15,216 research outputs found

    Salt marsh harvest mouse abundance and site use in a managed marsh

    Get PDF
    The salt marsh harvest mouse (Reithrodontomys raviventris) is a federal and California listed endangered mammal endemic to the San Francisco Bay. The objectives of this research were to determine habitat use of endangered salt marsh harvest mice in a managed marsh in Fremont California, and to evaluate whether managed flooding of the marsh provides favorable habitat conditions for the mice. In addition, this research explores the effectiveness of using mark-recapture model selection analysis to estimate capture probability, survival, and population growth rate for salt marsh harvest mice. Mice were captured for four nights per month between May and August, 2008. Thirty-six unique salt marsh harvest mice were captured for a catch per 100 nights of trap effort of 1.9. The sex ratio of male to female mice was skewed towards males with a sex of 2.3:1. Salt marsh harvest mice were distributed randomly throughout the marsh and no relationships were found between mice distribution and pickleweed salinity, pickleweed height, distance to levees, distance to dry or filled water bodies, percent cover of vegetation, or sympatric rodents. The findings of this study indicate that catch-per-trap-effort, the current standard method to estimate salt marsh harvest mice populations, may not be accurate. The results of this study can be used by managers of salt marsh harvest mice habitat to manage and estimate mouse populations

    Using Capec Attack Patterns For Developing Abuse Cases

    Get PDF
    To engineer secure software, it is imperative to understand attackers’ perspectives and approaches. This information has been captured by attack patterns. The Common Attack Patterns Enumeration Classification (CAPEC) repository hosts over 450 attack patterns that contain information about how attacks have been launched against software. Researches have indicated that attack patterns can be utilized for developing secure software; however, there exists no systematic methodology to address this concern. This research proposes a methodology for utilizing CAPEC attack patterns for developing abuse cases at the requirements stage of the secure software development lifecycle (SDLC). In previous research, a tool for retrieving attack patterns (TrAP) was developed to retrieve CAPEC attack patterns according to Microsoft STRIDE threat categories. This tool also features a search function using keywords. The proposed methodology starts with a set of initial abuse cases developed through brainstorming. Microsoft SDL threat modelling tool is then used to identify and rank possible security threats in the system. The SDL tool generates a series of questions for each threat and these questions are used to extract keywords that serve as input to the TrAP tool to retrieve attack patterns relevant to the abuse cases. Keywords can also be system prerequisites or any technology being implemented in the system. From the list of retrieved attack patterns, the most relevant attack patterns are selected and used to extend the initial abuse cases. New abuse cases can also be discovered through this process

    Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token

    Full text link
    With the large-scale deployment of industrial internet of things (IIoT) devices, the number of vulnerabilities that threaten IIoT security is also growing dramatically, including a mass of undisclosed IIoT vulnerabilities that lack mitigation measures. Coordination Vulnerabilities Disclosure (CVD) is one of the most popular vulnerabilities sharing solutions, in which some security workers (SWs) can develop undisclosed vulnerabilities patches together. However, CVD assumes that sharing participants (SWs) are all honest, and thus offering chances for dishonest SWs to leak undisclosed IIoT vulnerabilities. To combat such threats, we propose an Undisclosed IIoT Vulnerabilities Trusted Sharing Protection (UIV-TSP) scheme with dynamic token. In this article, a dynamic token is an implicit access credential for an SW to acquire an undisclosed vulnerability information, which is only held by the system and constantly updated as the SW access. Meanwhile, the latest updated token can be stealthily sneaked into the acquired information as the traceability token. Once the undisclosed vulnerability information leaves the SW host, the embedded self-destruct program will be automatically triggered to prevent leaks since the destination MAC address in the traceability token has changed. To quickly distinguish dishonest SWs, trust mechanism is adopted to evaluate the trust value of SWs. Moreover, we design a blockchain-assisted continuous logs storage method to achieve the tamper-proofing of dynamic token and the transparency of undisclosed IIoT vulnerabilities sharing. The simulation results indicate that our proposed scheme is resilient to suppress dishonest SWs and protect the IoT undisclosed vulnerabilities effectively.Comment: 10 pages,12 figure

    Financing Peace: International and National Resources for Postconflict Countries and Fragile States

    Get PDF
    This background paper for the World Bank’s World Development Report 2011 discusses current financing arrangements for postconflict countries and fragile states, with a focus on official development assistance. In recent years a consensus has emerged that in these “difficult environments” the core objective is to build effective and legitimate governance structures that secure public confidence through provision of personal security, equal justice and the rule of law, economic well-being, and essential social services including education and health. Yet tensions persist between business-as-usual development policies on the one hand and policies responsive to the demands of peacebuilding on the other. The preferential allocation of aid to “good performers,” in the name of maximizing its payoff in terms of economic growth, militates against aid to fragile and conflict-affected states. Compelling arguments can be made for assistance to “poor performers” if this can help to prevent conflict and build peace, but the difficulties that prompted donors to become more selective in aid allocation remain all too real. The move to selectivity came in response to evidence that in some contexts aid has perverse effects on economic performance. The same dilemma arises when aid is assessed in terms of its impact on peace and conflict: sometimes aid helps to prevent conflict and build peace, but sometimes it can have the opposite effect. This paper considers how international aid can more effectively help to build resilient states and durable peace.aid; conflict; peacebuilding; statebuilding; fiscal capacity

    Assessing the Effectiveness of Climate Change Science Communication in an Online Carbon Footprint Assessment

    Get PDF
    Climate change literacy and knowledge are influential in enabling people to take climate change mitigation and adaptation actions. Education about climate change usually takes place through two avenues, formal education and informal institutions, such as museums, television shows, and websites. To help residents reduce their household greenhouse gas emissions and adapt to the local impacts of climate change, the San Luis Obispo Climate Coalition is using the carbon footprint website Bright Action (https://resilientslo.org). Bright Action calculates household carbon footprints, suggests ways to reduce carbon footprints, and provides educational material about climate change mitigation and adaptation. This study seeks to assess Bright Action’s effectiveness as an educational tool. The San Luis Obispo Rotary Club, Rotary De Tolosa, was used as a case study to compare the climate change knowledge of people who used Bright Action to those who did not. Climate change knowledge was sampled using pre- and post-surveys about one month apart. Participants self-selected based on whether they wanted to participate in the Bright Action group or as a non-participating control group. Qualitative trends were assessed using the text tagging software Taguette. Only 31% of participants on the pre-survey and 43% of participants on the post-survey could correctly differentiate between global warming and climate change on a free response question. Results from multiple questions showed that participants had gaps in climate knowledge about less common energy sources including: nuclear, hydrogen, and wood. When asked what actions they might consider to reduce their carbon footprint, participants chose carbon credits and reducing flying the least. These topics should be targeted for local climate change education. While 44% of participants on the pre-survey and 63% of participants on the post survey correctly described the greenhouse effect in their own words, 75% of participants on the pre-survey and 100% of participants on the post-survey could correctly define it on a multiple-choice question. Survey results indicate that most participants use the internet as their primary source to learn about global warming. Bright Action is an online platform; therefore, it could be an effective way of delivering climate change science educational material. Climate change knowledge scores were compared based on Bright Action participation, level of education, and level of concern using paired t-tests. No statistically significant effects of group membership on climate change knowledge were identified. These findings reflect the study’s small sample size and limited sample population. Future research should expand to a larger sample size of the general public for a better representation of the community of San Luis Obispo
    • …
    corecore