. However, as a literacy of lived experience, Gangsta' Rap warrants critical investigation. Many postmodern…
Remote Detection of Covert Tactical Adversarial Intent of Individuals in Asymmetric Operations
2010-04-01
nameless people, and organizations not affiliated with any government, has occurred throughout human history but has recently become more prevalent. 2.1...hiding, and the terrorists are dispersed. Defeating such a faceless, nameless enemy embedding itself within a peaceful civilian population is a
The Rhetoric of Redistricting: Ohio's Altered State.
ERIC Educational Resources Information Center
Lucas, David M.
An event such as congressional boundary redistricting, so ripe with political confrontation, provides a fertile ground for the profuse growth of political rhetoric. The traditional two-party political system, charged by the two well-developed adversarial philosophies, generates a highly charged environment with messages begging for analysis. After…
The Household School as Life-Span Learning Center.
ERIC Educational Resources Information Center
Warnat, Winifred I.
A constructive, effective, and realistic national educational policy should be established which takes into account the contributions of the household school to individual learning in areas of life roles, feelings, values formation, and behavior development. The adversary relationship between formal educational institutions and the family will be…
Beyond Mediation: Administrators as Advocates.
ERIC Educational Resources Information Center
McCutcheon, Aubrey V.
Many educational administrators feel seriously lacking in advocacy training. They want to be able to deal with disruptive conflicts and adversary situations with legislative bodies, parent groups, and executive agencies. When 19 school administrators were polled informally, they asked for advocacy training to help them acquire the skills of…
On the Complexity of Delaying an Adversary’s Project
2005-01-01
interdiction models for such problems and show that the resulting problem com- plexities run the gamut : polynomially solvable, weakly NP-complete, strongly...problems and show that the resulting problem complexities run the gamut : polynomially solvable, weakly NP-complete, strongly NP-complete or NP-hard. We
Friendly Alternatives to the Argumentative Essay.
ERIC Educational Resources Information Center
Costanzo, William V.
Many teachers would like to counter what Deborah Tannen calls "The Argument Culture." They recognize that teaching students traditional principles of argument may perpetuate the kind of adversarial thinking that erupts all too often: in aggressive newspaper headlines, on confrontational television shows, in court rooms, and in school…
Photography/Digital Imaging: Parallel & Paradoxical Histories.
ERIC Educational Resources Information Center
Witte, Mary Stieglitz
With the introduction of photography and photomechanical printing processes in the 19th century, the first age of machine pictures and reproductions emerged. The 20th century introduced computer image processing systems, creating a digital imaging revolution. Rather than concentrating on the adversarial aspects of the computer's influence on…
40 CFR 17.4 - Applicability to EPA proceedings.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 1 2013-07-01 2013-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...
40 CFR 17.4 - Applicability to EPA proceedings.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 1 2012-07-01 2012-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...
40 CFR 17.4 - Applicability to EPA proceedings.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 1 2014-07-01 2014-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...
40 CFR 17.4 - Applicability to EPA proceedings.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 1 2011-07-01 2011-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...
40 CFR 17.4 - Applicability to EPA proceedings.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Applicability to EPA proceedings. 17.4... ACCESS TO JUSTICE ACT IN EPA ADMINISTRATIVE PROCEEDINGS General Provisions § 17.4 Applicability to EPA proceedings. The Act applies to an adversary adjudication pending before EPA at any time between October 1...
Incorporating Science into Decision-Making
Karl, Herman A.; Turner, Christine E.
2003-01-01
Alan Leshner's Editorial “Public engagement with science” (14 Feb., p. 977) highlights a conundrum: Why is science often ignored in important societal decisions, even as the call for decisions based on sound science escalates? One reason is that decision-making is often driven by a variety of nonscientific, adversarial, and stakeholder dynamics
Schools versus Students' Rights: Can Alternative Dispute Resolution Build a Community.
ERIC Educational Resources Information Center
Goldberg, Steven S.
1995-01-01
Schools' regulation by external forces has rendered the education process secondary to avoidance of litigation. Alternative dispute resolution (ADR) provides an answer to the adversarial process currently in place within education. ADR offers negotiation and mediation as methods to resolve conflict, avoid litigation, and increase the likelihood of…
Problems and Issues Related to the Data Game.
ERIC Educational Resources Information Center
Huff, Robert A.
Ways that data can be misused in establishing accountability of public higher education are described along with approaches to help alleviate the potential adversary relationships between postsecondary leaders and state agency personnel. It is suggested that scholars fear a future in which educational decisions may be made according to numbers or…
Seeking Common Ground: Deliberative Democracy and Sustainable Communities.
ERIC Educational Resources Information Center
Hyman, Drew; Clinehens, Brad
Public deliberation, sometimes called deliberative democracy, offers alternatives to what are often adversarial governmental debates and hearings. This paper provides a case example of applying the deliberative democracy process to development issues and an analysis of data comparing the effectiveness of the process for creating a consensus for…
A Policy-Based Approach to Technology Systems
ERIC Educational Resources Information Center
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie
2008-01-01
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Uncommon Sense for Parents with Teenagers.
ERIC Educational Resources Information Center
Riera, Michael
This guide to parenting high school-age adolescents is intended to help parents restructure the typically adversarial relationship between parent and teenager by replacing the "parent as manager" role with the "parent as consultant" role. The text is question-driven, comprised of a series of responses to questions commonly asked by parents and…
Boy Trouble: Rhetorical Framing of Boys' Underachievement
ERIC Educational Resources Information Center
Titus, Jordan J.
2004-01-01
This article examines discourse in the United States used to socially construct an "underachieving boys" moral panic. Employing discourse analysis I examine the adversarial rhetoric of claims-makers and the frames they deploy to undermine alternative and conflicting accounts (of females as disadvantaged) and to forestall any challenges to the…
On the Scientific Foundations of Level 2 Fusion
2004-03-01
Development of Decision Aids”, CMIF Report 2-99, Feb 1999 KN2-49 Theories of Groups, Teams, Coalitions, etc -Adaptive Behaviors- • There is a huge literature...Investigations of Trust-related System Vulnerabilities in Aided, Adversarial Decision Making”, CMIF Report, Jan 2000 KN2-53 Summarizing Algorithm re Thing
12 CFR 263.102 - Prevailing party.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Prevailing party. 263.102 Section 263.102 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES... Prevailing party. Only an eligible applicant that prevailed on the merits of an adversary proceeding may...
Labor-Management Cooperation in Schools: An Idea Whose Time Has Come.
ERIC Educational Resources Information Center
Woods-Houston, Michelle; Miller, Rima
This paper presents information useful to educational leaders considering a labor-management cooperation (LMC) process. LMC is a mechanism for changing attitudes and building an atmosphere of trust between two traditionally adversarial groups. The first section outlines categories and provides examples of LMC cooperative efforts, highlighting the…
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
2006-01-01
based approach. In this paper, we propose a symmetric key-based protocol for authenticating the reprogramming process. Our protocol is based on the ... secret instantiation algorithm, which requires only O(log n) keys to be maintained at each sensor. We integrate this algorithm with the existing
Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach
2011-08-01
enviromental factors, then it is very likely that the corresponding device has been compromised and controlled by an adversary. In this case, the report... Enviromental Factors in Faulty Case (b) Result of Policy Execution in Faulty Case Figure 7: Policy Execution in Faulty Case (a) Enviromental Factors
14 CFR 14.03 - Eligibility of applicants.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Agricultural Marketing Act (12 U.S.C. 1141j(a)) with not more than 500 employees at the time the adversary... relationship between the affiliated entities. In addition, the ALJ or adjudicative officer may determine that financial relationships of the applicant, other than those described in this paragraph, constitute special...
49 CFR 1016.105 - Eligibility of applicants.
Code of Federal Regulations, 2010 CFR
2010-10-01
... an adversary relationship to the position taken by agency counsel, and it must have prevailed on one... cooperative association as defined in section 15(a) of the Agricultural Marketing Act (12 U.S.C. 1141j(a... the actual relationship between the affiliated entities. In addition, the adjudicative officer may...
The Road from a Quick Reaction Capability to a Program of Record
2011-01-26
Automated Biometric Identification System (DoD-ABIS) is to store, match, and share national biometric resources for adversary (red force) and neutral...Node Relationship Metrics 20090100021 28 MAJOR Mug Book and Lineups 20090100022 29 MAJOR US Persons Marking 20090100023 30 MAJOR Detention Data in
29 CFR 2201.1 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-07-01
... FREEDOM OF INFORMATION ACT § 2201.1 Purpose and scope. This part prescribes procedures to obtain... the Freedom of Information Act (FOIA), 5 U.S.C. 552. It applies only to records or information of the Commission or in the Commission's custody. This part does not affect discovery in adversary proceedings...
10 CFR 12.102 - When the EAJA applies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false When the EAJA applies. 12.102 Section 12.102 Energy NUCLEAR REGULATORY COMMISSION IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN AGENCY PROCEEDINGS General Provisions § 12.102 When the EAJA applies. The EAJA applies to any covered adversary adjudication...
Enculturation, Not Alchemy: Professionalizing Novice Writing Program Administrators.
ERIC Educational Resources Information Center
Peters, Bradley
1998-01-01
Discusses a process of acculturation in three stages by which fledgling Writing Program Administrators can be transformed into change agents: (1) critically reading the program to locate key allies, potential advocates, and proven adversaries; (2) implementing changes on an infrastructural level to convert positive relations among colleagues into…
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Definitions. 18.2 Section 18.2 Commerce and Foreign Trade Office of the Secretary of Commerce ATTORNEY'S FEES AND OTHER EXPENSES General Provisions § 18.2 Definitions. As used in this part: (a) Adversary adjudication means an adjudication under 5...
29 CFR 18.1104 - Effective date.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 1 2011-07-01 2011-07-01 false Effective date. 18.1104 Section 18.1104 Labor Office of the... ADMINISTRATIVE LAW JUDGES Rules of Evidence Applicability § 18.1104 Effective date. These rules are effective thirty days after date of publication with respect to formal adversarial adjudications as specified in...
Managing Tensions in Educational Organizations: Trying for a Win-Win Approach.
ERIC Educational Resources Information Center
Grab, Rudi
1996-01-01
Constructive tension can be healthy for an organization. Although win-lose solutions based on adversarial strategies are common, the management of conflicts in schools should focus on win-win problem solving, which requires creativity. Identifies collaboration as the most desirable conflict resolution strategy, and discusses conflict management…
Chemical ecology of the Thysanoptera
Murray S. Blum
1991-01-01
The chemical ecology of the Thysanoptera is identified with a variety of natural products discharged in anal droplets during confrontations with adversaries. These exudates are fortified with defensive allomones that may function as repellents, contact irritants, or in some cases, fumigants. Thrips synthesize a large diversity of allomonal products that include...
Adversaries, Advocates, or Thoughtful Analysts? Some Lessons from Dance History.
ERIC Educational Resources Information Center
Wagner, Ann
1999-01-01
Argues that the arts demand careful analysis when providing a rationale for the inclusion of the arts in educational programs and policies. Provides information on the content and context of dance opposition and provides examples from dance history of issues that need to be addressed. (CMK)
Soviet Theater Nuclear Forces’ Issues.
1979-12-01
extinguish its mortal adversary or (ii) a golden opportunity to assist the tortuous processes of history.5 5 In either case there must be a strong feeling...the Chinese Ocommunist " jackals ," and respect and fear West Germans and Americans. (Americans they tend to like, but their genuine respect for
Proceduralism and Bureaucracy: Due Process in the School Setting
ERIC Educational Resources Information Center
Kirp, David L.
1976-01-01
The likely consequences of applying traditional due process standards, expecially formal adversary hearings, to the public school are examined. The ruling in Goss v. Lopez suggests that fair treatment can still be expected if the hearings are treated as opportunities for candid and informal exchange rather than prepunishment ceremonies. (LBH)
12 CFR 263.105 - Statement of net worth.
Code of Federal Regulations, 2010 CFR
2010-01-01
... initiation of the adversary adjudication. Unaudited financial statements are acceptable for individual... judge or the Board otherwise requires. Financial statements or reports filed with or reported to a... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Statement of net worth. 263.105 Section 263.105...
Scenarios that describe cyber attacks on the electric grid consistently predict significant disruptions to the economy and citizens quality of life...phenomena that deserve further investigation, such as the importance of some individual power plants in influencing the adversarys probability of
Better for Both--Thoughts on Teacher-Pupil Interaction.
ERIC Educational Resources Information Center
Kilburn, John
1978-01-01
To remove the adversary emphasis from pupil-teacher interactions, the author presents a simple model, showing how an intervention can potentially make a situation better, worse, or unchanged for the pupil and the teacher. A sample scenario is provided of two teachers dealing with a misbehaving child. (SJL)
Use of Third-Party Credibility in Hostile Situations.
ERIC Educational Resources Information Center
Gorney, Carole M.
A study analyzed the use of third-party credibility as a deliberate and systematic public relations strategy to regain credibility for an organization faced with public hostility. Four types of third-party usage are: citizen participation, outside investigation, adversarial advocacy, and employee dissemination. Third-party credibility as a public…
INTELLIGENCE SUPPORT TO JOINT TARGETING IN THE A2/AD ENVIRONMENT
2016-02-10
budgets. Finally, the dismal state of targeting personnel training and development must be rectified . These steps must be taken before the United... rectified . These steps must be taken before the United States faces a near-peer adversary employing A2/AD capabilities. Bibliography ACC/A2. Air Force
Restorative Practices as a Tool for Organizational Change
ERIC Educational Resources Information Center
Boulton, John; Mirsky, Laura
2006-01-01
Restorative practices focus on repairing the harm to relationships rather than piling on more punishment for violations. Originally popularized in formal conferences between a victim and offender in the justice system, restorative practices have been extended to educational and treatment settings. This article describes how the adversarial climate…
Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students
ERIC Educational Resources Information Center
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.
2017-01-01
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
ERIC Educational Resources Information Center
Hunter, Karen
1988-01-01
Proposes that academic librarians and publishers should view themselves as partners rather than adversaries. Following a discussion of premises, problems, and attitudes related to librarian-publisher cooperation, several areas for joint development are suggested: new products and services; CD-ROM; electronic document delivery; scholarly book…
The Influence of Informal Power Structures on School Board-Teacher Union Contract Negotiations.
ERIC Educational Resources Information Center
Miller-Whitehead, Marie
A study examined behaviors of participants trained in a nonadversarial model of contract negotiation, focusing on possible influences of formal and informal power structures, written and unwritten rules, and firmly entrenched adversarial behavior on the bargaining process. Participants were representatives of a district's teacher union and board…
Satisfaction With the Legal System and Adjustment to Marital Separation.
ERIC Educational Resources Information Center
Anderson, Elaine A.
The rise in the American divorce rate since the early 1960's emphasizes the need to examine the factors associated with adjustment to marital separation. The impact of the legal system upon post-separation adjustment in Pennsylvania, which has adversary divorce statutes, is explored with 205 individuals, separated 26 months or less. Satisfaction…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-28
..., Chief Financial Officer dated September 8, 2010 (``Georgetown, Texas Letter''); and Portland Letter... the financial advisor are separate, adversarial roles and cannot be provided by the same party.'' One..., President and Chief Executive Officer dated September 29, 2010 (``D.A. Davidson Letter''); and J.J.B...
Navy Cyber Power 2020. Sustaining U.S. Global Leadership: Priorities for 21st Century Defense
2012-11-01
to achieve superior operational outcomes at the time and place of our choosing. Cyberspace operations are a critical component of Information ... Dominance , and carefully coordinated, will provide Navy and Joint Commanders with the necessary elements to achieve and maintain an operational advantage over our adversaries in all domains.
2010-07-01
To be successful, the research needs to integrate kinesiological , neurophysiological, psychological, and cognitive science, and sociocultural... kinesiological neurophysiological, psychological, and cognitive science and sociocultural anthropology and information science components. Research and...successful, the research needs to integrate kinesiological , neurophysiological, psychological, and cognitive science, and sociocultural
2009-11-08
travel routes, holidays, festivals, sports, and other events; climate and weather; and water. Planning Planning must give appropriate weight...they can be manipulated rather easily, they are militarily significant. (1) Physical patterns such as market locations and travel routes may provide...cycle, cutting or controlling intercity and intracity mobility and communications, triggering an adversary response, or positioning forces to conduct
Management Challenges Fiscal Year 2016
2017-01-01
of Office of Inspector General Management Challenges 14 │ FY 2016 classified information revealed “methods to our adversaries that could impact our...electronic data to perform operations and to process, maintain, and report essential information . Office of Inspector General Management ...that collects, processes, stores, disseminates, and manages critical information . It includes owned and leased communications and computing
The Search for a Legal Ethic: The Adversary System, Liberalism and Beyond
ERIC Educational Resources Information Center
Verkuil, Paul R.
1977-01-01
The Code of Professional Responsibility of lawyers is examined in terms of ethical responsibility. Two major questions are addressed: to what degree does the profession understand and act consistently with its own ethic; and to what extent should legal ethics relate to larger questions of societal and political ethics? (LBH)
Personality and Situational Factors Influencing the Advertising Sales Interaction.
ERIC Educational Resources Information Center
Scarfo, Lauranell; Rogus, Mary T.
Focusing on situational and personality factors as predictors of two common types of sales behavior (the customer-oriented/marketing approach, and the adversarial/bottom-line approach), a study conducted a national survey of advertising sales people and media buyers in the summer and fall of 1987. A total of 3669 questionnaires were sent to…
Site-Based Management in a Collective Bargaining Environment: Can We Mix Oil and Water?
ERIC Educational Resources Information Center
Fossey, Richard
Site-based management has become a popular school reform strategy. However, conflicts can arise when school districts with collective bargaining try to implement site-based management. Site-based management depends on collaboration and cooperation among educators, both of which conflict with collective bargaining's adversarial nature. There is…
Disorder in the Courtroom? Child Witnesses under Cross-Examination
ERIC Educational Resources Information Center
Zajac, Rachel; O'Neill, Sarah; Hayne, Harlene
2012-01-01
When a witness gives evidence in an adversarial criminal trial, there are two main questioning phases: direct examination and cross-examination. Special provisions are sometimes made for children to give direct evidence, but the majority of child witnesses are still cross-examined. While several decades of research have demonstrated how to elicit…
Mediation, Fact-finding, and Impasse.
ERIC Educational Resources Information Center
Dubel, Robert Y.
Since collective bargaining in public education is here to stay, boards of education should learn to accept it for what it is--an adversary process. The author contends that striking is not a very viable weapon in the arsenal of the teachers' union because the schools will continue to operate, and public pressure against prolonged strikes and…
Active-Vision Control Systems for Complex Adversarial 3-D Environments
2009-03-01
Control Systems MURI Final Report 36 51. D. Nain, S. Haker , A. Bobick, A. Tannenbaum, "Multiscale 3D shape representation and segmentation using...Conference, August 2008. 99. L. Zhu, Y. Yang, S. Haker , and A. Tannenbaum, "An image morphing technique based on optimal mass preserving mapping," IEEE
15 CFR 18.3 - When the Act applies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false When the Act applies. 18.3 Section 18.3 Commerce and Foreign Trade Office of the Secretary of Commerce ATTORNEY'S FEES AND OTHER EXPENSES General Provisions § 18.3 When the Act applies. The Act applies to any adversary adjudication pending or...
The Professional Negotiator: Role Conflict, Role Ambiguity and Motivation To Work.
ERIC Educational Resources Information Center
Medford, Robert E.; Miskel, Cecil
The investigation examined the relationship among role conflict, role ambiguity, and motivation to work of teacher-negotiators. The theoretical rationale for the study was formulated from the finding of Walton and McKersie, Deutsch, Vidmar and McGrath, and Blum concerning the negotiator's conflict with his adversary, his dependence on his…
The Coach-Team Approach: An Introductory Accounting Instructional Alternative
ERIC Educational Resources Information Center
Wood, Lynette I.
2012-01-01
Many students approach the introductory accounting course with a great deal of apprehension. For the most part, the course is populated by non-accounting majors who often perceive accounting to be extremely difficult and may view the instructor-student relationship as adversarial. As a result, such students may be inclined to express their…
Agent-Based Computing in Distributed Adversarial Planning
2010-08-09
plans. An agent is expected to agree to deviate from its optimal uncoordinated plan only if it improves its position. - process models for opponent...Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.2 Improvements ...plan only if it improves its position. – process models for opponent modeling – We have analyzed the suitability of business process models for creating
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 3 2011-04-01 2011-04-01 false Purpose. 212.01 Section 212.01 Customs Duties... Justice Act, 5 U.S.C. 504 (called “the Act” in this part), provides for the award of attorney fees and... proceedings (called “adversary adjudications”) before an agency. Under the Act an eligible party may receive...
Newjack: Teaching in a Failing Middle School
ERIC Educational Resources Information Center
Sipe, Peter
2004-01-01
In this article, Peter Sipe compares his first year as a middle school teacher in Brooklyn, New York, to that of a rookie corrections officer at Sing Sing prison. Sipe explores what he considers to be disturbing similarities in these experiences, namely, a preoccupation with control, immersion in an adversarial social dynamic, and the prevalence…
Teachers Unions as Partners, Not Adversaries
ERIC Educational Resources Information Center
Catone, Keith
2013-01-01
Chicago has long been one of the national epicenters for public school reform. In many ways the reform efforts of the past decade in the Windy City have served as the blueprint for the current focus of federal education priorities. In particular, federal policy for school turnaround and transformation takes clear cues from the efforts that current…
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers
NASA Astrophysics Data System (ADS)
Li, Shujun; Sadeghi, Ahmad-Reza; Schmitz, Roland
We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user's computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module.
Literacy Teaching Method and Peace Building in Multi-Ethnic Communities of Nigeria
ERIC Educational Resources Information Center
Adelore, Omobola; Majaro-Majesty, Henry
2008-01-01
The challenge of peace building in Nigeria is increasing as communities continue to show adversary tendencies. This is happening even after many third party conflict transformation efforts have been expended to resolve and set a conducive climate for stakeholders to sustain peace. Some peace building assessment projects have indicated that the…
Minimum Competency Testing Clarification Hearing (July 9th, 1981).
ERIC Educational Resources Information Center
National Inst. of Education (ED), Washington, DC.
Barbara Jordan served as the hearing officer for three-day adversary evaluation hearings about the pros and cons of minimum competency testing (MCT). This report is the complete transcript of the second day of proceedings. The pro team, lead by James Popham, began by presenting representatives of four states (Florida, California, Texas, and…
Child Custody Evaluations: A Rational Process for an Emotion-Laden Event.
ERIC Educational Resources Information Center
Barnard, Charles P.; Jenson, Gust, III
1984-01-01
Presents a consultation model that can serve to diminish the destructive impact of the adversarial process in child custody decisions. The process and procedures described are consonant with what most state statutes suggest as criteria for consideration in custody decisions and promote the best interests of the children. (JAC)
More Important than the Contract Is the Relationship
ERIC Educational Resources Information Center
Burch, Patricia; Good, Annalee
2015-01-01
What should a school district procurement officer ask when he or she sits down with a sales representative from a vendor of digital education products? Who else should be at the table? How do districts and providers become partners in instruction, rather than adversaries in negotiation? These are increasingly critical questions as public school…
External Labeling as a Framework for Access Control
ERIC Educational Resources Information Center
Rozenbroek, Thomas H.
2012-01-01
With the ever increasing volume of data existing on and passing through on-line resources together with a growing number of legitimate users of that information and potential adversaries, the need for better security and safeguards is immediate and critical. Currently, most of the security and safeguards afforded on-line information are provided…
ERIC Educational Resources Information Center
Ogula, David
2012-01-01
Poor community-company relations in the Niger Delta have drawn attention to the practice of corporate social responsibility (CSR) in the region. Since the 1960s, transnational oil corporations operating in the Niger Delta have adopted various CSR strategies, yet community-company relations remain adversarial. This article examines community…
Enforcing Hardware-Assisted Integrity for Secure Transactions from Commodity Operating Systems
2015-08-17
OS. First, we dedicate one hard disk to each OS. A System Management Mode ( SMM )-based monitoring module monitors if an OS is accessing another hard...hypervisor- based systems. An adversary can only target the BIOS-anchored SMM code, which is tiny, and without any need for foreign code (i.e. third
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy
2016-05-01
The cyber spaces are increasingly becoming the battlefields between friendly and adversary forces, with normal users caught in the middle. Accordingly, planners of enterprise defensive policies and offensive cyber missions alike have an essential goal to minimize the impact of their own actions and adversaries' attacks on normal operations of the commercial and government networks. To do this, the cyber analysis need accurate "cyber battle maps", where the functions, roles, and activities of individual and groups of devices and users are accurately identified. Most of the research in cyber exploitation has focused on the identification of attacks, attackers, and their devices. Many tools exist for device profiling, malware identification, user attribution, and attack analysis. However, most of the tools are intrusive, sensitive to data obfuscation, or provide anomaly flagging and not able to correctly classify the semantics and causes of network activities. In this paper, we review existing solutions that can identify functional and social roles of entities in cyberspace, discuss their weaknesses, and propose an approach for developing functional and social layers of cyber battle maps.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno
We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less
Optimal helicopter trajectory planning for terrain following flight
NASA Technical Reports Server (NTRS)
Menon, P. K. A.
1990-01-01
Helicopters operating in high threat areas have to fly close to the earth surface to minimize the risk of being detected by the adversaries. Techniques are presented for low altitude helicopter trajectory planning. These methods are based on optimal control theory and appear to be implementable onboard in realtime. Second order necessary conditions are obtained to provide a criterion for finding the optimal trajectory when more than one extremal passes through a given point. A second trajectory planning method incorporating a quadratic performance index is also discussed. Trajectory planning problem is formulated as a differential game. The objective is to synthesize optimal trajectories in the presence of an actively maneuvering adversary. Numerical methods for obtaining solutions to these problems are outlined. As an alternative to numerical method, feedback linearizing transformations are combined with the linear quadratic game results to synthesize explicit nonlinear feedback strategies for helicopter pursuit-evasion. Some of the trajectories generated from this research are evaluated on a six-degree-of-freedom helicopter simulation incorporating an advanced autopilot. The optimal trajectory planning methods presented are also useful for autonomous land vehicle guidance.
The Effects of Sacred Value Networks Within an Evolutionary, Adversarial Game
NASA Astrophysics Data System (ADS)
McCalla, Scott G.; Short, Martin B.; Brantingham, P. Jeffrey
2013-05-01
The effects of personal relationships and shared ideologies on levels of crime and the formation of criminal coalitions are studied within the context of an adversarial, evolutionary game first introduced in Short et al. (Phys. Rev. E 82:066114, 2010). Here, we interpret these relationships as connections on a graph of N players. These connections are then used in a variety of ways to define each player's "sacred value network"—groups of individuals that are subject to special consideration or treatment by that player. We explore the effects on the dynamics of the system that these networks introduce, through various forms of protection from both victimization and punishment. Under local protection, these networks introduce a new fixed point within the game dynamics, which we find through a continuum approximation of the discrete game. Under more complicated, extended protection, we numerically observe the emergence of criminal coalitions, or "gangs". We also find that a high-crime steady state is much more frequent in the context of extended protection networks, in both the case of Erdős-Rényi and small world random graphs.
Understanding policy persistence-The case of police drug detection dog policy in NSW, Australia.
Hughes, Caitlin E; Ritter, Alison; Lancaster, Kari; Hoppe, Robert
2017-06-01
Significant research attention has been given to understanding the processes of drug policy reform. However, there has been surprisingly little analysis of the persistence of policy in the face of opposition and evidence of ineffectiveness. In this article we analysed just such a case - police drug detection dog policy in NSW, Australia. We sought to identify factors which may account for the continuation of this policy, in spite of counter-evidence and concerted advocacy. The analysis was conducted using the Advocacy Coalition Framework (ACF). We collated documents relating to NSW drug detection dog policy from 1995 to 2016, including parliamentary records (NSW Parliament Hansard), government and institutional reports, legislation, police procedures, books, media, and academic publications. Texts were then read, coded and classified against the core dimensions of the ACF, including subsystem actors and coalitions, their belief systems and resources and venues employed for policy debate. Three coalitions were identified as competing in the policy subsystem: security/law and order, civil liberties and harm reduction. Factors that aided policy stability were the continued dominance of the security/law and order coalition since they introduced the drug dog policy; a power imbalance enabling the ruling coalition to limit when and where the policy was discussed; and a highly adversarial policy subsystem. In this context even technical knowledge that dogs infringed civil liberties and increased risks of overdose were readily downplayed, leading to only incremental changes in implementation rather than policy cessation or wholesale revision. The analysis provides new insights into why the accumulation of new evidence and advocacy efforts can be insufficient to drive significant policy change. It poses a challenge for the evidence-based paradigm suggesting that in highly adversarial policy subsystems new evidence is unlikely to generate policy change without broader subsystem change, such as reducing the adversarial nature and/or providing new avenues for cross-coalition learning. Copyright © 2017 Elsevier B.V. All rights reserved.
ERIC Educational Resources Information Center
Udoh, Nsisong Anthony; Sanni, Kudirat Bimbo
2015-01-01
This literature review attempts to interface counselling with alternative legal practice. The authors proceed by contrasting the adversarial nature of litigation with the conciliatory nature of alternative dispute resolution (ADR) with a view to encouraging seekers of dispute resolution to opt for ADR in lieu of litigation. The paper discusses the…
Myths and Realities: U.S. Nuclear Strategy. Occasional Paper 32.
ERIC Educational Resources Information Center
Beres, Louis Rene
To survive into the future, the United States must learn to recognize that its Soviet adversary has much to gain from a mutual and graduated process of de-escalation and conflict reduction. While this country must continue to ensure the survivability of its strategic triad, it is altogether clear that this objective can be satisfied without moving…
Effectiveness Of The Individual Riflemen In An Infantry Squad
2017-12-01
adversaries. 14. SUBJECT TERMS individual carbine, interim combat service rifle, squad designated marksman rifle, commercial- off-the-shelf...7 5th–95th Percentile. Source: El Creative Advertising and Design (2007...but does not have overwhelming firepower compared to enemy infantry supported by an armored or 4 motorized assets (DA, 2006b). In order to achieve
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
... that ``adversarial rulemaking deprives the affected parties and the public of the benefits of face-to-face negotiations and cooperation in developing and reaching agreement on a rule. It also deprives them... has the dedicated resources it requires to complete its work in a timely fashion. Specifically, DOE...
ERIC Educational Resources Information Center
Hamill, Sean D.
2011-01-01
This paper documents Pittsburgh's transformation from a typical, adversarial district-union dynamic to one of deep, substantive collaboration over the course of several years. This work has catapulted Pittsburgh to the vanguard of efforts to improve teacher effectiveness, and helped secure more than $80 million in philanthropic and federal grants.…
10 CFR 12.103 - Proceedings covered.
Code of Federal Regulations, 2010 CFR
2010-01-01
... under the Program Fraud Civil Remedies Act (31 U.S.C. 3801-12); (2) Any appeal of a decision made... contract appeals as provided in section 8 of that Act (41 U.S.C. 607); and (3) Adversary adjudications...” under 5 U.S.C. 504(b)(1)(C). (b) The Commission's failure to identify a type of proceeding as an...
ERIC Educational Resources Information Center
Barden, Dennis M.
2007-01-01
Humor is a powerful tool. It can disarm an adversary. It can leaven the purposefully self-aggrandizing nature of a job interview. Perhaps most important, it can serve as a window to personality in the same way that a resume is a window to experience. In this article, the author emphasizes the value of having a sense of humor. He emphasizes that it…
Marriage and Family Therapy and the Law: Discovering Systemic Common Ground
ERIC Educational Resources Information Center
Richards, Jason C.
2017-01-01
Many important decisions regarding couples and families are made by the legal system. However, this system's adversarial nature often results in relational losses for clients, even when one "wins" a case. Some believe a solution may exist in legally-minded marriage and family therapists, who, as experts in family systems theory, are in a…
Seven Defense Priorities for the New Administration
2016-12-01
building consume human and financial military resources for decades. New weapons like cyber and autonomous systems are aimed at the heart of the U.S...information infrastructure enables for adversaries and for the U.S.; 5. Anticipating intelligent systems and autonomy including numbers and...challenging in a complex electromagnetic environment ...............................................37 Space and the global positioning system play a
Integrated planning for United Action in Phase Zero
2007-05-24
Allocations by Country Category and Objective .............. 24 Figure 9 - USAID Funtional Bureau DCHA Organization...interagency activities are performed to dissuade or deter potential adversaries and to assure or solidify relationships with friends and allies. They...Shaping Operations, it must be recognized that a cluster of capabilities are described as central for both and found in each. The relationship
Foundations of Neuromorphic Computing
2013-05-01
make informed decisions quicker than our adversaries. 2.0 INTRODUCTION The increasing resolution and speed of today’s advanced sensor ...limited information about the location, access to global positioning satellite information (GPS) to aid in navigation is impeded, and communications...more autonomous capability. This is where neuromorphic computing and other bio -inspired technologies for SWaP constrained environments can play a
Quasiregularity and Its Discontents: The Legacy of the Past Tense Debate
ERIC Educational Resources Information Center
Seidenberg, Mark S.; Plaut, David C.
2014-01-01
Rumelhart and McClelland's chapter about learning the past tense created a degree of controversy extraordinary even in the adversarial culture of modern science. It also stimulated a vast amount of research that advanced the understanding of the past tense, inflectional morphology in English and other languages, the nature of linguistic…
DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT
2016-08-01
AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
..., ``Security Performance (Adversary) Characteristics for Physical Security Programs for 10 CFR [Title 10 of the..., ``Physical Protection of Plants and Materials,'' that would apply during the storage of SNF at an ISFSI and... facilities licensed to store SNF through a combination of these existing security regulations and the...
Preparation for Bargaining: Negotiation and Administration of the Contract.
ERIC Educational Resources Information Center
Higginbotham, Richard L.
Every state will soon have some negotiation law covering school employees. If negotiation is an adversary process between two powers, then there has to be a balance of power between the school board and union. Today unions have more actual and potential power than school management. Unions spend great sums of money preparing for negotiations and…
ERIC Educational Resources Information Center
Buzzanell, Patrice M.
2001-01-01
Analyzes and critiques a front-page article in the "Wall Street Journal." Finds that, underlying an image of fun and equitable workplace, is a disquieting depiction of adversarial gendered relationships, and of career advice that can damage the competence assessments and long-term advancement of women. (SR)
A Combined Arms Approach to Defending Army Networks
2012-01-01
GIG operates, through cyberspace, as a globally interconnected, end...operations from the friendly to adversary box increases the situational awareness and unity of effort the Army lacks, and creates an economy of force that...indica- tions and warnings • Present a timely and accurate estimate of technical impact result- ing from the threat activity and determine
A First-cut Concept Map: The Irregular Adversary (Insurgent)
2012-12-01
conceptuel des AANE aidera le spécialiste du renseignement militaire à brosser pour le commandant un tableau plus global des AANE dans leur...Crandall et al. (2006), « il est sage de toujours considérer les schémas conceptuels comme des représentations « vivantes » plutôt que des « produits
2012-02-08
EMOE is the background electromagnetic environment and the friendly, neutral, and adversarial electronic order of battle within the...X-RayELF VLF MF VHF SHFLF HF Radio Spectrum Visible Spectrum UHF EHF Gamma Ray Cosmic Ray The top bar shows how the electromagnetic spectrum is...effects of sunspots, lightning, and precipitation static. Essentially, the EME is the global EM background . Figure I-2. Electromagnetic Environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sasser, D.W.
1978-03-01
EASI (Estimate of Adversary Sequence Interruption) is an analytical technique for measuring the effectiveness of physical protection systems. EASI Graphics is a computer graphics extension of EASI which provides a capability for performing sensitivity and trade-off analyses of the parameters of a physical protection system. This document reports on the implementation of EASI Graphics and illustrates its application with some examples.
ERIC Educational Resources Information Center
Goldberg, Steven S.
1989-01-01
A federal statute provided that parents may use the judicial process to challenge educators' decisions. Describes the intent of legalization; how reaction to an adversarial system led to the use of mediation in most states; and why this alternative model is not appropriate for resolving education questions. (MLF)
Love's Labor Lost: Emotional Agency in a School Worker's Story of Family Advocacy
ERIC Educational Resources Information Center
Naraian, Srikala
2015-01-01
This study reports on the dilemmas of practice experienced by a parent-school facilitator, Melanie, within a large urban school district. Melanie struggled to reconcile her commitment to families in her school with the demands placed on her by an administrative ideology that viewed families as adversaries. Her attempts to manage the conflicts…
Creating Schools of Peace and Nonviolence in a Time of War and Violence
ERIC Educational Resources Information Center
Cavanagh, Tom
2009-01-01
In this post 9/11 era Western cultures are focusing on values that support war and violence. In this article an ethnographer explores the impact of these values on schools. These values, seen through the lens of restorative justice, include: (a) punishment, (b) adversarial relationships, (c) monopolization of power, (d) problemization and…
ERIC Educational Resources Information Center
van Wormer, Katherine
2009-01-01
This article provides an overview of restorative justice as a process and examines its relevance to women who have been victimized by physical and sexual abuse. The starting point is the justice system with its roots in adversarial, offender-oriented practices of obtaining justice. The widespread dissatisfaction by battered women and rape victims…
2013-04-21
Britain. Third, Rumania, Bulgaria, Hungary, and Yugoslavia began aligning with the Axis. Fourth, Germany dominated Scandinavia through an occupation of...during the air campaigns supporting the conquests of Poland, Scandinavia , and Western Europe. Likewise, the Luftwaffe never fought an adversary that
ERIC Educational Resources Information Center
Gast, Frances M.
2011-01-01
One of the epicenters of the historic preservation movement in the United States, the east side of Providence is also home to Brown University and Rhode Island School of Design. Preservation leaders and institutional leaders--sometimes adversaries, sometimes partners--took a meandering path toward the expansive notion of Historic Providence that…
Combating Terrorism Technical Support Office. 2008 Review
2009-01-15
threat object displayed at the operator control unit of the robotic platform. Remote Utility Conversion Kit The Remote Utility Conversion Kit (RUCK) is a...three- dimensional and isometric simulations and games. Develop crowd models, adversarial behavior models, network-based simulations, mini-simulations...Craft-Littoral The modular unmanned surface craft-littoral ( MUSCL ) is a spin- off of EOD/LIC’s Unmanned Reconnaissance Observation Craft, developed
Contracting With the Enemy: The Contracting Officer’s Dilemma
2015-06-01
forgery, bribery , etc. Intentionally misusing "Made in America" designation Other offenses indicating a lack of business integrity or honesty that...major risk associated with using local national contractors in contingency environments is the presence of business entities that may directly or...indirectly support adversarial forces. Entering into contracts with enemy-affiliated business entities creates significant contractual and security
Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop
2015-12-01
simulation) perspective. This would be natural, considering that the cybersecurity problem is highly adversarial in nature. Because it involves intelligent ...be formulated as a partial information game; artificial intelligence techniques might help here. Yet another style of problem formulation that...computational information processing for weapons, intelligence , communication, and logistics systems continues to increase the vulnerability of
Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization
2016-05-30
Hide and Seek: Exploiting and Hardening Leakage -Resilient Code Randomization Robert Rudd MIT Lincoln Laboratory Thomas Hobson MIT Lincoln Laboratory...Irvine Ahmad-Reza Sadeghi TU Darmstadt Hamed Okhravi MIT Lincoln Laboratory Abstract Information leakage vulnerabilities can allow adversaries to...bypass mitigations based on code randomization. This discovery motivates numerous techniques that diminish direct and indirect information leakage : (i
Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization
2016-03-30
Hide and Seek: Exploiting and Hardening Leakage -Resilient Code Randomization Robert Rudd MIT Lincoln Laboratory Thomas Hobson MIT Lincoln Laboratory...Irvine Ahmad-Reza Sadeghi TU Darmstadt Hamed Okhravi MIT Lincoln Laboratory Abstract Information leakage vulnerabilities can allow adversaries to...bypass mitigations based on code randomization. This discovery motivates numerous techniques that diminish direct and indirect information leakage : (i
Influence of rock videos on attitudes of violence against women.
Peterson, D L; Pfost, K S
1989-02-01
144 undergraduate men viewed rock videos which contained content that was erotic-violent, erotic-nonviolent, nonerotic-violent, or nonerotic-nonviolent. Exposure to nonerotic-violent rock videos resulted in significantly higher Adversarial Sexual Beliefs scores and ratings of negative affect. These and other findings are discussed in terms of Bandura's concept of emotional incompatibility and the frustration-aggression model.
Adversaries and Allies: Rival National Suffrage Groups and the 1882 Nebraska Woman Suffrage Campaign
ERIC Educational Resources Information Center
Heider, Carmen
2005-01-01
In September 1882, Nebraska was the setting for a significant moment in the history of the United States women's rights movement: the two rival suffrage organizations, the American Woman Suffrage Association (AWSA) and the National Woman Suffrage Association (NWSA), both held their annual conventions in Omaha. The alliance of the AWSA and the NWSA…
Recent Acquisition Reform Through Technology and Workforce Improvements
2016-09-01
HMMWV High Mobility Multipurpose Wheeled Vehicle IED Improvised Explosive Device IRAD Independent Research And Development JCIDS Joint...their specific field within the acquisition community (Eide & Allen, 2012). In 1993, the Government Performance and Results Act (GPRA) was enacted...need arises as the nation’s “adversaries are modernizing at a significant rate, and they are responding rapidly to our development programs and fielded
ERIC Educational Resources Information Center
Cristol, Dean
2004-01-01
For more than forty years the governments of the United States and Cuba have maintained an adversarial relationship toward one another. Much of the negativity is expressed through verbal accusations, but at times there have been several destabilizing and sometimes dangerous actions by one or both governments such as the 1962 Missile Crisis,…
Machine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter
2008-05-20
Machine learning techniques are often used for decision making in security critical applications such as intrusion detection and spam filtering...filter. The defenses shown in this thesis are able to work against the attacks developed against SpamBayes and are sufficiently generic to be easily extended into other statistical machine learning algorithms.
29 CFR 102.143 - “Adversary adjudication” defined; entitlement to award; eligibility for award.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Marketing Act (12 U.S.C. 1141j(a)) with not more than 500 employees; and (5) Any other partnership... purposes of the Equal Access to Justice Act (94 Stat. 2325) in light of the actual relationship between the affiliated entities. In addition financial relationships of the applicant other than those described in this...
ERIC Educational Resources Information Center
Crittenden, Barry D.; England, Richard
2005-01-01
The principles and practices of environmental impact assessment are best taught to chemical engineering undergraduate students by means of a role-playing case study. Many suitable examples are available from public sources. The planning appeal process has been selected so as to introduce an adversarial style involving cross-examination on…
Manhunting: Counter-Network Organization for Irregular Warfare
2009-09-01
received his B.A. in International Relations from the University of Kansas in 1985 and M.S. in Computer Applications Management from Lesley University...collection management , and targeting.b. Operational level processes begin with intelligence on the adversary capabilities with granular focus to mitigate... managers work with analysts, targeting experts, decision makers, planners, and operations personnel, guiding multidisciplinary intelligence collection to
Illuminating the Shadows of War: Demystifying Complex Adaptive Systems
2009-06-01
time for reviewing instructions, searching existing data sources , gathering and maintaining the data needed, and completing and reviewing the...resources required when confronting an adversary such as Hezbollah. Apportionment of time, effort, and resources to influence 2 Hezbollah’s...Figure 1: Clausewitz’s Paradoxical Trinity Source : Author’s original work Nearly a century later, British Army officer, military
ERIC Educational Resources Information Center
Whitney, Simon N.; Brown, Byron W.; Brody, Howard; Alcser, Kirsten H.; Bachman, Jerald G.; Greely, Henry T.
2001-01-01
Ascertained the views of physicians and physician leaders toward legalization of physician-assisted suicide. Results indicated members of AMA House of Delegates strongly oppose physician-assisted suicide, but rank-and-file physicians show no consensus either for or against its legalization. Although the debate is adversarial, most physicians are…
Human Cognitive Enhancement Ethical Implications for Airman-Machine Teaming
2017-04-06
34 Psychological Constructs versus Neural Mechanisms: Different Perspectives for Advanced Research of Cognitive Processes and Development of Neuroadaptive...AIR WAR COLLEGE AIR UNIVERSITY HUMAN COGNITIVE ENHANCEMENT ETHICAL IMPLICATIONS FOR AIRMAN-MACHINE TEAMING by William M. Curlin...increasingly challenging adversarial threats. It is hypothesized that by the year 2030, human system operators will be “ cognitively challenged” to keep pace
Security Engineering FY17 Systems Aware Cybersecurity
2017-12-07
11 Figure 4 A hierarchical controls model that defines the expected service of a UAV. Each level is...defined by a generic control structure. Inadequate control in each level can cause an adversarial action to degrade the expected service and produce a...and can completely violate the systems expected service by escalating their privileges by either using the attack vectors presented individually or
ERIC Educational Resources Information Center
Duquette, Cheryll; Fullarton, Stephanie; Orders, Shari; Robertson-Grewal, Kristen
2011-01-01
The purpose of this qualitative study was to examine the educational advocacy experiences of parents of adolescents and young adults identified as having a learning disability (LD) through the lens of four dimensions of advocacy. Seventeen mothers of youth with LD responded to items in a questionnaire and 13 also engaged in in-depth interviews. It…
ERIC Educational Resources Information Center
Hanna, Mark; Sanders, Karen
2012-01-01
A longitudinal study of U.K. journalism undergraduates records how their attitudes on societal roles of the news media changed during university education. Students became more likely to endorse an adversarial approach toward public officials and businesses as extremely important. Yet students did not support these roles as strongly as an older…
Strategic Mobility 21 Project Management Plan
2006-09-29
California Association of Governments (SCAG), and other stakeholders to transform the former military installation into a modern in-land distribution node... governments , including adversary governments , and may be exported. c. This statement may not be used on technical documents that formerly were...required updates of both the ICD and the Technical Plan. SM21 has established a consortium of public and private, governmental and non
Strategic Mobility 21: Integrated Tracking System Analysis and Concept Design
2007-08-31
public and foreign nationals, companies, and governments , including adversary governments , and may be exported. c. This statement may not be used on...42 ii Integrated Tracking System Analysis & Concept Design LIST OF FIGURES Figure 1: Southern California Association of Governments ...conducted under the auspices of the California State University – Long Beach Foundation, a government -industry academic collaborative enterprise
Strategic Mobility 21 Technical Plan
2006-09-06
or grant. b. Technical documents with this statement may be made available or sold to the public and foreign nationals, companies, and governments ...including adversary governments , and may be exported. c. This statement may not be used on technical documents that formerly were classified...Transportation Technologies (CCDOTT), a government -industry academic collaborative enterprise. 2 Dual-use technology serves as a basis for both
Enhancing Arctic Surveillance With Space-Based Radars
2013-06-01
shipping, hydrocarbon extraction, fishing, and tourism activities (to name but just a few) are increasing in frequency, duration, and intensity and...maritime activities in the Arctic Circle ranging from relatively benign tourism ventures to adversary naval combatant maneuvers, the United States...activities there (U.S. Northern Command Posture Statement, 2011). Without awareness of human activities such as shipping, tourism , military operations
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
2015-01-01
independence in Tor. 5.1 Vanilla Tor All of our Tor simulations run over the week of January 19– 25, 2014. When producing and analyzing these simulations, we...selection using path simula- tion and our traceroute data, similar to how they were used in Section 5.1 to explore vanilla Tor security. As a byproduct
ERIC Educational Resources Information Center
Stake, Robert E.; Gjerde, Craig
This evaluation of the Twin City Institute for Talented Youth, a summer program for gifted students in grades 9 through 12, consists of two parts: a description of the program; and the evaluators' assessments, including advocate and adversary reports. Achievement tests were not used for evaluation. Evaluative comments follow each segment of the…
A Study of Covert Communications in Space Platforms Hosting Government Payloads
2015-02-01
possible adversarial actions (e.g., malicious software co- resident on the commercial host). Threats to the commercial supply chain are just one... supply chain to either create or exploit channel vulnerabilities. For government hosted payload missions, the critical payload data are encrypted...access to space by hosting government- supplied payloads on commercial space platforms. These commercially hosted payloads require stringent
Interim Report on Interagency National Personnel Recovery Architecture
2003-07-01
adversaries are smart , however, and rather than face our forces on open battlefields, they will seek to use any asymmetric advantage open to them. If...Liaison Officer SARNEG Search and Rescue Numeric Encryption Grid SARPO Search and Rescue Planning Officer SARREQ Search and Rescue Request SARSAT...Unconventional Assisted Recovery UARCC Unconventional Assisted Recovery Coordination Center UARM Unconventional Assisted Recovery Mechanism UART
2016-02-11
directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http
Visual quality testimony in an adversary setting
Bruce H. Murray; Bernard J. Niemann Jr.
1979-01-01
This paper documents the conditions, procedures, techniques and conclusions under which a utility was required to replace two-thirds of a mile segment of overhead 69 kv transmission line passing an Ice Age National Scieytific Reserve with underground at the cost of $950,000 vs. $60,000 for overhead (WPSC 1978). Because the proposed right-of-way would not, in this case...
Control Theoretic Modeling for Uncertain Cultural Attitudes and Unknown Adversarial Intent
2009-02-01
Constructive computational tools. 15. SUBJECT TERMS social learning, social networks , multiagent systems, game theory 16. SECURITY CLASSIFICATION OF: a...over- reactionary behaviors; 3) analysis of rational social learning in networks : analysis of belief propagation in social networks in various...general methodology as a predictive device for social network formation and for communication network formation with constraints on the lengths of
Automated Program Analysis for Cybersecurity (APAC)
2016-07-14
AUTOMATED PROGRAM ANALYSIS FOR CYBERSECURITY (APAC) FIVE DIRECTIONS, INC JULY 2016 FINAL TECHNICAL REPORT APPROVED... CYBERSECURITY (APAC) 5a. CONTRACT NUMBER FA8750-14-C-0050 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR(S) William Arbaugh...AC Team Adversarial Challenge Team, responsible for creating malicious applications APAC Automated Program Analysis for Cybersecurity BAE BAE Systems
Natural-Born Arguers: Teaching How to Make the Best of Our Reasoning Abilities
ERIC Educational Resources Information Center
Mercier, Hugo; Boudry, Maarten; Paglieri, Fabio; Trouche, Emmanuel
2017-01-01
We summarize the argumentative theory of reasoning, which claims that the main function of reasoning is to argue. In this theory, argumentation is seen as being essentially cooperative (people have to listen to others' arguments and be ready to change their mind) but with an adversarial dimension (their goal as argument producers is to convince).…
The Effects of Team Leader Feedback on Situation Assessment in Distributed Anti-Air Warfare Teams
1992-03-01
period makes warning signs even more ambiguous, reaction times even shorter, the identity and motives of potential adversaries more vague and the...A Great liule Deal 7. On average, how many measuments did you take per trial (for the scenario trials just completed)? I I I I I I 0 2 4 6 8 10or
WMD Intent Identification and Interaction Analysis Using the Dark Web
2016-04-01
WMD Intent Identification and Interaction Analysis Using the Dark Web Distribution Statement A. Approved for public release; distribution is...Organization/Institution: University of Arizona Project Title: WMD Intent Identification and Interaction Analysis Using the Dark Web Report Period: Final...and social media analytics. We are leveraging our highly successful Dark Web project as our research testbed (for identifying target adversarial
Psychology and the prevention of nuclear war: A book of readings
DOE Office of Scientific and Technical Information (OSTI.GOV)
White, R.K.
This book contains eight sections, each consisting of several papers. Some of the paper titles are: On Numbing and Feeling; The Mirror Image in Soviet-American Relations; Empathizing with the Soviet Government; Decision Making in Crises; The Nature and Control of Escalation; Cognitive Perspectives on Foreign Policy; and Deterrence, the Spiral Model and Intentions of the Adversary.
1991-09-27
in the world will be able to compare with the United IV. Basic Characteristics of the Future Multipolar States and the USSR in military strength...main characteristic of the bipolar age was two and strike capabilities. They were also the earliest to antithetical superpowers, formulation of a...over the adversary. By military expenditures, totaling $950 billion. Third, the comparison with the foregoing characteristics , the mul- United States
Transnational Criminal Organizations: Mexico’s Commercial Insurgency
2012-10-01
government officials and journalists have compared the violence of transnational criminal organizations (TCOs) within Mexico to the terrorist tactics...inefficient allocation of diplomatic, military, and economic power. Latency on the part of government officials and military strategists further complicates...matters. When evaluating a potential adversary, govern - ments often respond too late to be effective in crises. For example, in 1994, 800,000
A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs †
Shi, Yang; Wei, Wujing; He, Zongjian
2015-01-01
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform. Handling white-box attacks in a WSN scenario is a challenging task. Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios. As a countermeasure against the threat in this context, in this paper, we propose a class of lightweight secure implementations of the symmetric encryption algorithm SMS4. The basic idea of our approach is to merge several steps of the round function of SMS4 into table lookups, blended by randomly generated mixing bijections. Therefore, the size of the implementations are significantly reduced while keeping the same security efficiency. The security and efficiency of the proposed solutions are theoretically analyzed. Evaluation shows our solutions satisfy the requirement of sensor nodes in terms of limited memory size and low computational costs. PMID:26007737
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
Emerging From Water: Underwater Image Color Correction Based on Weakly Supervised Color Transfer
NASA Astrophysics Data System (ADS)
Li, Chongyi; Guo, Jichang; Guo, Chunle
2018-03-01
Underwater vision suffers from severe effects due to selective attenuation and scattering when light propagates through water. Such degradation not only affects the quality of underwater images but limits the ability of vision tasks. Different from existing methods which either ignore the wavelength dependency of the attenuation or assume a specific spectral profile, we tackle color distortion problem of underwater image from a new view. In this letter, we propose a weakly supervised color transfer method to correct color distortion, which relaxes the need of paired underwater images for training and allows for the underwater images unknown where were taken. Inspired by Cycle-Consistent Adversarial Networks, we design a multi-term loss function including adversarial loss, cycle consistency loss, and SSIM (Structural Similarity Index Measure) loss, which allows the content and structure of the corrected result the same as the input, but the color as if the image was taken without the water. Experiments on underwater images captured under diverse scenes show that our method produces visually pleasing results, even outperforms the art-of-the-state methods. Besides, our method can improve the performance of vision tasks.
Huo, Yuankai; Xu, Zhoubing; Bao, Shunxing; Bermudez, Camilo; Plassard, Andrew J.; Liu, Jiaqi; Yao, Yuang; Assad, Albert; Abramson, Richard G.; Landman, Bennett A.
2018-01-01
Spleen volume estimation using automated image segmentation technique may be used to detect splenomegaly (abnormally enlarged spleen) on Magnetic Resonance Imaging (MRI) scans. In recent years, Deep Convolutional Neural Networks (DCNN) segmentation methods have demonstrated advantages for abdominal organ segmentation. However, variations in both size and shape of the spleen on MRI images may result in large false positive and false negative labeling when deploying DCNN based methods. In this paper, we propose the Splenomegaly Segmentation Network (SSNet) to address spatial variations when segmenting extraordinarily large spleens. SSNet was designed based on the framework of image-to-image conditional generative adversarial networks (cGAN). Specifically, the Global Convolutional Network (GCN) was used as the generator to reduce false negatives, while the Markovian discriminator (PatchGAN) was used to alleviate false positives. A cohort of clinically acquired 3D MRI scans (both T1 weighted and T2 weighted) from patients with splenomegaly were used to train and test the networks. The experimental results demonstrated that a mean Dice coefficient of 0.9260 and a median Dice coefficient of 0.9262 using SSNet on independently tested MRI volumes of patients with splenomegaly.
NASA Astrophysics Data System (ADS)
Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Santhanam, Gokula Krishnan
2017-05-01
Observations of astrophysical objects such as galaxies are limited by various sources of random and systematic noise from the sky background, the optical system of the telescope and the detector used to record the data. Conventional deconvolution techniques are limited in their ability to recover features in imaging data by the Shannon-Nyquist sampling theorem. Here, we train a generative adversarial network (GAN) on a sample of 4550 images of nearby galaxies at 0.01 < z < 0.02 from the Sloan Digital Sky Survey and conduct 10× cross-validation to evaluate the results. We present a method using a GAN trained on galaxy images that can recover features from artificially degraded images with worse seeing and higher noise than the original with a performance that far exceeds simple deconvolution. The ability to better recover detailed features such as galaxy morphology from low signal to noise and low angular resolution imaging data significantly increases our ability to study existing data sets of astrophysical objects as well as future observations with observatories such as the Large Synoptic Sky Telescope (LSST) and the Hubble and James Webb space telescopes.
Edens, John F; Penson, Brittany N; Ruchensky, Jared R; Cox, Jennifer; Smith, Shannon Toney
2016-12-01
Published research suggests that most violence risk assessment tools have relatively high levels of interrater reliability, but recent evidence of inconsistent scores among forensic examiners in adversarial settings raises concerns about the "field reliability" of such measures. This study specifically examined the reliability of Violence Risk Appraisal Guide (VRAG) scores in Canadian criminal cases identified in the legal database, LexisNexis. Over 250 reported cases were located that made mention of the VRAG, with 42 of these cases containing 2 or more scores that could be submitted to interrater reliability analyses. Overall, scores were skewed toward higher risk categories. The intraclass correlation (ICCA1) was .66, with pairs of forensic examiners placing defendants into the same VRAG risk "bin" in 68% of the cases. For categorical risk statements (i.e., low, moderate, high), examiners provided converging assessment results in most instances (86%). In terms of potential predictors of rater disagreement, there was no evidence for adversarial allegiance in our sample. Rater disagreement in the scoring of 1 VRAG item (Psychopathy Checklist-Revised; Hare, 2003), however, strongly predicted rater disagreement in the scoring of the VRAG (r = .58). (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Chevalier, Caroline S; Boccaccini, Marcus T; Murrie, Daniel C; Varela, Jorge G
2015-06-01
We surveyed experts (N = 109) who conduct sexually violent predator (SVP) evaluations to obtain information about their Static-99R score reporting and interpretation practices. Although most evaluators reported providing at least 1 normative sample recidivism rate estimate, there were few other areas of consensus. Instead, reporting practices differed depending on the side for which evaluators typically performed evaluations. Defense evaluators were more likely to endorse reporting practices that convey the lowest possible level of risk (e.g., routine sample recidivism rates, 5-year recidivism rates) and the highest level of uncertainty (e.g., confidence intervals, classification accuracy), whereas prosecution evaluators were more likely to endorse practices suggesting the highest possible level of risk (e.g., high risk/need sample recidivism rates, 10-year recidivism rates). Reporting practices from state-agency evaluators tended to be more consistent with those of prosecution evaluators than defense evaluators, although state-agency evaluators were more likely than other evaluators to report that it was at least somewhat difficult to choose an appropriate normative comparison group. Overall, findings provide evidence for adversarial allegiance in Static-99R score reporting and interpretation practices. (c) 2015 APA, all rights reserved).
Ding, Chao; Yang, Lijun; Wu, Meng
2017-01-01
Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846
NASA Astrophysics Data System (ADS)
Paganini, Michela; de Oliveira, Luke; Nachman, Benjamin
2018-01-01
The precise modeling of subatomic particle interactions and propagation through matter is paramount for the advancement of nuclear and particle physics searches and precision measurements. The most computationally expensive step in the simulation pipeline of a typical experiment at the Large Hadron Collider (LHC) is the detailed modeling of the full complexity of physics processes that govern the motion and evolution of particle showers inside calorimeters. We introduce CaloGAN, a new fast simulation technique based on generative adversarial networks (GANs). We apply these neural networks to the modeling of electromagnetic showers in a longitudinally segmented calorimeter and achieve speedup factors comparable to or better than existing full simulation techniques on CPU (100 ×-1000 × ) and even faster on GPU (up to ˜105× ). There are still challenges for achieving precision across the entire phase space, but our solution can reproduce a variety of geometric shower shape properties of photons, positrons, and charged pions. This represents a significant stepping stone toward a full neural network-based detector simulation that could save significant computing time and enable many analyses now and in the future.
Performance evaluation of various K- anonymity techniques
NASA Astrophysics Data System (ADS)
Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand
2011-12-01
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.
Wang, Yi; Wan, Jianwu; Guo, Jun; Cheung, Yiu-Ming; Yuen, Pong C; Yi Wang; Jianwu Wan; Jun Guo; Yiu-Ming Cheung; Yuen, Pong C; Cheung, Yiu-Ming; Guo, Jun; Yuen, Pong C; Wan, Jianwu; Wang, Yi
2018-07-01
Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric privacy protection are in general based on pairwise matching of secured biometric templates and have inherent limitations in search efficiency and scalability. In this paper, we propose an inference-based framework for privacy-preserving similarity search in Hamming space. Our approach builds on an obfuscated distance measure that can conceal Hamming distance in a dynamic interval. Such a mechanism enables us to systematically design statistically reliable methods for retrieving most likely candidates without knowing the exact distance values. We further propose to apply Montgomery multiplication for generating search indexes that can withstand adversarial similarity analysis, and show that information leakage in randomized Montgomery domains can be made negligibly small. Our experiments on public biometric datasets demonstrate that the inference-based approach can achieve a search accuracy close to the best performance possible with secure computation methods, but the associated cost is reduced by orders of magnitude compared to cryptographic primitives.
Ding, Chao; Yang, Lijun; Wu, Meng
2017-01-15
Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.
Hard Fighting: Israel in Lebanon and Gaza
2011-01-01
mines . Hezbollah itself also proved an unexpectedly formidable adversary. During the years leading up to the Second Lebanon War, Hezbollah forces...hitting Hamas positions and detonating mines and IEDs. IDF engineers used armored D-9 bulldozers to clear paths through the remaining IEDs. Armored...discipline; cellular structure; small formations (squads) • Weapons: small arms; RPGs; mortars; short- range rockets; IEDs/ mines • Command and control
ERIC Educational Resources Information Center
Association for Education in Journalism and Mass Communication.
The Minorities and Communication section of the proceedings contains the following 10 papers: "A Content Analysis of Advertising Techniques in Mass Market and African-American Magazine Advertisements" (Jan S. Slater and others); "Political and Racial Adversaries: Southern Black Elected Officials and the Press" (Daniel Riffe and…
Assessing Conventional Army Demands and Requirements for Ultra-Light Tactical Mobility
2015-01-01
hour Enemy or adversary actions Population Decision points Reserve Fires Engineer PMO AMD CBRN Intelligence R&S Avn Bde M o ve m en t an d m an eu ve...LDMove on Route Irish Seize on OBJ Irene 2nd BCT Cross LDMove on Route Longstreet Seize on OBJ Rose 3rd BCT FPOL with 1st BCT Airdrop resupply AMD Avn Bde
Incubating a Space Strategy: The Role of Education
2017-06-01
strategies in denying the high ground the Air Force maintains while tensions increase. As the Air Force continues to transform space operations based on...a competitive advantage over adversaries.19 Space also enables economic growth, improved standards of living and increased communications that...fiction. The US space community , along with every space -faring nation, can either adapt to the new environment and take proactive measures in mitigating
Cognitive-Emotional Conflict: Adversary Will and Social Resilience
2017-12-21
are effective counters to these information flows, especially when poorly coordinated. The U.S. military and intelligence communities are starting...the Intelligence Community (IC) have exceptional technical cyber capabilities across the full range of OCO, DCO, and CNE as well as many of the non...integrated into the cybersecurity community than in many other countries, partnering through programs like “bugs for bounty” and hackathons. National
Vision-Based Autonomous Sensor-Tasking in Uncertain Adversarial Environments
2015-01-02
motion segmentation and change detection in crowd behavior. In particular we investigated Finite Time Lyapunov Exponents, Perron Frobenius Operator and...deformation tensor [11]. On the other hand, eigenfunctions of, the Perron Frobenius operator can be used to detect Almost Invariant Sets (AIS) which are... Perron Frobenius operator. Finally, Figure 1.12d shows the ergodic partitions (EP) obtained based on the eigenfunctions of the Koopman operator
Integrated Cyber Defenses: Towards Cyber Defense Doctrine
2007-12-01
National Security Affairs Department) Professor Dorothy Denning (Defense Analysis Department) To select NPS Instructors for teaching me how to...asymmetric battlefield advantage to get inside adversary decision cycles to shorten the “kill chain.” As a force multiplier, NCW continues to...the] number of [network] events is increasing.6 Therefore, the DoD and each U.S. military service faces the daunting challenge of determining how
National Guard State Partnership Program: A Means for Statecraft
2011-03-24
subsystems of interest; bringing its enormous material capabilities to bear, [and] U.S. shaping efforts may constrain the choices of adversaries and...Ambassadors by building the international, civil-military partnerships and interoperability during peacetime. This is done by linking state capacities...Europe, MG Enyart became the senior U.S. military official to represent President Obama with Ambassador Lee Feinstein at the funeral processions (See
When 21st-Century Schooling Just Isn't Good Enough: A Modest Proposal
ERIC Educational Resources Information Center
Kohn, Alfie
2009-01-01
Quite a few school district administrators, and even more people who are not educators but are kind enough to offer their advice about how the field can be improved, have emphasized the need for "21st-century schools" that teach "21st-century skills." However, this is not enough, particularly now that some adversaries (in other words, people who…
2014-11-01
Approved for public release. OPERATIONALIZING THE JOINT INFORMATION ENVIRONMENT: ACHIEVING INFORMATION DOMINANCE WITH THE UNDERSEA CONSTELLATION* Captain...SUBTITLE Operationalizing the Joint Information Environment: Achieving Information Dominance with the Undersea Constellation (U) 5a. CONTRACT NUMBER...predict what is over the horizon, faster than the adversary. As noted in the U.S. Navy’s Vision for Information Dominance , “The Navy will create a
Bridging the Gap: Enhancing SNA Within the Marine Corps Intelligence Community
2015-06-01
ENHANCING SNA WITHIN THE MARINE CORPS INTELLIGENCE COMMUNITY by Robert C. Schotter June 2015 Thesis Advisor: Raymond Buettner Co-Advisor...INTELLIGENCE COMMUNITY 5. FUNDING NUMBERS 6. AUTHOR(S) Robert C. Schotter 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate...United States Marine Corps and the Marine Corps’ intelligence community recognize that future adversaries are likely to be adaptive and complex. Both
Implementing the Transformation Vision
2006-01-01
competitive advantage in warfare. To achieve these objectives, transformation advocates aim to anticipate and create the future rather than react to a future that adversaries seek to impose. While the coevolution of military concepts, processes, organizations, and technology is not entirely new, the current DOD approach to transformation recognizes that a profound change in one of these areas can trigger a change in the others, creating both new competencies and new
Identifying Emerging Hybrid Adversaries
2012-01-01
average 1 hour per response , including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON a. REPORT...an extended engage- ment area to get into the close fight.4 In addition, they will employ a wide range of capabilities including cyber, social media
Continuity and Contingency in USAF Posture Planning
2016-01-01
with these adversaries. It also galvanized U.S. legislators , who dropped their normal objections to building bases overseas and resourced the efforts...Organized crime threats to El Savador gov Terrorism/piracy/crime Central America/Carb 81 Terrorists bomb Colombian parliament Terrorism/piracy/crime...Epidemic 4 2025-2034 Terrorists bomb Colombian parliament Terrorism/piracy/crime 81 2025-2034 Kosovo Civil conflict 18 2025-2034 Israel-Egypt in Sinai
Operational Vigilant Warrior: Conventional Deterrence Theory, Doctrine, and Practice
1996-06-01
psychological aspect of retaliation more than the possibility that defensive actions can deny anticipated gains. This definition is insufficient to...nuclear deterrence, conventional deterrence can also be based on eliminating or limiting the adversary’s ability to act. The nature and destructive...conclusions from the theory and evidence presented in the previous chapters. It reviews how conventional deterrence can be improved by exploiting
Applying Lessons Learned from Interwar Airpower (1919-1939) to Joint Warfighting with Cyberpower
2014-06-13
5 Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz, eds., Cyberpower and National Security (Washington...doctrines because such doctrines reduce uncertainty and increase organizational size, wealth , and autonomy.” 3 Offensive doctrines, defined as doctrines...almost any adversary and its geographic security. Russell Weigley, in his work The American Way of War, notes that as the military power of the
Evaluating the Security of Machine Learning Algorithms
2008-05-20
Two far-reaching trends in computing have grown in significance in recent years. First, statistical machine learning has entered the mainstream as a...computing applications. The growing intersection of these trends compels us to investigate how well machine learning performs under adversarial conditions... machine learning has a structure that we can use to build secure learning systems. This thesis makes three high-level contributions. First, we develop a
Biologically-Inspired Deceptive Behavior for a Robot
2012-01-01
by sending false signals either intentionally or unintentionally, are essential for animals’ survival. For example, camouflage and mimicry are well...detection by both predators and their prey. While camouflage or mimicry are examples of unknowingly deceiving, a deceptive behavior can include...face this situation, where it is important to discourage an adversary from discovering a protected site, so the application of these bio -inspired
2017-02-01
scale blade servers (Dell PowerEdge) [20]. It must be recognized however, that the findings are distributed over this collection of architectures not...current operating system designs run into millions of lines of code. Moreover, they compound the opportunity for compromise by granting device drivers...properties (e.g. IP & MAC address) so as to invalidate an adversary’s surveillance data. The current running and bootstrapping instances of the micro
Enabling Persistent Peace After Negotiated Settlements
2016-12-01
event either party fails to comply with the agreements, especially on the issue of power sharing, recurrence of conflict is high . Another cause...persistent peace after a negotiated settlement when the government holds a majority of the power . Additionally, an examination of Mozambique’s civil war...provisions can be used to stabilize expectations and reduce uncertainty. When adversaries agree to share power , this action can prolong the peace by
Distinctive Competencies: Taming the Marine Corps-glomerate
1998-01-01
strategic objectives, intentions , and designs of allies and adversaries alike. The post-Cold War replacement of threat-based forces by capabilities... intentions to remain engaged, implicitly exchanging a strategic paradigm centered on visible forward presence for one based on aloof power projection...by defense leaders to “adopt and adapt the lessons of the private sector,” it is worth considering private sector tools for strategic planning that
Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques
2008-06-01
Hide Things from Hackers: Processes, Principles, and Techniques,” Journal of Information Warfare , 5 (3): 26-40 (2006). 20. Rosenau, William ...54 Additional Sources Apel , Thomas. Generating Fingerprints of Network Servers and their Use in Honeypots. Thesis. Aachen University, Aachen...Paul Williams , PhD (ENG) REPORT U ABSTRACT U c. THIS PAGE U 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 55
Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks
2017-03-01
MAST is a custom software framework originally designed to facilitate the training of network administrators on live networks using SimWare. The MAST...or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services ...scenario development and testing in a virtual test environment. Commercial and custom software tools that provide the ability to conduct network
Quantum money with classical verification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gavinsky, Dmitry
We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.
2011-12-16
broadcasts, but verified by eyewitness accounts spread through word of mouth conduits. See the Dhofari case study. He also explained adversarial...information conduits of the tribes. Word of mouth was to be one the more reliable information...information conduits to its target audiences: notice boards, leaflets, word of mouth , newspapers, radio, and television. Notice boards were placed in
Quantum money with classical verification
NASA Astrophysics Data System (ADS)
Gavinsky, Dmitry
2014-12-01
We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.
Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis
2005-12-01
reasoning balanced against deductive (hypothesis- based and evidence tested) reasoning . It extols the value of truly scientific modes of thinking, including...the age of information and globalization. We need to be more open on a lot of things, especially where the original reason for secrecy perishes quickly...been reasonably successful in meeting the challenges on the tactical battlefield of locating, identifying, and targeting adversary units for main
Invasive Threats to the American Homeland
2004-04-01
The second example is the glassy-winged sharpshooter, an invasive insect that hosts the bacterium Xylella Fastidiosa . The insect was first de- tected... Xylella Fastidiosa causes Pierce’s Disease in grapes, which infects and kills the grapevine. The glassy-winged sharpshooter transmits and spreads the...netic processes.” Adversaries of the United States may modify the genetics of an invasive species to increase its competitiveness, virulence , lethality
ERIC Educational Resources Information Center
Little, Richard D.
Although colleges and universities generally regard the First Amendment as sacred, they often find themselves at the center of controversies concerning the right to say, print, write, or research with freedom. The complex relationships between a college or university and its student media have often contributed to conflicts over First Amendment…
Project Air Force Annual Report 2007
2007-01-01
China has developed options that would make it a formidable adversary, particularly in a conflict over Taiwan , which the United States remains...he focused on China’s relationship with Taiwan . Since then, he has worked with other RAND analysts, such as David Orletsky, Evan Medeiros, Keith Crane...Hamilton, engineers Jeff Hagen and David Vaughan, Air Force Fellow Michelle Grace, behavioral scientist Larry Hanser, and information scientist Herb Shukiar
The Poor Ye Need Not Have with You; Lessons from the War on Poverty.
ERIC Educational Resources Information Center
Levine, Robert A.
The book provides a dichotomy of the general technique of problem handling in the United States; i.e., getting even or punishing the adversary, and the reverse of this, problem solving; and discusses the two aspects in the context of the war on poverty. The second and third chapters discuss various definitions of the Poor, and provide objectives…
A Cyberspace Command and Control Model (Maxwell Paper, Number 47)
2009-08-01
mand [for] Network Warfare [JFCC-NW]).ŗ This arrange- ment further creates gaps and seams as the DOD attempts, through a traditional, hierarchical...pervasiveness of cyberspace coupled with aggressive adversaries create a volatile environment. The DOD. along with the rest of the world, is...these factors, along with the challenges of attributing cyberspace intrusions, combine to create an environment of frustrating ambiguity. The correct
A Cyberspace Command and Control Model
2009-02-17
control of Commander, Joint Functional Component Commander – Network Warfare (JFCC-NW).3 This arrangement further creates gaps and seams as the DoD...technological advances and increases in the use and pervasiveness of cyberspace coupled with aggressive 5 adversaries create a volatile environment. Both...intrusions, combine to create an environment of frustrating ambiguity. The correct military response lies in establishing a C2 structure for this
Combating WMD Journal. Issue 6, Fall/Winter 2010
2010-12-31
Editorial Board prior to publication. Submit articles in Microsoft Word without automatic features, include photographs , graphs, tables, etc. as...presenters as many in attendance were unlikely to be swayed and in some cases the meet- ings turned into adversarial shouting matches. 19 These...Solar Superstorm, http://science.nasa.gov/ science-news/science-at- nasa /2003/23oct_superstorm/ 8. Pfeffer, Robert, The Need to Re- define
Sensemaking Training Requirements for the Adaptive Battlestaff
2007-06-01
for the Adaptive Battlestaff Topic: Cognitive and Social Issues Celestine A. Ntuen1& Dennis Leedom2 1Army Center for Human-Centric Command...intelligent analysts. We need a new training strategy, paradigms, and methods for this purpose. The sensemaking trainability factors o must be identified...juxtapositions of social forces—a complex of network of information systems with people, technology, and domains of adversaries (tasks) that have been
Exploitation of Unintentional Information Leakage from Integrated Circuits
2011-12-01
U.S. Defense Science Board Task Force examined the effects and risks of outsourcing high performance microchip production to foreign countries [Off05...mapping methodology is developed and demon- strated to comprehensively assess the information leakage of arbitrary block cipher implementations. The...engineering poses a serious threat since it can en- able competitors or adversaries to bypass years of research and development through counterfeiting or
Rosetta Phase II: Measuring and Interpreting Cultural Differences in Cognition
2008-07-31
approaches are used to capture culture. First, anthropology and psychiatry adopt research methods that focus on specific groups or individuals...Classical anthropology provides information about behaviors, customs, social roles, and social rules based on extended and intense observation of single...This training goes beyond rules and procedures so that military personnel can see events through the eyes of adversaries or host nationals. They must
An Analysis of Trust in Deception Operations
2009-03-01
presents an overview of deception, both from the military and academic perspectives. The importance of the adversarial mind to a successful deception is...to most literature on deception. This section will introduce both military and academic theories of deception and discuss their relevance to trust...claim, faking documentation, plagiarism , and purchasing one (p. 226). A doctorate is regarded as a valuable item for establishing reputational
Technical Assessment: Autonomy
2015-02-23
low-cost sensors for automotive applications, mobile devices, and video games . If DoD develops CONOPS for lower- performance systems, there is an...advancement in this area is Microsoft’s Kinect technology. While originally designed for the Xbox video game platform, it is now being used or developed for...One area worthy of consideration is applied game theory, which may allow systems to effectively respond to adversary actions. Recommendation 4
Cyberspace Warfare: A New DoD Core Mission Area
2013-05-01
information in the same way that people thrive on sumptuous cuisine . What sort of information? Stuff like how to crack passwords that open the portals... French , demonstrating the use of information to shape the strategic environment.”17 This united Northern Germany and Southern Germany as one nation...28 defeat their adversary in detail. On the other hand, the French elected to adopt a
2013-02-01
that the Government formulated or supplied the drawings, specifications, or other data does not license the holder or any other person or corporation ...preparation. Berk , V. H., Cybenko, G., Souza, I. G. D., & Murphy, J. P. (2012, January). “Managing Malicious Insider Risk through BANDIT.” In System... finances , human resources for example; • Tactics – Short term goals and techniques to achieve those goals; • Strategy – Long term outcomes and
Urban and Spatial Opposition by the Subject
NASA Astrophysics Data System (ADS)
Saka, Gizem; Kırcı, Nazan
2017-10-01
In the production of spaces, an important aspect, that is ‘the subject’ was neglected with the influence of the industrial revolution, modernisation, capitalism and neo-liberalism. While the rationalist reason was standardising and extending production, the relationship between space and its user was broken-off. It initiated a tremendous change when the subject as the user of the spaces, singled out his own existence and needs from the whole and comprehended his self-distinctiveness. Such a split up indicating the act of critical thinking and liberation of the subject also created a demand for diversity. The demands of the subject being the user of the space was not met at the architectural and urban levels for several reasons. The subject feeling the discomfort of such a situation brings into view his criticisms first in his own individual space and then in public space for the purposes of expressing his right to live and his locus standi. Such acts being classified as adversary are being realised in order to provide the adaptability of the subject and the space to changing living conditions using different means. Such adversary touches being provided partly by the urbanites and partly by the professionals draw attention to the issue through by-pass interventions to the architecturally choked urban areas. By taking a stance against the existing situation, the intention is to treat space in a different way than what has been produced by the system, to re-produce it and to render it more democratic. All such alternative spatial situations show us that other production methods and lines of thought, other than what has been defined by the dominant market conditions are also possible. It has been asserted through these adversary instigations that there is a requirement for micro designs towards the daily and changing needs of the subject as a user during the act of design by architects and planners. For this reason, the part played by the designer should be wriggled out of ‘defining’ and ‘controlling’ effects and should turn towards using the transformational power of the society for the benefit of the same, lead the user and provide alternatives.
3D conditional generative adversarial networks for high-quality PET image estimation at low dose.
Wang, Yan; Yu, Biting; Wang, Lei; Zu, Chen; Lalush, David S; Lin, Weili; Wu, Xi; Zhou, Jiliu; Shen, Dinggang; Zhou, Luping
2018-07-01
Positron emission tomography (PET) is a widely used imaging modality, providing insight into both the biochemical and physiological processes of human body. Usually, a full dose radioactive tracer is required to obtain high-quality PET images for clinical needs. This inevitably raises concerns about potential health hazards. On the other hand, dose reduction may cause the increased noise in the reconstructed PET images, which impacts the image quality to a certain extent. In this paper, in order to reduce the radiation exposure while maintaining the high quality of PET images, we propose a novel method based on 3D conditional generative adversarial networks (3D c-GANs) to estimate the high-quality full-dose PET images from low-dose ones. Generative adversarial networks (GANs) include a generator network and a discriminator network which are trained simultaneously with the goal of one beating the other. Similar to GANs, in the proposed 3D c-GANs, we condition the model on an input low-dose PET image and generate a corresponding output full-dose PET image. Specifically, to render the same underlying information between the low-dose and full-dose PET images, a 3D U-net-like deep architecture which can combine hierarchical features by using skip connection is designed as the generator network to synthesize the full-dose image. In order to guarantee the synthesized PET image to be close to the real one, we take into account of the estimation error loss in addition to the discriminator feedback to train the generator network. Furthermore, a concatenated 3D c-GANs based progressive refinement scheme is also proposed to further improve the quality of estimated images. Validation was done on a real human brain dataset including both the normal subjects and the subjects diagnosed as mild cognitive impairment (MCI). Experimental results show that our proposed 3D c-GANs method outperforms the benchmark methods and achieves much better performance than the state-of-the-art methods in both qualitative and quantitative measures. Copyright © 2018 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
The Complexity of Threats to Nuclear Strategic Deterrence Posture
2017-02-07
environment, a status quo but things are improving, a status quo but things are getting worse, and the occurrence of a game -changing event. Findings...adversaries. This information will certainly inform this research, as game changing technology will in due course affect the strategic nuclear deterrence...Congressional Research Service, RAND Corporation, and certain peer-reviewed and scholarly articles. The fourth independent variable, “Occurrence of a Game
2017-03-01
Warfare. 14. SUBJECT TERMS data mining, natural language processing, machine learning, algorithm design , information warfare, propaganda 15. NUMBER OF...Speech Tags. Adapted from [12]. CC Coordinating conjunction PRP$ Possessive pronoun CD Cardinal number RB Adverb DT Determiner RBR Adverb, comparative ... comparative UH Interjection JJS Adjective, superlative VB Verb, base form LS List item marker VBD Verb, past tense MD Modal VBG Verb, gerund or
ERIC Educational Resources Information Center
National Council for Children's Rights, Washington, DC.
This document contains papers presented at the Seventh National Conference of the Children's Rights Council, also known as the National Council for Children's Rights. The papers presented were: (1) "Alternatives to the Adversarial Process for Resolution of Child Custody Cases" (Hugh McIsaac); (2) "New Decision Making Models in Child…
2007-01-01
warfare ). Although the defensive elements of IO and cyber warfare are important, to narrow the scope of our thesis, the remainder of the argu- ment...adversary decisions away from taking action against our will. Now, let us contrast IO doctrine with what we propose for cyber warfare . The focus of... cyber warfare is on using cyberspace (by operating within or through it) to attack personnel, facilities, or equipment with the intent of degrading
The Worried Well: Strategies for Installation Commanders
2005-01-01
require enlisting law enforcement personnel, members of the armed forces, pharmacists , veterinarians, and civilian volunteers to assist. Insights from...television, radio and print media protested that they may not view themselves as partners. They perceive of their role as the Fourth Estate, and have a...watchdog obligation.”52 In spite of the sometimes adversarial or skeptical Pilch—The Worried Well 26 posture that the media may feel their role
Integrated Adversarial Network Theory (iANT)
2011-07-01
Markman, G. D. 2003. Beyond social capital : The role of entrepreneurs’ social competence in their fmancial success. Journal of Business Venturing ...Share of all articles indexed in Google Scholar with "social network" in the title, by year. 6 Field Publications Pet all SNA Sociology 1330 14.26...including sub-variants. These included: • Capitalization . The process of a node actively seeking out and accumulating stocks of resources flowing
Report to the Congress on the Strategic Defense Initiative 1990
1990-05-01
thermoacoustic drivers, pulse tube coolers, and sorption coolers. High efficiency is 7-4 I Technology Base expected from the magnetic cooler work, currently in...generated by SDI research, the degree to which certain types of defensive systems discourage an adversary from attempting to overwhelm them with additional...energy interceptor that has replaced earlier approaches. Nevertheless, development of an earlier approach known as SBI (referring to a specific type of
2001-05-01
proper planning and preparation, our LOCs become lucrative high pay -off targets for our adversaries. Similar to United States doctrine, enemy SPF will...guerillas, saboteurs, terrorists, and special operations forces. This term will be used to differentiate between friendly SOF and enemy SOF. The author...Wellington’s proficient use of irregulars against the French Army during the Peninsular Campaign; and the Russian partisans that significantly
The Grand Challenges of Command and Control Policy
2006-06-01
Memetic Warfare Memes are ideas that can be modeled and simulated. In a modern journalistic environment, dynamic information feedback from the theater...output type such that both adversarial meme processes and our counter anti- memetic activity could be modeled, simulated, and assessed. I am now...opposing force of the consequence of using biological or chemical weapons on the invading American forces. Do we have the proper memetic dynamics
Defense AT&L. Volume 39, Number 2, March-April 2010
2010-04-01
have significant benefit to future systems concepts in the department. Q You also mentioned that there was a Developmental Test and Evaluation...enemy will engage. Identifying break- through capabilities can garner DoD significant advantages over potential adversaries. What does DDR&E do to...absolutely critical. We are working to protect them in a significant way. We have significant investments and programs looking at how we build very
System-Level Experimentation: Executive Summary and Annotated Brief
2006-07-01
both friendlies and adversaries – to define their own capabilities, unfettered by doctrinal or cultural limitations and bounded only by the laws of...Gen Eric Nelson, USAF (Ret) Independent Consultant (Systems, Software) Dr. Brad Parkinson Stanford University (GPS, Sensors, Systems) Mr. Skip Saunders...RCO* – rapid fielding for high priority needs SLE is focused on understanding the future - unknown needs A8’ s Future Game – analysis of future
U.S. Air Force Posture Statement 2007
2007-01-01
like the Raptor, the F–35a reaps the benefits of decades of advanced research, development and field experience . The F–35a will provide affordable...also increasing, and potential adversaries are already purchasing and fielding these complex and capable weapon systems. Many nations are...postured to meet our nation’s near -term requirements, our ability to meet steady state and surge requirements over the long term hinges on our ability to
Annual Report to the President and the Congress
1993-01-01
Cold War, when any crisis might have raised the possibility of immediate, global conflict with a heavily-armed adversary. In contrast, today’s...continue to be an important factor in inducing nations to work together to cope with crisis and to resist or defeat aggression. A general interest in...deterrence and defense, for- ward presence, crisis response, and reconstitution. These elements guide the plans for our future force posture and
Cyberspace Operations Concept Capability Plan 2016-2028
2010-02-22
effectively in this emerging environment, the Army must realign its information "Aim Point." Army leaders and Soldiers must possess an in -depth...communications technology (ICT) and its consequent effect in social networks and in society impact the OE. The diverse and wide arrays of agents who use...fails in this contest, or that cannot operate effectively when their systems are degraded or disrupted, cedes a significant advantage to the adversary
ERIC Educational Resources Information Center
Ooms, Theodora; Owen, Todd
This report contains highlights from a seminar on the role of parents in helping adolescents with their health problems. Comments by these panelists is summarized: Judy Areen, dean, Georgetown University Law Center; Barbara Popper, founder and board member of Children in Hospitals, Inc. and resource specialist at the Federation for Children with…
On the Lulejian-I Combat Model
1976-08-01
possible initial massing of the attacking side’s resources, the model tries to represent in a game -theoretic context the adversary nature of the...sequential game , as outlined in [A]. In principle, it is necessary to run the combat simulation once for each possible set of sequentially chosen...sequential game , in which the evaluative portion of the model (i.e., the combat assessment) serves to compute intermediate and terminal payoffs for the
Fusion Centers: Issues and Options for Congress
2007-07-06
financed and staffed by the states, and there is no one “model” for how a center should be structured. State and local law enforcement and criminal...Centers to Task the IC for Information and Receive “Feedback” . . . . . . . . . . . . . . . . . . 70 4e . Establish a Mechanism for Fusion Centers to Have...together nationally, represent a proactive tool to be used to fight a global jihadist adversary which has both centralized and decentralized elements
Fusion Centers: Issues and Options for Congress
2008-01-18
largely financed and staffed by the states, and there is no one “model” for how a center should be structured. State and local law enforcement and...Information and Receive “Feedback” . . . . . . . . . . . . . . . . . . 69 4e . Establish a Mechanism for Fusion Centers to Have Input into the NIPF...intelligence fusion centers, particularly when networked together nationally, represent a proactive tool to be used to fight a global jihadist adversary which
Auditing Rational Adversaries to Provably Manage Risks
2012-05-23
series of white papers on accountability-based privacy governance in which one recommendation is that organisations should have in place policies and...that this state of affairs raises is how to design effective audit and punishment schemes. This paper articulates a desirable property and presents an...In this section, we provide an overview of our model using a motivating scenario that will serve as a running example for this paper . Consider a
China’s Rise: Regional Stabilizer or U.S. Adversary?
2007-09-01
from the NAVAL POSTGRADUATE SCHOOL September 2007 Author: Rufus A. Lensey Approved by: Alice L . Miller Thesis Advisor...gratitude and loving thanks to my wife, Lisa Lensey and daughter, Jordan Lensey, who have shown patience and understanding during our time at the Naval...provides a foundation from which to analyze the areas where China may fall as it rises in today’s international system. C . LITERATURE REVIEW
2016-09-07
been demonstrated on maximum power point tracking for photovoltaic arrays and for wind turbines . 3. ES has recently been implemented on the Mars...high-dimensional optimization problems . Extensions and applications of these techniques were developed during the realization of the project. 15...studied problems of dynamic average consensus and a class of unconstrained continuous-time optimization algorithms for the coordination of multiple
Violent Systems: Defeating Terrorists, Insurgents, and Other Non-State Adversaries
2004-03-01
LTTE must be proactive in dealing with donor organizations in the Tamil Diaspora, whereas it takes a defensive, or even reactive, approach to...processing system that influence action, be they conscious or not, be they rational or not, be they distributed across an organization or not. They must...heuristics and biases, ecological rationality, fast and frugal heuristics, metaphor and analogy, the storytelling mind, “hot” emotional cognition
Chaos, Complexity and Deterrence
2000-04-19
populations of adversary countries but which seldom affect their leadership . Conclusion The jury is still out on the applicability of chaos theory to...Advent of Chaos Chaos theory in the West (considerable work on chaos was also conducted in the Soviet Union) developed from the 1960s work of...predicted by his model over time.1 This discovery, sensitivity to initial conditions, is one of the fundamental characteristics of chaos theory . Lorenz
We and They: Understanding Ourselves and Our Adversary. Ethics and Public Policy Essay 51.
ERIC Educational Resources Information Center
Kirkpatrick, Jeane J.
To act effectively in the world, it is first necessary to know who we are and who the Soviet Union is and what they are likely to do. The United States is the inheritor and the embodiment of a long struggle against arbitrary power. This country is the heir of the liberal, democratic tradition, whose roots are freedom. Facing the nature of the…
Deterrence and WMD Terrorism: Calibrating Its Potential Contributions to Risk Reduction
2007-06-01
ideology and aspiration (so-called franchisees ) • operational enablers (financiers etc.) • moral legitimizers • state sponsors • passive state...of al Qaeda • groups affiliated by ideology and aspiration (so-called franchisees ) • operational enablers (financiers etc.) • moral legitimizers...of deterrence.14 One is “deterrence by the threat of punishment,” which compels the adversary to try to calculate whether the potential benefits of
ERIC Educational Resources Information Center
McCall, Jeffrey M.
Journalists play a central role in U.S. presidential debates, but their exact role is unclear. Unlike the news conference or interview, the situation of a debate does not favor an adversarial role because journalists who assume this role tend to shift attention away from the main issues and reduce exchanges between the candidates. To insure true…
2011-01-01
warfare centers and the Fleet/Force with international academia, industry , government laboratories and research consortia. Many tools are used to...range of options helps make every dollar count. Delivering on the promise of this plan requires us to work with the best and brightest people from...emerging reality. Our potential adversaries will seek to deny us access and freedom of maneuver and action. Sea-based forces that can project power or
2010-08-01
between east and west. In 330 AD, the emperor Constantine I moved the capital of the eastern part to Byzantium, and renamed the city Constantinople . In...Byzantium was renamed. Long after the empire collapsed after Constantinople fell to the Ottomans in 1453, the Byzantine Empire became known for being...It was shown in [19] that standard network coding problems fall into three categories: (1) coding is un- necessary, and routing is enough to achieve
Robust Feedback Control of Reconfigurable Multi-Agent Systems in Uncertain Adversarial Environments
2015-07-09
R. G., Optimal Lunar Landing and Retargeting using a Hybrid Control Strategy. Proceedings of the 2013 AAS/AIAA Space Flight Mechanics Meeting (AAS...Furfaro, R. & Sanfelice, R. G., Switching System Model for Pinpoint Lunar Landing Guidance Using a Hybrid Control Strategy. Proceedings of the AIAA...methods in distributed settings and the design of numerical methods to properly compute their trajectories . We have generate results showing that
2006-03-01
Manpower of Military RLVs.” AIAA 2004-6111, Space 2004 Conference, San Diego, CA, September 28-30, 2004. 37. Serway , Raymond A . Physics for...E. Franke (Chairman) Date _____________//SIGNED//_____________ __14 Mar 06__ Ralph A . Anthenien (Member) Date _____________//SIGNED...keep a technological advantage over our adversaries, and many designs for RLVs have been proposed over the years. In addition, advances in
Evolving Intelligence, Surveillance & Reconnaissance (ISR) for Air Force Cyber Defense
2013-02-14
Telecommunications and Assessment Program ( TMAP ) notes in Air Force Instruction (AFI) 10-712 that “adversaries can easily monitor (unclassified) systems to...Instruction (AFI) 10-712, Telecommunications Monitoring And Assessment Program ( TMAP ), 2011, 4. 23. Lt Col Hugh M. Ragland., interview with author...Monitoring And Assessment Program ( TMAP ), 8 June 2011. Brenner, Carl N. Col, USAF. NASIC Air & Cyber Analysis Group/CC. Interview by the author. 29
Cyberdeterrence Between Nation-States: Plausible Strategy Or A Pipe Dream?
2011-01-01
those attempting to conduct the trace.5 It is important to appreciate that no single technical attribution tech- nique provides a panacea . Most...conducted diplomatic, economic, or military initiatives. This might be enough to convince the defending state’s leaders of the adversary state’s guilt ...probable guilt , even if based solely on circumstantial evidence, could prove extremely damaging to the aggressor state’s diplomatic and informational
Opponent Modeling in Interesting Adversarial Environments
2008-07-01
University of Alberta and the research team at Carnegie Melon University have both explored various abstraction and solution techniques. In [10] Billings et...solution for an abstraction of the entire four-betting-round version of Limit Texas Hold’em. At Carnegie Melon University, Gilpin and Sandholm...measuring how well opponent models met these goals. We’ve found that modeling opponents that adapt while playing is an active and fertile field of
Russia’s Approach to Cyber Warfare (1Rev)
2017-03-01
Steinitz, CNA. Approved by: March 2017 Ken E. Gause, RTL International Affairs Group Center for Strategic Studies REPORT DOCUMENTATION PAGE...the help of information networks.”7 Russian military thinkers on information operations IO and asymmetric military tactics, Col. S.G. Chekinov (Res...adversaries, influence public opinion, and reduce an opponent’s will to resist.8 Cyber IO affords the Russian government covert means to achieve these
Indicators of State Failure: Phase 2
2010-08-01
List - Security & Crime ................................................................................ 75 Table 19: Cluster List - Human... crime , environment, human development, and population and demography lines as shown in Figure 21. DRDC Toronto: Adversarial Intent Section CR 2010...Security & Crime Human Develop ment Demogra phy Environ ment Sudan 7.02 7.35 6.88 6.75 7.86 6.62 8.03 7.85 6.51 5.27 Afghanistan 6.93 7.40 7.09 6.24
An Analysis of Technology Transition Within the Department of Defense
2010-06-01
relentless adversaries, it is essential that the DoD performs technology transition in a practical yet expedient manner. Time is a critical factor in...themselves, rather than rely on DOD labs to do so—a practice that brings cost and schedule risk since programs may well find themselves addressing problems...that utilized non-traditional, industry practices to abate the difficulties bringing technologies to a suitable maturation state. Albeit these
Realizing Network-Centric Warfare: The Cultural, Organizational, and Human Barriers
2008-01-01
with the fielding of advanced information technology . Discussion: The Department ofDefense (DOD) transformation to NCW has lacked adequate focus on many...range of military operations. In order to successfully employ advanced technologies in "crisis response and limited contingency operations" and "major...its adversaries. Changes in military technology , concepts, and organization have usually come in conjunction with changes to our nation’s social
Advanced Protected Services: A Concept Paper on Survivable Service-Oriented Systems
2010-05-07
resiliency and protection of such systems to a level where they can withstand sustained attacks from well-motivated adversaries. In this paper we...that are designed for the protection of systems that are based on service-oriented architectures. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF...resilient against malicious attacks , and to demonstrate the utility of the developed advanced protection techniques in settings that exhibit various
Developing Realistic Behaviors in Adversarial Agents for Air Combat Simulation
1993-12-01
34Building Symbolic Primitives with Continuous Control Rou- tines." Proceedings of the 1st International Conference on Aritificial Intelligence Planning...shortcoming is the minimal Air Force participation in this field. 1-1 Some of the artificial intelligence (AI) personnel at the Air Force Institute of... intelligent system that operates in a moderately complex or unpredictable environment must be reactive. In being reactive the intelligent system must
Computational Modeling of Cultural Dimensions in Adversary Organizations
2010-01-01
Nodes”, In the Proceedings of the 9th Conference on Uncertainty in Artificial Intelli - gence, 1993. [8] Pearl, J. Probabilistic Reasoning in...the artificial life simulations; in con- trast, models with only a few agents typically employ quite sophisticated cognitive agents capa- ble of...Model Construction 45 cisions as to how to allocate scarce ISR assets (two Unmanned Air Systems, UAS ) among the two Red activities while at the same
The Limits of Offshore Balancing
2015-09-01
believe, is to adopt a minimalist approach referred to as “offshore balancing.” Briefly stated, offshore balancing envisions a dramatic reduction in...behavior from allies and adversaries alike. The proper response to this situation, they believe, is to adopt a minimalist approach usually referred to as...as a minimalist , or free-hand strategy, because it asserts that America can attain that goal while also shedding obligations and resources.30 Indeed
Operational Protection from Unmanned Aerial Systems
2015-05-15
future threat posed by adversary UAS to U.S. forces, both in the form of system capabilities and methods of employment . It also addresses present...both in the form of system capabilities and methods of employment . It also addresses present counter UAS capabilities and recommends ways and means to...capabilities and methods of employment . It also addresses present counter UAS capabilities and recommends ways and means to provide better operational
Cyber Security Research Frameworks For Coevolutionary Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rush, George D.; Tauritz, Daniel Remy
Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less
Resilience to leaking--dynamic systems modeling of information security.
Hamacher, Kay
2012-01-01
Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.
Reinforcements, ammunition limits, and termination of neutralization engagements in ASSESS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paulus, W.K.; Mondragon, J.
1991-01-01
This paper reports on the ASSESS Neutralization Analysis module (Neutralization) which is part of Analytic system and Software for Evaluation of Safeguards and Security, ASSESS, a vulnerability assessment tool. Neutralization models a fire fight engagement between security inspectors (SIs) and adversaries. The model has been improved to represent more realistically the addition of reinforcements to an engagement, the criteria for declaring an engagement terminated, and the amount of ammunition which security forces can use. SI reinforcements must prevent adversaries from achieving their purpose even if an initial security force has been overcome. The reinforcements must be timely. A variety ofmore » reinforcement timeliness cases can be modeled. Reinforcements that are not timely are shown to be ineffective in the calculated results. Engagements may terminate before all combatants on one side are neutralized if they recognize that they are losing. A winner is declared when the number of survivors on one side is reduced to a user specified level. Realistically, the amount of ammunition that can be carried into an engagement is limited. Neutralization now permits the analyst to specify the number of rounds available to the security forces initially and the quantity of resupply that is introduced with reinforcements. These new capabilities all contribute toward more realistic modeling of neutralization engagements.« less
Scalable Iterative Classification for Sanitizing Large-Scale Datasets
Li, Bo; Vorobeychik, Yevgeniy; Li, Muqun; Malin, Bradley
2017-01-01
Cheap ubiquitous computing enables the collection of massive amounts of personal data in a wide variety of domains. Many organizations aim to share such data while obscuring features that could disclose personally identifiable information. Much of this data exhibits weak structure (e.g., text), such that machine learning approaches have been developed to detect and remove identifiers from it. While learning is never perfect, and relying on such approaches to sanitize data can leak sensitive information, a small risk is often acceptable. Our goal is to balance the value of published data and the risk of an adversary discovering leaked identifiers. We model data sanitization as a game between 1) a publisher who chooses a set of classifiers to apply to data and publishes only instances predicted as non-sensitive and 2) an attacker who combines machine learning and manual inspection to uncover leaked identifying information. We introduce a fast iterative greedy algorithm for the publisher that ensures a low utility for a resource-limited adversary. Moreover, using five text data sets we illustrate that our algorithm leaves virtually no automatically identifiable sensitive instances for a state-of-the-art learning algorithm, while sharing over 93% of the original data, and completes after at most 5 iterations. PMID:28943741
Secure and lightweight network admission and transmission protocol for body sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Zhang, Pingxin
2013-05-01
A body sensor network (BSN) is a wireless network of biosensors and a local processing unit, which is commonly referred to as the personal wireless hub (PWH). Personal health information (PHI) is collected by biosensors and delivered to the PWH before it is forwarded to the remote healthcare center for further processing. In a BSN, it is critical to only admit eligible biosensors and PWH into the network. Also, securing the transmission from each biosensor to PWH is essential not only for ensuring safety of PHI delivery, but also for preserving the privacy of PHI. In this paper, we present the design, implementation, and evaluation of a secure network admission and transmission subsystem based on a polynomial-based authentication scheme. The procedures in this subsystem to establish keys for each biosensor are communication efficient and energy efficient. Moreover, based on the observation that an adversary eavesdropping in a BSN faces inevitable channel errors, we propose to exploit the adversary's uncertainty regarding the PHI transmission to update the individual key dynamically and improve key secrecy. In addition to the theoretical analysis that demonstrates the security properties of our system, this paper also reports the experimental results of the proposed protocol on resource-limited sensor platforms, which show the efficiency of our system in practice.
NASA Astrophysics Data System (ADS)
Bittner, K.; d'Angelo, P.; Körner, M.; Reinartz, P.
2018-05-01
Three-dimensional building reconstruction from remote sensing imagery is one of the most difficult and important 3D modeling problems for complex urban environments. The main data sources provided the digital representation of the Earths surface and related natural, cultural, and man-made objects of the urban areas in remote sensing are the digital surface models (DSMs). The DSMs can be obtained either by light detection and ranging (LIDAR), SAR interferometry or from stereo images. Our approach relies on automatic global 3D building shape refinement from stereo DSMs using deep learning techniques. This refinement is necessary as the DSMs, which are extracted from image matching point clouds, suffer from occlusions, outliers, and noise. Though most previous works have shown promising results for building modeling, this topic remains an open research area. We present a new methodology which not only generates images with continuous values representing the elevation models but, at the same time, enhances the 3D object shapes, buildings in our case. Mainly, we train a conditional generative adversarial network (cGAN) to generate accurate LIDAR-like DSM height images from the noisy stereo DSM input. The obtained results demonstrate the strong potential of creating large areas remote sensing depth images where the buildings exhibit better-quality shapes and roof forms.