attack location
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 6)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Wenting Wang ◽  
Qiang Ma ◽  
Lin Lin ◽  
Ti Guan ◽  
Dawei Tian ◽  
...  

This article mainly focuses on the attack location and defense of cyber-physical power systems under dynamic load altering attacks. Taking the smart grid as an example, first, the cyber-physical power system model under attack is established to provide conditions for attack detection. On this basis, an adaptive observer with [Formula: see text] performance is designed to realize detection and location through residual signal and attack estimation, respectively. Furthermore, a power redistribution strategy based on optimal economic scheduling is presented to realize attack defense by means of the observer data. Finally, theoretical analysis proves the feasibility of the algorithm, and simulation cases prove the effectiveness of attack location and defense strategies.


PeerJ ◽  
2021 ◽  
Vol 9 ◽  
pp. e11575
Author(s):  
Ajay Karki ◽  
Saroj Panthi

The snow leopard (Panthera uncia) found in central Asia is classified as vulnerable species by the International Union for Conservation of Nature (IUCN). Every year, large number of livestock are killed by snow leopards in Nepal, leading to economic loss to local communities and making human-snow leopard conflict a major threat to snow leopard conservation. We conducted formal and informal stakeholder’s interviews to gather information related to livestock depredation with the aim to map the attack sites by the snow leopard. These sites were further validated by district forest office staffs to assess sources of bias. Attack sites older than 3 years were removed from the survey. We found 109 attack sites and visited all the sites for geo location purpose (GPS points of all unique sites were taken). We maintained at least a 100 m distance between attack locations to ensure that each attack location was unique, which resulted in 86 unique locations. A total of 235 km2 was used to define livestock depredation risk zone during this study. Using Maximum Entropy (MaxEnt) modeling, we found that distance to livestock sheds, distance to paths, aspect, and distance to roads were major contributing factors to the snow leopard’s attacks. We identified 13.64 km2 as risk zone for livestock depredation from snow leopards in the study area. Furthermore, snow leopards preferred to attack livestock near livestock shelters, far from human paths and at moderate distance from motor roads. These identified attack zones should be managed both for snow leopard conservation and livestock protection in order to balance human livelihoods while protecting snow leopards and their habitats.


2021 ◽  
Author(s):  
Song Qi ◽  
Logan Cross ◽  
Toby Wise ◽  
Xin Sui ◽  
John O'Doherty ◽  
...  

Abstract Humans, like many other animals, pre-empt danger by moving to locations that maximize their success at escaping future threats. Here, we test the idea that spatial margin of safety (MOS) decisions, a form of prospective avoidance, result in participants placing themselves closer to safer locations when facing more unpredictable threats. Using multivariate pattern analysis on fMRI data collected while subjects engaged in MOS decisions with varying attack location predictability, we show that while the hippocampus encodes MOS decisions across all types of threat, a vmPFC anterior-posterior gradient tracked threat predictability. The posterior vmPFC encoded for more unpredictable threat and showed functional coupling with the amygdala and hippocampus. Conversely, the anterior vmPFC was more active for the more predictable attacks and showed coupling with the striatum. Our findings suggest that when pre-empting danger, the anterior vmPFC may provide a safety signal, possibly via predictable positive outcomes, while the posterior vmPFC drives prospective danger signals.


2020 ◽  
Author(s):  
Song Qi ◽  
Logan Cross ◽  
Toby Wise ◽  
Xin Sui ◽  
John O’Doherty ◽  
...  

Humans, like many other animals, pre-empt danger by moving to locations that maximize their success at escaping future threats. We test the idea that spatial margin of safety (MOS) decisions, a form of pre-emptive avoidance, results in participants placing themselves closer to safer locations when facing more unpredictable threats. Using multivariate pattern analysis on fMRI data collected while subjects engaged in MOS decisions with varying attack location predictability, we show that while the hippocampus encodes MOS decisions across all types of threat, a vmPFC anterior-posterior gradient tracked threat predictability. The posterior vmPFC encoded for more unpredictable threat and showed functional coupling with the amygdala and hippocampus. Conversely, the anterior vmPFC was more active for the more predictable attacks and showed coupling with the striatum. Our findings suggest that when pre-empting danger, the anterior vmPFC may provide a safety signal, possibly via predictable positive outcomes, while the posterior vmPFC drives prospective danger signals.


Forests ◽  
2019 ◽  
Vol 10 (2) ◽  
pp. 156 ◽  
Author(s):  
Fu Liu ◽  
Chengxu Wu ◽  
Sufang Zhang ◽  
Xiangbo Kong ◽  
Zhen Zhang ◽  
...  

Research Highlights: We found that the initial attack location together with the aggregation pheromones played an important role in mediating the aggressive behavior of T. brevipilosus on P. kesiya. Background and Objectives: T. brevipilosus was identified as an aggressive species, which possesses the ability to kill live, healthy P. kesiya. In this scenario, we study the top-down attack pattern of T. brevipilosus on P. kesiya during the entirety of the reproductive period. Materials and Methods: We investigated the phenology of trunk attack on P. kesiya over a period of three years in Pu’er City, China. The hindguts extracts of the females and males T. brevipilosus were analyzed by coupled gas chromatography-mass spectrometry (GC-MS). The candidate aggregation pheromone compounds of T. brevipilosus were determined through electrophysiology experiments (electroantennographic detection, EAD and electroantennography, EAG), laboratory olfactometer bioassays, and field trapping. Results: we found that the pioneer beetles preferentially infested the crown of P. kesiya at the early stage of attack following spring flight with the later arriving beetles selectively attacking the lower area of the trunk to avoid intraspecific competition and better utilize limited resources, which exhibits a top-down attack pattern. During gallery initiation, the beetles release aggregation pheromones to attract conspecifics to conduct a mass attack. The chemical analyses indicated that the hindgut extracts of gallery-initiating beetles contained a larger amount of myrtenol, cis-verbenol, trans-verbenol, and verbenone. Myrtenol and trans-verbenol were identified as candidate aggregation pheromone compounds. In addition, a blend of these two components with S-(−)-α-pinene and S-(−)-β-pinene attracted more T. brevipilosus individuals in a field bioassay. Conclusions: We concluded that the preference for the initial attack location together with the aggregation pheromones played an important role in mediating the top-down attack pattern of T. brevipilosus on P. kesiya.


2019 ◽  
Vol 11 (2) ◽  
pp. 306 ◽  
Author(s):  
Zheng Tang ◽  
Yijia Li ◽  
Xiaofeng Hu ◽  
Huanggang Wu

Urban dirty bomb attacking is a type of unconventional terrorism threatening the urban security all through the world. In this paper, a Bayesian network of urban dirty bomb attacking is established to analyze the risk of urban dirty bomb attacking. The impacts of factors such as occurrence time, location, wind fields, the size of dirty bomb, emergency response and defense approaches on casualty from both direct blast and radiation-caused cancers are examined. Results show that sensitivity of casualty from cancers to wind fields are less significant; the impact of emergency response on the direct casualty from blast is not large; the size of the dirty bomb results in more casualties from cancers than that from bomb explosions; Whether an attack is detected by the police is not that related to normal or special time, but significantly depends on the attack location; Furthermore, casualty from cancers significantly depends on the location, while casualty from blast is not considerably influenced by the attacking location; patrol and surveillance are less important than security check in terms of controlling the risk of urban dirt bomb, and security check is the most effective approach to decreasing the risk of urban dirty bomb.


Sign in / Sign up

Export Citation Format

Share Document