WorldWideScience

Sample records for adversaries

  1. Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN

    OpenAIRE

    Lee, Hyeungill; Han, Sungyeob; Lee, Jungwoo

    2017-01-01

    We propose a novel technique to make neural network robust to adversarial examples using a generative adversarial network. We alternately train both classifier and generator networks. The generator network generates an adversarial perturbation that can easily fool the classifier network by using a gradient of each image. Simultaneously, the classifier network is trained to classify correctly both original and adversarial images generated by the generator. These procedures help the classifier ...

  2. Adversarial risk analysis

    CERN Document Server

    Banks, David L; Rios Insua, David

    2015-01-01

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout illustrate the application of the ARA approach to a variety of games and strategic situations. The book shows decision makers how to build Bayesian models for the strategic calculation of their opponents, enabling decision makers to maximize their expected utility or minimize their expected loss. This new approach to risk analysis asserts that analysts should use Bayesian thinking to describe their beliefs about an opponent's goals, resources, optimism, and type of strategic calculation, such as minimax and level-k thinking. Within that framework, analysts then solve the problem from the perspective of the opponent while placing subjective probability distributions on a...

  3. Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

    OpenAIRE

    Bao, Ruying; Liang, Sihang; Wang, Qingcan

    2018-01-01

    Deep neural networks have been demonstrated to be vulnerable to adversarial attacks, where small perturbations are intentionally added to the original inputs to fool the classifier. In this paper, we propose a defense method, Featurized Bidirectional Generative Adversarial Networks (FBGAN), to capture the semantic features of the input and filter the non-semantic perturbation. FBGAN is pre-trained on the clean dataset in an unsupervised manner, adversarially learning a bidirectional mapping b...

  4. Adversarial reasoning: challenges and approaches

    Science.gov (United States)

    Kott, Alexander; Ownby, Michael

    2005-05-01

    This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-world problems, the paper explores the lessons learned in the CADET -- a battle planning system that focuses on brigade-level ground operations and involves adversarial reasoning. From this example of current capabilities, the paper proceeds to describe RAID -- a DARPA program that aims to build capabilities in adversarial reasoning, and how such capabilities would address practical requirements in Defense and other application areas.

  5. Generic adversary characteristics: summary report

    International Nuclear Information System (INIS)

    Stewart, J.B. Jr.; Davidson, J.J.; Jones, H.B.; Fulwiler, C.H.; Mullen, S.A.

    1978-07-01

    The adversaries studied were found to be complex, often unpredictable, and dynamic. The adversary typically goes through a complex decision-making process between the time a potential target is identified and the moment the decision to act is made. This study analyzes the adversary characteristics, and the following conclusions are made: one of the least likely methods of attack is an overt armed assault. Terrorists and psychotics depend upon a high degree of personal dedication. No single generic adversary group or individual exhibits strength in every characteristic. Physical danger appears to have some deterrent effect on all adversaries except the psychotics. Organized and professional criminals often try to recruit insiders. Disoriented persons, white-collar criminals, and disgruntled employees tend to operate as insiders. Professional criminals, many terrorist groups, some extremist protest groups, and certain disoriented persons plan carefully before initiating a criminal mission. Organized crime and miscellaneous criminal adversaries rely on deception and ruse to bypass security. After the decision to commit a crime, the resources deployed by terrorists or organized criminals will be a function of their perception of the operational requirements of the crime. The nature of ''threat'' is dynamic; adversary behavior and capability appear to be related to prevailing political, economic, and social conditions

  6. Adversary characterization for security system evaluation

    International Nuclear Information System (INIS)

    Suber, L.A. Jr.

    1976-04-01

    Evaluation of security systems effectiveness requires a definition of adversary capabilities, but an objective basis for such a definition has been lacking. A system of adversary attributes is proposed in which any desired adversary may be synthesized by selection of the appropriate level of capability from each attribute or category. In use, the synthesized adversaries will be pitted against a security system in an evaluation model, thus allowing comparison of other adversary or security system configurations

  7. Learning Adversary Modeling from Games

    National Research Council Canada - National Science Library

    Avellino, Paul

    2007-01-01

    .... In the computer age, highly accurate models and simulations of the enemy can be created. However, including the effects of motivations, capabilities, and weaknesses of adversaries in current wars is still extremely difficult...

  8. Deep Learning and Music Adversaries

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    the minimal perturbation of the input image such that the system misclassifies it with high confidence. We adapt this approach to construct and deploy an adversary of deep learning systems applied to music content analysis. In our case, however, the system inputs are magnitude spectral frames, which require...

  9. Learning consensus in adversarial environments

    Science.gov (United States)

    Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.

    2013-05-01

    This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.

  10. Flipped-Adversarial AutoEncoders

    OpenAIRE

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  11. Generative Adversarial Networks: An Overview

    Science.gov (United States)

    Creswell, Antonia; White, Tom; Dumoulin, Vincent; Arulkumaran, Kai; Sengupta, Biswa; Bharath, Anil A.

    2018-01-01

    Generative adversarial networks (GANs) provide a way to learn deep representations without extensively annotated training data. They achieve this through deriving backpropagation signals through a competitive process involving a pair of networks. The representations that can be learned by GANs may be used in a variety of applications, including image synthesis, semantic image editing, style transfer, image super-resolution and classification. The aim of this review paper is to provide an overview of GANs for the signal processing community, drawing on familiar analogies and concepts where possible. In addition to identifying different methods for training and constructing GANs, we also point to remaining challenges in their theory and application.

  12. Modeling intelligent adversaries for terrorism risk assessment: some necessary conditions for adversary models.

    Science.gov (United States)

    Guikema, Seth

    2012-07-01

    Intelligent adversary modeling has become increasingly important for risk analysis, and a number of different approaches have been proposed for incorporating intelligent adversaries in risk analysis models. However, these approaches are based on a range of often-implicit assumptions about the desirable properties of intelligent adversary models. This "Perspective" paper aims to further risk analysis for situations involving intelligent adversaries by fostering a discussion of the desirable properties for these models. A set of four basic necessary conditions for intelligent adversary models is proposed and discussed. These are: (1) behavioral accuracy to the degree possible, (2) computational tractability to support decision making, (3) explicit consideration of uncertainty, and (4) ability to gain confidence in the model. It is hoped that these suggested necessary conditions foster discussion about the goals and assumptions underlying intelligent adversary modeling in risk analysis. © 2011 Society for Risk Analysis.

  13. An analytic approach to cyber adversarial dynamics

    Science.gov (United States)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  14. Scientific method, adversarial system, and technology assessment

    Science.gov (United States)

    Mayo, L. H.

    1975-01-01

    A basic framework is provided for the consideration of the purposes and techniques of scientific method and adversarial systems. Similarities and differences in these two techniques of inquiry are considered with reference to their relevance in the performance of assessments.

  15. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  16. Using Machine Learning in Adversarial Environments.

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Warren Leon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-02-01

    Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approaches only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.

  17. David against Goliath: Coping with Adversarial Customers

    DEFF Research Database (Denmark)

    Alajoutsijärvi, Kimmo; Tikkanen, Henrikki; Skaates, Maria Anne

    2001-01-01

    future-oriented relationships with any of them. From the perspective of the SME, this kind of customer behaviour could even be described as harmful, since it often impedes the SME manager's long-term development of his or her business. This makes the balancing of adversarial customer relationships...... an aspect crucial to the long-term survival and success of the particular SME. In this article, we propose a three-fold approach through which SME managers could balance their relationships with this type of customer. Firstly, we review theoretical discussions about business relationships and adversariness......SME managers in many industries face the situation that they have to deal with a few important, large customer organisations that behave in an adversarial manner. These customers pit alternative suppliers against each other in order to achieve the lowest possible price, showing no intent to build...

  18. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  19. Modeling documents with Generative Adversarial Networks

    OpenAIRE

    Glover, John

    2016-01-01

    This paper describes a method for using Generative Adversarial Networks to learn distributed representations of natural language documents. We propose a model that is based on the recently proposed Energy-Based GAN, but instead uses a Denoising Autoencoder as the discriminator network. Document representations are extracted from the hidden layer of the discriminator and evaluated both quantitatively and qualitatively.

  20. Modeling urbanization patterns with generative adversarial networks

    OpenAIRE

    Albert, Adrian; Strano, Emanuele; Kaur, Jasleen; Gonzalez, Marta

    2018-01-01

    In this study we propose a new method to simulate hyper-realistic urban patterns using Generative Adversarial Networks trained with a global urban land-use inventory. We generated a synthetic urban "universe" that qualitatively reproduces the complex spatial organization observed in global urban patterns, while being able to quantitatively recover certain key high-level urban spatial metrics.

  1. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  2. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  3. Resilient Distributed Estimation Through Adversary Detection

    Science.gov (United States)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2018-05-01

    This paper studies resilient multi-agent distributed estimation of an unknown vector parameter when a subset of the agents is adversarial. We present and analyze a Flag Raising Distributed Estimator ($\\mathcal{FRDE}$) that allows the agents under attack to perform accurate parameter estimation and detect the adversarial agents. The $\\mathcal{FRDE}$ algorithm is a consensus+innovations estimator in which agents combine estimates of neighboring agents (consensus) with local sensing information (innovations). We establish that, under $\\mathcal{FRDE}$, either the uncompromised agents' estimates are almost surely consistent or the uncompromised agents detect compromised agents if and only if the network of uncompromised agents is connected and globally observable. Numerical examples illustrate the performance of $\\mathcal{FRDE}$.

  4. Using plural modeling for predicting decisions made by adaptive adversaries

    International Nuclear Information System (INIS)

    Buede, Dennis M.; Mahoney, Suzanne; Ezell, Barry; Lathrop, John

    2012-01-01

    Incorporating an appropriate representation of the likelihood of terrorist decision outcomes into risk assessments associated with weapons of mass destruction attacks has been a significant problem for countries around the world. Developing these likelihoods gets at the heart of the most difficult predictive problems: human decision making, adaptive adversaries, and adversaries about which very little is known. A plural modeling approach is proposed that incorporates estimates of all critical uncertainties: who is the adversary and what skills and resources are available to him, what information is known to the adversary and what perceptions of the important facts are held by this group or individual, what does the adversary know about the countermeasure actions taken by the government in question, what are the adversary's objectives and the priorities of those objectives, what would trigger the adversary to start an attack and what kind of success does the adversary desire, how realistic is the adversary in estimating the success of an attack, how does the adversary make a decision and what type of model best predicts this decision-making process. A computational framework is defined to aggregate the predictions from a suite of models, based on this broad array of uncertainties. A validation approach is described that deals with a significant scarcity of data.

  5. Generative Adversarial Networks for Improving Face Classification

    OpenAIRE

    Natten, Jonas

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Facial recognition can be applied in a wide variety of cases, including entertainment purposes and biometric security. In this thesis we take a look at improving the results of an existing facial recognition approach by utilizing generative adversarial networks to improve the existing dataset. The training data was taken from the LFW dataset[4] and was preprocessed using OpenCV[2] for...

  6. Deep learning, audio adversaries, and music content analysis

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    We present the concept of adversarial audio in the context of deep neural networks (DNNs) for music content analysis. An adversary is an algorithm that makes minor perturbations to an input that cause major repercussions to the system response. In particular, we design an adversary for a DNN...... that takes as input short-time spectral magnitudes of recorded music and outputs a high-level music descriptor. We demonstrate how this adversary can make the DNN behave in any way with only extremely minor changes to the music recording signal. We show that the adversary cannot be neutralised by a simple...... filtering of the input. Finally, we discuss adversaries in the broader context of the evaluation of music content analysis systems....

  7. Cascading Generative Adversarial Networks for Targeted

    KAUST Repository

    Hamdi, Abdullah

    2018-01-01

    Abundance of labelled data played a crucial role in the recent developments in computer vision, but that faces problems like scalability and transferability to the wild. One alternative approach is to utilize the data without labels, i.e. unsupervised learning, in learning valuable information and put it in use to tackle vision problems. Generative Adversarial Networks (GANs) have gained momentum for their ability to model image distributions in unsupervised manner. They learn to emulate the training set and that enables sampling from that domain and using the knowledge learned for useful applications. Several methods proposed enhancing GANs, including regularizing the loss with some feature matching. We seek to push GANs beyond the data in the training and try to explore unseen territory in the image manifold. We first propose a new regularizer for GAN based on K-Nearest Neighbor (K-NN) selective feature matching to a target set Y in high-level feature space, during the adversarial training of GAN on the base set X, and we call this novel model K-GAN. We show that minimizing the added term follows from cross-entropy minimization between the distributions of GAN and set Y. Then, we introduce a cascaded framework for GANs that try to address the task of imagining a new distribution that combines the base set X and target set Y by cascading sampling GANs with translation GANs, and we dub the cascade of such GANs as the Imaginative Adversarial Network (IAN). Several cascades are trained on a collected dataset Zoo-Faces and generated innovative samples are shown, including from K-GAN cascade. We conduct an objective and subjective evaluation for different IAN setups in the addressed task of generating innovative samples and we show the effect of regularizing GAN on different scores. We conclude with some useful applications for these IANs, like multi-domain manifold traversing.

  8. Cascading Generative Adversarial Networks for Targeted

    KAUST Repository

    Hamdi, Abdullah

    2018-04-09

    Abundance of labelled data played a crucial role in the recent developments in computer vision, but that faces problems like scalability and transferability to the wild. One alternative approach is to utilize the data without labels, i.e. unsupervised learning, in learning valuable information and put it in use to tackle vision problems. Generative Adversarial Networks (GANs) have gained momentum for their ability to model image distributions in unsupervised manner. They learn to emulate the training set and that enables sampling from that domain and using the knowledge learned for useful applications. Several methods proposed enhancing GANs, including regularizing the loss with some feature matching. We seek to push GANs beyond the data in the training and try to explore unseen territory in the image manifold. We first propose a new regularizer for GAN based on K-Nearest Neighbor (K-NN) selective feature matching to a target set Y in high-level feature space, during the adversarial training of GAN on the base set X, and we call this novel model K-GAN. We show that minimizing the added term follows from cross-entropy minimization between the distributions of GAN and set Y. Then, we introduce a cascaded framework for GANs that try to address the task of imagining a new distribution that combines the base set X and target set Y by cascading sampling GANs with translation GANs, and we dub the cascade of such GANs as the Imaginative Adversarial Network (IAN). Several cascades are trained on a collected dataset Zoo-Faces and generated innovative samples are shown, including from K-GAN cascade. We conduct an objective and subjective evaluation for different IAN setups in the addressed task of generating innovative samples and we show the effect of regularizing GAN on different scores. We conclude with some useful applications for these IANs, like multi-domain manifold traversing.

  9. Arguing with Adversaries: Aikido, Rhetoric, and the Art of Peace

    Science.gov (United States)

    Kroll, Barry M.

    2008-01-01

    The Japanese martial art of aikido affords a framework for understanding argument as harmonization rather than confrontation. Two movements, circling away ("tenkan") and entering in ("irimi"), suggest tactics for arguing with adversaries. The ethical imperative of aikido involves protecting one's adversary from harm, using the least force…

  10. Monte-Carlo approach to the generation of adversary paths

    International Nuclear Information System (INIS)

    1977-01-01

    This paper considers the definition of a threat as the sequence of events that might lead to adversary success. A nuclear facility is characterized as a weighted, labeled, directed graph, with critical adversary paths. A discrete-event, Monte-Carlo simulation model is used to estimate the probability of the critical paths. The model was tested for hypothetical facilities, with promising results

  11. Computational Modeling of Cultural Dimensions in Adversary Organizations

    Science.gov (United States)

    2010-01-01

    theatre of operations. 50 51 Chapter 5 Adversary Modeling Applications 5.1 Modeling Uncertainty in Adversary Behavior: Attacks in...Underestimate the Strength of Coalition Power 1 1 (= True) 1 1 1 -- Coalition Deploys Forces to Indonesia 1 1 2 1 2 -- Thai can Conduct Unilateral NEO 1 1

  12. Saliency detection by conditional generative adversarial network

    Science.gov (United States)

    Cai, Xiaoxu; Yu, Hui

    2018-04-01

    Detecting salient objects in images has been a fundamental problem in computer vision. In recent years, deep learning has shown its impressive performance in dealing with many kinds of vision tasks. In this paper, we propose a new method to detect salient objects by using Conditional Generative Adversarial Network (GAN). This type of network not only learns the mapping from RGB images to salient regions, but also learns a loss function for training the mapping. To the best of our knowledge, this is the first time that Conditional GAN has been used in salient object detection. We evaluate our saliency detection method on 2 large publicly available datasets with pixel accurate annotations. The experimental results have shown the significant and consistent improvements over the state-of-the-art method on a challenging dataset, and the testing speed is much faster.

  13. Adversarial training and dilated convolutions for brain MRI segmentation

    NARCIS (Netherlands)

    Moeskops, P.; Veta, M.; Lafarge, M.W.; Eppenhof, K.A.J.; Pluim, J.P.W.

    2017-01-01

    Convolutional neural networks (CNNs) have been applied to various automatic image segmentation tasks in medical image analysis, including brain MRI segmentation. Generative adversarial networks have recently gained popularity because of their power in generating images that are difficult to

  14. Feminized Power and Adversarial Advocacy: Levelling Arguments or Analyzing Them?

    Science.gov (United States)

    Condit, Celeste Michelle

    1989-01-01

    Examines the journalistic analysis of the 1988 Presidential Debates from a feminist perspective in order to identify the revisions needed in the debate process. Provides historical background of feminized power and adversarial advocacy. (MM)

  15. Modelling adversary actions against a nuclear material accounting system

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-01-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise a SSNM theft and the collusion requirements needed to accomplish this feat. Some technical highlights of the logic diagram are also discussed

  16. MTGAN: Speaker Verification through Multitasking Triplet Generative Adversarial Networks

    OpenAIRE

    Ding, Wenhao; He, Liang

    2018-01-01

    In this paper, we propose an enhanced triplet method that improves the encoding process of embeddings by jointly utilizing generative adversarial mechanism and multitasking optimization. We extend our triplet encoder with Generative Adversarial Networks (GANs) and softmax loss function. GAN is introduced for increasing the generality and diversity of samples, while softmax is for reinforcing features about speakers. For simplification, we term our method Multitasking Triplet Generative Advers...

  17. Adversarial life testing: A Bayesian negotiation model

    International Nuclear Information System (INIS)

    Rufo, M.J.; Martín, J.; Pérez, C.J.

    2014-01-01

    Life testing is a procedure intended for facilitating the process of making decisions in the context of industrial reliability. On the other hand, negotiation is a process of making joint decisions that has one of its main foundations in decision theory. A Bayesian sequential model of negotiation in the context of adversarial life testing is proposed. This model considers a general setting for which a manufacturer offers a product batch to a consumer. It is assumed that the reliability of the product is measured in terms of its lifetime. Furthermore, both the manufacturer and the consumer have to use their own information with respect to the quality of the product. Under these assumptions, two situations can be analyzed. For both of them, the main aim is to accept or reject the product batch based on the product reliability. This topic is related to a reliability demonstration problem. The procedure is applied to a class of distributions that belong to the exponential family. Thus, a unified framework addressing the main topics in the considered Bayesian model is presented. An illustrative example shows that the proposed technique can be easily applied in practice

  18. Generative adversarial networks for brain lesion detection

    Science.gov (United States)

    Alex, Varghese; Safwan, K. P. Mohammed; Chennamsetty, Sai Saketh; Krishnamurthi, Ganapathy

    2017-02-01

    Manual segmentation of brain lesions from Magnetic Resonance Images (MRI) is cumbersome and introduces errors due to inter-rater variability. This paper introduces a semi-supervised technique for detection of brain lesion from MRI using Generative Adversarial Networks (GANs). GANs comprises of a Generator network and a Discriminator network which are trained simultaneously with the objective of one bettering the other. The networks were trained using non lesion patches (n=13,000) from 4 different MR sequences. The network was trained on BraTS dataset and patches were extracted from regions excluding tumor region. The Generator network generates data by modeling the underlying probability distribution of the training data, (PData). The Discriminator learns the posterior probability P (Label Data) by classifying training data and generated data as "Real" or "Fake" respectively. The Generator upon learning the joint distribution, produces images/patches such that the performance of the Discriminator on them are random, i.e. P (Label Data = GeneratedData) = 0.5. During testing, the Discriminator assigns posterior probability values close to 0.5 for patches from non lesion regions, while patches centered on lesion arise from a different distribution (PLesion) and hence are assigned lower posterior probability value by the Discriminator. On the test set (n=14), the proposed technique achieves whole tumor dice score of 0.69, sensitivity of 91% and specificity of 59%. Additionally the generator network was capable of generating non lesion patches from various MR sequences.

  19. Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

    Directory of Open Access Journals (Sweden)

    Simko Lucy

    2018-01-01

    Full Text Available Source code attribution classifiers have recently become powerful. We consider the possibility that an adversary could craft code with the intention of causing a misclassification, i.e., creating a forgery of another author’s programming style in order to hide the forger’s own identity or blame the other author. We find that it is possible for a non-expert adversary to defeat such a system. In order to inform the design of adversarially resistant source code attribution classifiers, we conduct two studies with C/C++ programmers to explore the potential tactics and capabilities both of such adversaries and, conversely, of human analysts doing source code authorship attribution. Through the quantitative and qualitative analysis of these studies, we (1 evaluate a state-of-the-art machine classifier against forgeries, (2 evaluate programmers as human analysts/forgery detectors, and (3 compile a set of modifications made to create forgeries. Based on our analyses, we then suggest features that future source code attribution systems might incorporate in order to be adversarially resistant.

  20. Decorrelated Jet Substructure Tagging using Adversarial Neural Networks

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    We describe a strategy for constructing a neural network jet substructure tagger which powerfully discriminates boosted decay signals while remaining largely uncorrelated with the jet mass. This reduces the impact of systematic uncertainties in background modeling while enhancing signal purity, resulting in improved discovery significance relative to existing taggers. The network is trained using an adversarial strategy, resulting in a tagger that learns to balance classification accuracy with decorrelation. As a benchmark scenario, we consider the case where large-radius jets originating from a boosted Z' decay are discriminated from a background of nonresonant quark and gluon jets. We show that in the presence of systematic uncertainties on the background rate, our adversarially-trained, decorrelated tagger considerably outperforms a conventionally trained neural network, despite having a slightly worse signal-background separation power. We generalize the adversarial training technique to include a paramet...

  1. An adversarial queueing model for online server routing

    NARCIS (Netherlands)

    Bonifaci, V.

    2007-01-01

    In an online server routing problem, a vehicle or server moves in a network in order to process incoming requests at the nodes. Online server routing problems have been thoroughly studied using competitive analysis. We propose a new model for online server routing, based on adversarial queueing

  2. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    simulation in the presence of malicious, polynomial-time adversaries (assuming that ElGamal encryption is semantically secure) and exhibits computation and communication costs of O(n + m) in a constant round complexity. In addition to the above, we propose a collection of protocols for variations...

  3. Vulnerability of classifiers to evolutionary generated adversarial examples

    Czech Academy of Sciences Publication Activity Database

    Vidnerová, Petra; Neruda, Roman

    submitted 14.1. 2017 (2018) ISSN 0941-0643 R&D Projects: GA ČR GA15-18108S Institutional support: RVO:67985807 Keywords : supervised learning * neural networks * kernel methods * genetic algorithm s * adversarial examples Subject RIV: IN - Informatics, Computer Science Impact factor: 2.505, year: 2016

  4. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    International Nuclear Information System (INIS)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems

  5. Comparing Generative Adversarial Network Techniques for Image Creation and Modification

    NARCIS (Netherlands)

    Pieters, Mathijs; Wiering, Marco

    2018-01-01

    Generative adversarial networks (GANs) have demonstrated to be successful at generating realistic real-world images. In this paper we compare various GAN techniques, both supervised and unsupervised. The effects on training stability of different objective functions are compared. We add an encoder

  6. Generative adversarial networks for anomaly detection in images

    OpenAIRE

    Batiste Ros, Guillem

    2018-01-01

    Anomaly detection is used to identify abnormal observations that don t follow a normal pattern. Inthis work, we use the power of Generative Adversarial Networks in sampling from image distributionsto perform anomaly detection with images and to identify local anomalous segments within thisimages. Also, we explore potential application of this method to support pathological analysis ofbiological tissues

  7. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems.

  8. Adversarial risks in social experiments with new technologies

    NARCIS (Netherlands)

    Pieters, Wolter; Dechesne, Francien; van der Poel, Ibo; Asveld, Lotte; Mehos, Donna C.

    2017-01-01

    Studies that approach the deployment of new technologies as social experiments have mostly focused on unintentional effects, notably safety. We argue for the inclusion of adversarial risks or security aspects that are the result of intentional, strategic behavior of actors, who aim at using the

  9. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    NARCIS (Netherlands)

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement

  10. Application of Generative Adversarial Networks (GANs) to jet images

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    https://arxiv.org/abs/1701.05927 We provide a bridge between generative modeling in the Machine Learning community and simulated physical processes in High Energy Particle Physics by applying a novel Generative Adversarial Network (GAN) architecture to the production of jet images -- 2D representations of energy depositions from particles interacting with a calorimeter. We propose a simple architecture, the Location-Aware Generative Adversarial Network, that learns to produce realistic radiation patterns from simulated high energy particle collisions. The pixel intensities of GAN-generated images faithfully span over many orders of magnitude and exhibit the desired low-dimensional physical properties (i.e., jet mass, n-subjettiness, etc.). We shed light on limitations, and provide a novel empirical validation of image quality and validity of GAN-produced simulations of the natural world. This work provides a base for further explorations of GANs for use in faster simulation in High Energy Particle Physics.

  11. Coupled generative adversarial stacked Auto-encoder: CoGASA.

    Science.gov (United States)

    Kiasari, Mohammad Ahangar; Moirangthem, Dennis Singh; Lee, Minho

    2018-04-01

    Coupled Generative Adversarial Network (CoGAN) was recently introduced in order to model a joint distribution of a multi modal dataset. The CoGAN model lacks the capability to handle noisy data as well as it is computationally expensive and inefficient for practical applications such as cross-domain image transformation. In this paper, we propose a new method, named the Coupled Generative Adversarial Stacked Auto-encoder (CoGASA), to directly transfer data from one domain to another domain with robustness to noise in the input data as well to as reduce the computation time. We evaluate the proposed model using MNIST and the Large-scale CelebFaces Attributes (CelebA) datasets, and the results demonstrate a highly competitive performance. Our proposed models can easily transfer images into the target domain with minimal effort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Speech-Driven Facial Reenactment Using Conditional Generative Adversarial Networks

    OpenAIRE

    Jalalifar, Seyed Ali; Hasani, Hosein; Aghajan, Hamid

    2018-01-01

    We present a novel approach to generating photo-realistic images of a face with accurate lip sync, given an audio input. By using a recurrent neural network, we achieved mouth landmarks based on audio features. We exploited the power of conditional generative adversarial networks to produce highly-realistic face conditioned on a set of landmarks. These two networks together are capable of producing a sequence of natural faces in sync with an input audio track.

  13. Online Evolution for Multi-Action Adversarial Games

    OpenAIRE

    Justesen, Niels; Mahlmann, Tobias; Togelius, Julian

    2016-01-01

    We present Online Evolution, a novel method for playing turn-based multi-action adversarial games. Such games, which include most strategy games, have extremely high branching factors due to each turn having multiple actions. In Online Evolution, an evolutionary algorithm is used to evolve the combination of atomic actions that make up a single move, with a state evaluation function used for fitness. We implement Online Evolution for the turn-based multi-action game Hero Academy and compare i...

  14. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    OpenAIRE

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement learning technique, like neural networks, Monte Carlo learning and Q-learning, against each other and examine their effectiveness against learning opponents. The results showed that Monte Carlo lear...

  15. A5: Automated Analysis of Adversarial Android Applications

    Science.gov (United States)

    2014-06-03

    A5: Automated Analysis of Adversarial Android Applications Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin...detecting, on the device itself, that an application is malicious is much more complex without elevated privileges . In other words, given the...interface via website. Blasing et al. [7] describe another dynamic analysis system for Android . Their system focuses on classifying input applications as

  16. Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments

    Science.gov (United States)

    2006-08-14

    COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN ADVERSARIAL ENVIRONMENTS Grant #F49620–01–1–0361 Final Report Jeff Shamma Department of...CONTRACT NUMBER F49620-01-1-0361 5b. GRANT NUMBER 4. TITLE AND SUBTITLE COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN...single dominant language or a distribution of languages. A relation to multivehicle systems is understanding how highly autonomous vehicles on extended

  17. Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels

    OpenAIRE

    Ahlswede, Rudolf; Bjelakovic, Igor; Boche, Holger; Noetzel, Janis

    2010-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes...

  18. Cognitive-Emotional Conflict: Adversary Will and Social Resilience

    Science.gov (United States)

    2017-12-21

    effectively with skilled adversaries in the realm of social media . This admit- tedly is a complex problem for any open, democratic society that does not... social media of the targeted populations. Rather than inciting a population to take a particular action, as the leak of the Zimmerman telegram did in...produced by the 24/7 news cycle, amplified and accelerated by social media . National Level Most Americans do not recognize the threats posed by

  19. End-to-End Adversarial Retinal Image Synthesis.

    Science.gov (United States)

    Costa, Pedro; Galdran, Adrian; Meyer, Maria Ines; Niemeijer, Meindert; Abramoff, Michael; Mendonca, Ana Maria; Campilho, Aurelio

    2018-03-01

    In medical image analysis applications, the availability of the large amounts of annotated data is becoming increasingly critical. However, annotated medical data is often scarce and costly to obtain. In this paper, we address the problem of synthesizing retinal color images by applying recent techniques based on adversarial learning. In this setting, a generative model is trained to maximize a loss function provided by a second model attempting to classify its output into real or synthetic. In particular, we propose to implement an adversarial autoencoder for the task of retinal vessel network synthesis. We use the generated vessel trees as an intermediate stage for the generation of color retinal images, which is accomplished with a generative adversarial network. Both models require the optimization of almost everywhere differentiable loss functions, which allows us to train them jointly. The resulting model offers an end-to-end retinal image synthesis system capable of generating as many retinal images as the user requires, with their corresponding vessel networks, by sampling from a simple probability distribution that we impose to the associated latent space. We show that the learned latent space contains a well-defined semantic structure, implying that we can perform calculations in the space of retinal images, e.g., smoothly interpolating new data points between two retinal images. Visual and quantitative results demonstrate that the synthesized images are substantially different from those in the training set, while being also anatomically consistent and displaying a reasonable visual quality.

  20. Vulnerability assessment: Determining probabilities of neutralization of adversaries

    International Nuclear Information System (INIS)

    Graves, B.R.

    1987-01-01

    The Security Manager charged with the responsibility of designing Safeguards and Security Systems at Department of Energy facilities must take many factors into consideration. There must be a clear understanding, supported by documented guidance, of the level of threat to be addressed; the nature of the facility to be protected, and the funds available to design, implement, and maintain the Safeguards and Security System. Armed with these prerequisites, the Security Manager may then determine the characteristics of the Safeguards measures and security forces necessary to protect the facility. Security forces selection and training programs may then be established based on realistic facility needs. The next step is to attempt to determine the probability of security forces winning in a confrontation with adversaries. To determine the probability of success the Security Manager must consider the characteristics of the facility and surrounding area; the characteristics of the security forces and safeguards system at the facility; the response time and capabilities of the augmentation forces and the characteristics and capabilities of the adversary threat level to be addressed. Obviously, the Safeguards and Security Systems must initially address ''worst case'' scenarios consistent with stated guidelines. Validation of the assessment of the Safeguards and Security Systems must then be determined by simulation testing of the capabilities of the response forces against the capabilities of the adversary

  1. GANViz: A Visual Analytics Approach to Understand the Adversarial Game.

    Science.gov (United States)

    Wang, Junpeng; Gou, Liang; Yang, Hao; Shen, Han-Wei

    2018-06-01

    Generative models bear promising implications to learn data representations in an unsupervised fashion with deep learning. Generative Adversarial Nets (GAN) is one of the most popular frameworks in this arena. Despite the promising results from different types of GANs, in-depth understanding on the adversarial training process of the models remains a challenge to domain experts. The complexity and the potential long-time training process of the models make it hard to evaluate, interpret, and optimize them. In this work, guided by practical needs from domain experts, we design and develop a visual analytics system, GANViz, aiming to help experts understand the adversarial process of GANs in-depth. Specifically, GANViz evaluates the model performance of two subnetworks of GANs, provides evidence and interpretations of the models' performance, and empowers comparative analysis with the evidence. Through our case studies with two real-world datasets, we demonstrate that GANViz can provide useful insight into helping domain experts understand, interpret, evaluate, and potentially improve GAN models.

  2. Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    Many classification algorithms have been successfully deployed in security-sensitive applications including spam filters and intrusion detection systems. Under such adversarial environments, adversaries can generate exploratory attacks against the defender such as evasion and reverse engineering. In this paper, we discuss why reverse engineering attacks can be carried out quite efficiently against fixed classifiers, and investigate the use of randomization as a suitable strategy for mitigating their risk. In particular, we derive a semidefinite programming (SDP) formulation for learning a distribution of classifiers subject to the constraint that any single classifier picked at random from such distribution provides reliable predictions with a high probability. We analyze the tradeoff between variance of the distribution and its predictive accuracy, and establish that one can almost always incorporate randomization with large variance without incurring a loss in accuracy. In other words, the conventional approach of using a fixed classifier in adversarial environments is generally Pareto suboptimal. Finally, we validate such conclusions on both synthetic and real-world classification problems. Copyright 2014 ACM.

  3. Towards Stable Adversarial Feature Learning for LiDAR based Loop Closure Detection

    OpenAIRE

    Xu, Lingyun; Yin, Peng; Luo, Haibo; Liu, Yunhui; Han, Jianda

    2017-01-01

    Stable feature extraction is the key for the Loop closure detection (LCD) task in the simultaneously localization and mapping (SLAM) framework. In our paper, the feature extraction is operated by using a generative adversarial networks (GANs) based unsupervised learning. GANs are powerful generative models, however, GANs based adversarial learning suffers from training instability. We find that the data-code joint distribution in the adversarial learning is a more complex manifold than in the...

  4. StackGAN++: Realistic Image Synthesis with Stacked Generative Adversarial Networks

    OpenAIRE

    Zhang, Han; Xu, Tao; Li, Hongsheng; Zhang, Shaoting; Wang, Xiaogang; Huang, Xiaolei; Metaxas, Dimitris

    2017-01-01

    Although Generative Adversarial Networks (GANs) have shown remarkable success in various tasks, they still face challenges in generating high quality images. In this paper, we propose Stacked Generative Adversarial Networks (StackGAN) aiming at generating high-resolution photo-realistic images. First, we propose a two-stage generative adversarial network architecture, StackGAN-v1, for text-to-image synthesis. The Stage-I GAN sketches the primitive shape and colors of the object based on given...

  5. Adversarial Advantage Actor-Critic Model for Task-Completion Dialogue Policy Learning

    OpenAIRE

    Peng, Baolin; Li, Xiujun; Gao, Jianfeng; Liu, Jingjing; Chen, Yun-Nung; Wong, Kam-Fai

    2017-01-01

    This paper presents a new method --- adversarial advantage actor-critic (Adversarial A2C), which significantly improves the efficiency of dialogue policy learning in task-completion dialogue systems. Inspired by generative adversarial networks (GAN), we train a discriminator to differentiate responses/actions generated by dialogue agents from responses/actions by experts. Then, we incorporate the discriminator as another critic into the advantage actor-critic (A2C) framework, to encourage the...

  6. Evaluating late detection capability against diverse insider adversaries

    International Nuclear Information System (INIS)

    Sicherman, A.

    1987-01-01

    This paper describes a model for evaluating the late (after-the-fact) detection capability of material control and accountability (MCandA) systems against insider theft or diversion of special nuclear material. Potential insider cover-up strategies to defeat activities providing detection (e.g., inventories) are addressed by the model in a tractable manner. For each potential adversary and detection activity, two probabilities are assessed and used to fit the model. The model then computes the probability of detection for activities occurring periodically over time. The model provides insight into MCandA effectiveness and helps identify areas for safeguards improvement. 4 refs., 4 tabs

  7. Probabilistic Characterization of Adversary Behavior in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  8. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  9. Gender Identity and Adversarial Sexual Beliefs as Predictors of Attitudes toward Sexual Harassment.

    Science.gov (United States)

    Murrell, Audrey J.; Dietz-Uhler, Beth L.

    1993-01-01

    Examines impact of gender identity and adversarial sexual beliefs as predictors of attitudes toward sexual harassment for 52 female and 55 male college students. Adversarial beliefs and experience with sexual harassment predict less tolerant attitudes toward harassment for males, whereas strong gender group identity and experience with harassment…

  10. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    International Nuclear Information System (INIS)

    Heineke, J.M.

    1978-01-01

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed

  11. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    Directory of Open Access Journals (Sweden)

    Yujia Liu

    2017-01-01

    Full Text Available Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN. To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic detector blind to the existence of objects in an image, by crafting a kind of adversarial examples. It is just like all objects disappear after wearing an “invisible cloak” from the view of the detector. Then we evaluate the effectiveness of Stealth algorithm through our newly defined measurement, named privacy insurance. The results indicate that our scheme has considerable success rate to guarantee privacy compared with other methods, such as mosaic, blur, and noise. Better still, Stealth algorithm has the smallest impact on image visual quality. Meanwhile, we set a user adjustable parameter called cloak thickness for regulating the perturbation intensity. Furthermore, we find that the processed images have transferability property; that is, the adversarial images generated for one particular DNN will influence the others as well.

  12. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O......We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O...

  13. 'Meatball searching' - The adversarial approach to online information retrieval

    Science.gov (United States)

    Jack, R. F.

    1985-01-01

    It is proposed that the different styles of online searching can be described as either formal (highly precise) or informal with the needs of the client dictating which is most applicable at a particular moment. The background and personality of the searcher also come into play. Particular attention is focused on meatball searching which is a form of online searching characterized by deliberate vagueness. It requires generally comprehensive searches, often on unusual topics and with tight deadlines. It is most likely to occur in search centers serving many different disciplines and levels of client information sophistication. Various information needs are outlined as well as the laws of meatball searching and the adversarial approach. Traits and characteristics important to sucessful searching include: (1) concept analysis, (2) flexibility of thinking, (3) ability to think in synonyms and (4) anticipation of variant word forms and spellings.

  14. Identifying quantum phase transitions with adversarial neural networks

    Science.gov (United States)

    Huembeli, Patrick; Dauphin, Alexandre; Wittek, Peter

    2018-04-01

    The identification of phases of matter is a challenging task, especially in quantum mechanics, where the complexity of the ground state appears to grow exponentially with the size of the system. Traditionally, physicists have to identify the relevant order parameters for the classification of the different phases. We here follow a radically different approach: we address this problem with a state-of-the-art deep learning technique, adversarial domain adaptation. We derive the phase diagram of the whole parameter space starting from a fixed and known subspace using unsupervised learning. This method has the advantage that the input of the algorithm can be directly the ground state without any ad hoc feature engineering. Furthermore, the dimension of the parameter space is unrestricted. More specifically, the input data set contains both labeled and unlabeled data instances. The first kind is a system that admits an accurate analytical or numerical solution, and one can recover its phase diagram. The second type is the physical system with an unknown phase diagram. Adversarial domain adaptation uses both types of data to create invariant feature extracting layers in a deep learning architecture. Once these layers are trained, we can attach an unsupervised learner to the network to find phase transitions. We show the success of this technique by applying it on several paradigmatic models: the Ising model with different temperatures, the Bose-Hubbard model, and the Su-Schrieffer-Heeger model with disorder. The method finds unknown transitions successfully and predicts transition points in close agreement with standard methods. This study opens the door to the classification of physical systems where the phase boundaries are complex such as the many-body localization problem or the Bose glass phase.

  15. TRANSITION FROM ADVERSARIAL TO COOPERATIVE STRATEGIC INTERACTION; FINAL

    International Nuclear Information System (INIS)

    G.H. CANAVAN

    2001-01-01

    This note extends the game theoretic analysis of strategic conflicts begun in earlier Seminars on Planetary Emergencies to interactions with and without defenses between two or more adversaries with more realistic target structures. It reviews the essentials of game theory as applied to the analysis of strategic decisions, the application of first and second strike costs as payoffs, and solution optimization, which resolves several inconsistencies seen with earlier metrics. The stability of the current bilateral offensive configuration is shown to be high and insensitive to deep reductions in offensive forces, the deployment of limited defenses, and the exchange of significant offensive forces for defenses. The transition from adversarial to cooperative interaction is represented by the progressive reduction of the parameters representing each side's preference for damaging or deterring the other, which monotonically improves stability. Estimates of strike incentives in bilateral and trilateral configurations are reduced by the inclusion of high value targets in both sides' force allocations, which dominates the details of offensive and defensive forces. The shift to high value targets stabilizes trilateral offensive configurations, a result that differs with that from analyses based on military costs only. When defenses are included, they lead to a balance between a large defended side and small undefended side that resembles the balance between two large sides. Including the large side's preference for defense of high value targets in the analyses reduces its strike incentives and thus the small side's incentive to preempt. However, it also removes the large sides' ability to deter, so the stability of multi-polar configurations continues to be controlled by the least stable dyad, which places constraints on the size of defenses that can be deployed stably that could be more stringent than those from the bilateral balance

  16. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries

    NARCIS (Netherlands)

    Frost, J.H.; Finkel, E.J.; Norton, M.I.; Ariely, D.; Caprariello, P.A.; Eastwick, P.W.

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our

  17. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  18. Translating agency reform through durable rhetorical styles: comparing official agency talk across consensus and adversarial contexts

    NARCIS (Netherlands)

    Smullen, A.

    2010-01-01

    This article directs attention to the role of ideational variables in shaping public management reform initiatives. It considers the contribution of both endogenous rhetorical styles and exogenous international fashions in explaining official agency talk in consensus and adversarial contexts.

  19. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.

    Science.gov (United States)

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in

  20. C-RNN-GAN: Continuous recurrent neural networks with adversarial training

    OpenAIRE

    Mogren, Olof

    2016-01-01

    Generative adversarial networks have been proposed as a way of efficiently training deep generative neural networks. We propose a generative adversarial model that works on continuous sequential data, and apply it by training it on a collection of classical music. We conclude that it generates music that sounds better and better as the model is trained, report statistics on generated music, and let the reader judge the quality by downloading the generated songs.

  1. Creating Turbulent Flow Realizations with Generative Adversarial Networks

    Science.gov (United States)

    King, Ryan; Graf, Peter; Chertkov, Michael

    2017-11-01

    Generating valid inflow conditions is a crucial, yet computationally expensive, step in unsteady turbulent flow simulations. We demonstrate a new technique for rapid generation of turbulent inflow realizations that leverages recent advances in machine learning for image generation using a deep convolutional generative adversarial network (DCGAN). The DCGAN is an unsupervised machine learning technique consisting of two competing neural networks that are trained against each other using backpropagation. One network, the generator, tries to produce samples from the true distribution of states, while the discriminator tries to distinguish between true and synthetic samples. We present results from a fully-trained DCGAN that is able to rapidly draw random samples from the full distribution of possible inflow states without needing to solve the Navier-Stokes equations, eliminating the costly process of spinning up inflow turbulence. This suggests a new paradigm in physics informed machine learning where the turbulence physics can be encoded in either the discriminator or generator. Finally, we also propose additional applications such as feature identification and subgrid scale modeling.

  2. Quantum Capacity under Adversarial Quantum Noise: Arbitrarily Varying Quantum Channels

    Science.gov (United States)

    Ahlswede, Rudolf; Bjelaković, Igor; Boche, Holger; Nötzel, Janis

    2013-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called an arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes a regularized formula for the common randomness-assisted capacity for entanglement transmission of an AVQC. Quite surprisingly and in contrast to the classical analog of the problem involving the maximal and average error probability, we find that the capacity for entanglement transmission of an AVQC always equals its strong subspace transmission capacity. These results are accompanied by different notions of symmetrizability (zero-capacity conditions) as well as by conditions for an AVQC to have a capacity described by a single-letter formula. In the final part of the paper the capacity of the erasure-AVQC is computed and some light shed on the connection between AVQCs and zero-error capacities. Additionally, we show by entirely elementary and operational arguments motivated by the theory of AVQCs that the quantum, classical, and entanglement-assisted zero-error capacities of quantum channels are generically zero and are discontinuous at every positivity point.

  3. Protecting Clock Synchronization: Adversary Detection through Network Monitoring

    Directory of Open Access Journals (Sweden)

    Elena Lisova

    2016-01-01

    Full Text Available Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.

  4. Ichthyoplankton Classification Tool using Generative Adversarial Networks and Transfer Learning

    KAUST Repository

    Aljaafari, Nura

    2018-04-15

    The study and the analysis of marine ecosystems is a significant part of the marine science research. These systems are valuable resources for fisheries, improving water quality and can even be used in drugs production. The investigation of ichthyoplankton inhabiting these ecosystems is also an important research field. Ichthyoplankton are fish in their early stages of life. In this stage, the fish have relatively similar shape and are small in size. The currently used way of identifying them is not optimal. Marine scientists typically study such organisms by sending a team that collects samples from the sea which is then taken to the lab for further investigation. These samples need to be studied by an expert and usually end needing a DNA sequencing. This method is time-consuming and requires a high level of experience. The recent advances in AI have helped to solve and automate several difficult tasks which motivated us to develop a classification tool for ichthyoplankton. We show that using machine learning techniques, such as generative adversarial networks combined with transfer learning solves such a problem with high accuracy. We show that using traditional machine learning algorithms fails to solve it. We also give a general framework for creating a classification tool when the dataset used for training is a limited dataset. We aim to build a user-friendly tool that can be used by any user for the classification task and we aim to give a guide to the researchers so that they can follow in creating a classification tool.

  5. Generative Adversarial Networks for Noise Reduction in Low-Dose CT.

    Science.gov (United States)

    Wolterink, Jelmer M; Leiner, Tim; Viergever, Max A; Isgum, Ivana

    2017-12-01

    Noise is inherent to low-dose CT acquisition. We propose to train a convolutional neural network (CNN) jointly with an adversarial CNN to estimate routine-dose CT images from low-dose CT images and hence reduce noise. A generator CNN was trained to transform low-dose CT images into routine-dose CT images using voxelwise loss minimization. An adversarial discriminator CNN was simultaneously trained to distinguish the output of the generator from routine-dose CT images. The performance of this discriminator was used as an adversarial loss for the generator. Experiments were performed using CT images of an anthropomorphic phantom containing calcium inserts, as well as patient non-contrast-enhanced cardiac CT images. The phantom and patients were scanned at 20% and 100% routine clinical dose. Three training strategies were compared: the first used only voxelwise loss, the second combined voxelwise loss and adversarial loss, and the third used only adversarial loss. The results showed that training with only voxelwise loss resulted in the highest peak signal-to-noise ratio with respect to reference routine-dose images. However, CNNs trained with adversarial loss captured image statistics of routine-dose images better. Noise reduction improved quantification of low-density calcified inserts in phantom CT images and allowed coronary calcium scoring in low-dose patient CT images with high noise levels. Testing took less than 10 s per CT volume. CNN-based low-dose CT noise reduction in the image domain is feasible. Training with an adversarial network improves the CNNs ability to generate images with an appearance similar to that of reference routine-dose CT images.

  6. Adversarial reasoning and resource allocation: the LG approach

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg; Boyd, Ron

    2005-05-01

    Many existing automated tools purporting to model the intelligent enemy utilize a fixed battle plan for the enemy while using flexible decisions of human players for the friendly side. According to the Naval Studies Board, "It is an open secret and a point of distress ... that too much of the substantive content of such M&S has its origin in anecdote, ..., or a narrow construction tied to stereotypical current practices of 'doctrinally correct behavior.'" Clearly, such runs lack objectivity by being heavily skewed in favor of the friendly forces. Presently, the military branches employ a variety of game-based simulators and synthetic environments, with manual (i.e., user-based) decision-making, for training and other purposes. However, without an ability to automatically generate the best strategies, tactics, and COA, the games serve mostly to display the current situation rather than form a basis for automated decision-making and effective training. We solve the problem of adversarial reasoning as a gaming problem employing Linguistic Geometry (LG), a new type of game theory demonstrating significant increase in size in gaming problems solvable in real and near-real time. It appears to be a viable approach for solving such practical problems as mission planning and battle management. Essentially, LG may be structured into two layers: game construction and game solving. Game construction includes construction of a game called an LG hypergame based on a hierarchy of Abstract Board Games (ABG). Game solving includes resource allocation for constructing an advantageous initial game state and strategy generation to reach a desirable final game state in the course of the game.

  7. VIGAN: Missing View Imputation with Generative Adversarial Networks.

    Science.gov (United States)

    Shang, Chao; Palmer, Aaron; Sun, Jiangwen; Chen, Ko-Shin; Lu, Jin; Bi, Jinbo

    2017-01-01

    In an era when big data are becoming the norm, there is less concern with the quantity but more with the quality and completeness of the data. In many disciplines, data are collected from heterogeneous sources, resulting in multi-view or multi-modal datasets. The missing data problem has been challenging to address in multi-view data analysis. Especially, when certain samples miss an entire view of data, it creates the missing view problem. Classic multiple imputations or matrix completion methods are hardly effective here when no information can be based on in the specific view to impute data for such samples. The commonly-used simple method of removing samples with a missing view can dramatically reduce sample size, thus diminishing the statistical power of a subsequent analysis. In this paper, we propose a novel approach for view imputation via generative adversarial networks (GANs), which we name by VIGAN. This approach first treats each view as a separate domain and identifies domain-to-domain mappings via a GAN using randomly-sampled data from each view, and then employs a multi-modal denoising autoencoder (DAE) to reconstruct the missing view from the GAN outputs based on paired data across the views. Then, by optimizing the GAN and DAE jointly, our model enables the knowledge integration for domain mappings and view correspondences to effectively recover the missing view. Empirical results on benchmark datasets validate the VIGAN approach by comparing against the state of the art. The evaluation of VIGAN in a genetic study of substance use disorders further proves the effectiveness and usability of this approach in life science.

  8. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems

    Directory of Open Access Journals (Sweden)

    Xiaofei He

    2018-02-01

    Full Text Available Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT (smart cities, smart grid, smart transportation, etc. and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy, our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against

  9. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †

    Science.gov (United States)

    Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-01-01

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries

  10. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.

    Science.gov (United States)

    He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-02-24

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries

  11. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Directory of Open Access Journals (Sweden)

    Tess M S Neal

    Full Text Available This survey of 206 forensic psychologists tested the "filtering" effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the "allegiance effect" in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process.

  12. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Science.gov (United States)

    2016-01-01

    This survey of 206 forensic psychologists tested the “filtering” effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the “allegiance effect” in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process. PMID:27124416

  13. Consensus of discrete-time multi-agent systems with adversaries and time delays

    Science.gov (United States)

    Wu, Yiming; He, Xiongxiong; Liu, Shuai; Xie, Lihua

    2014-05-01

    This paper studies the resilient asymptotic consensus problem for discrete-time multi-agent systems in the presence of adversaries and transmission delays. The network is assumed to have ? loyal agents and ? adversarial agents, and each loyal agent in the network has no knowledge of the network topology other than an upper bound on the number of adversarial agents in its neighborhood. For the considered networked system, only locally delayed information is available for each loyal agent, and also the information flow is directed and a control protocol using only local information is designed to guarantee the realization of consensus with respect to communication graph, which satisfies a featured network robustness. Numerical examples are finally given to demonstrate the effectiveness of theoretical results.

  14. The adversarial system and the best interests of the child in divorce ...

    African Journals Online (AJOL)

    In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be considered underupon divorce. Collaborative Law is suggested as a means to bear in ...

  15. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  16. Synthetic aperture radar ship discrimination, generation and latent variable extraction using information maximizing generative adversarial networks

    CSIR Research Space (South Africa)

    Schwegmann, Colin P

    2017-07-01

    Full Text Available such as Synthetic Aperture Radar imagery. To aid in the creation of improved machine learning-based ship detection and discrimination methods this paper applies a type of neural network known as an Information Maximizing Generative Adversarial Network. Generative...

  17. GalaxyGAN: Generative Adversarial Networks for recovery of galaxy features

    Science.gov (United States)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Krishnan Santhanam, Gokula

    2017-02-01

    GalaxyGAN uses Generative Adversarial Networks to reliably recover features in images of galaxies. The package uses machine learning to train on higher quality data and learns to recover detailed features such as galaxy morphology by effectively building priors. This method opens up the possibility of recovering more information from existing and future imaging data.

  18. Adversarial risk analysis with incomplete information: a level-k approach.

    Science.gov (United States)

    Rothschild, Casey; McLay, Laura; Guikema, Seth

    2012-07-01

    This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.

  19. Bring a gun to a gunfight: armed adversaries and violence across nations.

    Science.gov (United States)

    Felson, Richard B; Berg, Mark T; Rogers, Meghan L

    2014-09-01

    We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. With God on our side: Religious primes reduce the envisioned physical formidability of a menacing adversary.

    Science.gov (United States)

    Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy

    2016-01-01

    The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Material control study: a directed graph and fault tree procedure for adversary event set generation

    International Nuclear Information System (INIS)

    Lambert, H.E.; Lim, J.J.; Gilman, F.M.

    1978-01-01

    In work for the United States Nuclear Regulatory Commission, Lawrence Livermore Laboratory is developing an assessment procedure to evaluate the effectiveness of a potential nuclear facility licensee's material control (MC) system. The purpose of an MC system is to prevent the theft of special nuclear material such as plutonium and highly enriched uranium. The key in the assessment procedure is the generation and analysis of the adversary event sets by a directed graph and fault-tree methodology

  2. Jointly Optimize Data Augmentation and Network Training: Adversarial Data Augmentation in Human Pose Estimation

    OpenAIRE

    Peng, Xi; Tang, Zhiqiang; Yang, Fei; Feris, Rogerio; Metaxas, Dimitris

    2018-01-01

    Random data augmentation is a critical technique to avoid overfitting in training deep neural network models. However, data augmentation and network training are usually treated as two isolated processes, limiting the effectiveness of network training. Why not jointly optimize the two? We propose adversarial data augmentation to address this limitation. The main idea is to design an augmentation network (generator) that competes against a target network (discriminator) by generating `hard' au...

  3. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary

    OpenAIRE

    Sendrier , Nicolas; Tillich , Jean-Pierre

    2016-01-01

    International audience; Cryptography is one of the key tools for providing security in our quickly evolving technological society. An adversary with the ability to use a quantum computer would defeat most of the cryptographic solutions that are deployed today to secure our communications. We do not know when quantum computing will become available, but nevertheless, the cryptographic research community must get ready for it now. Code-based cryptography is among the few cryptographic technique...

  4. Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

    OpenAIRE

    Sethi, Tegjyot Singh; Kantardzic, Mehmed

    2017-01-01

    While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication of attacks, has prompted the need for a data driven solution, with machine learning forming the core of many cybersecurity systems. Machine learning was not designed with security in mind, and the essential assumption of stationarity, requiri...

  5. Anti-Makeup: Learning A Bi-Level Adversarial Network for Makeup-Invariant Face Verification

    OpenAIRE

    Li, Yi; Song, Lingxiao; Wu, Xiang; He, Ran; Tan, Tieniu

    2017-01-01

    Makeup is widely used to improve facial attractiveness and is well accepted by the public. However, different makeup styles will result in significant facial appearance changes. It remains a challenging problem to match makeup and non-makeup face images. This paper proposes a learning from generation approach for makeup-invariant face verification by introducing a bi-level adversarial network (BLAN). To alleviate the negative effects from makeup, we first generate non-makeup images from makeu...

  6. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates an...... an additive factor of order $\\Delta e^{\\Delta^2}$, where $\\Delta$ is the minimal gap of a problem instance. In the adversarial regime regret guarantee remains unchanged....

  7. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    2017-01-01

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates...... an additive factor of order $\\Delta e^{\\Delta^2}$, where $\\Delta$ is the minimal gap of a problem instance. In the adversarial regime regret guarantee remains unchanged....

  8. Playing Multi-Action Adversarial Games: Online Evolutionary Planning versus Tree Search

    OpenAIRE

    Justesen, Niels; Mahlmann, Tobias; Risi, Sebastian; Togelius, Julian

    2017-01-01

    We address the problem of playing turn-based multi-action adversarial games, which include many strategy games with extremely high branching factors as players take multiple actions each turn. This leads to the breakdown of standard tree search methods, including Monte Carlo Tree Search (MCTS), as they become unable to reach a sufficient depth in the game tree. In this paper, we introduce Online Evolutionary Planning (OEP) to address this challenge, which searches for combinations of actions ...

  9. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    OpenAIRE

    Vieira, Aitor Couce; Houmb, Siv Hilde; Insua, David Rios

    2014-01-01

    Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  10. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    Directory of Open Access Journals (Sweden)

    Aitor Couce Vieira

    2014-04-01

    Full Text Available Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  11. Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments

    OpenAIRE

    Kott, Alexander

    2018-01-01

    Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments. This paper explores the characteristics, capabilities and intelligence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT). It will experience unique challenges that are not yet well addressed by the current generation of AI and machine lear...

  12. Occluded object reconstruction for first responders with augmented reality glasses using conditional generative adversarial networks

    OpenAIRE

    Yun, Kyongsik; Lu, Thomas; Chow, Edward

    2018-01-01

    Firefighters suffer a variety of life-threatening risks, including line-of-duty deaths, injuries, and exposures to hazardous substances. Support for reducing these risks is important. We built a partially occluded object reconstruction method on augmented reality glasses for first responders. We used a deep learning based on conditional generative adversarial networks to train associations between the various images of flammable and hazardous objects and their partially occluded counterparts....

  13. SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams

    International Nuclear Information System (INIS)

    Darby, J.L.

    1986-01-01

    The Adversary Sequence Diagram (ASD) concept was developed by Sandia National Laboratories (SNL) to examine physical security system effectiveness. Sandia also developed a mainframe computer code, PANL, to analyze the ASD. The authors have developed a microcomputer code, SEAPATH, which also analyzes ASD's. The Authors are supporting SNL in software development of the SAVI code; SAVI utilizes the SEAPATH algorithm to identify and quantify paths

  14. Deep Convolutional Generative Adversarial Network for Procedural 3D Landscape Generation Based on DEM

    OpenAIRE

    Wulff-Jensen, Andreas; Rant, Niclas Nerup; Møller, Tobias Nordvig; Billeskov, Jonas Aksel

    2018-01-01

    This paper proposes a novel framework for improving procedural generation of 3D landscapes using machine learning. We utilized a Deep Convolutional Generative Adversarial Network (DC-GAN) to generate heightmaps. The network was trained on a dataset consisting of Digital Elevation Maps (DEM) of the alps. During map generation, the batch size and learning rate were optimized for the most efficient and satisfying map production. The diversity of the final output was tested against Perlin noise u...

  15. Cognitive Targeting: A Coercive Air Power Theory for Conventional Escalation Control Against Nuclear Armed Adversaries

    Science.gov (United States)

    2016-06-01

    strategic,” in the cognitive targeting paradigm , are those that directly disable - in the strategic audience’s mind – the attractiveness or...This study analyses the applicability of three operational targeting paradigms to coerce a nuclear-armed adversary in a regional crisis, while...principles and elements of war and understand the coercive ability of utility targeting (a capabilities-based targeting paradigm , CBTP), axiological

  16. Show, Adapt and Tell: Adversarial Training of Cross-domain Image Captioner

    OpenAIRE

    Chen, Tseng-Hung; Liao, Yuan-Hong; Chuang, Ching-Yao; Hsu, Wan-Ting; Fu, Jianlong; Sun, Min

    2017-01-01

    Impressive image captioning results are achieved in domains with plenty of training image and sentence pairs (e.g., MSCOCO). However, transferring to a target domain with significant domain shifts but no paired training data (referred to as cross-domain image captioning) remains largely unexplored. We propose a novel adversarial training procedure to leverage unpaired data in the target domain. Two critic networks are introduced to guide the captioner, namely domain critic and multi-modal cri...

  17. Cooperation and punishment in an adversarial game: How defectors pave the way to a peaceful society

    Science.gov (United States)

    Short, M. B.; Brantingham, P. J.; D'Orsogna, M. R.

    2010-12-01

    The evolution of human cooperation has been the subject of much research, especially within the framework of evolutionary public goods games, where several mechanisms have been proposed to account for persistent cooperation. Yet, in addressing this issue, little attention has been given to games of a more adversarial nature, in which defecting players, rather than simply free riding, actively seek to harm others. Here, we develop an adversarial evolutionary game using the specific example of criminal activity, recasting the familiar public goods strategies of punishers, cooperators, and defectors in this light. We then introduce a strategy—the informant—with no clear analog in public goods games and show that individuals employing this strategy are a key to the emergence of systems where cooperation dominates. We also find that a defection-dominated regime may be transitioned to one that is cooperation-dominated by converting an optimal number of players into informants. We discuss these findings, the role of informants, and possible intervention strategies in extreme adversarial societies, such as those marred by wars and insurgencies.

  18. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    Science.gov (United States)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  19. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  20. SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation.

    Science.gov (United States)

    Xue, Yuan; Xu, Tao; Zhang, Han; Long, L Rodney; Huang, Xiaolei

    2018-05-03

    Inspired by classic Generative Adversarial Networks (GANs), we propose a novel end-to-end adversarial neural network, called SegAN, for the task of medical image segmentation. Since image segmentation requires dense, pixel-level labeling, the single scalar real/fake output of a classic GAN's discriminator may be ineffective in producing stable and sufficient gradient feedback to the networks. Instead, we use a fully convolutional neural network as the segmentor to generate segmentation label maps, and propose a novel adversarial critic network with a multi-scale L 1 loss function to force the critic and segmentor to learn both global and local features that capture long- and short-range spatial relationships between pixels. In our SegAN framework, the segmentor and critic networks are trained in an alternating fashion in a min-max game: The critic is trained by maximizing a multi-scale loss function, while the segmentor is trained with only gradients passed along by the critic, with the aim to minimize the multi-scale loss function. We show that such a SegAN framework is more effective and stable for the segmentation task, and it leads to better performance than the state-of-the-art U-net segmentation method. We tested our SegAN method using datasets from the MICCAI BRATS brain tumor segmentation challenge. Extensive experimental results demonstrate the effectiveness of the proposed SegAN with multi-scale loss: on BRATS 2013 SegAN gives performance comparable to the state-of-the-art for whole tumor and tumor core segmentation while achieves better precision and sensitivity for Gd-enhance tumor core segmentation; on BRATS 2015 SegAN achieves better performance than the state-of-the-art in both dice score and precision.

  1. RETHINKING THE ROLE OF SMALL-GROUP COLLABORATORS AND ADVERSARIES IN THE LONDON KLEINIAN DEVELOPMENT (1914-1968).

    Science.gov (United States)

    Aguayo, Joseph; Regeczkey, Agnes

    2016-07-01

    The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968. © 2016 The Psychoanalytic Quarterly, Inc.

  2. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  3. The Adversarial Principle in Prima Facie Judgments of the Legal Thesis Firmed in the Trial of Repetitive Cases

    Directory of Open Access Journals (Sweden)

    Juliana Provedel Cardoso

    2016-10-01

    Full Text Available The present articles objective is to analyse the highly effective adversarial principle from the Constitutional Democratic State of Law and the cooperative process structure. In this sense, an analysis of the repetitive cases model is made with special relevance to the Civil Procedure Codice 2015, put in evidence the preliminary injunction, the repetitive appeals and the resolution incident repetitive demands. With the establishment of the premises, an analysis of the adversarial principle is made on prima facie judgments of the legal thesis firmed in the trial of repetitive cases, in view of the motivation of the court decision (speech of the case and law (speech of the precedents.

  4. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries.

    Science.gov (United States)

    Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-03-27

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  5. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Science.gov (United States)

    Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-01-01

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679

  6. Translation-aware semantic segmentation via conditional least-square generative adversarial networks

    Science.gov (United States)

    Zhang, Mi; Hu, Xiangyun; Zhao, Like; Pang, Shiyan; Gong, Jinqi; Luo, Min

    2017-10-01

    Semantic segmentation has recently made rapid progress in the field of remote sensing and computer vision. However, many leading approaches cannot simultaneously translate label maps to possible source images with a limited number of training images. The core issue is insufficient adversarial information to interpret the inverse process and proper objective loss function to overcome the vanishing gradient problem. We propose the use of conditional least squares generative adversarial networks (CLS-GAN) to delineate visual objects and solve these problems. We trained the CLS-GAN network for semantic segmentation to discriminate dense prediction information either from training images or generative networks. We show that the optimal objective function of CLS-GAN is a special class of f-divergence and yields a generator that lies on the decision boundary of discriminator that reduces possible vanished gradient. We also demonstrate the effectiveness of the proposed architecture at translating images from label maps in the learning process. Experiments on a limited number of high resolution images, including close-range and remote sensing datasets, indicate that the proposed method leads to the improved semantic segmentation accuracy and can simultaneously generate high quality images from label maps.

  7. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    Directory of Open Access Journals (Sweden)

    Murilo Coutinho

    2018-04-01

    Full Text Available Researches in Artificial Intelligence (AI have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC. Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  8. Adversarial Allegiance: The Devil is in the Evidence Details, Not Just on the Witness Stand

    Science.gov (United States)

    McAuliff, Bradley D.; Arter, Jeana L.

    2016-01-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5 year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on pro-defense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Unlike prosecution-retained experts who shifted their focus from pro-defense aspects of the case in the high suggestibility interview to pro-prosecution aspects in the low suggestibility interview, defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts due to negativity bias and positive testing strategies associated with confirmation bias. PMID:27243362

  9. Generative adversarial network based telecom fraud detection at the receiving bank.

    Science.gov (United States)

    Zheng, Yu-Jun; Zhou, Xiao-Han; Sheng, Wei-Guo; Xue, Yu; Chen, Sheng-Yong

    2018-06-01

    Recently telecom fraud has become a serious problem especially in developing countries such as China. At present, it can be very difficult to coordinate different agencies to prevent fraud completely. In this paper we study how to detect large transfers that are sent from victims deceived by fraudsters at the receiving bank. We propose a new generative adversarial network (GAN) based model to calculate for each large transfer a probability that it is fraudulent, such that the bank can take appropriate measures to prevent potential fraudsters to take the money if the probability exceeds a threshold. The inference model uses a deep denoising autoencoder to effectively learn the complex probabilistic relationship among the input features, and employs adversarial training that establishes a minimax game between a discriminator and a generator to accurately discriminate between positive samples and negative samples in the data distribution. We show that the model outperforms a set of well-known classification methods in experiments, and its applications in two commercial banks have reduced losses of about 10 million RMB in twelve weeks and significantly improved their business reputation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    Science.gov (United States)

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  11. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Directory of Open Access Journals (Sweden)

    Zhengqiu Zhu

    2018-03-01

    Full Text Available Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters are integrated into the extended CPEP model; (iii Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  12. The cornucopia of meaningful leads: Applying deep adversarial autoencoders for new molecule development in oncology.

    Science.gov (United States)

    Kadurin, Artur; Aliper, Alexander; Kazennov, Andrey; Mamoshina, Polina; Vanhaelen, Quentin; Khrabrov, Kuzma; Zhavoronkov, Alex

    2017-02-14

    Recent advances in deep learning and specifically in generative adversarial networks have demonstrated surprising results in generating new images and videos upon request even using natural language as input. In this paper we present the first application of generative adversarial autoencoders (AAE) for generating novel molecular fingerprints with a defined set of parameters. We developed a 7-layer AAE architecture with the latent middle layer serving as a discriminator. As an input and output the AAE uses a vector of binary fingerprints and concentration of the molecule. In the latent layer we also introduced a neuron responsible for growth inhibition percentage, which when negative indicates the reduction in the number of tumor cells after the treatment. To train the AAE we used the NCI-60 cell line assay data for 6252 compounds profiled on MCF-7 cell line. The output of the AAE was used to screen 72 million compounds in PubChem and select candidate molecules with potential anti-cancer properties. This approach is a proof of concept of an artificially-intelligent drug discovery engine, where AAEs are used to generate new molecular fingerprints with the desired molecular properties.

  13. Adversarial allegiance: The devil is in the evidence details, not just on the witness stand.

    Science.gov (United States)

    McAuliff, Bradley D; Arter, Jeana L

    2016-10-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5-year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on prodefense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Prosecution-retained experts shifted their focus from prodefense aspects of the case in the high suggestibility interview to proprosecution aspects in the low suggestibility interview; defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and police interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts because of negativity bias and positive testing strategies associated with confirmation bias. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  14. Application of adversarial risk analysis model in pricing strategies with remanufacturing

    Directory of Open Access Journals (Sweden)

    Liurui Deng

    2015-01-01

    Full Text Available Purpose: Purpose: This paper mainly focus on the application of adversarial risk analysis (ARA in pricing strategy with remanufacturing. We hope to obtain more realistic results than classical model. Moreover, we also wish that our research improve the development of ARA in pricing strategy of manufacturing or remanufacturing. Approach: In order to gain more actual research, combining adversarial risk analysis, we explore the pricing strategy with remanufacturing based on Stackelberg model. Especially, we build OEM’s 1-order ARA model and further study on manufacturers and remanufacturers’ pricing strategy. Findings: We find the OEM’s 1-order ARA model for the OEM’s product cost C. Besides, we get according manufacturers and remanufacturers’ pricing strategies. Besides, the pricing strategies based on 1-order ARA model have advantage over than the classical model regardless of OEMs and remanufacturers. Research implications: The research on application of ARA imply that we can get more actual results with this kind of modern risk analysis method and ARA can be extensively in pricing strategies of supply chain. Value: Our research improves the application of ARA in remanufacturing industry. Meanwhile, inspired by this analysis, we can also create different ARA models for different parameters. Furthermore, some results and analysis methods can be applied to other pricing strategies of supply chain.

  15. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    Bernard, Jean-Francois

    1989-01-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  16. Are the advocates of nuclear power and the adversaries listening to each other?

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Jean-Francois [Electricite de France, Engineering and Construction Division, Sites-Environment-Information Branch, 22-30, avenue de Wagram, 75008, Paris (France)

    1989-07-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting.

  17. Undermining Adversaries

    DEFF Research Database (Denmark)

    He, Kai

    2012-01-01

    balancing refers to a state's strategies or diplomatic efforts aiming to undermine a rival's power. By contrast, positive balancing means to strengthen a state's own power in world politics. I argue that a state's balancing strategies are shaped by the level of threat perception regarding its rival....... The higher the threat perception, the more likely it is for a state to choose positive balancing. The lower the threat perception, the more likely it is for a state to choose negative balancing. I suggest that the hegemon provides security as a public good to the international system in a unipolar world...... in which the relatively low-threat propensity of the system renders positive balancing strategies incompatible with state interests after the Cold War. Instead, states have employed various negative balancing strategies to undermine each other's power, especially when dealing with us primacy. China...

  18. Playing Multi-Action Adversarial Games: Online Evolutionary Planning versus Tree Search

    DEFF Research Database (Denmark)

    Justesen, Niels; Mahlmann, Tobias; Risi, Sebastian

    2017-01-01

    We address the problem of playing turn-based multi-action adversarial games, which include many strategy games with extremely high branching factors as players take multiple actions each turn. This leads to the breakdown of standard tree search methods, including Monte Carlo Tree Search (MCTS......), as they become unable to reach a sufficient depth in the game tree. In this paper, we introduce Online Evolutionary Planning (OEP) to address this challenge, which searches for combinations of actions to perform during a single turn guided by a fitness function that evaluates the quality of a particular state....... We compare OEP to different MCTS variations that constrain the exploration to deal with the high branching factor in the turn-based multi-action game Hero Academy. While the constrained MCTS variations outperform the vanilla MCTS implementation by a large margin, OEP is able to search the space...

  19. Stock Market Prediction on High-Frequency Data Using Generative Adversarial Nets

    Directory of Open Access Journals (Sweden)

    Xingyu Zhou

    2018-01-01

    Full Text Available Stock price prediction is an important issue in the financial world, as it contributes to the development of effective strategies for stock exchange transactions. In this paper, we propose a generic framework employing Long Short-Term Memory (LSTM and convolutional neural network (CNN for adversarial training to forecast high-frequency stock market. This model takes the publicly available index provided by trading software as input to avoid complex financial theory research and difficult technical analysis, which provides the convenience for the ordinary trader of nonfinancial specialty. Our study simulates the trading mode of the actual trader and uses the method of rolling partition training set and testing set to analyze the effect of the model update cycle on the prediction performance. Extensive experiments show that our proposed approach can effectively improve stock price direction prediction accuracy and reduce forecast error.

  20. Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.

    Science.gov (United States)

    Biddle, Justin

    2013-12-01

    There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others.

  1. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries.

    Science.gov (United States)

    Finkel, Eli J; Norton, Michael I; Reis, Harry T; Ariely, Dan; Caprariello, Peter A; Eastwick, Paul W; Frost, Jeana H; Maniaci, Michael R

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our conceptualizations of the familiarity-attraction link, as well as the limitations of prior research, were masking a set of higher order principles capable of integrating these diverse conceptualizations. This realization led us to adopt a broader perspective, which focuses on three distinct relationship stages-awareness, surface contact, and mutuality-and suggests that the influence of familiarity on attraction depends on both the nature and the stage of the relationship between perceivers and targets. This article introduces the framework that emerged from our discussions and suggests directions for research to investigate its validity. © The Author(s) 2014.

  2. Sharpness-Aware Low-Dose CT Denoising Using Conditional Generative Adversarial Network.

    Science.gov (United States)

    Yi, Xin; Babyn, Paul

    2018-02-20

    Low-dose computed tomography (LDCT) has offered tremendous benefits in radiation-restricted applications, but the quantum noise as resulted by the insufficient number of photons could potentially harm the diagnostic performance. Current image-based denoising methods tend to produce a blur effect on the final reconstructed results especially in high noise levels. In this paper, a deep learning-based approach was proposed to mitigate this problem. An adversarially trained network and a sharpness detection network were trained to guide the training process. Experiments on both simulated and real dataset show that the results of the proposed method have very small resolution loss and achieves better performance relative to state-of-the-art methods both quantitatively and visually.

  3. Fine-Tuning Neural Patient Question Retrieval Model with Generative Adversarial Networks.

    Science.gov (United States)

    Tang, Guoyu; Ni, Yuan; Wang, Keqiang; Yong, Qin

    2018-01-01

    The online patient question and answering (Q&A) system attracts an increasing amount of users in China. Patient will post their questions and wait for doctors' response. To avoid the lag time involved with the waiting and to reduce the workload on the doctors, a better method is to automatically retrieve the semantically equivalent question from the archive. We present a Generative Adversarial Networks (GAN) based approach to automatically retrieve patient question. We apply supervised deep learning based approaches to determine the similarity between patient questions. Then a GAN framework is used to fine-tune the pre-trained deep learning models. The experiment results show that fine-tuning by GAN can improve the performance.

  4. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

    Directory of Open Access Journals (Sweden)

    Juen Joshua

    2015-06-01

    Full Text Available The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes and Internet exchanges (IXes, which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of the time. We also consider the impact that prediction errors have on Tor security. Using a simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance of at least one compromise in a week with 11% of total paths containing an AS compromise and less than 1% containing an IX compromise when using default Tor selection. We find modifying the path selection to choose paths predicted to be safe lowers total paths with an AS compromise to 0.14% but still presents a 5–11% chance of at least one compromise in a week while making 5% of paths fail, with 96% of failures due to false positives in path inferences. Our results demonstrate more measurement and better path prediction is necessary to mitigate the risk of AS and IX adversaries to Tor.

  5. Reconstruction of three-dimensional porous media using generative adversarial neural networks

    Science.gov (United States)

    Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.

    2017-10-01

    To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.

  6. Learning Physics-based Models in Hydrology under the Framework of Generative Adversarial Networks

    Science.gov (United States)

    Karpatne, A.; Kumar, V.

    2017-12-01

    Generative adversarial networks (GANs), that have been highly successful in a number of applications involving large volumes of labeled and unlabeled data such as computer vision, offer huge potential for modeling the dynamics of physical processes that have been traditionally studied using simulations of physics-based models. While conventional physics-based models use labeled samples of input/output variables for model calibration (estimating the right parametric forms of relationships between variables) or data assimilation (identifying the most likely sequence of system states in dynamical systems), there is a greater opportunity to explore the full power of machine learning (ML) methods (e.g, GANs) for studying physical processes currently suffering from large knowledge gaps, e.g. ground-water flow. However, success in this endeavor requires a principled way of combining the strengths of ML methods with physics-based numerical models that are founded on a wealth of scientific knowledge. This is especially important in scientific domains like hydrology where the number of data samples is small (relative to Internet-scale applications such as image recognition where machine learning methods has found great success), and the physical relationships are complex (high-dimensional) and non-stationary. We will present a series of methods for guiding the learning of GANs using physics-based models, e.g., by using the outputs of physics-based models as input data to the generator-learner framework, and by using physics-based models as generators trained using validation data in the adversarial learning framework. These methods are being developed under the broad paradigm of theory-guided data science that we are developing to integrate scientific knowledge with data science methods for accelerating scientific discovery.

  7. 3D conditional generative adversarial networks for high-quality PET image estimation at low dose.

    Science.gov (United States)

    Wang, Yan; Yu, Biting; Wang, Lei; Zu, Chen; Lalush, David S; Lin, Weili; Wu, Xi; Zhou, Jiliu; Shen, Dinggang; Zhou, Luping

    2018-07-01

    Positron emission tomography (PET) is a widely used imaging modality, providing insight into both the biochemical and physiological processes of human body. Usually, a full dose radioactive tracer is required to obtain high-quality PET images for clinical needs. This inevitably raises concerns about potential health hazards. On the other hand, dose reduction may cause the increased noise in the reconstructed PET images, which impacts the image quality to a certain extent. In this paper, in order to reduce the radiation exposure while maintaining the high quality of PET images, we propose a novel method based on 3D conditional generative adversarial networks (3D c-GANs) to estimate the high-quality full-dose PET images from low-dose ones. Generative adversarial networks (GANs) include a generator network and a discriminator network which are trained simultaneously with the goal of one beating the other. Similar to GANs, in the proposed 3D c-GANs, we condition the model on an input low-dose PET image and generate a corresponding output full-dose PET image. Specifically, to render the same underlying information between the low-dose and full-dose PET images, a 3D U-net-like deep architecture which can combine hierarchical features by using skip connection is designed as the generator network to synthesize the full-dose image. In order to guarantee the synthesized PET image to be close to the real one, we take into account of the estimation error loss in addition to the discriminator feedback to train the generator network. Furthermore, a concatenated 3D c-GANs based progressive refinement scheme is also proposed to further improve the quality of estimated images. Validation was done on a real human brain dataset including both the normal subjects and the subjects diagnosed as mild cognitive impairment (MCI). Experimental results show that our proposed 3D c-GANs method outperforms the benchmark methods and achieves much better performance than the state

  8. OFFSETTING TOMORROW’S ADVERSARY IN A CONTESTED ENVIRONMENT: DEFENDING EXPEDITIONARY ADVANCE BASES IN 2025 AND BEYOND

    Science.gov (United States)

    2017-04-06

    EABs enable the dispersal of key assets to cloud adversary targeting process while 8 providing the joint force proximity to the area of...environment, the denial of ISR capabilities is critical to maintaining an adversary’s uncertainty and cloud his situational awareness. To this task...James E. 2014. "Expeditionary Force 21." Expeditionary Force 21, Forward and Ready: Now and in the Future. Washington, DC: HQ USMC, March 4. Board

  9. Cutting out the middleman: physicians can contract directly with employers--a viable alternative to adversarial managed care agreements.

    Science.gov (United States)

    Lester, Howard

    2002-01-01

    HMOs, PPOs, and other managed care "middlemen" control the means by which most physicians do business with employers. As physicians face dwindling reimbursements, greater practice restrictions, and increased pressure to sign adversarial middleman contracts, interest in direct contracting has grown. This article introduces direct contracting as an important alternative to commercial managed care agreements; cites the key advantages and process of direct contracting; and offers practical recommendations for helping physician practices successfully negotiate direct physician/employer agreements.

  10. PSFGAN: a generative adversarial network system for separating quasar point sources and host galaxy light

    Science.gov (United States)

    Stark, Dominic; Launet, Barthelemy; Schawinski, Kevin; Zhang, Ce; Koss, Michael; Turp, M. Dennis; Sartori, Lia F.; Zhang, Hantian; Chen, Yiru; Weigel, Anna K.

    2018-06-01

    The study of unobscured active galactic nuclei (AGN) and quasars depends on the reliable decomposition of the light from the AGN point source and the extended host galaxy light. The problem is typically approached using parametric fitting routines using separate models for the host galaxy and the point spread function (PSF). We present a new approach using a Generative Adversarial Network (GAN) trained on galaxy images. We test the method using Sloan Digital Sky Survey r-band images with artificial AGN point sources added that are then removed using the GAN and with parametric methods using GALFIT. When the AGN point source is more than twice as bright as the host galaxy, we find that our method, PSFGAN, can recover point source and host galaxy magnitudes with smaller systematic error and a lower average scatter (49 per cent). PSFGAN is more tolerant to poor knowledge of the PSF than parametric methods. Our tests show that PSFGAN is robust against a broadening in the PSF width of ± 50 per cent if it is trained on multiple PSFs. We demonstrate that while a matched training set does improve performance, we can still subtract point sources using a PSFGAN trained on non-astronomical images. While initial training is computationally expensive, evaluating PSFGAN on data is more than 40 times faster than GALFIT fitting two components. Finally, PSFGAN is more robust and easy to use than parametric methods as it requires no input parameters.

  11. The Effects of Sacred Value Networks Within an Evolutionary, Adversarial Game

    Science.gov (United States)

    McCalla, Scott G.; Short, Martin B.; Brantingham, P. Jeffrey

    2013-05-01

    The effects of personal relationships and shared ideologies on levels of crime and the formation of criminal coalitions are studied within the context of an adversarial, evolutionary game first introduced in Short et al. (Phys. Rev. E 82:066114, 2010). Here, we interpret these relationships as connections on a graph of N players. These connections are then used in a variety of ways to define each player's "sacred value network"—groups of individuals that are subject to special consideration or treatment by that player. We explore the effects on the dynamics of the system that these networks introduce, through various forms of protection from both victimization and punishment. Under local protection, these networks introduce a new fixed point within the game dynamics, which we find through a continuum approximation of the discrete game. Under more complicated, extended protection, we numerically observe the emergence of criminal coalitions, or "gangs". We also find that a high-crime steady state is much more frequent in the context of extended protection networks, in both the case of Erdős-Rényi and small world random graphs.

  12. Generative Adversarial Networks-Based Semi-Supervised Learning for Hyperspectral Image Classification

    Directory of Open Access Journals (Sweden)

    Zhi He

    2017-10-01

    Full Text Available Classification of hyperspectral image (HSI is an important research topic in the remote sensing community. Significant efforts (e.g., deep learning have been concentrated on this task. However, it is still an open issue to classify the high-dimensional HSI with a limited number of training samples. In this paper, we propose a semi-supervised HSI classification method inspired by the generative adversarial networks (GANs. Unlike the supervised methods, the proposed HSI classification method is semi-supervised, which can make full use of the limited labeled samples as well as the sufficient unlabeled samples. Core ideas of the proposed method are twofold. First, the three-dimensional bilateral filter (3DBF is adopted to extract the spectral-spatial features by naturally treating the HSI as a volumetric dataset. The spatial information is integrated into the extracted features by 3DBF, which is propitious to the subsequent classification step. Second, GANs are trained on the spectral-spatial features for semi-supervised learning. A GAN contains two neural networks (i.e., generator and discriminator trained in opposition to one another. The semi-supervised learning is achieved by adding samples from the generator to the features and increasing the dimension of the classifier output. Experimental results obtained on three benchmark HSI datasets have confirmed the effectiveness of the proposed method , especially with a limited number of labeled samples.

  13. Sistema penal acusatorio en Veracruz/Adversarial criminal system in Veracruz

    Directory of Open Access Journals (Sweden)

    Jorge Alberto Pérez Tolentino (México

    2014-01-01

    Full Text Available El estudio y comprensión del nuevo Código de Procedimientos Penales de Veracruz resulta ineludible, en virtud de las nítidas diferencias existentes entre las figuras jurídicas que contiene el actual ordenamiento, en comparación con el anterior. Es preciso sistematizar, describir y analizar la estructura del sistema penal acusatorio, a efecto de estar en condiciones de evaluar y, en su caso, proponer las mejoras al sistema en cuestión. El contenido esquemático y sustancial del código, la visión y recepción que del mismo tienen los operadores jurídicos y la sociedad en general, son aspectos que cubre el presente documento. The study and understanding of the new Code of Criminal Procedure of Veracruz is unavoidable, by reason of the sharp differences between the legal concepts that contains the actual order, compared with the previous. Needs to be systematized, describe and analyze the structure of the adversarial criminal system, in order to be able to evaluate and, if necessary, propose improvements to the system in question. The schematic and substantial content of the code, viewing and welcome that the same have the legal practitioners and society in general, are aspects covered by herein.

  14. PSFGAN: a generative adversarial network system for separating quasar point sources and host galaxy light

    Science.gov (United States)

    Stark, Dominic; Launet, Barthelemy; Schawinski, Kevin; Zhang, Ce; Koss, Michael; Turp, M. Dennis; Sartori, Lia F.; Zhang, Hantian; Chen, Yiru; Weigel, Anna K.

    2018-03-01

    The study of unobscured active galactic nuclei (AGN) and quasars depends on the reliable decomposition of the light from the AGN point source and the extended host galaxy light. The problem is typically approached using parametric fitting routines using separate models for the host galaxy and the point spread function (PSF). We present a new approach using a Generative Adversarial Network (GAN) trained on galaxy images. We test the method using Sloan Digital Sky Survey (SDSS) r-band images with artificial AGN point sources added which are then removed using the GAN and with parametric methods using GALFIT. When the AGN point source PS is more than twice as bright as the host galaxy, we find that our method, PSFGAN, can recover PS and host galaxy magnitudes with smaller systematic error and a lower average scatter (49%). PSFGAN is more tolerant to poor knowledge of the PSF than parametric methods. Our tests show that PSFGAN is robust against a broadening in the PSF width of ±50% if it is trained on multiple PSF's. We demonstrate that while a matched training set does improve performance, we can still subtract point sources using a PSFGAN trained on non-astronomical images. While initial training is computationally expensive, evaluating PSFGAN on data is more than 40 times faster than GALFIT fitting two components. Finally, PSFGAN it is more robust and easy to use than parametric methods as it requires no input parameters.

  15. Generative adversarial networks recover features in astrophysical images of galaxies beyond the deconvolution limit

    Science.gov (United States)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Santhanam, Gokula Krishnan

    2017-05-01

    Observations of astrophysical objects such as galaxies are limited by various sources of random and systematic noise from the sky background, the optical system of the telescope and the detector used to record the data. Conventional deconvolution techniques are limited in their ability to recover features in imaging data by the Shannon-Nyquist sampling theorem. Here, we train a generative adversarial network (GAN) on a sample of 4550 images of nearby galaxies at 0.01 < z < 0.02 from the Sloan Digital Sky Survey and conduct 10× cross-validation to evaluate the results. We present a method using a GAN trained on galaxy images that can recover features from artificially degraded images with worse seeing and higher noise than the original with a performance that far exceeds simple deconvolution. The ability to better recover detailed features such as galaxy morphology from low signal to noise and low angular resolution imaging data significantly increases our ability to study existing data sets of astrophysical objects as well as future observations with observatories such as the Large Synoptic Sky Telescope (LSST) and the Hubble and James Webb space telescopes.

  16. Generative Adversarial Networks Based Heterogeneous Data Integration and Its Application for Intelligent Power Distribution and Utilization

    Directory of Open Access Journals (Sweden)

    Yuanpeng Tan

    2018-01-01

    Full Text Available Heterogeneous characteristics of a big data system for intelligent power distribution and utilization have already become more and more prominent, which brings new challenges for the traditional data analysis technologies and restricts the comprehensive management of distribution network assets. In order to solve the problem that heterogeneous data resources of power distribution systems are difficult to be effectively utilized, a novel generative adversarial networks (GANs based heterogeneous data integration method for intelligent power distribution and utilization is proposed. In the proposed method, GANs theory is introduced to expand the distribution of completed data samples. Then, a so-called peak clustering algorithm is proposed to realize the finite open coverage of the expanded sample space, and repair those incomplete samples to eliminate the heterogeneous characteristics. Finally, in order to realize the integration of the heterogeneous data for intelligent power distribution and utilization, the well-trained discriminator model of GANs is employed to check the restored data samples. The simulation experiments verified the validity and stability of the proposed heterogeneous data integration method, which provides a novel perspective for the further data quality management of power distribution systems.

  17. On-line diagnosis and recovery of adversary attack using logic flowgraph methodology simulation

    International Nuclear Information System (INIS)

    Guarro, S.B.

    1986-01-01

    The Logic Flowgraph Methodology (LFM) allows the construction of special graph models for simulation of complex processes of causality, including feedback loops and sequential effects. Among the most notable features of LFM is the formal inclusion in its models of causality conditioning by logic switches imbedded in the modeled process, such as faults or modes of operation. The LFM model of a process is a graph structure that captures, in one synthetic representation, the relevant success and fault space characterization of that process. LFM is very similar to an artificial intelligence expert system shell. To illustrate the utilization of LFM, an application to the assessment and on-line monitoring of a material control facility is presented. The LFM models are used to model adversary action and control response, and to generate mini-diagnostic and recovery trees in real time, as well as reliability tress for off-line evaluation. Although the case study presented is for an imaginary facility, most of the conceptual elements that would be present in a real application have been retained in order to highlight the features and capabilities of the methodology

  18. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.

    Science.gov (United States)

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts

  19. Training-Image Based Geostatistical Inversion Using a Spatial Generative Adversarial Neural Network

    Science.gov (United States)

    Laloy, Eric; Hérault, Romain; Jacques, Diederik; Linde, Niklas

    2018-01-01

    Probabilistic inversion within a multiple-point statistics framework is often computationally prohibitive for high-dimensional problems. To partly address this, we introduce and evaluate a new training-image based inversion approach for complex geologic media. Our approach relies on a deep neural network of the generative adversarial network (GAN) type. After training using a training image (TI), our proposed spatial GAN (SGAN) can quickly generate 2-D and 3-D unconditional realizations. A key characteristic of our SGAN is that it defines a (very) low-dimensional parameterization, thereby allowing for efficient probabilistic inversion using state-of-the-art Markov chain Monte Carlo (MCMC) methods. In addition, available direct conditioning data can be incorporated within the inversion. Several 2-D and 3-D categorical TIs are first used to analyze the performance of our SGAN for unconditional geostatistical simulation. Training our deep network can take several hours. After training, realizations containing a few millions of pixels/voxels can be produced in a matter of seconds. This makes it especially useful for simulating many thousands of realizations (e.g., for MCMC inversion) as the relative cost of the training per realization diminishes with the considered number of realizations. Synthetic inversion case studies involving 2-D steady state flow and 3-D transient hydraulic tomography with and without direct conditioning data are used to illustrate the effectiveness of our proposed SGAN-based inversion. For the 2-D case, the inversion rapidly explores the posterior model distribution. For the 3-D case, the inversion recovers model realizations that fit the data close to the target level and visually resemble the true model well.

  20. Modeling urbanization patterns at a global scale with generative adversarial networks

    Science.gov (United States)

    Albert, A. T.; Strano, E.; Gonzalez, M.

    2017-12-01

    Current demographic projections show that, in the next 30 years, global population growth will mostly take place in developing countries. Coupled with a decrease in density, such population growth could potentially double the land occupied by settlements by 2050. The lack of reliable and globally consistent socio-demographic data, coupled with the limited predictive performance underlying traditional urban spatial explicit models, call for developing better predictive methods, calibrated using a globally-consistent dataset. Thus, richer models of the spatial interplay between the urban built-up land, population distribution and energy use are central to the discussion around the expansion and development of cities, and their impact on the environment in the context of a changing climate. In this talk we discuss methods for, and present an analysis of, urban form, defined as the spatial distribution of macroeconomic quantities that characterize a city, using modern machine learning methods and best-available remote-sensing data for the world's largest 25,000 cities. We first show that these cities may be described by a small set of patterns in radial building density, nighttime luminosity, and population density, which highlight, to first order, differences in development and land use across the world. We observe significant, spatially-dependent variance around these typical patterns, which would be difficult to model using traditional statistical methods. We take a first step in addressing this challenge by developing CityGAN, a conditional generative adversarial network model for simulating realistic urban forms. To guide learning and measure the quality of the simulated synthetic cities, we develop a specialized loss function for GAN optimization that incorporates standard spatial statistics used by urban analysis experts. Our framework is a stark departure from both the standard physics-based approaches in the literature (that view urban forms as fractals with a

  1. How to achieve public participation in nuclear waste decisions: Public relations or transparent adversary science

    International Nuclear Information System (INIS)

    Treichel, J.

    1999-01-01

    correctly, are in this case, merely tools being employed to co-opt or buy off the opposition and legitimize the process. It appears at this point that there are two choices: either the decision-makers can attempt to continue with the current program of forced siting, ignoring all citizen and scientific opposition and eventually leading to litigation; or a new program can be developed. Since the US nuclear waste programs have utilized or have been perceived as utilizing advocacy science, the country must add 'adversary science' to the national program. This is described as the providing of financial support for competing teams of experts to investigate, and to tell the public about, any hazards which the enthusiasts of a project may have failed to report, or even to see. If citizens were able to participate in the debate between scientists and experts, with differing opinions concerning the merits of a nuclear waste site or indeed, any controversial technology, they would feel represented. They would believe that the final decisions were made only after the program in question had withstood and overcome all criticism-rather than just ignored it. There is probably no chance that the current US nuclear waste program can succeed in light of the level of public opposition. It is therefore necessary to move to a policy that respects those who must pay the costs and live with its consequences

  2. How to achieve public participation in nuclear waste decisions: Public relations or transparent adversary science

    Energy Technology Data Exchange (ETDEWEB)

    Treichel, J. [Nevada Nuclear Waste Task Force, Las Vegas, NV (United States)

    1999-12-01

    applied correctly, are in this case, merely tools being employed to co-opt or buy off the opposition and legitimize the process. It appears at this point that there are two choices: either the decision-makers can attempt to continue with the current program of forced siting, ignoring all citizen and scientific opposition and eventually leading to litigation; or a new program can be developed. Since the US nuclear waste programs have utilized or have been perceived as utilizing advocacy science, the country must add 'adversary science' to the national program. This is described as the providing of financial support for competing teams of experts to investigate, and to tell the public about, any hazards which the enthusiasts of a project may have failed to report, or even to see. If citizens were able to participate in the debate between scientists and experts, with differing opinions concerning the merits of a nuclear waste site or indeed, any controversial technology, they would feel represented. They would believe that the final decisions were made only after the program in question had withstood and overcome all criticism-rather than just ignored it. There is probably no chance that the current US nuclear waste program can succeed in light of the level of public opposition. It is therefore necessary to move to a policy that respects those who must pay the costs and live with its consequences.

  3. The Influence of Cognitive Biases on Court Decisions. Contributions of Legal Psychology to the Adversary Criminal Proceedings

    Directory of Open Access Journals (Sweden)

    Paola Iliana De la Rosa Rodríguez

    2016-06-01

    Full Text Available The purpose of this paper is to disperse among the judiciary and society the psychological procedures involved in the decision-making process of judges since they are not only influenced by law but by previous ideas and values. It is worth questioning: in what extent their personal views and beliefs are the bases of verdicts? How can aversions and public opinion have an impact in the court decision? This paper analyzes and states the differences of the judicial role in the Mexican adversarial system and the inquisitorial models of justice. It also critiques the categories of the judicial officers and presents the circumstances that make an impact on judicial decisions, according to Psychology studies. It finally classifies cognitive biases and concludes that the more knowledge judges have about it, the more imparcial judgments will be.

  4. druGAN: An Advanced Generative Adversarial Autoencoder Model for de Novo Generation of New Molecules with Desired Molecular Properties in Silico.

    Science.gov (United States)

    Kadurin, Artur; Nikolenko, Sergey; Khrabrov, Kuzma; Aliper, Alex; Zhavoronkov, Alex

    2017-09-05

    Deep generative adversarial networks (GANs) are the emerging technology in drug discovery and biomarker development. In our recent work, we demonstrated a proof-of-concept of implementing deep generative adversarial autoencoder (AAE) to identify new molecular fingerprints with predefined anticancer properties. Another popular generative model is the variational autoencoder (VAE), which is based on deep neural architectures. In this work, we developed an advanced AAE model for molecular feature extraction problems, and demonstrated its advantages compared to VAE in terms of (a) adjustability in generating molecular fingerprints; (b) capacity of processing very large molecular data sets; and (c) efficiency in unsupervised pretraining for regression model. Our results suggest that the proposed AAE model significantly enhances the capacity and efficiency of development of the new molecules with specific anticancer properties using the deep generative models.

  5. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  6. Mothers’ Power Assertion, Children’s Negative, Adversarial Orientation, and Future Behavior Problems in Low-Income Families: Early Maternal Responsiveness as a Moderator of the Developmental Cascade

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2014-01-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children’s negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers’ responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children’s negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children’s behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children’s negative, adversarial orientation to future behavior problems was present when mothers’ responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483

  7. The Adversarial Principle and the5º Paragraph of the Article 307 of the TCE-ES Res. 261/2013

    Directory of Open Access Journals (Sweden)

    Rafael Ambrósio Gava

    2015-12-01

    Full Text Available This paper aims to analyze the implications of the adversarial principle in the administrative process that are judged by the TCE-ES under summary rite. More specifically, we examine if it is possible to judge the process merit without the accused's subpoena. Throughout the study, the characteristics of the Courts of Accounts are explained, according to the doctrine and jurisprudence, as well their prerogative of precautionary action, recognized by the theory of implied powers. In addition, the systematic of the summary procedure, by which develop the processes in which there are precautionary action, is studied, from the specific legislation. At last, the summary procedure is analyzed, specifically with respect to the art. 307, §5º, Res. TCE-ES 261/2013, from the perspective of the adversarial principle, understood, based on the doctrine teaching and according to the New Code of Civil Procedure, as the right of knowledge and of influence the debate. We demonstrated, based on literature and through a deductive argumentative reasoning, that the TEC -ES cannot do disregard the adversarial principle, otherwise there would be violation of this fundamental right.

  8. CaloGAN: Simulating 3D high energy particle showers in multilayer electromagnetic calorimeters with generative adversarial networks

    Science.gov (United States)

    Paganini, Michela; de Oliveira, Luke; Nachman, Benjamin

    2018-01-01

    The precise modeling of subatomic particle interactions and propagation through matter is paramount for the advancement of nuclear and particle physics searches and precision measurements. The most computationally expensive step in the simulation pipeline of a typical experiment at the Large Hadron Collider (LHC) is the detailed modeling of the full complexity of physics processes that govern the motion and evolution of particle showers inside calorimeters. We introduce CaloGAN, a new fast simulation technique based on generative adversarial networks (GANs). We apply these neural networks to the modeling of electromagnetic showers in a longitudinally segmented calorimeter and achieve speedup factors comparable to or better than existing full simulation techniques on CPU (100 ×-1000 × ) and even faster on GPU (up to ˜105× ). There are still challenges for achieving precision across the entire phase space, but our solution can reproduce a variety of geometric shower shape properties of photons, positrons, and charged pions. This represents a significant stepping stone toward a full neural network-based detector simulation that could save significant computing time and enable many analyses now and in the future.

  9. THE ADVERSARIAL SYSTEM AND THE BEST INTERESTS OF THE CHILD IN DIVORCE LITIGATION: SOME THOUGHTS REGARDING COLLABORATIVE LAW AS A MEANS TO RESOLVE PARENTAL DISPUTES

    Directory of Open Access Journals (Sweden)

    JA Robinson

    2016-03-01

    Full Text Available In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be considered under upon divorce. Collaborative Law is suggested as a means to bear in mind. The fact that current practice of lawyer negotiations in respect of divorce is not too far removed from Collaborative Law may lead to practitioners readily accepting the concept.

  10. Adversarial Geospatial Abduction Problems

    Science.gov (United States)

    2011-01-01

    better). We assume the reasoning agent is using the Spatial Cultural Abductive Reasoning Engine (SCARE) to provide information on cache locations. OAS...Technology, Vol. , No. , 20. 38 · Paulo Shakarian et al. Rossmo, D. K. and Rombouts, S. 2008. Geographic Profiling. In Enviromental Criminology and Crime

  11. Cyber Adversary Dynamics

    Science.gov (United States)

    2013-02-01

    that the Government formulated or supplied the drawings, specifications, or other data does not license the holder or any other person or corporation ...preparation. Berk , V. H., Cybenko, G., Souza, I. G. D., & Murphy, J. P. (2012, January). “Managing Malicious Insider Risk through BANDIT.” In System... finances , human resources for example; • Tactics – Short term goals and techniques to achieve those goals; • Strategy – Long term outcomes and

  12. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson

    International Nuclear Information System (INIS)

    Macpherson, John A.

    1989-01-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening

  13. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Macpherson, John A [Atomic Energy of Canada Ltd., Mississauga, ON (Canada)

    1989-07-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening.

  14. Exploring the Potential of Generative Adversarial Networks for Synthesizing Radiological Images of the Spine to be Used in In Silico Trials

    Directory of Open Access Journals (Sweden)

    Fabio Galbusera

    2018-05-01

    Full Text Available In silico trials recently emerged as a disruptive technology, which may reduce the costs related to the development and marketing approval of novel medical technologies, as well as shortening their time-to-market. In these trials, virtual patients are recruited from a large database and their response to the therapy, such as the implantation of a medical device, is simulated by means of numerical models. In this work, we propose the use of generative adversarial networks to produce synthetic radiological images to be used in in silico trials. The generative models produced credible synthetic sagittal X-rays of the lumbar spine based on a simple sketch, and were able to generate sagittal radiological images of the trunk using coronal projections as inputs, and vice versa. Although numerous inaccuracies in the anatomical details may still allow distinguishing synthetic and real images in the majority of cases, the present work showed that generative models are a feasible solution for creating synthetic imaging data to be used in in silico trials of novel medical devices.

  15. Introductory remarks by Augusto Ancarani[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Ancarani, Augusto [Commission of the European Communities, Brussels (Belgium)

    1989-07-01

    The subject proposed for the present roundtable is in the form of a twofold question. To assert that advocates and adversaries of nuclear power are listening to each other will hopefully result from what will be said. But, as far as the chance of a dialogue is concerned, one can answer in the positive from the start. Indeed a dialogue is always possible, even among deaf people, provided they are polite. This has been and still is the situation in many instances. If we consider the politics situation in a worldwide perspective, we hove to acknowledge that the mood is favorable to the dialogue on almost every possible subject. If this is true among the great powers, it will also be the case, at all the Levels, inside our democratic and articulate societies, O rice set in motion the solution of the great problems concerning peace among notions, still remain to be tackled the ones about the welfare of humankind. Such welfare rests heavily on the availability of energy; besides, energy cannot bp produced without some consequences upon the environment. This process will bi a Long and a difficult one; it will be exhausted only through confrontations, exchanges of view, dialogues, discussions - any term that you will care to choose.

  16. Using adversary text to detect adversary phase changes.

    Energy Technology Data Exchange (ETDEWEB)

    Speed, Ann Elizabeth; Doser, Adele Beatrice; Warrender, Christina E.

    2009-05-01

    The purpose of this work was to help develop a research roadmap and small proof ofconcept for addressing key problems and gaps from the perspective of using text analysis methods as a primary tool for detecting when a group is undergoing a phase change. Self- rganizing map (SOM) techniques were used to analyze text data obtained from the tworld-wide web. Statistical studies indicate that it may be possible to predict phase changes, as well as detect whether or not an example of writing can be attributed to a group of interest.

  17. An Adversarial Exchange on Adversarial Ethics: Text, Subtext, and Context.

    Science.gov (United States)

    Rhode, Deborah L.

    1991-01-01

    Presented in the form of a debate and rebuttals are both sides of the issue, first stated by Lord Brougham in 1820, of a client's legal and moral rights to his counsel's total support. It is concluded that advocacy in law does not carry some special authority or excuse the lawyer from accepting moral responsibility for his professional choices.…

  18. Domain Adversarial for Acoustic Emotion Recognition

    OpenAIRE

    Abdelwahab, Mohammed; Busso, Carlos

    2018-01-01

    The performance of speech emotion recognition is affected by the differences in data distributions between train (source domain) and test (target domain) sets used to build and evaluate the models. This is a common problem, as multiple studies have shown that the performance of emotional classifiers drop when they are exposed to data that does not match the distribution used to build the emotion classifiers. The difference in data distributions becomes very clear when the training and testing...

  19. A Database of Adversary Decision Makers

    National Research Council Canada - National Science Library

    Ward, Tyrone

    2001-01-01

    ...). The database design and development process is elaborated in detail, database administration guidelines are documented, and a migration path is presented for incorporating relevant decision support...

  20. Socio-metrics: Identifying Invisible Deviant Adversaries

    Science.gov (United States)

    2015-12-07

    like MySQL since it has been found that graph databases work well on highly connected data (which is the case with OSNs). Moreover, the performance...web application. We also used the Java Vaadin framework, which is built upon the Google Web Toolkit (GWT) since it supports rapid application...development, provides the ability to build professional Uis and also scales well. Compared to Java Web framework, it has been observed that Vaadin has shown

  1. Integrated Adversarial Network Theory (iANT)

    Science.gov (United States)

    2011-07-01

    elite networks and governance changes in the 1980s. American Journal of Sociology, 103(1): 1-37. DiMaggio, P. 1986. Structural analysis of...Interorganization contagion in corporate philanthropy . Administrative Science Quarterly, 36(1): 88-105. Gargiulo, M., & Benassi, M. 1999. The dark...1): 7 1-84. Useem, M. 1979. The social organization ofthe American business elite and participation of corporation directors in the governance of

  2. Frugal Innovation and development: Aides or adversaries?

    NARCIS (Netherlands)

    Knorringa, P; I, Peša; Leliveld, A; van Beers, C.P.

    2016-01-01

    Frugal innovation aims to bring products, services and systems within the reach of billions of poor and emerging middle-class consumers. Through significantly cutting costs while safeguarding user value, frugal innovation opens opportunities for new business models and may well disrupt innovation

  3. Adversarial Risk Analysis for Dynamic Network Routing

    Science.gov (United States)

    2011-03-20

    Attacker’s strategy space A . Then the Defender finds IEP [ã ′] = ∑I i=1 piai, where ã is Attacker’s choice of IED sites, which is unknown and thus...r∈D IEP [ã ′]Y r, where Y is the (actual) payoff matrix for the Defender. In order to construct P , we describe the mirroring argument. The...Attacker will try to find argmax P∈P IEP [ã ′]X̃(ω)IEQ[·|ω][r̃], (3) which elicits one mixed-strategy. Next, allowing ω to have non-unitary support

  4. Randomized Prediction Games for Adversarial Machine Learning.

    Science.gov (United States)

    Rota Bulo, Samuel; Biggio, Battista; Pillai, Ignazio; Pelillo, Marcello; Roli, Fabio

    In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time, e.g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits. Interestingly, randomization has also been proposed to improve security of learning algorithms against evasion attacks, as it results in hiding information about the classifier to the attacker. Recent work has proposed game-theoretical formulations to learn secure classifiers, by simulating different evasion attacks and modifying the classification function accordingly. However, both the classification function and the simulated data manipulations have been modeled in a deterministic manner, without accounting for any form of randomization. In this paper, we overcome this limitation by proposing a randomized prediction game, namely, a noncooperative game-theoretic formulation in which the classifier and the attacker make randomized strategy selections according to some probability distribution defined over the respective strategy set. We show that our approach allows one to improve the tradeoff between attack detection and false alarms with respect to the state-of-the-art secure classifiers, even against attacks that are different from those hypothesized during design, on application examples including handwritten digit recognition, spam, and malware detection.

  5. TARGETING THE HUMAN DOMAIN: REACHING INTERNAL, JOINT, AND ADVERSARIAL AUDIENCES

    Science.gov (United States)

    2017-04-06

    86th Medical Support Squadron, Ramstein Air Base, Germany . In this capacity, she commanded a 197-person unit providing health care support services to...religion, illustrated via such military- specific rites as the Uniformed Code of Military Justice as a moral compass. This holds for smaller groupings...within a service, as well as for larger joint and international allied warfighting. Correspondingly, service history , rhetoric and literature must focus

  6. Deterrence, the spiral model, and intentions of the adversary

    International Nuclear Information System (INIS)

    Jervis, R.

    1986-01-01

    This paper is not concerned with the many subtleties and complexities of deterrence theory, but only with the central argument that great dangers arise if an aggressor believes that the status quo powers are weak in capability or resolve. This belief will lead the former to test its opponents, usually starting with a small and apparently unimportant issue. If the status quo powers retreat, they will not only lose the specific value at stake but, more important in the long run, will encourage the aggressor to press harder. Even if the defenders later recognize their plight and are willing to pay a higher price to prevent further retreats, they will find it increasingly difficult to convince the aggressor of their new-found resolve. The choice will then be between continuing to retreat and thereby sacrificing basic values or fighting. To avoid this disastrous situation, the state must display the ability and willingness to wage war. It may not be able to ignore minor conflicts or to judge disputes on their merits. Issues of little intrinsic value become highly significant as indices of resolve

  7. Turbulent Arena: Global Effects Against Non-State Adversaries

    National Research Council Canada - National Science Library

    Thomas, Troy S; Casebeer, William D

    2005-01-01

    .... In the midst of a global war against terrorism, collective violent action thrives as a strategy of groups ranging from the al Qaida network to Maoist rebels of Nepal to the Revolutionary Armed Forces of Colombia (FARC...

  8. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  9. (YIP) Detecting, Analyzing, Modeling Adversarial Propaganda in Social Media

    Science.gov (United States)

    2015-10-26

    campaign is a coherent and organized effort to spread a particular message – e.g., misinformation, propaganda, payloads containing malware, phishing ...propaganda, payloads containing malware, phishing URLs – and stands in contrast to “organic” (or grassroots) efforts. This project has viewed campaigns...have at least 50 Twitter followers, search for a certain keyword on Google , and then click on a website in the search results. In addition, it

  10. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

    Science.gov (United States)

    2013-11-01

    compromise any streams until new guards are selected. This results in a relative plateau after initial compromises (disturbed only by minor guard as churn ...Qiu and L. Gao. AS Path Inference by Exploiting Known AS Paths. In Global Telecommunications Conference, 2006. [33] A. Serjantov and G. Danezis

  11. The Adversary System in Low-Level Soviet Economic Decisionmaking.

    Science.gov (United States)

    1984-08-01

    34- ° .. 78 - capital or a few countertrade agreements, will solve their problems for them. This is markedly different from the overall Soviet pattern...currency countertrade practice, the considerations of this Note would permit further refinement of predictions of Soviet economic decisionmaking that

  12. Risk taking in adversarial situations: Civilization differences in chess experts.

    Science.gov (United States)

    Chassy, Philippe; Gobet, Fernand

    2015-08-01

    The projections of experts in politics predict that a new world order will emerge within two decades. Being multipolar, this world will inevitably lead to frictions where civilizations and states will have to decide whether to risk conflict. Very often these decisions are informed if not taken by experts. To estimate risk-taking across civilizations, we examined strategies used in 667,599 chess games played over eleven years by chess experts from 11 different civilizations. We show that some civilizations are more inclined to settle for peace. Similarly, we show that once engaged in the battle, the level of risk taking varies significantly across civilizations, the boldest civilization using the riskiest strategy about 35% more than the most conservative civilization. We discuss which psychological factors might underpin these civilizational differences. Copyright © 2015. Published by Elsevier B.V.

  13. A model-referenced procedure to support adversarial decision processes

    International Nuclear Information System (INIS)

    Bunn, D.W.; Vlahos, K.

    1992-01-01

    In public enquiries concerning major facilities, such as the construction of a new electric power plant, it is observed that a useable decision model should be made commonly available alongside the open provision of data and assumptions. The protagonist, eg the electric utility, generally makes use of a complex, proprietary model for detailed evaluation of options. A simple emulator of this, based upon a regression analysis of numerous scenarios, and validated by further simulations is shown to be feasible and potentially attractive. It would be in the interests of the utility to make such a model-referenced decision support method generally available. The approach is considered in relation to the recent Hinkley Point C public enquiry for a new nuclear power plant in the UK. (Author)

  14. Drugs offshore: companies stepping up fight against hidden adversary

    Energy Technology Data Exchange (ETDEWEB)

    Redden, J.

    1986-01-01

    Oil companies worldwide are effectively fighting a growing nemesis, drug and alcohol abuse on offshore installations. It is estimated that companies are losing millions of dollars in lost productivity, accidents, and thefts caused by on-the-job use of illegal drugs. Some of the measures being employed to combat the use of such drugs, e.g., tight control, better communications, diversions for employees, and the use of sniffer dogs, are discussed.

  15. The media and the military: Allies or adversaries?

    African Journals Online (AJOL)

    The fact is thus that the media both reflect and influence ... The media is run by journalists, and journalists are fallible people who make ..... family and friends back home were not only denied that information, but were shamelessly lied to.

  16. Civilized Uncoupling: A Non-Adversarial Approach to Divorce

    Directory of Open Access Journals (Sweden)

    Gaylen Curtis

    2015-07-01

    Full Text Available The word divorce can conjure images and expectations of ugly battles and emotional brutality involving parasitic attorneys profiting from the whole process. For many people the only hope for peace is to just walk away without a fight. There is another way for divorcing people. It is possible to get through a divorce and avoid the ugliness. This requires the willingness of the litigant and problem-solving skills of the attorney, as well as judges who demand compliance with court rules and accountability from both lawyers and litigants. Most of all, keeping divorce peaceful requires the viewpoint that it is possible to do so. This article advocates for this perspective.

  17. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  18. Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students

    Science.gov (United States)

    Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.

    2017-01-01

    The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…

  19. Behavior of Machine Learning Algorithms in Adversarial Environments

    Science.gov (United States)

    2010-11-23

    searches happened while ago. Besides being completely hilarious they made people September June March February Meta Login RSS Valid XHTML XFN WP Blogroll...contention acorn cpa bladder- wort chick. cinematic agleam chemisorb brothel choir conformance airfield. (b) Date: Sun, 22 Jul 2007 Subj: bradshaw deride...an almost continuous 6 month period from March 1, 2004 through September 10, 2004 [Zhang, Ge, Greenberg, and Roughan, 2005]. Each week of data consists

  20. The media and the military: Allies or adversaries? | Scholtz | Scientia ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 28, No 2 (1998) >. Log in or Register to get access to full text downloads.

  1. A First-cut Concept Map: The Irregular Adversary (Insurgent)

    Science.gov (United States)

    2012-12-01

    conceptuel des AANE aidera le spécialiste du renseignement militaire à brosser pour le commandant un tableau plus global des AANE dans leur...Crandall et al. (2006), « il est sage de toujours considérer les schémas conceptuels comme des représentations « vivantes » plutôt que des « produits

  2. The Gunfighter's Dilemma: Multiple Adversary Deterrence and Coercion

    National Research Council Canada - National Science Library

    Palmer, Jess

    2000-01-01

    .... Those faced with this dilemma have included the Romans, Byzantines, and the British Empire. Studying these nations in their struggle to maintain control revealed tactics and techniques that proved effective...

  3. Transparency and Legitimacy in Chinese Criminal Procedure : Beyond Adversarial Dogmas

    NARCIS (Netherlands)

    Zhang, S.

    2017-01-01

    In recent years, the legitimacy of China's criminal justice system has been increasingly challenged by the Chinese populace, in part due to the numerous exposed miscarriages of justice. The Chinese academic mainstream as well as the political and judicial authorities have looked towards the

  4. Developing Realistic Behaviors in Adversarial Agents for Air Combat Simulation

    Science.gov (United States)

    1993-12-01

    34Building Symbolic Primitives with Continuous Control Rou- tines." Proceedings of the 1st International Conference on Aritificial Intelligence Planning...shortcoming is the minimal Air Force participation in this field. 1-1 Some of the artificial intelligence (AI) personnel at the Air Force Institute of... intelligent system that operates in a moderately complex or unpredictable environment must be reactive. In being reactive the intelligent system must

  5. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    OpenAIRE

    Liu, Yujia; Zhang, Weiming; Yu, Nenghai

    2017-01-01

    Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN). To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic det...

  6. Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.

    Science.gov (United States)

    Merrick, Jason R W; Leclerc, Philip

    2016-04-01

    Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions. © 2014 Society for Risk Analysis.

  7. Religious Fundamentalism/Religious Modernism: Conceptual Adversaries or Ambivalent Phenomena?

    Directory of Open Access Journals (Sweden)

    D. GOLOVUSHKIN

    2015-02-01

    Full Text Available Both religious modernism and religious fundamentalism appeared as problems in academic and theological literature at the beginning of the 20th century. They came about as the result of the dynamic development of modernistic ideology in Russia, the United States, Western Europe and the Islamic world. Today, the concepts of religious modernism and religious fundamentalism are widely used to describe religious processes and phenomena which are the result of interaction between religion (as a dynamic spiritual and social subsystem and society - as a social system experiencing evolution. The concept of religious modernism is traditionally associated with religious renewal, the contemporary world, and innovation. Fundamentalism, on the contrary, is an ideological commitment to the “roots and origins” of religion. Under the aegis of fundamentalism, any religious idea, value or concept has a right to exist. Religious Studies, during the course of time and the production of ever new material, encountered a serious theoretic-methodological problem: How can various religious movements and religious traditions be organized into groups since some of them combine elements of religious modernism and of religious fundamentalism? Already at the end of the nineteen-eighties, the well-established view defining “fundamentalism-modernism” as contrary positions had to be rethought. Studies dating from the nineteen-nineties and the beginning of the new millennium concentrated on noting the social origins and the political character of these phenomena. They demonstrated that neither fundamentalism nor modernism present the whole picture. The lines dividing them are so blurred, that they become confl uent. Consequently, the author concludes that religious fundamentalism and religious modernism are ambivalent phenomena, which can, on occasion, interact with each other.

  8. Ichthyoplankton Classification Tool using Generative Adversarial Networks and Transfer Learning

    KAUST Repository

    Aljaafari, Nura

    2018-01-01

    . This method is time-consuming and requires a high level of experience. The recent advances in AI have helped to solve and automate several difficult tasks which motivated us to develop a classification tool for ichthyoplankton. We show that using machine

  9. Studies and Analyses of Vulnerabilities in Aided Adversarial Decision Making

    National Research Council Canada - National Science Library

    Llinas, James

    1998-01-01

    .... The aid" in the analysis (i.e., an automated decision aid) focuses upon a generic data fusion processor that estimates situation and threat states based on multisensor/multisource-based data assessments...

  10. Eliminating Adversary Weapons of Mass Destruction: What's at Stake?

    National Research Council Canada - National Science Library

    Hersman, Rebecca K

    2004-01-01

    .... Unfortunately, the current preoccupation with intelligence might mask other issues and shortcomings in the American ability to eliminate the threat posed by weapons of mass destruction in the hands of its enemies...

  11. REFLECTIONS OF SOUTH AFRICAN TEACHERS TEACHING UNDER ADVERSARIAL CONDITIONS

    Directory of Open Access Journals (Sweden)

    Sarah Bansilal

    2016-04-01

    Full Text Available Teachers often teach under difficult conditions of which they do not have oversight. In order for teacher development programmes to be responsive to teachers’ needs, it is necessary to understand the teaching contexts of their participant teachers. Accordingly the purpose of the research was to identify the problems of practice reported by 41 Mathematical Literacy teachers who teach under impoverished conditions in South Africa. The participants identified their problems of practice and focused on one problem which they tried to address during a two-week teaching intervention. They were required to generate a reflective research report based on their teaching intervention, which formed the primary data source. The findings indicate that of the 305 citations of problems, 174 were attributed to socio-economic factors, 111 to pedagogic factors and 51 to school management factors. With most of these problems being out of their locus of control, these teachers are forced to spend time dealing with the consequences of these problems, instead of focusing their energy to find ways to improve their pedagogic practice. Teacher development agencies need to consider how such teachers could be more appropriately supported.

  12. Evaluating late detection capability against diverse insider adversaries

    International Nuclear Information System (INIS)

    Sicherman, A.

    1987-01-01

    The threat of theft or diversion of special nuclear material (SNM) by insiders is a key concern for safeguards planners. Different types of employees having varying degrees of access to both SNM and safeguards systems pose a difficult challenge for theft detection. Safeguards planners rely on physical security, material control, and accountability to provide detection of a theft attempt. When detection occurs too late to prevent a theft, it is called a late detection or late alarm. Activities or events that many provide late detection usually belong to material control and accountability (MC ampersand A) activities. A model has been developed for evaluating the probability of late detection as a function of time elapsed since the theft. Late detection capability is beneficial if it is timely enough to improve the ability to determine the cause of an alarm, speed recovery of SNM, prevent an incorrect response to a threat demand, or promote assurance that no theft has occurred in the absence of an alarm. The model provides insight into the effectiveness of late detection safeguards components in place and helps to identify areas where the MC ampersand A can be most effectively improved

  13. Adversaries, Advocates, or Thoughtful Analysts? Some Lessons from Dance History.

    Science.gov (United States)

    Wagner, Ann

    1999-01-01

    Argues that the arts demand careful analysis when providing a rationale for the inclusion of the arts in educational programs and policies. Provides information on the content and context of dance opposition and provides examples from dance history of issues that need to be addressed. (CMK)

  14. Toward Adversarial Online Learning and the Science of Deceptive Machines

    Science.gov (United States)

    2015-11-14

    games (Blum and Monsour 2007). We will define a notion of regret for secure online learning with respect to a static learner. The value of an action a......anomaly detection methods. The avail- ability of large amount of data requires the processing of data in a “streaming” fashion with online algorithms. Yet

  15. The deconstruction of safety arguments through adversarial counter-argument

    International Nuclear Information System (INIS)

    Armstrong, James M.; Paynter, Stephen E.

    2007-01-01

    The project Deconstructive Evaluation of Risk In Dependability Arguments and Safety Cases (DERIDASC) has recently experimented with techniques borrowed from literary theory as safety case analysis techniques [Armstrong. Danger: Derrida at work. Interdiscipl Sci Rev 2003;28(2):83-94. ; Armstrong J, Paynter S. Safe systems: construction, destruction, and deconstruction. In: Redmill F, Anderson T, editors. Proceedings of the 11th safety critical systems symposium, Bristol, UK. Berlin: Springer; 2003. p. 62-76. ISBN:1-85233-696-X. ]. This paper introduces our high-level framework for 'deconstructing' safety arguments. Our approach is quite general and should be applicable to different types of safety argumentation framework. As one example, we outline how the approach would work in the context of the Goal Structure Notation (GSN)

  16. Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks

    Science.gov (United States)

    2017-03-01

    enclave, as shown in Figure 11, is a common design for many secure networks. Different variations of a cyber-attack scenario can be rehearsed based...achieved a greater degree of success against multiple variations of an enemy network. E. ATTACK TYPES A primary goal of this thesis is to define and...2013. [33] R. Goldberg , “Architectural principles for virtual computer systems,” Ph.D. dissertation, Dept. of Comp. Sci., Harvard Univ., Cambridge

  17. ARIGAN: Synthetic Arabidopsis Plants using Generative Adversarial Network

    OpenAIRE

    Giuffrida, Mario Valerio; Scharr, Hanno; Tsaftaris, Sotirios A

    2017-01-01

    In recent years, there has been an increasing interest in image-based plant phenotyping, applying state-of-the-art machine learning approaches to tackle challenging problems, such as leaf segmentation (a multi-instance problem) and counting. Most of these algorithms need labelled data to learn a model for the task at hand. Despite the recent release of a few plant phenotyping datasets, large annotated plant image datasets for the purpose of training deep learning algorithms are lacking. One c...

  18. Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

    KAUST Repository

    Alabdulmohsin, Ibrahim; Gao, Xin; Zhang, Xiangliang

    2014-01-01

    their risk. In particular, we derive a semidefinite programming (SDP) formulation for learning a distribution of classifiers subject to the constraint that any single classifier picked at random from such distribution provides reliable predictions with a high

  19. Online evolution for multi-action adversarial games

    DEFF Research Database (Denmark)

    Justesen, Niels Orsleff; Mahlmann, Tobias; Togelius, Julian

    2016-01-01

    the combination of atomic actions that make up a single move, with a state evaluation function used for fitness. We implement Online Evolution for the turn-based multi-action game Hero Academy and compare it with a standard Monte Carlo Tree Search implementation as well as two types of greedy algorithms. Online...

  20. BEHAVIOR AND CONSCIOUSNESS. HISTORICAL ORIGIN OF THE ADVERSARY ALTERNATIVES IN THE BEGINNINGS OF THE SCIENTIFIC PSYCHOLOGY

    Directory of Open Access Journals (Sweden)

    LUIS GARCÍA-VEGA

    2005-10-01

    Full Text Available The word behavior has a reduccionist origin and meaning, the later has been commonly assumed since the mecanicistinterpretation of organic movement in Descartes, La Mettrie, Séchenov and Pávlov until nowadays. Watson continueswith this tendency making it the starting point of his psychology and, in fact, due to the category he studies, he will callhis school behaviorism.In 1924 Vygostky refuses to take this reduccionist and mecanicist model from reactology and reflexology and claims forpsychology the need of taking conscience into account, understanding conscience not as the movement of a machinethat reacts to a stimular situation, but as the dialectic activity of material human brain, that has reached its highestdegree of development.

  1. Synchronous Adversarial Feature Learning for LiDAR based Loop Closure Detection

    OpenAIRE

    Yin, Peng; He, Yuqing; Xu, Lingyun; Peng, Yan; Han, Jianda; Xu, Weiliang

    2018-01-01

    Loop Closure Detection (LCD) is the essential module in the simultaneous localization and mapping (SLAM) task. In the current appearance-based SLAM methods, the visual inputs are usually affected by illumination, appearance and viewpoints changes. Comparing to the visual inputs, with the active property, light detection and ranging (LiDAR) based point-cloud inputs are invariant to the illumination and appearance changes. In this paper, we extract 3D voxel maps and 2D top view maps from LiDAR ...

  2. China’s Rise: Regional Stabilizer or U.S. Adversary?

    Science.gov (United States)

    2007-09-01

    and 1860s.67 The process of economic growth and success was achieved through the concept of Prussian-Austrian dualism . This process helped to create...textile production.” All these commitments helped to foster a capable military that went hand in hand with Japan’s economic power. After a formidable...for each state to reach out to other countries commercially, or combine economies (referred to as dualism ), thereby merging support for each other

  3. Vision-Based Autonomous Sensor-Tasking in Uncertain Adversarial Environments

    Science.gov (United States)

    2015-01-02

    structure. c) shows the AIS highlighted with different colours . d) shows the EP. While FTLE and AIS identify regions of different qualitative crowd motion...David M. Blei. A tutorial on bayesian nonparametric models. Journal of Mathematical Psychology , 56:1–12, 2012. [10] Nathan Halko, Per-Gunnar

  4. From adversary to target market: the ACT-UP boycott of Philip Morris

    OpenAIRE

    Offen, N; Smith, E; Malone, R

    2003-01-01

    BACKGROUND: In 1990, the AIDS Coalition to Unleash Power (ACT-UP) sparked a year long boycott of Philip Morris's Marlboro cigarettes and Miller beer. The boycott protested the company's support of Senator Jesse Helms (R-North Carolina), a leading opponent of AIDS funding and civil rights for lesbian, gay, bisexual and transgender (LGBT) people. ACT-UP demanded that Philip Morris sever its ties with Helms and acknowledge its responsibility to the LGBT community and to people with AIDS. OBJECTI...

  5. From adversary to target market: the ACT-UP boycott of Philip Morris.

    Science.gov (United States)

    Offen, N; Smith, E A; Malone, R E

    2003-06-01

    In 1990, the AIDS Coalition to Unleash Power (ACT-UP) sparked a year long boycott of Philip Morris's Marlboro cigarettes and Miller beer. The boycott protested the company's support of Senator Jesse Helms (R-North Carolina), a leading opponent of AIDS funding and civil rights for lesbian, gay, bisexual and transgender (LGBT) people. ACT-UP demanded that Philip Morris sever its ties with Helms and acknowledge its responsibility to the LGBT community and to people with AIDS. To assess the impact of the boycott on the LGBT community, the tobacco industry, and the tobacco control movement; and to determine what lessons tobacco control advocates can extract from this case. Internal tobacco industry documents and newspaper archives. Search of tobacco industry documents websites using "boycott", "ACT-UP", "gay", and other terms. Philip Morris used the boycott to its own advantage. It exploited differences within the community and settled the boycott by pledging large donations to combat AIDS. Through corporate philanthropy, Philip Morris gained entrée to the LGBT market without appearing gay friendly. Many LGBT organisations, thirsty for recognition and funding from mainstream corporations, welcomed Philip Morris's overtures without considering the health hazards of tobacco. Unless the goal of a boycott is to convince the tobacco industry to abandon tobacco altogether, such actions invite the industry to expand its marketing under the guise of philanthropy. Tobacco control advocates should be clear about goals and acceptable settlement terms before participating in a boycott of a tobacco company.

  6. Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems

    Science.gov (United States)

    Anceaume, Emmanuelle; Brasileiro, Francisco; Ludinard, Romaric; Sericola, Bruno; Tronel, Frederic

    Awerbuch and Scheideler [2] have shown that peer-to-peer overlays networks can only survive Byzantine attacks if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. A prerequisite for this condition to hold is to guarantee that nodes identifiers randomness is continuously preserved. However targeted join/leave attacks may quickly endanger the relevance of such an assumption. Inducing churn has been shown to be the other fundamental ingredient to preserve randomness. Several strategies based on these principles have been proposed. Most of them are based on locally induced churn. However either they have been proven incorrect or they involve a too high level of complexity to be practically acceptable [2]. The other ones, based on globally induced churn, enforce limited lifetime for each node in the system. However, these solutions keep the system in an unnecessary hyper-activity, and thus need to impose strict restrictions on nodes joining rate which clearly limit their applicability to open systems.

  7. Anticipatory Understanding of Adversary Intent: A Signature-Based Knowledge System

    Science.gov (United States)

    2009-06-01

    concept of logical positivism has been applied more recently to all human knowledge and reflected in current data fusion research, information mining...this work has been successfully translated into useful analytical tools that can provide a rigorous and quantitative basis for predictive analysis

  8. The effects of indirect intergroup contact on willingness to engage in direct contact with former adversary

    Czech Academy of Sciences Publication Activity Database

    Voca, S.; Graf, Sylvie

    2018-01-01

    Roč. 12, č. 1 (2018), s. 47-57 ISSN 2309-3455 R&D Projects: GA ČR(CZ) GA17-14387S Institutional support: RVO:68081740 Keywords : positive intergroup contact * negative intergroup contact * extended intergroup contact * mass-mediated intergroup contact * willingness to engage in intergroup contact * empathy * outgroup trust Subject RIV: AN - Psychology OBOR OECD: Psychology (including human - machine relations)

  9. The Bacas and the Priests: How Old Adversaries Came Together to Revive and Reinterpret Tradition

    Directory of Open Access Journals (Sweden)

    Sendyka Pawel

    2017-12-01

    Full Text Available In the Polish pastoralist tradition there have always been two seminal community events which bracketed the winter season. There was the autumn event of “Redyk Jesienny” when the sheep brought back from the summer alpine pastures were given back to their owners and there was also a spring “Redyk” also called “Mieszanie Owiec” which literally means the Mixing of Sheep. Historically, it was an important event in which the head shepherd, or the baca had to use his magical knowledge to ensure that the big herd made up of sheep from the individual owners would keep together as one and produce enough milk to make this summer venture profitable. To do that he used magic spells and performed rituals learned from his predecessors. The bacas' magical knowledge was frequently in opposition to the powers of the priests who viewed them with suspicion. Today, this spring event of “Mieszanie Owiec” is much changed. It is no longer a private affair of the baca and the sheep owners. Frequently, it is a public event, a tourist attraction, with the priests often taking centre stage. There is even a new, “invented” tradition of region wide “Mieszanie” at the sanctuary of Ludźmierz. There, a small herd of around 200 sheep is symbolically used to bless all the herds going up the mountain pastures for the season. The paper examines how these traditions changed from old ethnographic descriptions and how they are evolving in a modern economic and social reality.

  10. A model-referenced procedure to support adversarial decision processes; Application to electricity planning

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, D.W.; Vlahos, K. (London Business School (United Kingdom))

    1992-10-01

    In public enquiries concerning major facilities, such as the construction of a new electric power plant, it is observed that a useable decision model should be made commonly available alongside the open provision of data and assumptions. The protagonist, eg the electric utility, generally makes use of a complex, proprietary model for detailed evaluation of options. A simple emulator of this, based upon a regression analysis of numerous scenarios, and validated by further simulations is shown to be feasible and potentially attractive. It would be in the interests of the utility to make such a model-referenced decision support method generally available. The approach is considered in relation to the recent Hinkley Point C public enquiry for a new nuclear power plant in the UK. (Author).

  11. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    2017-01-01

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates...

  12. Confronting Emergent Nuclear-Armed Regional Adversaries: Prospects for Neutralization, Strategies for Escalation Management

    Science.gov (United States)

    2015-01-01

    states vulnerable to 6 Scott D. Sagan , “The Perils of Proliferation: Organization Theory...substantially less than those of the opponent’s. As Prussian military theorist Carl von Clausewitz so famously asserted, “The political object—the...powers or that the United States could not manage 6 Carl von Clausewitz, On War, edited and translated

  13. Reconstructing perceived faces from brain activations with deep adversarial neural decoding

    NARCIS (Netherlands)

    Güçlütürk, Y.; Güçlü, U.; Seeliger, K.; Bosch, S.E.; Lier, R.J. van; Gerven, M.A.J. van; Guyon, I.; Luxburg, U.V.; Bengio, S.; Wallach, H.; Fergus, R.; Vishwanathan, S.; Garnett, R.

    2017-01-01

    Here, we present a novel approach to solve the problem of reconstructing perceived stimuli from brain responses by combining probabilistic inference with deep learning. Our approach first inverts the linear transformation from latent features to brain responses with maximum a posteriori estimation

  14. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations

    OpenAIRE

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol.

  15. Adversarial Tuning of Perturbative Parameters in Non-Differentiable Physics Simulators

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    In this contribution, we present a method for tuning perturbative parameters in Monte Carlo simulation using a classifier loss in high dimensions. We use an LSTM trained on the radiation pattern inside jets to learn the parameters of the final state shower in the Pythia Monte Carlo generator. This represents a step forward compared to unidimensional distributional template-matching methods.

  16. FCNs in the Wild: Pixel-level Adversarial and Constraint-based Adaptation

    OpenAIRE

    Hoffman, Judy; Wang, Dequan; Yu, Fisher; Darrell, Trevor

    2016-01-01

    Fully convolutional models for dense prediction have proven successful for a wide range of visual tasks. Such models perform well in a supervised setting, but performance can be surprisingly poor under domain shifts that appear mild to a human observer. For example, training on one city and testing on another in a different geographic region and/or weather condition may result in significantly degraded performance due to pixel-level distribution shift. In this paper, we introduce the first do...

  17. Improving the resilience of cyber-physical systems under strategic adversaries

    OpenAIRE

    Wood, Paul

    2016-01-01

    Renewable energy resources challenge traditional energy system operations by substituting the stability and predictability of fossil fuel based generation with the unreliability and uncertainty of wind and solar power. Rising demand for green energy drives grid operators to integrate sensors, smart meters, and distributed control to compensate for this uncertainty and improve the operational efficiency of the grid. Real-time negotiations enable producers and consumers to adjust power loads du...

  18. Interdicting an Adversary’s Economy Viewed As a Trade Sanction Inoperability Input Output Model

    Science.gov (United States)

    2017-03-01

    Agriculture, hunting, forestry and fishing YES $4,578,424,000 2 TTL_C10T14: Mining and quarrying YES $53,345,194,000 3 TTL_C15T16: Food products, beverages ...22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave...Wei, Dong, and Sun (2009) use the IIM to study supply chain risk management and mitigation strategies. They use a method called the “ordered

  19. Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation

    National Research Council Canada - National Science Library

    Llinas, James

    1998-01-01

    .... Given that offensive IW operations may interfere with automated, data-fusion based decision aids, it is necessary to understand how personnel may rely on or trust these aids when appropriate (e.g...

  20. Assessing the Deterrence Value of Carrier Presence Against Adversary Aggression in a Coalition Environment

    Science.gov (United States)

    2017-09-01

    provides statistics on nations’ military forces and defense expenditures. The cost for a player to seek an alliance with a nation, defined as the...summary. Report, Naval Postgraduate School, Monterey, CA. Barnes J, Kleck G (2014) Do more police lead to more crime deterrence? Crime & Delinquency

  1. 29 CFR 102.143 - “Adversary adjudication” defined; entitlement to award; eligibility for award.

    Science.gov (United States)

    2010-07-01

    ...; eligibility for award. 102.143 Section 102.143 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS... Marketing Act (12 U.S.C. 1141j(a)) with not more than 500 employees; and (5) Any other partnership, corporation, association, unit of local government, or public or private organization with a net worth of not...

  2. Unique Approach to Threat Analysis Mapping: A Malware Centric Methodology for Better Understanding the Adversary Landscape

    Science.gov (United States)

    2016-04-05

    additional malware, network infrastructure, and adversaries’ using Open Source Intelli- gence ( OSINT ) and public data feeds for the network defense and...source intelligence ( OSINT ), in-house efforts, and commercial sources. Our case studies use mostly OSINT and in- house data sources to illustrate the...can be found in OSINT or are written by analysts within an organization. If provided uncate- gorized malware, an analyst should use a vetted YARA rule

  3. Adversaries and Allies: Rival National Suffrage Groups and the 1882 Nebraska Woman Suffrage Campaign

    Science.gov (United States)

    Heider, Carmen

    2005-01-01

    In September 1882, Nebraska was the setting for a significant moment in the history of the United States women's rights movement: the two rival suffrage organizations, the American Woman Suffrage Association (AWSA) and the National Woman Suffrage Association (NWSA), both held their annual conventions in Omaha. The alliance of the AWSA and the NWSA…

  4. Accelerating Science with Generative Adversarial Networks: An Application to 3D Particle Showers in Multilayer Calorimeters

    Science.gov (United States)

    Paganini, Michela; de Oliveira, Luke; Nachman, Benjamin

    2018-01-01

    Physicists at the Large Hadron Collider (LHC) rely on detailed simulations of particle collisions to build expectations of what experimental data may look like under different theoretical modeling assumptions. Petabytes of simulated data are needed to develop analysis techniques, though they are expensive to generate using existing algorithms and computing resources. The modeling of detectors and the precise description of particle cascades as they interact with the material in the calorimeter are the most computationally demanding steps in the simulation pipeline. We therefore introduce a deep neural network-based generative model to enable high-fidelity, fast, electromagnetic calorimeter simulation. There are still challenges for achieving precision across the entire phase space, but our current solution can reproduce a variety of particle shower properties while achieving speedup factors of up to 100 000 × . This opens the door to a new era of fast simulation that could save significant computing time and disk space, while extending the reach of physics searches and precision measurements at the LHC and beyond.

  5. Optimising Realism of Synthetic Agricultural Images using Cycle Generative Adversarial Networks

    NARCIS (Netherlands)

    Barth, R.; IJsselmuiden, J.M.M.; Hemming, J.; Henten, van E.J.

    2017-01-01

    A bottleneck of state-of-the-art machine learning methods, e.g. deep learning, for plant part image segmentation in agricultural robotics is the requirement of large manually annotated datasets. As a solution, large synthetic datasets including ground truth can be rendered that realistically reflect

  6. Vision and strategy development of Slovak society. Development Strategy for Slovak society (basis for public adversary)

    International Nuclear Information System (INIS)

    Sikula, V.; Peknik, M.; Tirpak, I.; Bucek, M.

    2010-02-01

    This analytical study analyses the present state as well as strategy of perspectives of development of Slovak society. This strategy of development of Slovak society is scientific testimony of the authors, the manner and extent of its use will determine political representation. Future economic growth and development of Slovak's regions will mainly depend on the availability of raw materials, energy resources, water, food processes and improving the environment. A key issue in the next 5 to 10 years in the energy sector will address energy security, diversification of energy sources, utilization of domestic raw materials and renewable energy and energy savings. The energy security strategy is to achieve a competitive energy industry for reliable and efficient supply of all forms of energy at affordable prices, with a view to protection of the customer and the environment.

  7. Adversarial Framing: President Bashar al-Assad’s Depiction of the Armed Syrian Opposition

    Directory of Open Access Journals (Sweden)

    Fabien Merz

    2014-06-01

    Full Text Available 'This paper evaluates how Syrian president Bashar al-Assad is framing his opponents in the context of the Syrian civil war. The question is addressed by conducting a qualitative thematic analysis of 13 interviews he gave to international television news networks and newspapers between March and November 2013. It is found that Al-Assad consequently labels the armed opposition as “terrorists” preponderantly composed of groups affiliated to Al-Qaeda. The “terrorists” are framed as posing a threat to the region as well as to international security on a global scale. Furthermore, Al-Assad denies the armed opposition its Syrian grassroots by portraying them as outside aggressors fighting for foreign interests. They are also depicted as “enemies of the Syrian people”, responsible for all the atrocities and human suffering committed during the Syrian civil war.' ' '

  8. Non-adversarial justice and the coroner's court: a proposed therapeutic, restorative, problem-solving model.

    Science.gov (United States)

    King, Michael S

    2008-12-01

    Increasingly courts are using new approaches that promote a more comprehensive resolution of legal problems, minimise any negative effects that legal processes have on participant wellbeing and/or that use legal processes to promote participant wellbeing. Therapeutic jurisprudence, restorative justice, mediation and problem-solving courts are examples. This article suggests a model for the use of these processes in the coroner's court to minimise negative effects of coroner's court processes on the bereaved and to promote a more comprehensive resolution of matters at issue, including the determination of the cause of death and the public health and safety promotion role of the coroner.

  9. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  10. Motivations and possible actions of potential criminal adversaries of US nuclear programs

    International Nuclear Information System (INIS)

    Bass, G.; Jenkins, B.; Kellen, K.; Krofcheek, J.; Petty, G.; Reinstedt, R.; Ronfeldt, D.

    1981-01-01

    The motivations that might impel individuals or groups to undertake criminal actions against US nuclear facilities or programs are explored in the report (R and R-2554-SL) from which this note is taken. The analysis involves examination of the motivations behind nuclear-related crimes that have already occurred and of those behind analogous nonnuclear crimes

  11. Deep Convolutional Generative Adversarial Network for Procedural 3D Landscape Generation Based on DEM

    DEFF Research Database (Denmark)

    Wulff-Jensen, Andreas; Rant, Niclas Nerup; Møller, Tobias Nordvig

    2018-01-01

    as it has been used to generate game maps in previous productions [3, 4]. The diversity test showed the generated maps had a significantly greater diversity than the Perlin noise maps. Afterwards the heightmaps was converted to 3D maps in Unity3D. The 3D maps’ perceived realism and videogame usability...

  12. Adversarial Collaboration Decision-Making: An Overview of Social Quantum Information Processing

    Science.gov (United States)

    2002-01-01

    collaborative decision - making (CDM) to solve problems is an aspect of human behavior least yielding to rational predictions. To reduce the complexity of CDM...increases. Implications for C2 decision - making are discussed. Overview of research Game theory was one of the first rational approaches to the study of...Psychologist, 36, 343-356. Lawless, W.F. (2001), The quantum of social action and the function of emotion in decision - making , Proceedings, Emotional and

  13. The Effect of Adversary Unmanned Aerial Systems on the US Concept of Air Superiority

    Science.gov (United States)

    2014-12-04

    The German V1 and V2 challenged the concept of Allied air superiority during WWII. The history surrounding the V-weapons parallels the current...weapons in World War II. The V1 and V2 represented a previously unseen threat to Allied air superiority. The Germans focused the weapons on Allied...bombing.” 33 Hitler and the German High Command hoped to begin a large-scale bombardment with both V-1 flying bombs and V-2 rockets in late 1943 or

  14. Assessing and Minimizing Adversarial Risk in a Nuclear Material Transportation Network

    Science.gov (United States)

    2013-09-01

    SCHOOL September 2013 Author: Bradford S. Foster Approved by: R. Kevin Wood Thesis Advisor Kyle Y. Lin Second Reader Robert F. Dell Chair, Department of...Goodrich Center SnowmassEVillage Raymer Stratton Bethune Granada Holly SheridanELake SugarECity Manzanola Fowler RockyEFord Redcliff Minturn Avon Gypsum

  15. Adversary phase change detection using S.O.M. and text data

    International Nuclear Information System (INIS)

    Speed, Ann Elizabeth; Doser, Adele Beatrice; Warrender, Christina E.

    2010-01-01

    In this work, we developed a self-organizing map (SOM) technique for using web-based text analysis to forecast when a group is undergoing a phase change. By 'phase change', we mean that an organization has fundamentally shifted attitudes or behaviors. For instance, when ice melts into water, the characteristics of the substance change. A formerly peaceful group may suddenly adopt violence, or a violent organization may unexpectedly agree to a ceasefire. SOM techniques were used to analyze text obtained from organization postings on the world-wide web. Results suggest it may be possible to forecast phase changes, and determine if an example of writing can be attributed to a group of interest.

  16. Natural Language Processing Of Online Propaganda As A Means Of Passively Monitoring An Adversarial Ideology

    Science.gov (United States)

    2017-03-01

    US analysts overwhelmed by pro-ISIS social media , military posts threatened. [Online]. Available: http://www.foxnews. com/politics/2015/05/26/bulletin...warns-us-analysts-overwhelmed-by-pro-isis- social - media -military-posts.html [3] J. Moore. (2015, Feb. 35). Western intelligence services overwhelmed...organizations have effectively leveraged an online presence to influence elections and distance-recruit. The Islamic State has also shown proficiency in

  17. Adversaries, adherents and opponent of nuclear energy in the Slovak Republic

    International Nuclear Information System (INIS)

    Simunek, P.

    1998-01-01

    In this paper the author deals with the opinions on NPP, using of science by opponents as aid of the knowledge, with the opponents of variants of the development of the slovak energetic, with the public relations. New activities in the public relations are proposed

  18. Remote Detection of Covert Tactical Adversarial Intent of Individuals in Asymmetric Operations

    Science.gov (United States)

    2010-04-01

    Hyperspectral imagers: Passive multiband imagers are optimized to select specific wavelengths of interest related to particular optical phenomena or...monitoring (either fluorescent imaging or nonimaging amplitude of a particular wavelength), can be used to inspect a portion of the body for sweat or...17 • Retroreflection: Active laser illumination and passive imaging of the collimated returns can be used for detecting optics /video cameras

  19. Research Directions in Remote Detection of Covert Tactical Adversarial Intent of Individuals in Asymmetric Operations

    Science.gov (United States)

    2010-07-01

    between psychological issues (ideologues, disaffected, etc.) and psychopathological issues (not sociopathic ). Clinical data may not be applicable as...physiological indicators. For example, sociopaths may be emotionally numb. Further, there could be possible links to religious fanaticism and the

  20. ONE PICTURE IS WORTH A THOUSAND BULLETS: THE POWER OF PICTURES AND VIDEOS TO COMBAT FOREIGN ADVERSARIES AND INFLUENCE PERCEPTIONS

    Science.gov (United States)

    2016-08-01

    images. Another concept relative to the psychological implications of using imagery as an influencer lies within the “heuristic” model of...for one’s own forces and to instill fear in one’s enemy.”47 Some examples of symbolism is how Jihadi propaganda often uses photographs of waterfalls ...Organization. “Enhancement of Literacy in Afghanistan (ELA) program.” 30. Shelly Chaiken. “The Heuristic Model of Persuasion.” 3. 31. Ibid. 6. 32

  1. Overview of the structured assessment approach and documentation of algorithms to compute the probability of adversary detection

    International Nuclear Information System (INIS)

    Rice, T.R.; Derby, S.L.

    1978-01-01

    The Structured Assessment Approach was applied to material control and accounting systems at facilities that process Special Nuclear Material. Four groups of analytical techniques were developed for four general adversory types. Probabilistic algorithms were developed and compared with existing algorithms. 20 figures

  2. Distributed Learning, Extremum Seeking, and Model-Free Optimization for the Resilient Coordination of Multi-Agent Adversarial Groups

    Science.gov (United States)

    2016-09-07

    and Technology, UK) OTHER MAJOR RECOGNITIONS 2016 Qian Ren Professor, Northeastern University, China 2015 Invitation Fellow, Japan Society for...Foroush and S. Martı́nez. On triggering control of single-input linear systems under pulse- width modulated DoS jamming attacks. SIAM Journal on...controllable linear systems under unknown periodic DoS jamming attacks. In SIAM Conference on Control and Its Applications (CT), pages 222–229, San Diego, CA

  3. On the Formal Modeling of Games of Language and Adversarial Argumentation : A Logic-Based Artificial Intelligence Approach

    OpenAIRE

    Eriksson Lundström, Jenny S. Z.

    2009-01-01

    Argumentation is a highly dynamical and dialectical process drawing on human cognition. Successful argumentation is ubiquitous to human interaction. Comprehensive formal modeling and analysis of argumentation presupposes a dynamical approach to the following phenomena: the deductive logic notion, the dialectical notion and the cognitive notion of justified belief. For each step of an argumentation these phenomena form networks of rules which determine the propositions to be allowed to make se...

  4. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment

    Directory of Open Access Journals (Sweden)

    Muhammad Sohail

    2018-03-01

    Full Text Available Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node’s transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing, which extends the widely used AODV (Ad hoc On-demand Distance Vector routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network. The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  5. [Max Planck--an adversary of Christianity? The debate about Planck's attitude towards religion after World War II].

    Science.gov (United States)

    Löhr, Gebhard

    2012-03-01

    The article discusses a debate which unfolded in the early 1950s and 1960s between East German Marxist philosophers and historians of science and West German theologians and scientists. The subject treated was the attitude towards religion of famous physicist Max Planck who had died a few years earlier, in 1947. The article analyses the different positions of the contributors, mainly with a view to developing a categorial framework usable in descriptions and analyses of the religious attitudes of natural scientists. Moreover the different stages of the debate are outlined in order to exhibit their connections to the larger historical context, i.e. the unfolding of the cold war. In the light of this the debate can be regarded as a religious or ideological war, albeit a cold one, on German soil, which fortunately did not escalate into a hot conflict. It ended, as can be illustrated in a late contribution to the debate, with the collapse of the GDR in 1989 or shortly thereafter.

  6. 3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.

    Science.gov (United States)

    Sohail, Muhammad; Wang, Liangmin

    2018-03-14

    Today IoT integrate thousands of inter networks and sensing devices e.g., vehicular networks, which are considered to be challenging due to its high speed and network dynamics. The goal of future vehicular networks is to improve road safety, promote commercial or infotainment products and to reduce the traffic accidents. All these applications are based on the information exchange among nodes, so not only reliable data delivery but also the authenticity and credibility of the data itself are prerequisite. To cope with the aforementioned problem, trust management come up as promising candidate to conduct node's transaction and interaction management, which requires distributed mobile nodes cooperation for achieving design goals. In this paper, we propose a trust-based routing protocol i.e., 3VSR (Three Valued Secure Routing), which extends the widely used AODV (Ad hoc On-demand Distance Vector) routing protocol and employs the idea of Sensing Logic-based trust model to enhance the security solution of VANET (Vehicular Ad-Hoc Network). The existing routing protocol are mostly based on key or signature-based schemes, which off course increases computation overhead. In our proposed 3VSR, trust among entities is updated frequently by means of opinion derived from sensing logic due to vehicles random topologies. In 3VSR the theoretical capabilities are based on Dirichlet distribution by considering prior and posterior uncertainty of the said event. Also by using trust recommendation message exchange, nodes are able to reduce computation and routing overhead. The simulated results shows that the proposed scheme is secure and practical.

  7. Statistical Hypothesis Testing using CNN Features for Synthesis of Adversarial Counterexamples to Human and Object Detection Vision Systems

    Energy Technology Data Exchange (ETDEWEB)

    Raj, Sunny [Univ. of Central Florida, Orlando, FL (United States); Jha, Sumit Kumar [Univ. of Central Florida, Orlando, FL (United States); Pullum, Laura L. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Ramanathan, Arvind [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-05-01

    Validating the correctness of human detection vision systems is crucial for safety applications such as pedestrian collision avoidance in autonomous vehicles. The enormous space of possible inputs to such an intelligent system makes it difficult to design test cases for such systems. In this report, we present our tool MAYA that uses an error model derived from a convolutional neural network (CNN) to explore the space of images similar to a given input image, and then tests the correctness of a given human or object detection system on such perturbed images. We demonstrate the capability of our tool on the pre-trained Histogram-of-Oriented-Gradients (HOG) human detection algorithm implemented in the popular OpenCV toolset and the Caffe object detection system pre-trained on the ImageNet benchmark. Our tool may serve as a testing resource for the designers of intelligent human and object detection systems.

  8. El aspecto científico de la trilogía “ministerio público-policía-peritos” en el nuevo proceso penal de corte acusatorio, adversarial y oral en México/The scientific aspect of the trilogy "public-police-expert ministry" in the new adversarial criminal process, and oral adversarial court in Mexico

    OpenAIRE

    Juan Antonio Maruri Jiménez

    2015-01-01

    The last June 18, 2008 the Decree amending Articles 16, 17, 18, 19, 20, 21, 22 are amended was published; (the fractions) XXI and XXIII of Article 73, Section VII of Article 115 and section XIII paragraph B of Article 123 of the Constitution of the United Mexican States, giving rise to the Constitutional reform of criminal justice, emerging as basic expectations: total transformation of the criminal justice system; effectively guarantee the validity of the “due process” in criminal matters re...

  9. El aspecto científico de la trilogía “ministerio público-policía-peritos” en el nuevo proceso penal de corte acusatorio, adversarial y oral en México/The scientific aspect of the trilogy "public-police-expert ministry" in the new adversarial criminal process, and oral adversarial court in Mexico

    Directory of Open Access Journals (Sweden)

    Juan Antonio Maruri Jiménez

    2015-05-01

    Full Text Available The last June 18, 2008 the Decree amending Articles 16, 17, 18, 19, 20, 21, 22 are amended was published; (the fractions XXI and XXIII of Article 73, Section VII of Article 115 and section XIII paragraph B of Article 123 of the Constitution of the United Mexican States, giving rise to the Constitutional reform of criminal justice, emerging as basic expectations: total transformation of the criminal justice system; effectively guarantee the validity of the “due process” in criminal matters restore confidence in the criminal justice system and its institutions doing research and efficient prosecution of crimes, the accused is greater assurances defense thereby ensuring the protection, support and participation of victims and injured, and safeguard the principles governing a Democratic-State Constitutional Law.

  10. [Polls and analysis of data presented by Risto Saenkiaho [Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    International Nuclear Information System (INIS)

    Saenkiaho, Risto

    1989-01-01

    This discussion shows the results of polls and analysis of data related to: confidence toward different information sources in energy policy; advantages of nuclear power; disadvantages of nuclear power; factors of political goals; factors of attitudes in energy policy

  11. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  12. Unexpected Turns: The Aesthetic, the Pathetic and the Adversarial in the Long Durée of Art’s Histories

    Directory of Open Access Journals (Sweden)

    Griselda Pollock

    2012-12-01

    Full Text Available In a conference organized at the University of Birmingham in 2012, I was invited to reflect upon the current situation in Art History that is posited as being ‘After the New Art History’. What is this after-ness? Succession? Supersession? Replacement? Exhaustion? Erasure? Fashionability? Dare we ask what kind of ‘killing’ of the past or of Oedipal Feminist Mothers and Marxists Fathers is going on here? Or does this indicate simply that we need new directions in our discipline just to keep it alive? There is certainly a feeling around that we are in a period of transition. Former certainties about the tendencies within the discipline of art history have melted. Is this a sign of our condition as Liquid Modernity? There is a risk, however, of casting the recent past as being ‘over’, to be viewed nostalgically, or gratefully cast into the dustbin of has-been histories so that we can get back to business as normal or find new pastures exciting because they are different. Before I acquiesce to such a trend for newness per se, I want to reconsider what is being said to have come before and now is defined as being over. To do so, I shall argue for an understanding of the long-term nature of any one intervention seeking radically to change the ways we study art and the image, past and present. Equally, I suggest that such long-term projects are themselves subject to historical change, shifting in sensitive response to altered conditions and changed priorities, but also registering their own effects and opening new avenues of analysis. Finally this article performs a reading of the call for papers for the conference in order to tease out critical misrepresentations of the past that we are now supposed to come after. Displacing the model of old and new with notions of parallel trajectories and multiple settlements in the expanding, historically shifting but also deeply structured ‘landscape’ of the discipline, I propose as less phallic model of a field with many threads contributing to its complex engagements with art, with visuality, with subjectivity and with their forms of material and symbolic interaction.

  13. Validation of Rational Deterrence Theory: Analysis of U.S. Government and Adversary Risk Propensity and Relative Emphasis on Gain or Loss

    Science.gov (United States)

    2010-03-01

    natural or man-made occurrences, individuals, entities, or actions that have or indicate the potential to harm life , information, operations, the ...Skuta, P. (2006). Poker, blackjack , rummy, and war: the face of American strategic culture. Strategy research project for U.S. Army War College...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching

  14. Design of an engineered safeguards system for a mixed-oxide fuel fabrication facility

    International Nuclear Information System (INIS)

    Winblad, A.E.; McKnight, R.P.; Fienning, W.C.; Fenchel, B.R.

    1977-06-01

    Several Engineered Safeguards System concepts and designs are described that provide increased protection against a wide spectrum of adversary threats. An adversary sequence diagram that outlines all possible adversary paths through the safeguards elements in a mixed-oxide fuel fabrication facility is shown. An example of a critical adversary path is given

  15. Enablers of Self-Synchronization for Network-Centric Operations: Design of a Complex Command and Control Experiment

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kleinman, David L; Hocevar, Susan P; Kemple, William G; Porter, Gary R

    2001-01-01

    ... that is shorter than an adversary"s. Self synchronization is viewed as an essential process within military organizations that can increase speed of command and thus accelerate execution of the mission...

  16. Understanding an Adversary’s Strategic and Operational Calculus: A Late Cold War Case Study with 21st Century Applicability U.S. Views on Soviet Navy Strategy and Operations

    Science.gov (United States)

    2013-08-01

    principal target is domestic. It is a peculiar form of inflated Western self - esteem that turns a literature read for profit in the Soviet Union into a...Thus, we can disseminate the paper within the U.S. national security community, enhancing its utility. Two authoritative sources in particular treat...U.S. Senate Committee on Appropriations. 2 For an authoritative third narrative that tracks with the Hattendorf and Rosenberg findings, see Jan

  17. Vision and strategy development of Slovak society. Development Strategy for Slovak society (basis for public adversary); Vizia a strategia rozvoja slovenskej spolocnosti. Strategia rozvoja slovenskej spolocnosti (Podklad pre verejnu oponenturu)

    Energy Technology Data Exchange (ETDEWEB)

    Sikula, V [ed.; Okali, I; Klas, A [Ekonomicky ustav, Slovenska akademia vied, Bratislava (Slovakia); Bercik, P [Ministerstvo vnutra SR, Bratislava (Slovakia); Peknik, M [Ustav politickych vied, Slovenska akademia vied, Bratislava (Slovakia); Tirpak, I [Recyklacny fond, Bratislava (Slovakia); Bucek, M [Narodohospodarska fakulta Ekonomickej univerzity v Bratislave (Slovakia)

    2010-02-15

    This analytical study analyses the present state as well as strategy of perspectives of development of Slovak society. This strategy of development of Slovak society is scientific testimony of the authors, the manner and extent of its use will determine political representation. Future economic growth and development of Slovak's regions will mainly depend on the availability of raw materials, energy resources, water, food processes and improving the environment. A key issue in the next 5 to 10 years in the energy sector will address energy security, diversification of energy sources, utilization of domestic raw materials and renewable energy and energy savings. The energy security strategy is to achieve a competitive energy industry for reliable and efficient supply of all forms of energy at affordable prices, with a view to protection of the customer and the environment.

  18. Proceedings of the Annual Symposium on the Role of Behavioral Science in Physical Security (9th), Symmetry and Asymmetry of Global Adversary Behavior Held at Springfield, Virginia on 3-4 April 1984

    Science.gov (United States)

    1984-04-04

    of deaths from terrorist acts have been attributed to bombing. Let us go back a few months to a Sunday in October. A yellow Mercedes - Benz stake...he cited for purposes of advertisement . PLEASE NÜTin Uli; DEFENSE M,CLEAR AGENCY ATTN: STTI, WASHINGTON. D.C. 20305-1000, IF YOUR ADDRESS IS...had in Jerusalem where people were just in the market or riding the bus, or in Athens where you can’t go to work without getting killed, or in

  19. Defending Against Opposed Patterns of Resistant: Can Past Cultural Lessons in Armed Conflict Help U.S. Identify, Defend, Adapt, or Exploit Notions of Resistant With New Adversaries Like ISIS

    Science.gov (United States)

    2015-05-01

    experienced in Sri Lanka, the “Birds of Paradise ” women combatants and suicide bombers were successfully able to exploit gender bias...research paper are those of the author and do not reflect the official policy or position of the US government or the Department of Defense. In...contact and how might we defend them or exploit them without compromising our own notions? This research paper evaluates current events and identifies

  20. Design Basis Threat (DBT) Approach for the First NPP Security System in Indonesia

    International Nuclear Information System (INIS)

    Ign Djoko Irianto

    2004-01-01

    Design Basis Threat (DBT) is one of the main factors to be taken into account in the design of physical protection system of nuclear facility. In accordance with IAEA's recommendations outlined in INFCIRC/225/Rev.4 (Corrected), DBT is defined as: attributes and characteristics of potential insider and/or external adversaries, who might attempt unauthorized removal of nuclear material or sabotage against the nuclear facilities. There are three types of adversary that must be considered in DBT, such as adversary who comes from the outside (external adversary), adversary who comes from the inside (internal adversary), and adversary who comes from outside and colludes with insiders. Current situation in Indonesia, where many bomb attacks occurred, requires serious attention on DBT in the physical protection design of NPP which is to be built in Indonesia. This paper is intended to describe the methodology on how to create and implement a Design Basis Threat in the design process of NPP physical protection in Indonesia. (author)

  1. The National Counterintelligence Strategy of the United States of America

    National Research Council Canada - National Science Library

    McConnell, J. M

    2007-01-01

    .... Our adversaries -- foreign intelligence services, terrorists, foreign criminal enterprises and cyber intruders -- use overt, covert, and clandestine activities to exploit and undermine US national security interests...

  2. Asymmetry in Maritime Access and Undersea Anti-Access/Area-Denial Strategies

    National Research Council Canada - National Science Library

    Manke, Robert C; Christian, Raymond J

    2007-01-01

    .... From a national security perspective, however, it is equally important to address asymmetric approaches plausibly employed by potential adversaries during conventional campaigns that will most likely...

  3. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    National Research Council Canada - National Science Library

    Mankins, David

    2001-01-01

    .... By employing different price and purchase functions, the architecture can provide service quality differentiation and furthermore, select good client behavior and discriminate against adversarial behavior...

  4. An Analysis of the Influence of Signals Intelligence Through Wargaming

    National Research Council Canada - National Science Library

    McCaffrey, Charles

    2000-01-01

    Signals intelligence (SIGINT), information derived from the monitoring, interception, decryption and evaluation of an adversary's electronic communications, has long been viewed as a significant factor in modem warfare...

  5. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  6. Opportunities in white-box cryptography

    NARCIS (Netherlands)

    Michiels, W.

    White-box cryptography is the discipline of implementing a cryptographic algorithm in software such that an adversary will have difficulty extracting the cryptographic key. This approach assumes that the adversary has full access to and full control over the implementation's execution. White-box

  7. Information Theoretic-Learning Auto-Encoder

    OpenAIRE

    Santana, Eder; Emigh, Matthew; Principe, Jose C

    2016-01-01

    We propose Information Theoretic-Learning (ITL) divergence measures for variational regularization of neural networks. We also explore ITL-regularized autoencoders as an alternative to variational autoencoding bayes, adversarial autoencoders and generative adversarial networks for randomly generating sample data without explicitly defining a partition function. This paper also formalizes, generative moment matching networks under the ITL framework.

  8. Taking Managerial Context Seriously

    DEFF Research Database (Denmark)

    Meier, Kenneth J.; Andersen, Simon Calmar; O'Toole, Laurence J.

    2015-01-01

    , the unitary and corporatist Denmark and the fragmented, adversarial Texas. We hypothesize that external as well as internal management matter more in Texas than Denmark. This is because Texas principals can gain power by negotiating the adversarial system, while the corporatist influence of teachers reduces...

  9. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  10. Random Oracles in a Quantum World

    NARCIS (Netherlands)

    D. Boneh; O. Dagdelen; M. Fischlin; D. Lehmann; C. Schaffner (Christian); M. Zhandry

    2012-01-01

    htmlabstractThe interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems. Some of these systems are set in the random oracle model and are proven secure relative to adversaries that

  11. Material control system simulator program reference manual

    Energy Technology Data Exchange (ETDEWEB)

    Hollstien, R.B.

    1978-01-24

    A description is presented of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts. Although MCSS may be used independently in the design or analysis of material handling and processing systems, it has been tailored toward the determination of material accountability and the response of material control systems to adversary action sequences.

  12. Actively Secure Two-Party Evaluation of Any Quantum Operation

    DEFF Research Database (Denmark)

    Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis

    2012-01-01

    We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map , given as a quantum circuit, upon their joint quantum input state . Our protocol leaks no more to any active adversary than an ideal ...... functionality for provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]....

  13. Material control system simulator program reference manual

    International Nuclear Information System (INIS)

    Hollstien, R.B.

    1978-01-01

    A description is presented of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts. Although MCSS may be used independently in the design or analysis of material handling and processing systems, it has been tailored toward the determination of material accountability and the response of material control systems to adversary action sequences

  14. 16 CFR 1052.3 - Conduct of oral presentation.

    Science.gov (United States)

    2010-01-01

    ... the Commission of relevant data, views and arguments. (b) The oral presentation, which shall be taped or transcribed, shall be an informal, non-adversarial legislative-type proceeding at which there will... presentation of data, views or arguments. ...

  15. Using detection and deterrence to reduce insider risk

    International Nuclear Information System (INIS)

    Eggers, R.F.; Carlson, R.L.; Udell, C.J.

    1988-01-01

    This paper addresses a new concept of interaction between adversary detection and deterrence. It provides an initial evaluation of the effects of these variables on the risk of theft of special nuclear material by an insider adversary and can be extended to the sabotage threat. A steady-state risk equation is used. Exercises with this equation show that deterrence, resulting from the prospect of detection, has a greater ability to reduce the risk than the detection exercise itself. This is true for all cases except those in which the probabilty of detection is 1. Cases were developed for three different types of adversaries that can be distinguished from one another by the level of detection they are willing to tolerate before they are deterred from attempting a theft. By considering the effects of detection, deterrence, and adversary type, the ground work is laid for designing cost-effective insider threat-protection systems

  16. Street Smarts: Unconventional Warriors in Contemporary Joint Urban Operations

    National Research Council Canada - National Science Library

    Amato, Edward

    2001-01-01

    ...) and Stability and Support Operations (SASO). America's pre-eminence on the conventional battlefield, and the asymmetric advantages cities offer, should compel adversaries to engage us on urban terrain...

  17. Using detection and deterrence to reduce insider risk

    Energy Technology Data Exchange (ETDEWEB)

    Eggers, R F; Carlson, R L; Udell, C J

    1988-06-01

    This paper addresses a new concept of interaction between adversary detection and deterrence. It provides an initial evaluation of the effects of these variables on the risk of theft of special nuclear material by an insider adversary and can be extended to the sabotage threat. A steady-state risk equation is used. Exercises with this equation show that deterrence, resulting from the prospect of detection, has a greater ability to reduce the risk than the detection exercise itself. This is true for all cases except those in which the probability of detection is 1. Cases were developed for three different types of adversaries that can be distinguished from one another by the level of detection they are willing to tolerate before they are deterred from attempting a theft. By considering the effects of detection, deterrence, and adversary type, the ground work is laid for designing cost-effective insider threat-protection systems. 2 refs., 6 figs.

  18. A Revitalized Information Assurance Training Approach and Information Assurance Best Practice Rule Set

    National Research Council Canada - National Science Library

    Pappas, James A

    2008-01-01

    ... superiority, yet inferiority could prevail in the same breath if not carefully examined. Unlike wars of the past, the DoD faces a new dimension to modern warfare, against a novel adversary: the faceless foe...

  19. OPSEC in the Information Age

    National Research Council Canada - National Science Library

    Michnowicz, Robert G

    2006-01-01

    ... source communication networks. The internal effort to deny adversaries any advantage could have implications regarding methods of communication with families, freedom of information, and media relations as the United States...

  20. The Psychology of Coercion: Merging Airpower and Prospect Theory

    National Research Council Canada - National Science Library

    Kimminau, Jon

    1998-01-01

    ... as a negotiated solution to a confrontation. The foundation of coercion is the adversary s decisionmaking process, and most theories of coercion rely on a rational model that weighs costs, benefits, and expectations for success...

  1. A Survey of Satellite Communications System Vulnerabilities

    National Research Council Canada - National Science Library

    Steinberger, Jessica A

    2008-01-01

    The U.S. military's increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries...

  2. Denying Access to Commercial Communications Satellites

    National Research Council Canada - National Science Library

    Washington, Tania

    1999-01-01

    .... Commercial systems such as Orion, Panamsat, Iridium and Globalstar will provide the U.S. military and its potential adversaries with a relatively inexpensive and highly effective means to increase the command, control and communications (C3...

  3. War and Urban Terrain in the Twenty-First Century

    National Research Council Canada - National Science Library

    Murray, Williamson

    2000-01-01

    .... The spread of urban sprawl throughout the world is only part of the cause; the motivation of adversaries and friends alike to seek refuge in these environments offers a more compelling reason for the U.S...

  4. Nuclear Weapons and U.S. National Security: A Need for Weapons Programs?

    National Research Council Canada - National Science Library

    Woolf, Amy F

    2003-01-01

    .... nuclear weapons that goes beyond the concept of deterrence from the Cold War. It also identified a new targeting strategy that would seek to threaten specific capabilities in adversary nations...

  5. An efficient attack identification and risk prediction algorithm for ...

    African Journals Online (AJOL)

    The social media is highly utilized cloud for storing huge amount of data. ... However, the adversarial scenario did not design properly to maintain the privacy of the ... Information Retrieval, Security Evaluation, Efficient Attack Identification and ...

  6. Divorce Mediation and Its Emotional Impact on the Couple and Their Children.

    Science.gov (United States)

    Kaslow, Florence W.

    1984-01-01

    Discusses the influence of development on divorce, and presents a diaclectic model of divorce stages. Suggests mediation as an alternative dispute resolution strategy and describes contraindications for both mediation and the adversarial approach. (JAC)

  7. Achieving the physical limits of the bounded-storage model

    International Nuclear Information System (INIS)

    Mandayam, Prabha; Wehner, Stephanie

    2011-01-01

    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security can be extended to a larger class of noisy quantum memories.

  8. Fighting in the Gray Zone: A Strategy to Close the Preemption Gap

    National Research Council Canada - National Science Library

    Fish, Joanne

    2004-01-01

    .... However, the NSS argues that in the 21st century, technology has advanced and become so readily available that we "must adapt the concept of imminent threat to the capabilities and objectives of today's adversaries...

  9. Should the Australian Army Adopt the Concept of Effects-Based Operations?

    National Research Council Canada - National Science Library

    Wainwright, John

    2003-01-01

    .... EBO are a continuous process, applied from the strategic to the tactical level, to promote a whole of government strategy against an adversary, achieving a common end state with the greatest speed and least cost...

  10. DoD Global Information Grid Mission Assurance

    National Research Council Canada - National Science Library

    Bargar, Anthony

    2008-01-01

    ...). However, the GIG was built for business efficiency instead of mission assurance against sophisticated adversaries who have demonstrated intent and proven their ability to use cyberspace as a tool...

  11. Defining the Information within Military Information Operations: Utilizing a Case Study of the Jammu and Kashmir Conflict

    National Research Council Canada - National Science Library

    Bookard, Joe D

    2006-01-01

    .... A function of the U.S. military is to deter adversaries who oppose the will of the United States, and if unsuccessful, render them incapable of physical resistance, thus ultimately altering their behavior. In essence, the U.S...

  12. Fighting Downtown: A Training Necessity for the Heavy Brigade

    National Research Council Canada - National Science Library

    Seigel, David

    2001-01-01

    .... This monograph also analyzes the lessons learned and impacts of the relatively recent post-Cold War battles of Mogadishu and Grozny to identify the methods that potential adversaries will likely use...

  13. Democratic design experiments

    DEFF Research Database (Denmark)

    Ehn, Pelle; Brandt, Eva; Halse, Joachim

    2016-01-01

    Designers and design researchers are increasingly exploring societal challenges through engagements with issues that call forward new publics and new modes of democratic citizenship. Whatever this is called design activism, social design, adversarial design, participatory design or something else...

  14. Special Operations Forces: Looking Forward

    National Research Council Canada - National Science Library

    Shelton, Henry

    1998-01-01

    The article introduces the United States as the sole superpower. As such the U.S. is obligated to assist other countries in need or threatened by adversaries, as long as it's in our national interests. Future U.S...

  15. Information Operations: The Least Applied Element of U.S. National Power

    National Research Council Canada - National Science Library

    Ferguson, Quill

    2004-01-01

    Information operations, one of the four elements of U.S. national power, is supreme in defending the country against foreign or domestic adversaries and winning hearts and minds both at home and internationally...

  16. Streaming PCA with many missing entries.

    Science.gov (United States)

    2015-12-01

    This paper considers the problem of matrix completion when some number of the columns are : completely and arbitrarily corrupted, potentially by a malicious adversary. It is well-known that standard : algorithms for matrix completion can return arbit...

  17. Nuclear facility safeguards systems modeling using discrete event simulation

    International Nuclear Information System (INIS)

    Engi, D.

    1977-01-01

    The threat of theft or dispersal of special nuclear material at a nuclear facility is treated by studying the temporal relationships between adversaries having authorized access to the facility (insiders) and safeguards system events by using a GASP IV discrete event simulation. The safeguards system events--detection, assessment, delay, communications, and neutralization--are modeled for the general insider adversary strategy which includes degradation of the safeguards system elements followed by an attempt to steal or disperse special nuclear material. The performance measure used in the analysis is the estimated probability of safeguards system success in countering the adversary based upon a predetermined set of adversary actions. An exemplary problem which includes generated results is presented for a hypothetical nuclear facility. The results illustrate representative information that could be utilized by safeguards decision-makers

  18. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

    Directory of Open Access Journals (Sweden)

    Jingyu Hua

    2017-01-01

    Full Text Available In collaborative data publishing (CDP, an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset.

  19. US Strategy for Cyberspace

    National Research Council Canada - National Science Library

    Veazie, Arnold

    2003-01-01

    .... in conventional warfare. As a result, America's adversaries are adopting asymmetrical warfare approaches, such as cyber attacks, as part of their strategy to disrupt the American infrastructure and economy...

  20. Identifying and tracking switching, non-stationary opponents: a Bayesian approach

    CSIR Research Space (South Africa)

    Hernandez-Leal, P

    2016-02-01

    Full Text Available extend BPR to adversarial settings, in particular, to opponents that switch from one stationary strategy to another. Our proposed extension enables learning new models in an online fashion when the learning agent detects that the current policies...

  1. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  2. The Challenge of New and Emerging Information Operations

    National Research Council Canada - National Science Library

    Heath, James E; Woodcock, Alexander E

    1999-01-01

    Information operations as defined in Joint Publication 3-13 of the Joint Staff (1998) are aimed at influencing the information and information systems of an adversary and defending one's own information and information systems...

  3. Integrating Effects-Based and Attrition-Based Modeling

    National Research Council Canada - National Science Library

    DeGregorio, Edward A; Janssen, Raymond A; Wagenhals, Lee W; Messier, Richard H

    2004-01-01

    .... Modeling the NCW EBO process attempts to codify the belief structure and reasoning of adversaries and their cause-effect relationships with US and coalition actions, including mitigating undesired effects...

  4. Operational Net Assessment: A Framework for Social Network Analysis and Requirements for Critical Debate

    National Research Council Canada - National Science Library

    Hannan, Michael J

    2005-01-01

    .... SJFHQs were designed by the U.S. Joint Forces Command (USJFCOM) to provide Regional Combatant Commanders in-depth analysis for a specific adversary or situation within their area of responsibility...

  5. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  6. The Creeping Irrelevance of U.S. Force Planning

    National Research Council Canada - National Science Library

    Record, Jeffrey

    1998-01-01

    ... disintegration of established states. He believes U.S. force planning, for decades riveted on the prospect of massive conventional and even nuclear operations against a militarily-like adversary, now confronts a strategic environment heavily populated...

  7. Tactical Mobility of the Medium Weight Force in Urban Terrain

    National Research Council Canada - National Science Library

    Johnson, Scott

    2001-01-01

    The potential for urban combat grows more plausible and probable as the world's population migrates toward cities and adversaries attempt to minimize the technological advantage of the U.S. military...

  8. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  9. Analysis of For-Profit Commercial Firm Participation in Technology Investment Agreements

    National Research Council Canada - National Science Library

    Tucker, Barbara

    2002-01-01

    .... These changes impacted the military's ability to maintain technological superiority over its adversaries, which was the foundation of a successful U,S, national defense, Commercial research and development (R&D...

  10. United States Air Force Precision Engagement Against Mobile Targets: Is Man In or Out

    National Research Council Canada - National Science Library

    Kosan, Keith

    2001-01-01

    ... been strategically placed by an adversary in areas with a high risk of collateral damage. Current air-to-ground guided weapon systems, including man-in-the-loop guidance weapon systems, have limited 'collateral reduction' capabilities...

  11. What Does Distributed Operations Mean for Joint Air Fire Support?

    National Research Council Canada - National Science Library

    Frey, James W

    2006-01-01

    .... technologies and training will enable DO forces to counter the asymmetric adversary. The adaptability and lethality for the squad to battalion sized units will add flexibility to Combatant Commanders...

  12. Effective Defense Support for Public Diplomacy (DSPD) with a Sub-Saharan Africa Target Audience: A Case Study of the African Crisis Response Force Proposal

    National Research Council Canada - National Science Library

    Ieva, Christopher S

    2008-01-01

    .... From a more narrow DSPD perspective, the absence of an explicit adversary in Africa means that military tactics there should be focused on capturing human terrain through the robust utilization...

  13. Capstone Concept for Special Operations

    National Research Council Canada - National Science Library

    2006-01-01

    The United States and its allies will remain at war for the foreseeable future. They will continue to battle a networked, technologically modern adversary that utilizes nonconventional methods of warfare as its primary means of operation...

  14. Prospects for improved detection of chemical, biological, radiological, and nuclear threats

    Energy Technology Data Exchange (ETDEWEB)

    Wuest, Craig R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hart, Brad [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Slezak, Thomas R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2012-07-31

    Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.

  15. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  16. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  17. Material control system simulator user's manual

    International Nuclear Information System (INIS)

    Hollstien, R.B.

    1978-01-01

    This report describes the use of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts

  18. Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    OpenAIRE

    Nyagudi, Nyagudi Musandu

    2013-01-01

    Nations are today challenged with multiple constraints such as declining population and financial austerity, these inevitably reduce military/security forces preparedness. Faced with well resourced adversaries or those of the asymmetric type, only a Nation that arms itself "intelligently" and fights "smart" attains advantages in the world's ever more complex and restrictive battle-spaces. Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that...

  19. Material control system simulator user's manual

    Energy Technology Data Exchange (ETDEWEB)

    Hollstien, R.B.

    1978-01-24

    This report describes the use of a Material Control System Simulator (MCSS) program for determination of material accounting uncertainty and system response to particular adversary action sequences that constitute plausible material diversion attempts. The program is intended for use in situations where randomness, uncertainty, or interaction of adversary actions and material control system components make it difficult to assess safeguards effectiveness against particular material diversion attempts.

  20. I feel good whether my friends win or my foes lose: Brain mechanisms underlying feeling similarity

    OpenAIRE

    Aue, Tatjana

    2014-01-01

    People say they enjoy both seeing a preferred social group succeed and seeing an adversary social group fail. At the same time, they state they dislike seeing a preferred social group fail and seeing an adversary social group succeed. The current magnetic resonance imaging study investigated whether—and if so, how—such similarities in reported feeling states are reflected in neural activities. American football fans anticipated success and failure situations for their favorite or their advers...

  1. DNSSEC for cyber forensics

    OpenAIRE

    Shulman, Haya; Waidner, Michael

    2014-01-01

    Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users activities for censorship, to distribute malware and spam and to subvert correctness and availability of Internet clients and services. Currently, the DNS infrastructure relies on challenge-response defences against attacks by (the common) off-path adversaries. Such defences do not suffice against stronger, man-in-the-middle (MitM), adversaries. Howev...

  2. SUSTAINING NAVAL SURFACE COMBATANT VERTICAL LAUNCH SYSTEM MUNITIONS DURING JOINT OPERATIONS

    Science.gov (United States)

    2017-04-21

    permission of the author. 14. ABSTRACT Maintaining maritime dominance against near peer adversaries will tax an already complex logistics structure...This page intentionally blank i ABSTRACT Maintaining maritime dominance against near peer adversaries will tax an already complex logistics...140725-N-EW716- 002.jpg 40 California to Guam, approximately eight days would be required but this does not account for delay to conduct refueling

  3. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  4. Estado e mercado: adversários ou aliados no processo de implementação da Política Nacional de Alimentação e Nutrição? Elementos para um debate sobre medidas de regulamentação State and market: adversaries or allies in the implementation of the National Food and Nutrition Policy? Some reflections on regulation measures

    Directory of Open Access Journals (Sweden)

    Anelise Rizzolo de Oliveira Pinheiro

    2008-06-01

    Full Text Available A alimentação e a nutrição constituem requisitos básicos para a promoção e a proteção da saúde, possibilitando a afirmação plena do potencial de crescimento e desenvolvimento humano, com qualidade de vida e cidadania. As mudanças na relação do Estado, sociedade civil e mercado têm trazido uma série de conseqüências sociais adversas, especialmente no campo da saúde e nutrição. Este artigo tem como propósito provocar algumas reflexões relativas à necessidade de pactuação entre Estado, sociedade e mercado para a efetivação de medidas capazes de atuar positivamente no controle da obesidade e conseqüentemente melhorar as condições de saúde e nutrição da população brasileira. Apresenta uma breve descrição de contexto histórico sobre política social no Brasil e seus reflexos específicos na temática de alimentação e nutrição; identifica aspectos políticos principais para uma análise das diretrizes da Política Nacional de Alimentação e Nutrição; destaca o fortalecimento de medidas de regulamentação como estratégia de enfrentamento do problema de excesso de peso / obesidade na sociedade, identificando suas raízes a partir do modo de viver urbano, globalizado e neoliberal das ultimas décadas, e, por fim, sugere elementos para enriquecer esse debate. Medidas de regulamentação parecem poder influenciar positivamente nas ações de promoção da saúde, pois estabelecem limites e um conjunto de critérios para mediar as relações entre sociedade e mercado, além de refletir o apoio e a proteção da saúde do cidadão como objetivo principal do Estado nesse processo.Food and nutrition constitute basic requirements for health promotion and protection, enabling the full expression of the human potential for growth and development, with quality of life and citizenship. Changes in the relationship between State, Civil Society, and the Market have brought several adverse social consequences, particularly in the health and nutrition field. This article intends to stimulate some reflections related to the need of an agreement between State, Civil Society and the Market for the accomplishment of measures that are able to contribute to obesity control and, as a consequence, to improve health and nutrition conditions of the Brazilian population. The article also presents a brief description of the historical context of social policies in Brazil and their specific consequences to food and nutrition matters; it identifies the main political aspects to analyze guidelines of the National Food and Nutrition Policy; it emphasizes the strengthening of regulation measures as a strategy to face the problem of excess of weight / obesity in society, identifying its roots in the urban, 'global' and neoliberal way of life of the last decades and, as a conclusion, it suggests more elements to enrich this debate. Regulation Measures seem to have a positive influence on health promotion actions by setting up the boundaries and criteria to mediate the relationship between Civil Society and the Market, besides reflecting the support and protection of the citizen's health as the main purpose of the State in this process.

  5. I feel good whether my friends win or my foes lose: brain mechanisms underlying feeling similarity.

    Science.gov (United States)

    Aue, Tatjana

    2014-07-01

    People say they enjoy both seeing a preferred social group succeed and seeing an adversary social group fail. At the same time, they state they dislike seeing a preferred social group fail and seeing an adversary social group succeed. The current magnetic resonance imaging study investigated whether-and if so, how-such similarities in reported feeling states are reflected in neural activities. American football fans anticipated success and failure situations for their favorite or their adversary teams. The data support the idea that feeling similarities and divergences expressed in verbal reports carry with them significant neural similarities and differences, respectively. Desired (favorite team likely to win and adversary team likely to lose) rather than undesired (favorite team likely to lose and adversary team likely to win) outcomes were associated with heightened activity in the supramarginal gyrus, posterior cingulate cortex, insula, and cerebellum. Precuneus activity additionally distinguished anticipated desirable outcomes for favorite versus adversary teams. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. A Theoretical Analysis: Physical Unclonable Functions and The Software Protection Problem

    Energy Technology Data Exchange (ETDEWEB)

    Nithyanand, Rishab [Stony Brook Univ., NY (United States); Solis, John H. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-09-01

    Physical Unclonable Functions (PUFs) or Physical One Way Functions (P-OWFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure (within reasonable error bounds) but hard to clone. This property of unclonability is due to the accepted hardness of replicating the multitude of uncontrollable manufacturing characteristics and makes PUFs useful in solving problems such as device authentication, software protection, licensing, and certified execution. In this paper, we focus on the effectiveness of PUFs for software protection and show that traditional non-computational (black-box) PUFs cannot solve the problem against real world adversaries in offline settings. Our contributions are the following: We provide two real world adversary models (weak and strong variants) and present definitions for security against the adversaries. We continue by proposing schemes secure against the weak adversary and show that no scheme is secure against a strong adversary without the use of trusted hardware. Finally, we present a protection scheme secure against strong adversaries based on trusted hardware.

  7. Structure for the decomposition of safeguards responsibilities

    International Nuclear Information System (INIS)

    Dugan, V.L.; Chapman, L.D.

    1977-01-01

    A major mission of safeguards is to protect against the use of nuclear materials by adversaries to harm society. A hierarchical structure of safeguards responsibilities and activities to assist in this mission is defined. The structure begins with the definition of international or multi-national safeguards and continues through domestic, regional, and facility safeguards. The facility safeguards is decomposed into physical protection and material control responsibilities. In addition, in-transit safeguards systems are considered. An approach to the definition of performance measures for a set of Generic Adversary Action Sequence Segments (GAASS) is illustrated. These GAASS's begin outside facility boundaries and terminate at some adversary objective which could lead to eventual safeguards risks and societal harm. Societal harm is primarily the result of an adversary who is successful in the theft of special nuclear material or in the sabotage of vital systems which results in the release of material in situ. With the facility safeguards system, GAASS's are defined in terms of authorized and unauthorized adversary access to materials and components, acquisition of material, unauthorized removal of material, and the compromise of vital components. Each GAASS defines a set of ''paths'' (ordered set of physical protection components) and each component provides one or more physical protection ''functions'' (detection, assessment, communication, delay, neutralization). Functional performance is then developed based upon component design features, the environmental factors, and the adversary attributes. An example of this decomposition is presented

  8. Structure for the decomposition of safeguards responsibilities

    International Nuclear Information System (INIS)

    Dugan, V.L.; Chapman, L.D.

    1977-08-01

    A major mission of safeguards is to protect against the use of nuclear materials by adversaries to harm society. A hierarchical structure of safeguards responsibilities and activities to assist in this mission is defined. The structure begins with the definition of international or multi-national safeguards and continues through domestic, regional, and facility safeguards. The facility safeguards is decomposed into physical protection and material control responsibilities. In addition, in-transit safeguards systems are considered. An approach to the definition of performance measures for a set of Generic Adversary Action Sequence Segments (GAASS) is illustrated. These GAASS's begin outside facility boundaries and terminate at some adversary objective which could lead to eventual safeguards risks and societal harm. Societal harm is primarily the result of an adversary who is successful in the theft of special nuclear material or in the sabotage of vital systems which results in the release of material in situ. With the facility safeguards system, GAASS's are defined in terms of authorized and unauthorized adversary access to materials and components, acquisition of material, unauthorized removal of material, and the compromise of vital components. Each GAASS defines a set of ''paths'' (ordered set of physical protection components) and each component provides one or more physical protection ''functions'' (detection, assessment, communication, delay, neutralization). Functional performance is then developed based upon component design features, the environmental factors, and the adversary attributes. An example of this decomposition is presented

  9. Safeguards systems concepts for nuclear material transportation. Final report

    International Nuclear Information System (INIS)

    Baldonado, O.C.; Kevany, M.; Rodney, D.; Pitts, D.; Mazur, M.

    1977-09-01

    The report describes the development of system concepts for the safeguarding of special strategic nuclear materials (SNM) against malevolent adversary action during the interfacility transport of the SNM. The methodology used includes techniques for defining, classifying, and analyzing adversary action sequences; defining safeguards system components; assessing the vulnerability of various safeguards systems and their component parts to the potential adversary action sequences, and conceptualizing system design requirements. The method of analysis is based primarily on a comparison of adversary actions with safeguards measures, to estimate vulnerability. Because of the paucity of the data available for assessing vulnerability, the Delphi approach was used to generate data: values were estimated in a structured exercise by a panel of experts in the safeguards and terrorist fields. It is concluded that the probability of successful attack against a truck/escort convoy manned by well-trained, well-armed personnel is low enough to discourage all but the strongest adversaries. Secrecy of operations and careful screening of personnel are very important. No reliance should be placed on current capabilities of local law enforcement agencies. The recommendation of the study is the use of road transport in the near future and air transport at a later time when the number of shipments reaches a level to justify it, and when present safety problems are resolved

  10. A computer model for identifying security system upgrades

    International Nuclear Information System (INIS)

    Lamont, A.

    1988-01-01

    This paper describes a prototype safeguards analysis tool that automatically identifies system weaknesses against an insider adversary and suggest possible upgrades to improve the probability that the adversary will be detected. The tool is based on this premise: as the adversary acts, he or she creates a set of facts that can be detected by safeguards components. Whenever an adversary's planned set of actions create a set of facts which the security personnel would consider irregular or unusual, we can improve the security system by implementing safeguards that detect those facts. Therefore, an intelligent computer program can suggest upgrades to the facility if we construct a knowledge base that contains information about: (1) the facts created by each possible adversary action, (2) the facts that each possible safeguard can detect, and (3) groups of facts which will be considered irregular whenever they occur together. The authors describe the structure of the knowledge base and show how the above information can be represented in it. They also describe the procedures that a computer program can use to identify missing or weak safeguards and to suggest upgrades

  11. Engineering Trade-off Considerations Regarding Design-for-Security, Design-for-Verification, and Design-for-Test

    Science.gov (United States)

    Berg, Melanie; Label, Kenneth

    2018-01-01

    The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.

  12. The Application of materials attractiveness in a graded approach to nuclear materials security

    International Nuclear Information System (INIS)

    Ebbinghaus, B.; Bathke, C.; Dalton, D.; Murphy, J.

    2013-01-01

    The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that is necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED

  13. The Application of materials attractiveness in a graded approach to nuclear materials security

    Energy Technology Data Exchange (ETDEWEB)

    Ebbinghaus, B. [Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551 (United States); Bathke, C. [Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Dalton, D.; Murphy, J. [National Nuclear Security Administration, US Department of Energy, 1000 Independent Ave., S. W. Washington, DC 20585 (United States)

    2013-07-01

    The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that is necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.

  14. 20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables

    Directory of Open Access Journals (Sweden)

    Jaggard Aaron D.

    2015-04-01

    Full Text Available Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions and use them to improve their security. To illustrate this system, we present two novel types of adversaries. First, we study a powerful, pervasive adversary that can compromise an unknown number of Autonomous System organizations, Internet Exchange Point organizations, and Tor relay families. Second, we initiate the study of how an adversary might use Mutual Legal Assistance Treaties (MLATs to enact surveillance. As part of this, we identify submarine cables as a potential subject of trust and incorporate data about these into our MLAT analysis by using them as a proxy for adversary power. Finally, we present preliminary experimental results that show the potential for our trust framework to be used by Tor clients and services to improve security.

  15. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  16. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  17. Tamper-Proof Circuits : : How to Trade Leakage for Tamper-Resilience

    DEFF Research Database (Denmark)

    Faust, Sebastian; Pietrzak, Krzysztof; Venturi, Daniele

    2011-01-01

    Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler...... complex computation to protecting simple components....... that transforms any circuit into a new circuit with the same functionality, but which is resilient against a well-defined and powerful tampering adversary. More concretely, our transformed circuits remain secure even if the adversary can adaptively tamper with every wire in the circuit as long as the tampering......-box access to the original circuit and log(q) bits of additional auxiliary information. Thus, if the implemented cryptographic scheme is secure against log(q) bits of leakage, then our implementation is tamper-proof in the above sense. Surprisingly, allowing for this small amount of information leakage...

  18. Bounded Tamper Resilience

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Faust, Sebastian; Mukherjee, Pratyay

    2013-01-01

    Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain algebraic induced key relations, e.......g., affine functions or polynomials of bounded degree. In this work, we show that it is possible to go beyond the algebraic barrier and achieve security against arbitrary key relations, by restricting the number of tampering queries the adversary is allowed to ask for. The latter restriction is necessary......-protocols (including the Okamoto scheme, for instance) are secure even if the adversary can arbitrarily tamper with the prover’s state a bounded number of times and obtain some bounded amount of leakage. Interestingly, for the Okamoto scheme we can allow also independent tampering with the public parameters. We show...

  19. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  20. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  1. Device-independence for two-party cryptography and position verification

    DEFF Research Database (Denmark)

    Ribeiro, Jeremy; Thinh, Le Phuc; Kaniewski, Jedrzej

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position......-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which...... security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary...

  2. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  3. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    Science.gov (United States)

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  4. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  5. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  7. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    Science.gov (United States)

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  8. Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Damgård, Ivan Bjerre

    2010-01-01

    generation protocol. In the final part of the paper we show how one can, in zero-knowledge - prove knowledge of the plaintext contained in a given ciphertext from Regev's original cryptosystem or our variant. The proof is of size only a constant times the size of the public key....... a very efficient and non-interactive decryption protocol. We prove the threshold cryptosystem secure against passive adversaries corrupting all but one of the players, and againts active adversaries corrupting less than one third of the players. We also describe how one can build a distributed key...

  9. Executive summary of safeguards systems concepts for nuclear material transportation. Final report

    International Nuclear Information System (INIS)

    Baldonado, O.C.; Kevany, M.; Rodney, D.; Pitts, D.; Mazur, M.

    1977-09-01

    The U.S. Nuclear Regulatory Commission contracted with System Development Corporation to develop integrated system concepts for the safeguard of special strategic nuclear materials (SSNM), which include plutonium, uranium 233 and uranium 235 of at least 20 percent enrichment, against malevolent action during interfacility transport. This executive summary outlines the conduct and findings of the project. The study was divided into three major subtasks: (1) The development of adversary action sequences; (2) The assessment of the vulnerability of the transport of nuclear materials to adversary action; (3) The development of conceptual safeguards system design requirements to reduce vulnerabilities

  10. Physical security system effectiveness evaluation, a status report

    International Nuclear Information System (INIS)

    Todd, J.L. Jr.; Nickell, W.C.

    1975-07-01

    A method to permit objective comparisons of physical security is under development and is expected to be useful in the optimization of system design and in cost benefit analysis. The procedure involves identifying the possible or potential characteristics of a postulated adversary, the countermeasures to deny or diminish adversary success, and the response capabilities of the defender. These, in conjunction with system definition information, are evaluated by the use of analytical models which provide a means of ranking systems against threats. This paper describes the status of this effort and includes an overview of the methodology with a brief description of various models being considered for use in effectiveness evaluation. (U.S.)

  11. The effect of the guard location in a nuclear facility on performance criteria

    International Nuclear Information System (INIS)

    Lee, Hyun-Chul; Hwang, In-Koo; An, Jin-Soo

    2002-01-01

    Full text: The major functions of a physical protection system (PPS) are detection, delay, and response. Detection function is mainly to sense an adversary's intrusion and assess alarm events, and its physical implementation includes intrusion sensors, alarm communication systems and entry control facilities. Delay function can be accomplished through various passive and active barriers, makes adversary's advance toward his goal slow. Response function is to practically stop adversary actions. There are response guards responsible for the response function in a nuclear facility. They can be located at one or more posts to take action against adversary's progress after alarm occurred. The mostly used quantitative effectiveness measure of a PPS is the probability of interruption (PI) derived from delay time after detection and guard response time. Delay time is a variable dependent on adversary's capabilities and guard response time varies with the distance between a guard post and destination to be dispatched. According to the advanced technology of digital computing, software programs such as SAVI (System Analysis of Vulnerability to Intrusion) provide PI based on user input including adversary capability, protective elements, guard response time, and other PPS information. However guard response time is considered as a constant not a variable. That means same guard response time is always set regardless of the variable guard travel time from a post to a location where guards can interrupt the adversary's action. Since the location of guards may be easily changed in contrast to detection elements or delay elements and can be considered as a flexible mean against temporarily upgraded threat, a trial to investigate the changes of PI and CDP (Critical Detection Point) in case that guard response time is a variable was started. We defined several detection and delay elements along an adversary intrusion path and guard travel times as many as the number of detection

  12. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  13. R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises

    Science.gov (United States)

    2017-09-11

    without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to...2.1 Environment 3 2.2 Adversary 4 2.3 Communications 4 2.4 Tactics 5 2.5 Roles 5 3 Case Study – Cyber Forge 11 7 3.1 Environment 7 3.2...Adversary 8 3.3 Communications 9 3.4 Tactics 10 3.5 Roles 11 4 Conclusion 13 References 14 CMU/SEI-2017-TR-005 | SOFTWARE ENGINEERING INSTITUTE

  14. The art of negotiation. A delicate balance.

    Science.gov (United States)

    Rehberg, C; Sullivan, G

    1997-01-01

    Successful negotiation is the art of gentle persuasion, not a "winner-take-all" showdown. Accordingly, it is essential to begin the process with a positive outlook and with the goal of reaching an agreement that is acceptable to all parties involved. Although the term "opponent" is used in this article to describe the person or group with whom you are negotiating, it is not used in the adversarial context. It is important to maintain a non-adversarial relationship, to the extent possible.

  15. Asynchronous Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel

    2009-01-01

    guarantees termination if the adversary allows a preprocessing phase to terminate, in which no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting...... less than n/3 players. We also present a software framework for implementation of asynchronous protocols called VIFF (Virtual Ideal Functionality Framework), which allows automatic parallelization of primitive operations such as secure multiplications, without having to resort to complicated...... multithreading. Benchmarking of a VIFF implementation of our protocol confirms that it is applicable to practical non-trivial secure computations....

  16. Interactive animation of fault-tolerant parallel algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Apgar, S.W.

    1992-02-01

    Animation of algorithms makes understanding them intuitively easier. This paper describes the software tool Raft (Robust Animator of Fault Tolerant Algorithms). The Raft system allows the user to animate a number of parallel algorithms which achieve fault tolerant execution. In particular, we use it to illustrate the key Write-All problem. It has an extensive user-interface which allows a choice of the number of processors, the number of elements in the Write-All array, and the adversary to control the processor failures. The novelty of the system is that the interface allows the user to create new on-line adversaries as the algorithm executes.

  17. Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Isobe, Takanori; Tischhauser, Elmar Wolfgang

    2016-01-01

    Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted environment where the adversary has full access to their implementation. Typical security goals for whitebox cryptography include key extraction security and decomposition security: Indeed, it should...... the practical requirements to whitebox cryptography in real-world applications such as DRM or mobile payments. Moreover, we formalize resistance towards decomposition in form of weak and strong space hardness at various security levels. We obtain bounds on space hardness in all those adversarial models...... real-world applications with whitebox cryptography....

  18. Practical Leakage-Resilient Symmetric Cryptography

    DEFF Research Database (Denmark)

    Faust, Sebastian; Pietrzak, Krzysztof; Schipper, Joachim

    2012-01-01

    Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount of arbitr......Leakage resilient cryptography attempts to incorporate side-channel leakage into the black-box security model and designs cryptographic schemes that are provably secure within it. Informally, a scheme is leakage-resilient if it remains secure even if an adversary learns a bounded amount...

  19. Controlling chaotic transients: Yorke's game of survival

    DEFF Research Database (Denmark)

    Aguirre, Jacobo; D'ovidio, Francesco; Sanjuán, Miguel A. F.

    2004-01-01

    . This problem is focused as a two-person, mathematical game between two players called "the protagonist" and "the adversary." The protagonist's goal is to survive. He can lose but cannot win; the best he can do is survive to play another round, struggling ad infinitum. In the absence of actions by either player...... knows the action of the adversary in choosing his response and is permitted to choose the initial point x(0) of the game. We use the "slope 3" tent map in an example of this problem. We show that it is possible for the protagonist to survive....

  20. Server-Aided Two-Party Computation with Simultaneous Corruption

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; Ranellucci, Samuel

    We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal composab......We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal...

  1. Fault tree and reliability relationships for analyzing noncoherent two-state systems

    International Nuclear Information System (INIS)

    Alesso, H.P.; Benson, H.J.

    1980-01-01

    Recently, there has been interest in analyzing the noncoherent interactions that result from adversary theft of special nuclear material from reprocessing facilities. The actions of the adversary, acting in conflict with the reprocessing facility's material control and accounting system, may be viewed as a single noncoherent structure. This paper develops a basis for analyzing noncoherent structures by decomposing them into coherent subsystems. Both reliability and fault tree structure functions are used for this analysis. In addition, a bounding criterion is established for the reliability of statistically dependent noncoherent structures. (orig.)

  2. Efficient, Robust and Constant-Round Distributed RSA Key Generation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Mikkelsen, Gert Læssøe

    2010-01-01

    We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number.......We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one iteration of the underlying primality test on each candidate number....

  3. Personal and organizational predictors of workplace sexual harassment of women by men.

    Science.gov (United States)

    Dekker, I; Barling, J

    1998-01-01

    The authors investigated the predictors of workplace sexual harassment in 278 male university faculty and staff (M age = 45 years). Workplace variables (perceptions of organizational sanctions against harassment and perceptions of a sexualized workplace) and personal variables (adversarial sexual beliefs, sexual harassment beliefs, perspective taking, and self-esteem) were studied as predictors of sexualized and gender harassment. Social desirability was controlled. Both organizational variables and beliefs about sexual harassment predicted gender harassment and sexualized harassment. Perspective taking, adversarial sexual beliefs, and sexual harassment beliefs moderated the effects of perceived organizational sanctions against harassment on sexualized harassment. Findings are discussed as they relate to organizational efforts to reduce or prevent sexual harassment.

  4. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  5. Societal risk approach to safeguards design and evaluation

    International Nuclear Information System (INIS)

    Murphey, W.M.; Sherr, T.S.; Bennett, C.A.

    1975-01-01

    A comprehensive rationale for safeguards design and evaluation, and a framework for continuing systematic assessment of the system's effectiveness and efficient allocation of available safeguards resources for balanced protection, were developed. The societal risk approach employed considers the likelihood of successful destructive acts involving nuclear materials or facilities and the magnitude of the effects on society. The safeguards problem is described in terms of events affecting societal risk and adversary actions. Structure of the safeguards system and the evaluation of its adequacy are discussed. Adversary characteristics are also discussed

  6. Quantum hashing is maximally secure against classical leakage

    OpenAIRE

    Huang, Cupjin; Shi, Yaoyun

    2017-01-01

    Cryptographic hash functions are fundamental primitives widely used in practice. For such a function $f:\\{0, 1\\}^n\\to\\{0, 1\\}^m$, it is nearly impossible for an adversary to produce the hash $f(x)$ without knowing the secret message $x\\in\\{0, 1\\}^n$. Unfortunately, all hash functions are vulnerable under the side-channel attack, which is a grave concern for information security in practice. This is because typically $m\\ll n$ and an adversary needs only $m$ bits of information to pass the veri...

  7. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyonam; Kim, So Young; Yim, Mansung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Schneider, Erich [Univ. of Texas at Austin, Texas (United States)

    2014-05-15

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  8. Results of a directed graph and fault tree assessment of a MC and A system

    International Nuclear Information System (INIS)

    Gilman, F.M.; Lambert, H.E.; Lim, J.J.

    1978-01-01

    An assessment of the effectiveness of the Material Control and Accounting System (MC and A) in a hypothetical nuclear facility, the TEST BED is presented. The key in assessing the TEST BED is the generation of adversary event sets. The adversary event sets are generated and analyzed by a directed graph (digraph) and fault tree procedure. Although the TEST BED is a system hardened against SNM theft, the assessment of the TEST BED finds several major weaknesses, and also indicates possible modifications to correct these weaknesses

  9. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  10. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    International Nuclear Information System (INIS)

    Kim, Kyonam; Kim, So Young; Yim, Mansung; Schneider, Erich

    2014-01-01

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  11. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  12. Security of the AES with a Secret S-Box

    DEFF Research Database (Denmark)

    Tiessen, Tyge; Knudsen, Lars Ramkilde; Kölbl, Stefan

    2015-01-01

    How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of encryption rounds? In this paper, we demonstrate attacks based on integral cryptanalysis which allow to recover both the secret...... key and the secret S-box for respectively four, five, and six rounds of the AES. Despite the significantly larger amount of secret information which an adversary needs to recover, the attacks are very efficient with time/data complexities of 217/216, 238/240 and 290/264, respectively. Another...

  13. Den tavse venstrefløjspolitik

    DEFF Research Database (Denmark)

    Dyrberg, Torben Bech

    2012-01-01

    , leftists have been keen to silence political adversaries by advocating the censoring of the freedom of speech, which is particularly evident during the cartoon crisis 2005/6 and in cases of hate speech. These two aspects of the politics of silence – to remain silent and to silence others – have been...... legitimized in three ways. First, by displacing the question of freedom of speech from a political right to a morality of empathy; second, by moralizing and antagonizing the political climate in good/evil, which stigmatizes the adversary; and finally, calling for self-censorship and censorship of those who do...

  14. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  15. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  16. Nuclear reactors for electric power generation

    International Nuclear Information System (INIS)

    Hoogenboom, J.E.

    1987-01-01

    In this article the operation of a nuclear power plant, the status quo about the application of nuclear energy in the world are explained, the subjects of discussion between supporters and adversaries nowadays and the prospects for prolonged usage of nuclear power are summarized, viewed from the actual technical possibilities. 2 refs.; 7 figs.; 2 tabs

  17. Joint Urban Operations

    Science.gov (United States)

    2009-11-08

    travel routes, holidays, festivals, sports, and other events; climate and weather; and water. Planning Planning must give appropriate weight...they can be manipulated rather easily, they are militarily significant. (1) Physical patterns such as market locations and travel routes may provide...cycle, cutting or controlling intercity and intracity mobility and communications, triggering an adversary response, or positioning forces to conduct

  18. Cutting the Cord: Discrimination and Command Responsibility in Autonomous Lethal Weapons

    Science.gov (United States)

    2014-02-13

    subjects for study in relation to ALW. Many would object to the use of an all-machine army against human adversaries as prima facie unethical or...Employ Uninhabited Aerial Vehicles”, Journal of Military Ethics Vol. 9, No. 4, (2010) 342-368. Strawser asserts that there is an ethical obligation

  19. Corporate Social Responsibility: Case Study of Community Expectations and the Administrative Systems, Niger Delta

    Science.gov (United States)

    Ogula, David

    2012-01-01

    Poor community-company relations in the Niger Delta have drawn attention to the practice of corporate social responsibility (CSR) in the region. Since the 1960s, transnational oil corporations operating in the Niger Delta have adopted various CSR strategies, yet community-company relations remain adversarial. This article examines community…

  20. Towards Mining Latent Client Identifiers from Network Traffic

    Directory of Open Access Journals (Sweden)

    Jain Sakshi

    2016-04-01

    Full Text Available Websites extensively track users via identifiers that uniquely map to client machines or user accounts. Although such tracking has desirable properties like enabling personalization and website analytics, it also raises serious concerns about online user privacy, and can potentially enable illicit surveillance by adversaries who broadly monitor network traffic.

  1. Computer-aided proofs for multiparty computation with active security

    DEFF Research Database (Denmark)

    Spitters, Bas

    2018-01-01

    public-key encryption, signatures, garbled circuits and differential privacy. Here we show for the first time that it can also be used to prove security of MPC against a malicious adversary. We formalize additive and replicated secret sharing schemes and apply them to Maurer’s MPC protocol for secure...

  2. Optimal Resilient Dynamic Dictionaries

    DEFF Research Database (Denmark)

    Jørgensen, Allan Grønlund; Brodal, Gerth Stølting; Moruz, Gabriel

    2007-01-01

    We investigate the problem of computing in the presence of faults that may arbitrarily (i.e., adversarially) corrupt memory locations. In the faulty memory model, any memory cell can get corrupted at any time, and corrupted cells cannot be distinguished from uncorrupted ones. An upper bound $\\del...

  3. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    Critical infrastructure models, strategies and policies should take information ... gain an advantage over a competitor or adversary through the use of one's own .... digital communications system, where the vehicles are analogous to bits or packets, ..... performance degraded, causing an increase in traffic finding a new route.

  4. WMD Intent Identification and Interaction Analysis Using the Dark Web

    Science.gov (United States)

    2016-04-01

    understanding the intent and interaction patterns among adversarial parties. The basic research questions are grounded on computational linguistics ...relationships between the virtual and real measures. Research Hypotheses Based on the literature , several expectations were established regarding the...group’s geographic location, will have an influence on the 6 virtual behaviors of groups. Previous literature has suggested that certain social

  5. USAF Posture Statement 2013

    Science.gov (United States)

    2013-04-12

    request maintains investments in the DCGS, the MQ-1 Predator, the RC-135 Rivet Joint, the RQ-4 Global Hawk Block 40, and U-2 programs, and makes internal... electromagnetic jamming. Our potential adversaries are also making advances by electronically linking their own combat capabilities, creating new military

  6. Soldier-Portable Battery Supply: Foreign Dependence and Policy Options

    Science.gov (United States)

    2014-01-01

    private firm, the Sociedad Quimica y Minera (SQM) de Chile. Across the border in Bolivia, the Salar de Uyuni, which is the largest salt flat in the...on analyzing the U.S.-China military balance, as well as developing strategies for dealing with nuclear -armed regional adversaries and performing an

  7. Project 1946

    Science.gov (United States)

    2007-12-01

    casualties of that war. During the Battle of the Somme in July 1916, Haig recorded in his diaries how he was (Continued on the next page.) Part 1...Thirteen Planning for an Iranian Adversary • Iranian Structure • 2003 and Iranian Strategy • Aya - tollah as Executive • Iranian Military Development

  8. On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Tischhauser, Elmar

    2014-01-01

    estimates. Our study suggests that the efficiency of Matsui’s Algorithm 2 has been previously somewhat overestimated in the cases where the adversary attempts to use a linear approximation with a low bias, to attain a high computational advantage over brute force, or both. These cases are typical since...

  9. A Response to Eze's critique of Wiredu's consensual democracy ...

    African Journals Online (AJOL)

    The question of what political system best suites post colonial/independent. African states remain alive and ever more pertinent particularly in the face of failed attempts at democratisation. Kwasi Wiredu notes that the adversarial nature of Western democratic practices along party political lines may not be well suited for ...

  10. Safeguards system design methodology

    International Nuclear Information System (INIS)

    Cravens, M.N.; Winblad, A.E.

    1977-01-01

    Sandia Laboratories is developing methods for the design of physical protection systems to safeguard special nuclear material and vital equipment at fixed sites. One method is outlined and illustrated with simplified examples drawn from current programs. The use of an adversary sequence diagram as an analysis tool is discussed

  11. Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks

    NARCIS (Netherlands)

    Skoric, B.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2013-01-01

    The concept of quantum-secure readout of Physical Unclonable Functions (PUFs) has recently been realized experimentally in an optical PUF system. We analyze the security of this system under the strongest type of classical attack: the challenge estimation attack. The adversary performs a measurement

  12. Investigative Journalism and the Legitimation of Moral Order.

    Science.gov (United States)

    Glasser, Theodore L.; Ettema, James S.

    Investigative journalists long have had an adversarial relationship with powerful institutions and those in public office, stemming from the "righteously indignant" reporters of the early nineteenth century penny presses who guarded the interests of the public. Currently, investigative journalists are in a difficult position if they have…

  13. Strategic alliances in oil and gas industry

    International Nuclear Information System (INIS)

    Crump, J.G.

    1998-01-01

    A competitor today is an ally tomorrow. A strategic partner in one market is an adversary in another. In this radically new way of doing business, the oil and gas industry seems quite at home. The trend to mergers is not unique to the oil industry, what is unique is the knack of petroleum companies to form strategic alliances [it

  14. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  15. 78 FR 699 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2013-01-04

    .... FOR FURTHER INFORMATION CONTACT: Ms. B. English, DSCA/DBO/CFM, (703) 601-3740. The following is a copy... workstation and a C2 workstation. The primary difference between the LRE and MCE is the lack of any wide-band... documentation are Unclassified. 2. If a technologically advanced adversary were to obtain knowledge of the...

  16. Gendered Practices in the Contemporary Workplace: A Critique of What Often Constitutes Front Page News in "The Wall Street Journal."

    Science.gov (United States)

    Buzzanell, Patrice M.

    2001-01-01

    Analyzes and critiques a front-page article in the "Wall Street Journal." Finds that, underlying an image of fun and equitable workplace, is a disquieting depiction of adversarial gendered relationships, and of career advice that can damage the competence assessments and long-term advancement of women. (SR)

  17. 217 An International Multi-Disciplinary Journal, Ethiopia Vol. 4 (1 ...

    African Journals Online (AJOL)

    FIRST LADY

    An alternative structure exist when a party does not perceive sufficiently important interest .... Considering the grand strategies of the superpowers during the cold war,. Freiberg .... the two adversaries; how they construct and interpret reality; and the. “bounded ... to loss… it can only make people behave to avoid it. The only.

  18. Terra Nullius: Frontiers and the Rise of Great Powers Within International Systems

    Science.gov (United States)

    2015-05-01

    irresistible (McDonald’s franchise ). The United States began as a humble assortment of overseas colonial holdings. In a span of two centuries, the...adversaries. Value differences between sovereign homeland and distant holdings enabled US negotiators to buy hundreds of thousands of square miles of

  19. Joint Operating Environment 2035: The Joint Force in a Contested and Disordered World

    Science.gov (United States)

    2016-07-14

    for technological parity as well as designing innovative mixes of high and low technology that may allow adversaries to more effectively challenge... equally or perceive they are being treated unequally. Conversely, tension between the aspirations and goals of majority and minority populations...their identity in many ways, including religion, ethnicity, race, language, gender , tribe, class, occupation, geography, and nationality. Increasingly

  20. Joint Operating Environment: The Joint Force in a Contested and Disordered World

    Science.gov (United States)

    2016-07-14

    for technological parity as well as designing innovative mixes of high and low technology that may allow adversaries to more effectively challenge... equally or perceive they are being treated unequally. Conversely, tension between the aspirations and goals of majority and minority populations...their identity in many ways, including religion, ethnicity, race, language, gender , tribe, class, occupation, geography, and nationality. Increasingly

  1. The Joint Force in a Contested and Disordered World

    Science.gov (United States)

    2016-07-14

    for technological parity as well as designing innovative mixes of high and low technology that may allow adversaries to more effectively challenge... equally or perceive they are being treated unequally. Conversely, tension between the aspirations and goals of majority and minority populations...their identity in many ways, including religion, ethnicity, race, language, gender , tribe, class, occupation, geography, and nationality. Increasingly

  2. A hybrid lattice basis reduction and quantum search attack on LWE

    NARCIS (Netherlands)

    Göpfert, F.; Van Vredendaal, C.; Wunderer, T.

    2017-01-01

    Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parameter sets aiming for concrete post-quantum security levels. Security evaluations of such schemes need to include all possible attacks, in particular those by quantum adversaries. In the case of

  3. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and......, hopefully, to enhance the level of security provided by these solutions even further....

  4. Conflict: How to Beat the Odds.

    Science.gov (United States)

    Anderson, Patricia L.

    1993-01-01

    Conflict between people can arise over breakdowns in communication, work policies and practices, adversarial management, and personality conflict. A conflict-resolution plan involves defining the problem, collecting the facts and opinions, considering all solutions proposed, implementing the solutions, and evaluating the situation. (MLF)

  5. Perceptions of the News Media's Societal Roles: How the Views of U.K. Journalism Students Changed during Their Education

    Science.gov (United States)

    Hanna, Mark; Sanders, Karen

    2012-01-01

    A longitudinal study of U.K. journalism undergraduates records how their attitudes on societal roles of the news media changed during university education. Students became more likely to endorse an adversarial approach toward public officials and businesses as extremely important. Yet students did not support these roles as strongly as an older…

  6. Chemical ecology of the Thysanoptera

    Science.gov (United States)

    Murray S. Blum

    1991-01-01

    The chemical ecology of the Thysanoptera is identified with a variety of natural products discharged in anal droplets during confrontations with adversaries. These exudates are fortified with defensive allomones that may function as repellents, contact irritants, or in some cases, fumigants. Thrips synthesize a large diversity of allomonal products that include...

  7. 7 CFR 1.185 - Standards for awards.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Standards for awards. 1.185 Section 1.185 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Procedures Relating to Awards Under the... the agency which led to the adversary adjudication, but does not include a recitation by the agency of...

  8. Cyberspace at the Operational Level: Warfighting In All Five Domains

    Science.gov (United States)

    2016-05-13

    exclusive , cyberspace capabilities and connections are everywhere. While innovation in space is possible through the imagination of a relative few, the...senior leaders rush to integrate and consolidate stovepiped cyberspace expertise scattered across DoD, our potential adversaries have the luxury of

  9. PIME '89 (Public Information Materials Exchange): International workshop on public information problems of nuclear energy

    International Nuclear Information System (INIS)

    1989-01-01

    Presentations included in this proceedings are describing the following; Mass media and public information on nuclear energy and radiation: striving for two-way confidence and understanding; case studies of different countries having developed nuclear programs, problems of communication between nuclear promoters and/or operators and its adversaries; public attitude concerning nuclear power; different attitudes of men and women

  10. Dynamic analysis of nuclear safeguards systems

    International Nuclear Information System (INIS)

    Wilson, J.R.; Rasmuson, D.M.; Tingey, F.H.

    1978-01-01

    The assessment of the safeguards/adversary system poses a unique challenge as evolving technology affects the capabilities of both. The method discussed meets this challenge using a flexible analysis which can be updated by system personnel. The automatically constructed event tree provides a rapid overview analysis for initial assessment, evaluation of changes, cost/benefit study and inspection and audit

  11. A Lesson of Two World Wars: Protect the Ship, not the SLOCs

    National Research Council Canada - National Science Library

    Pillsbury, James

    2001-01-01

    ... hands of the United States' potential adversaries. The enduring lesson of both World Wars was that it took time for the Allies to realize that technology was not the anti-submarine panacea it had been hoped to be, and it was the age-old practice...

  12. Generic physical protection logic trees

    International Nuclear Information System (INIS)

    Paulus, W.K.

    1981-10-01

    Generic physical protection logic trees, designed for application to nuclear facilities and materials, are presented together with a method of qualitative evaluation of the trees for design and analysis of physical protection systems. One or more defense zones are defined where adversaries interact with the physical protection system. Logic trees that are needed to describe the possible scenarios within a defense zone are selected. Elements of a postulated or existing physical protection system are tagged to the primary events of the logic tree. The likelihood of adversary success in overcoming these elements is evaluated on a binary, yes/no basis. The effect of these evaluations is propagated through the logic of each tree to determine whether the adversary is likely to accomplish the end event of the tree. The physical protection system must be highly likely to overcome the adversary before he accomplishes his objective. The evaluation must be conducted for all significant states of the site. Deficiencies uncovered become inputs to redesign and further analysis, closing the loop on the design/analysis cycle

  13. Learning from contemporary examples in Africa: Referral ...

    African Journals Online (AJOL)

    Tanzania is one of the jurisdictions in Africa that follow an adversarial criminal justice system. Despite a number of problems associated with the fact that the criminal justice system overutilises imprisonment, there is still a lack of diversionary measures to complement the system. This article investigates restorative justice as ...

  14. Views of United States Physicians and Members of the American Medical Association House of Delegates on Physician-assisted Suicide.

    Science.gov (United States)

    Whitney, Simon N.; Brown, Byron W.; Brody, Howard; Alcser, Kirsten H.; Bachman, Jerald G.; Greely, Henry T.

    2001-01-01

    Ascertained the views of physicians and physician leaders toward legalization of physician-assisted suicide. Results indicated members of AMA House of Delegates strongly oppose physician-assisted suicide, but rank-and-file physicians show no consensus either for or against its legalization. Although the debate is adversarial, most physicians are…

  15. 12 CFR 263.102 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Prevailing party. 263.102 Section 263.102 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES... Prevailing party. Only an eligible applicant that prevailed on the merits of an adversary proceeding may...

  16. 12 CFR 308.173 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Prevailing party. 308.173 Section 308.173 Banks....173 Prevailing party. (a) General rule. An eligible applicant who, following an adversary adjudication has gained victory on the merits in the proceeding is a “prevailing party”. An eligible applicant may...

  17. Increased cooperation through immediate post contractual negotiation

    NARCIS (Netherlands)

    Meijers, Stephan; Doree, Andries G.; Boes, Johan

    2014-01-01

    Traditional contracting has been largely shown to cause adversarial relationships between client and contractor in the construction sector. This leads to claims during construction by contractors, which increase transaction costs for both parties in the form of policing and enforcement costs. In

  18. Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW

    Science.gov (United States)

    2017-12-01

    from Kyiv to Boryslav, a targeted bombing resulted in the successful 17 The Army Cyber Institute at West Point...electromagnetic ( EM ) emissions has proved extremely successful at the tactical level against Ukrainian forces. While tactical cyber looks at content, EW...against Ukrainian personnel. The use by Ukrainian forces of devices with EM broadcasting enabled adversary tracking of individual devices or volumes

  19. DoD CIO Annual Information Assurance Report

    National Research Council Canada - National Science Library

    2000-01-01

    .... The adversary can be a lone hacker either out for a thrill or with a grudge against the U.S. government, a member of a state-supported cyber-warfare group, or a cyber-terrorist driven by ideology, religion, or money...

  20. 76 FR 10926 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-02-28

    ..., Chief Financial Officer dated September 8, 2010 (``Georgetown, Texas Letter''); and Portland Letter... the financial advisor are separate, adversarial roles and cannot be provided by the same party.'' One..., President and Chief Executive Officer dated September 29, 2010 (``D.A. Davidson Letter''); and J.J.B...

  1. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  2. Kerkhoff v Minister of Justice and Constitutional Development 2011 ...

    African Journals Online (AJOL)

    General consensus exists that the adversarial nature of the South African criminal procedure with its often aggressive cross-examination of a witness, sometimes by an accused himself, will in most cases expose a child to undue mental stress or suffering when having to testify in court. In confirmation of this fact and with a ...

  3. The Complexity of Threats to Nuclear Strategic Deterrence Posture

    Science.gov (United States)

    2017-02-07

    India and Pakistan, and concludes “…South Asian nuclear adversaries are believed to make each of the four dangers of inadvertent use of nuclear...directed energy, unmanned systems, and artificial intelligence ( AI ).”50 Ultimately, the promulgation of either of these technologies in a mature or

  4. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152 RTG

    Science.gov (United States)

    2018-04-18

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  5. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Science.gov (United States)

    2018-04-01

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  6. Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop

    Science.gov (United States)

    2015-12-01

    simulation) perspective. This would be natural, considering that the cybersecurity problem is highly adversarial in nature. Because it involves intelligent ...be formulated as a partial information game; artificial intelligence techniques might help here. Yet another style of problem formulation that...computational information processing for weapons, intelligence , communication, and logistics systems continues to increase the vulnerability of

  7. Proactive malware detection

    Science.gov (United States)

    Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty

    2014-06-01

    Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.

  8. 12 CFR 308.172 - Eligibility of applicants.

    Science.gov (United States)

    2010-01-01

    ... for remuneration for the applicant, under its direction and control, on the date the adversary... indirectly owns or controls a majority of the voting shares. The Board of Directors may, however, on the... addition, the Board of Directors may determine that financial relationships of the applicant other than...

  9. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  10. Natural-Born Arguers: Teaching How to Make the Best of Our Reasoning Abilities

    Science.gov (United States)

    Mercier, Hugo; Boudry, Maarten; Paglieri, Fabio; Trouche, Emmanuel

    2017-01-01

    We summarize the argumentative theory of reasoning, which claims that the main function of reasoning is to argue. In this theory, argumentation is seen as being essentially cooperative (people have to listen to others' arguments and be ready to change their mind) but with an adversarial dimension (their goal as argument producers is to convince).…

  11. Child Custody Evaluations: A Rational Process for an Emotion-Laden Event.

    Science.gov (United States)

    Barnard, Charles P.; Jenson, Gust, III

    1984-01-01

    Presents a consultation model that can serve to diminish the destructive impact of the adversarial process in child custody decisions. The process and procedures described are consonant with what most state statutes suggest as criteria for consideration in custody decisions and promote the best interests of the children. (JAC)

  12. “You are my rock and fortress”. Refuge metaphors in Psalm 31. a ...

    African Journals Online (AJOL)

    The psalms of lamentation are prayers of a beleaguered individual or nation. The one under constant attack of the enemy has no other option but to implore the deity to intervene on his behalf. Yahweh is invoked to save the supplicant and to destroy the adversaries. Apart from this recurrent plea, Yahweh is often depicted as ...

  13. A Remedy to Crises: Danish Special Operations Forces in Whole-of-Government Stabilization Engagements

    Science.gov (United States)

    2016-06-01

    special operations forces, capacity building, state building 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT... psychology , beliefs (such as religion), and behaviors.”66 This knowledge is essential for decision makers who maneuver not only against adversaries, but...To further influence and inform target audiences, the military uses a variety of information-operation capabilities, including psychological

  14. Quantum tagging for tags containing secret classical data

    International Nuclear Information System (INIS)

    Kent, Adrian

    2011-01-01

    Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finite key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.

  15. Military Sealift Command’s Combat Logistics Force in Contested Environments

    Science.gov (United States)

    2017-05-12

    of Japan, the South China Sea, the Persian Gulf, the Bab-El- Mandeb, and the Black Sea.4F5 Each adversary is rapidly developing the capability and...RI and a 2006 graduate of the U.S. Merchant Marine Academy at Kings Point, NY. Kutkiewicz resides in Hingham, MA with his wife and daughter.

  16. Quasiregularity and Its Discontents: The Legacy of the Past Tense Debate

    Science.gov (United States)

    Seidenberg, Mark S.; Plaut, David C.

    2014-01-01

    Rumelhart and McClelland's chapter about learning the past tense created a degree of controversy extraordinary even in the adversarial culture of modern science. It also stimulated a vast amount of research that advanced the understanding of the past tense, inflectional morphology in English and other languages, the nature of linguistic…

  17. Media conflicts : the complicated relationship between ‘media’ and ‘revolutions’

    NARCIS (Netherlands)

    2012-01-01

    Over the years, technological innovations have created new opportunities in conflict situations. Control of the media means not only the power to have your message heard, but also to drown out or disrupt the messages of your adversaries. Innovations like satellite communications, the internet (which

  18. PIME '89 (Public Information Materials Exchange): International workshop on public information problems of nuclear energy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-07-01

    Presentations included in this proceedings are describing the following; Mass media and public information on nuclear energy and radiation: striving for two-way confidence and understanding; case studies of different countries having developed nuclear programs, problems of communication between nuclear promoters and/or operators and its adversaries; public attitude concerning nuclear power; different attitudes of men and women.

  19. Threshold implementations : as countermeasure against higher-order differential power analysis

    NARCIS (Netherlands)

    Bilgin, Begül

    2015-01-01

    Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to several inputs and/or outputs of the algorithm.

  20. Generic physical protection logic trees

    Energy Technology Data Exchange (ETDEWEB)

    Paulus, W.K.

    1981-10-01

    Generic physical protection logic trees, designed for application to nuclear facilities and materials, are presented together with a method of qualitative evaluation of the trees for design and analysis of physical protection systems. One or more defense zones are defined where adversaries interact with the physical protection system. Logic trees that are needed to describe the possible scenarios within a defense zone are selected. Elements of a postulated or existing physical protection system are tagged to the primary events of the logic tree. The likelihood of adversary success in overcoming these elements is evaluated on a binary, yes/no basis. The effect of these evaluations is propagated through the logic of each tree to determine whether the adversary is likely to accomplish the end event of the tree. The physical protection system must be highly likely to overcome the adversary before he accomplishes his objective. The evaluation must be conducted for all significant states of the site. Deficiencies uncovered become inputs to redesign and further analysis, closing the loop on the design/analysis cycle.

  1. The role of social media in the intelligence cycle

    NARCIS (Netherlands)

    Forrester, B.; Hollander, K. den

    2016-01-01

    Social Media (SM) is a relatively new phenomenon. Intelligence agencies have been struggling to understand how to exploit the social pulse that flows from this source. The paper starts with a brief overview of SM with some examples of how it is being used by adversaries and how we might be able to

  2. Playing games with scenario- and resource-aware SDF graphs through policy iteration

    NARCIS (Netherlands)

    Yang, Yang; Geilen, M.C.W.; Basten, T.; Stuijk, S.; Corporaal, H.

    2012-01-01

    The two-player mean-payoff game is a well-known game theoretic model that is widely used, for instance in economics and control theory. For controller synthesis, a controller is modeled as a player while the environment, or plant, is modeled as the opponent player (adversary). Synthesizing an

  3. Intelligent agents for training on-board fire fighting

    NARCIS (Netherlands)

    Bosch, K. van den; Harbers, M.; Heuvelink, A.; Doesburg, W. van

    2009-01-01

    Simulation-based training in complex decision making often requires ample personnel for playing various roles (e.g. team mates, adversaries). Using intelligent agents may diminish the need for staff. However, to achieve goal-directed training, events in the simulation as well as the behavior of key

  4. 76 FR 60471 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2011-09-29

    ... friendly forces on an easy-to-understand relative position display. This proposed system will increase... situational awareness in any coalition operation. The United Arab Emirates will have no difficulty absorbing.... If a technologically advanced adversary were to obtain knowledge of the specific hardware and...

  5. High Power Radio Frequency Weapons: A Potential Counter to U.S. Stealth and Cruise Missile Technology

    National Research Council Canada - National Science Library

    Brunderman, John

    1999-01-01

    ... them. This paper examines the question of whether U.S. tactics or strategy will have to change with these systems in the hands of an adversary, assuming they were used in an integrated air defense role to counter U.S...

  6. Multiparty Computation from Threshold Homomorphic Encryption

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2001-01-01

    We introduce a new approach to multiparty computation (MPC) basing it on homomorphic threshold crypto-systems. We show that given keys for any sufficiently efficient system of this type, general MPC protocols for n parties can be devised which are secure against an active adversary that corrupts...

  7. Space – An Essential Feature of the Hybrid War

    Directory of Open Access Journals (Sweden)

    Ioniţă Dorin

    2017-03-01

    Full Text Available Hybrid Warfare is an unofficial intellectual construct to describe the combination or integration of conventional and non-conventional approaches used by adversaries to avoid conventional military strengths, often times occurring below the threshold that would trigger a conventional military.

  8. PVV en SP: ideologische tegenstanders met dezelfde voedingsbodem?

    NARCIS (Netherlands)

    Veul, Ilva; Flache, Andreas; Venema, Simon

    2016-01-01

    The right-wing PVV and the left-wing SP are seen as populist parties who are fierce ideological adversaries in the Dutch political spectrum. We study the similarities and differences in municipal contexts that explain their electoral success. Results of the 2010 national elections at the

  9. Framework for generating expert systems to perform computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1985-01-01

    At Los Alamos we are developing a framework to generate knowledge-based expert systems for performing automated risk analyses upon a subject system. The expert system is a computer program that models experts' knowledge about a topic, including facts, assumptions, insights, and decision rationale. The subject system, defined as the collection of information, procedures, devices, and real property upon which the risk analysis is to be performed, is a member of the class of systems that have three identifying characteristics: a set of desirable assets (or targets), a set of adversaries (or threats) desiring to obtain or to do harm to the assets, and a set of protective mechanisms to safeguard the assets from the adversaries. Risk analysis evaluates both vulnerability to and the impact of successful threats against the targets by determining the overall effectiveness of the subject system safeguards, identifying vulnerabilities in that set of safeguards, and determining cost-effective improvements to the safeguards. As a testbed, we evaluate the inherent vulnerabilities and risks in a system of computer security safeguards. The method considers safeguards protecting four generic targets (physical plant of the computer installation, its hardware, its software, and its documents and displays) against three generic threats (natural hazards, direct human actions requiring the presence of the adversary, and indirect human actions wherein the adversary is not on the premises-perhaps using such access tools as wiretaps, dialup lines, and so forth). Our automated procedure to assess the effectiveness of computer security safeguards differs from traditional risk analysis methods

  10. On the Runtime of Randomized Local Search and Simple Evolutionary Algorithms for Dynamic Makespan Scheduling

    DEFF Research Database (Denmark)

    Neumann, Frank; Witt, Carsten

    2015-01-01

    combinatorial optimization problem, namely makespan scheduling. We study the model of a strong adversary which is allowed to change one job at regular intervals. Furthermore, we investigate the setting of random changes. Our results show that randomized local search and a simple evolutionary algorithm are very...

  11. Factors that challenge health for people involved in the compensation process following a motor vehicle crash: A longitudinal study

    NARCIS (Netherlands)

    Elbers, N.A.; Akkermans, A.J.; Lockwood, K.; Craig, A.; Cameron, I.D.

    2014-01-01

    Background People who claim compensation after a motor vehicle accident do not recover as well as people with similar injuries who do not claim compensation. It has been suggested that this impeded recovery is caused by the stressful compensation process and the adversarial attitude of

  12. Cryptography In The Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Schaffner, Christian

    2005-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  13. Cryptography in the Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Serge, Fehr; Schaffner, Christian

    2008-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  14. Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts

    DEFF Research Database (Denmark)

    Alagic, Gorjan; Russell, Alexander

    2017-01-01

    Recent results of Kaplan et al., building on work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems can be completely broken by quantum chosen-plaintext attacks (qCPA). In such an attack, the quantum adversary has the ability to query the cryp...

  15. Friendly Alternatives to the Argumentative Essay.

    Science.gov (United States)

    Costanzo, William V.

    Many teachers would like to counter what Deborah Tannen calls "The Argument Culture." They recognize that teaching students traditional principles of argument may perpetuate the kind of adversarial thinking that erupts all too often: in aggressive newspaper headlines, on confrontational television shows, in court rooms, and in school…

  16. Strategic Studies Quarterly. Volume 4, Number 3, Fall 2010

    Science.gov (United States)

    2010-01-01

    political notions such as anarcho- syndicalism or communism. These are all reasons labor violence overturned so few economies and political orders of the...against cyber spies. Although some columnists seem to suggest that retaliation could keep adversaries from stealing military technology secrets,104

  17. Prediction of Audience Response from Spoken Sequences, Speech Pauses and Co-speech Gestures in Humorous Discourse by Barack Obama

    DEFF Research Database (Denmark)

    Navarretta, Costanza

    2017-01-01

    president mocks himself, his collaborators, political adversary and the press corps making the audience react with cheers, laughter and/or applause. The results of the prediction experiment demonstrate that information about spoken sequences, pauses and co-speech gestures by Obama can be used to predict...

  18. Russian Nuclear Power: an Instrument of Deterrence and Intimidation

    International Nuclear Information System (INIS)

    Marange, Celine

    2017-01-01

    Given current tensions with Western countries, nuclear power is assuming a new importance for Moscow. It serves as ever to compensate for the relative weakness of Russian forces in comparison to those of NATO and China. Furthermore, it increasingly serves as an intimidation to an adversary by demonstrating renewed power

  19. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of); Schneider, Erich [The University of Texas, Austin (United States)

    2015-05-15

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values.

  20. The Road from a Quick Reaction Capability to a Program of Record

    Science.gov (United States)

    2011-01-26

    Automated Biometric Identification System (DoD-ABIS) is to store, match, and share national biometric resources for adversary (red force) and neutral...Node Relationship Metrics 20090100021 28 MAJOR Mug Book and Lineups 20090100022 29 MAJOR US Persons Marking 20090100023 30 MAJOR Detention Data in

  1. Deterring Emergent Technologies

    Science.gov (United States)

    2016-01-01

    procedures , and location. At that point, the government has many options available to deter a potential adversary. Depending on the nature of the...cannot discern which actor in a lineup is the computer. The most recent event was in 2014, when “Eugene Goostman,” a chat bot designed by Vladimir

  2. What can we infer from beyond the data? The statistics behind the analysis of risk events in the context of environmental studies

    CSIR Research Space (South Africa)

    Khuluse, S

    2009-04-01

    Full Text Available trigger a chain of subsequent negative events. Such events are termed `risk events'. Extreme Value Theory (EVT) is a tool that attempts to best estimate the probability of adversarial risk events. There are several environmental studies where extreme value...

  3. Complex VLSI Feature Comparison for Commercial Microelectronics Verification

    Science.gov (United States)

    2014-03-27

    corruption , tampering and counterfeiting due to these technologies’ extremely sensitive purposes. Adversarial intervention in the IC design and...counterfeiting in its motive: whereas counterfeiting is usually motivated by greed , tampering is an act of espionage or sabotage [26]. Finally, poor

  4. 20 CFR 405.1 - Introduction.

    Science.gov (United States)

    2010-04-01

    ...-adversarial proceeding. In making a determination or decision on your claim, we conduct the administrative... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Introduction. 405.1 Section 405.1 Employees... before an administrative law judge. If you are dissatisfied with a decision made by the Federal reviewing...

  5. 75 FR 9323 - American Red Cross Month, 2010

    Science.gov (United States)

    2010-03-01

    ... rebuilding former adversaries after World War II, to combating HIV/AIDS in Africa, to saving lives after the... Nation's leadership relies upon our citizens who are motivated to act by our common humanity. This month... Constitution and the laws of the United States, do hereby proclaim March 2010 as American Red Cross Month. I...

  6. Privacy friendly aggregation of smart meter readings, even when meters crash

    NARCIS (Netherlands)

    Hoepman, J.H.

    2017-01-01

    A well studied privacy problem in the area of smart grids is the question of how to aggregate the sum of a set of smart meter readings in a privacy friendly manner, i.e., in such a way that individual meter readings are not revealed to the adversary. Much less well studied is how to deal with

  7. 75 FR 73014 - Notice of Public Meeting: Updating the Flight Instructor Renewal Process To Enhance Safety of Flight

    Science.gov (United States)

    2010-11-29

    ... confirmation of attendance and the number of members in the attending party. If we find that we are nearing... years. Even with the advent of new technologies to assist the GA pilot, there has been little... affect them. The meetings will be informal and non-adversarial. No individual will be subject to cross...

  8. Arvustused / Ahto-Lembit Lehtmets

    Index Scriptorium Estoniae

    Lehtmets, Ahto-Lembit

    2006-01-01

    Heliplaatidest: Satyricon "Now, Diabolica", Nitrous "Dominant Force", Ihsahn "Adversary", Keep Of Kalessin "Armada", Zyklon "Disintegrate", Enslaved "Ruun", Lacuna Coil "Karmacode", Sick Of It All "Death To Tyrants", Cult Of Luna "Somewhere Along the Highway", Scent Of Flesh "Become Malignity EP", Mythological Cold Towers "The Vanished Pantheon", Kalmah "The Black Waltz", Neglected Fields "Splenetic"

  9. Better for Both--Thoughts on Teacher-Pupil Interaction.

    Science.gov (United States)

    Kilburn, John

    1978-01-01

    To remove the adversary emphasis from pupil-teacher interactions, the author presents a simple model, showing how an intervention can potentially make a situation better, worse, or unchanged for the pupil and the teacher. A sample scenario is provided of two teachers dealing with a misbehaving child. (SJL)

  10. Linear-time non-malleable codes in the bit-wise independent tampering model

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); N.M. Döttling (Nico); I. Giacomelli (Irene); C. Xing (Chaoping)

    2017-01-01

    textabstractNon-malleable codes were introduced by Dziembowski et al. (ICS 2010) as coding schemes that protect a message against tampering attacks. Roughly speaking, a code is non-malleable if decoding an adversarially tampered encoding of a message m produces the original message m or a value m′

  11. Process of system design and analysis

    International Nuclear Information System (INIS)

    Gardner, B.

    1995-01-01

    The design of an effective physical protection system includes the determination of the physical protection system objectives, the initial design of a physical protection system, the evaluation of the design, and, probably, a redesign or refinement of the system. To develop the objectives, the designer must begin by gathering information about facility operations and conditions, such as a comprehensive description of the facility, operating states, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: Class of adversary, adversary's capabilities, and range of adversary's tactics. Next, the designer should identify targets. Determination of whether or not nuclear materials are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the materiaL The designer now knows the objectives of the physical protection system, that is, ''What to protect against whom.'' The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors, procedures, communication devices, and protective force personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working together to assure protection rather than regarding each feature separately. Due to the complexity of protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted

  12. Development of a statistically based access delay timeline methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversarys task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  13. Autoencoding beyond pixels using a learned similarity metric

    DEFF Research Database (Denmark)

    Larsen, Anders Boesen Lindbo; Sønderby, Søren Kaae; Larochelle, Hugo

    2016-01-01

    We present an autoencoder that leverages learned representations to better measure similarities in data space. By combining a variational autoencoder (VAE) with a generative adversarial network (GAN) we can use learned feature representations in the GAN discriminator as basis for the VAE reconstr...

  14. Restorative Justice as Social Justice for Victims of Gendered Violence: A Standpoint Feminist Perspective

    Science.gov (United States)

    van Wormer, Katherine

    2009-01-01

    This article provides an overview of restorative justice as a process and examines its relevance to women who have been victimized by physical and sexual abuse. The starting point is the justice system with its roots in adversarial, offender-oriented practices of obtaining justice. The widespread dissatisfaction by battered women and rape victims…

  15. Creating Schools of Peace and Nonviolence in a Time of War and Violence

    Science.gov (United States)

    Cavanagh, Tom

    2009-01-01

    In this post 9/11 era Western cultures are focusing on values that support war and violence. In this article an ethnographer explores the impact of these values on schools. These values, seen through the lens of restorative justice, include: (a) punishment, (b) adversarial relationships, (c) monopolization of power, (d) problemization and…

  16. Personality and Situational Factors Influencing the Advertising Sales Interaction.

    Science.gov (United States)

    Scarfo, Lauranell; Rogus, Mary T.

    Focusing on situational and personality factors as predictors of two common types of sales behavior (the customer-oriented/marketing approach, and the adversarial/bottom-line approach), a study conducted a national survey of advertising sales people and media buyers in the summer and fall of 1987. A total of 3669 questionnaires were sent to…

  17. Automating Cyber Defence Responses Using Attack-Defence Trees and Game Theory

    NARCIS (Netherlands)

    Jhawar, Ravi; Mauw, Sjouke; Zakiuddin, Irfan

    2016-01-01

    Cyber systems that serve government and military organizations must cope with unique threats and powerful adversaries. In this context, one must assume that attackers are continuously engaged in offence and an attack can potentially escalate in a compromised system. This paper proposes an approach

  18. 77 FR 13656 - Call for Papers: National Symposium on Moving Target Research

    Science.gov (United States)

    2012-03-07

    ... a dynamic attack surface to an adversary, increasing the work factor necessary to successfully attack and exploit a cyber target. Throughout the federal government, research related to MT has been... improvement in the defense of cyber systems (a game changer),'' including how to develop better measures of...

  19. Trust Management and Accountability for Internet Security

    Science.gov (United States)

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  20. Translating agency reform: rhetoric and culture in comparative perspective

    NARCIS (Netherlands)

    Smullen, A.

    2010-01-01

    Through comparative analysis this book examines and explains the official rhetoric of agency reform across consensus and adversarial political cultures. It traces the trajectory of talk about agency reform in The Netherlands, Sweden and Australia and identifies the national styles of speaking that