intentional attack
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 14)

H-INDEX

9
(FIVE YEARS 1)

2022 ◽  
Vol 9 ◽  
Author(s):  
Yanli Zou ◽  
Haoqian Li

Based on the community discovery method in complex network theory, a power grid partition method considering generator nodes and network weightings is proposed. Firstly, the weighted network model of a power system is established, an improved Fast-Newman hierarchical algorithm and a weighted modular Q function index are introduced, and the partitioning algorithm process is practically improved combined with the characteristics of the actual power grid. Then, the partition results of several IEEE test systems with the improved algorithm and with the Fast-Newman algorithm are compared to demonstrate its effectiveness and correctness. Subsequently, on the basis of subnet partition, two kinds of network attack strategies are proposed. One is attacking the maximum degree node of each subnet, and the other is attacking the maximum betweenness node of each subnet. Meanwhile, considering the two traditional intentional attack strategies, that is, attacking the maximum degree nodes or attacking the maximum betweenness nodes of the whole network, the cascading fault survivability of different types of networks under four attack strategies is simulated and analyzed. It was found that the proposed two attack strategies based on subnet partition are better than the two traditional intentional attack strategies.


2021 ◽  
Author(s):  
◽  
Simon William Bunckenburg

<p>The work of Jeff McMahan has revitalised discussion of just war theory with its rejection of the moral equality of combatants. The main aim of this thesis is to explore and develop McMahan’s work and recent challenges to it. I do this in four chapters. First, I outline McMahan’s account of liability to attack which subsequently shows why the moral equality of combatants is false. I defend his account of liability to attack from problems raised by Yitzhak Benbaji and Thomas Hurka. Second, I discuss developments by McMahan to the in bello condition of proportionality. I suggest that the features McMahan introduces, though innovative, do not go far enough and ultimately argue for David Rodin’s multi-factor account. Third, I defend Seth Lazar’s responsibility dilemma from objections by McMahan and Bradley Strawser. Fourth, I combine McMahan’s understanding of responsibility with Tony Honoré’s outcome responsibility and after establishing an account of collective responsibility argue that unjust noncombatants can be liable to intentional attack due to being collectively outcome responsible for the threat their state poses in war.</p>


2021 ◽  
Author(s):  
◽  
Simon William Bunckenburg

<p>The work of Jeff McMahan has revitalised discussion of just war theory with its rejection of the moral equality of combatants. The main aim of this thesis is to explore and develop McMahan’s work and recent challenges to it. I do this in four chapters. First, I outline McMahan’s account of liability to attack which subsequently shows why the moral equality of combatants is false. I defend his account of liability to attack from problems raised by Yitzhak Benbaji and Thomas Hurka. Second, I discuss developments by McMahan to the in bello condition of proportionality. I suggest that the features McMahan introduces, though innovative, do not go far enough and ultimately argue for David Rodin’s multi-factor account. Third, I defend Seth Lazar’s responsibility dilemma from objections by McMahan and Bradley Strawser. Fourth, I combine McMahan’s understanding of responsibility with Tony Honoré’s outcome responsibility and after establishing an account of collective responsibility argue that unjust noncombatants can be liable to intentional attack due to being collectively outcome responsible for the threat their state poses in war.</p>


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Hao Peng ◽  
Zhen Qian ◽  
Zhe Kan ◽  
Dandan Zhao ◽  
Juan Yu ◽  
...  

The emerging Industrial Internet of Things (IIoT) provides industries with an opportunity to collect, aggregate, and analyze data from sensors, including motion control, machine-to-machine communication, predictive maintenance, smart energy grid, big data analysis, and other smart connected medical systems. The physical systems and the cyber systems are organically integrated, forming an interdependent IIoT. This system provides us with enormous advantages, but at the same time, it also introduces the main safety challenges in the design and operation phase. To exploit the security threats of IIoT systems, in this paper, we propose a novel security-by-design approach for interdependent IIoT environments across two different levels, namely, theory modeling and runtime simulation. Our method theoretically analyzes the cascading failure dynamics of the intentional attack network. Simultaneously, we verified the theoretical results through simulations and gave the risk factors that affect the system’s security to mitigate potential security attack threats. Besides, we prove its applicability through comparative simulation experiments to study application environments that rely on IIoT, which shows that our method helps identify risk factors and mitigate IIoT attacks’ mechanism.


2021 ◽  
pp. 23-35
Author(s):  
Rosalind Dixon ◽  
David Landau

This chapter defines abusive constitutional change as an intentional attack on the democratic minimum core, or a minimalist, electorally focused definition of democracy familiar from recent work in law and political science. The advantage of using a yardstick for abuse that is a relatively thin, electoral version of democracy is that it avoids engaging more contestable commitments and thus enjoys a higher degree of global consensus. The chapter also distinguishes democracy from liberalism and explores the complex relationship between the two concepts. There is a theoretical tension between democracy and liberalism, although recent experience has suggested a strong tendency for them to erode together. Finally, the chapter explains the main forms of abusive constitutional change—formal constitutional amendment and replacement, sub-constitutional change through the passage of new legislation, and informal methods of change such as judicial reinterpretation. Most recent experiences with democratic erosion rely on a broad mix of these methods.


Author(s):  
Juan Toctaquiza ◽  
Diego Carrión

This research focuses on optimal post-intentional attack operation considering switching transmission systems. The applicable models for this process focus on the application of bi-level optimization methods that are capable of analyzing two possible scenarios in order to reduce the time of loss or departure from the demand of the electricity system. The main objective of this work is related to maintaining the minimum requirements that allow the operation of the Electric Power System, for this the approach of equations will be carried out that allows establishing the mathematical models in the event of intentional attacks, it must maintain the operation of the Electric System and react in the event of contingencies through the Optimal Switching of Transmission Lines.


2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Geoffroy Berthelot ◽  
Liubov Tupikina ◽  
Min-Yeong Kang ◽  
Bernard Sapoval ◽  
Denis S. Grebenkov

Abstract The evolution of complex transport networks is investigated under three strategies of link removal: random, intentional attack and “Pseudo-Darwinian” strategy. At each evolution step and regarding the selected strategy, one removes either a randomly chosen link, or the link carrying the strongest flux, or the link with the weakest flux, respectively. We study how the network structure and the total flux between randomly chosen source and drain nodes evolve. We discover a universal power-law decrease of the total flux, followed by an abrupt transport collapse. The time of collapse is shown to be determined by the average number of links per node in the initial network, highlighting the importance of this network property for ensuring safe and robust transport against random failures, intentional attacks and maintenance cost optimizations.


2020 ◽  
Vol 2020 ◽  
pp. 1-15 ◽  
Author(s):  
Vani Rajasekar ◽  
J. Premalatha ◽  
K. Sathya

Biometrics combined with cryptography can be employed to solve the conceptual and factual identity frauds in digital authentication. Biometric traits are proven to provide enhanced security for detecting crimes because of its interesting features such as accuracy, stability, and uniqueness. Although diverse techniques have been raised to address this objective, limitations such as higher computational time, minimal accuracy, and maximum recognition time remain. To overcome these challenges, an enhanced iris recognition approach has been proposed based on hyperelliptic curve cryptography (HECC). The proposed study uses the 2D Gabor filter approach for perfect feature extraction in iris preprocessing. A lightweight cryptographic scheme called HECC was employed to encrypt the iris template to avoid intentional attack by the intruders. The benchmark CASIA Iris V-4 and IITD iris datasets were used in the proposed approach for experimental analysis. The result analysis witnessed that the prime objective of the research such as lesser false acceptance rate, lesser false rejection rate, maximum accuracy of 99.74%, maximum true acceptance rate of 100%, and minimal recognition time of 3 seconds has been achieved. Also, it has been identified that the proposed study outperforms other existing well-known techniques.


Sign in / Sign up

Export Citation Format

Share Document