8,670 research outputs found

    Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review

    Full text link
    Globally, the external Internet is increasingly being connected to the contemporary industrial control system. As a result, there is an immediate need to protect the network from several threats. The key infrastructure of industrial activity may be protected from harm by using an intrusion detection system (IDS), a preventive measure mechanism, to recognize new kinds of dangerous threats and hostile activities. The most recent artificial intelligence (AI) techniques used to create IDS in many kinds of industrial control networks are examined in this study, with a particular emphasis on IDS-based deep transfer learning (DTL). This latter can be seen as a type of information fusion that merge, and/or adapt knowledge from multiple domains to enhance the performance of the target task, particularly when the labeled data in the target domain is scarce. Publications issued after 2015 were taken into account. These selected publications were divided into three categories: DTL-only and IDS-only are involved in the introduction and background, and DTL-based IDS papers are involved in the core papers of this review. Researchers will be able to have a better grasp of the current state of DTL approaches used in IDS in many different types of networks by reading this review paper. Other useful information, such as the datasets used, the sort of DTL employed, the pre-trained network, IDS techniques, the evaluation metrics including accuracy/F-score and false alarm rate (FAR), and the improvement gained, were also covered. The algorithms, and methods used in several studies, or illustrate deeply and clearly the principle in any DTL-based IDS subcategory are presented to the reader

    The Professional Identity of Doctors who Provide Abortions: A Sociological Investigation

    Get PDF
    Abortion is a medicalised problem in England and Wales, where the law places doctors at the centre of legal provision and puts doctors in control of who has an abortion. However, the sex-selection abortion scandal of 2012 presented a very real threat to 'abortion doctors', when the medical profession's values and practices were questioned in the media, society and by Members of Parliament. Doctors found themselves at the centre of a series of claims that stated doctors were acting both illegally and unethically, driven by profit rather than patient needs. Yet, the perspectives of those doctors who provide abortions has been under-researched; this thesis aims to fill that gap by examining the beliefs and values of this group of doctors. Early chapters highlight the ambiguous position of the abortion provider in Britain, where doctors are seen as a collective group of professionals motivated by medical dominance and medical autonomy. They outline how this position is then questioned and contested, with doctors being presented as unethical. By studying abortion at the macro-, meso- and micro-levels, this thesis seeks to better understand the values of the 'abortion doctor', and how these levels shape the work and experiences of abortion providers in England and Wales. This thesis thus addresses the question: 'What do abortion doctors' accounts of their professional work suggest about the contemporary dynamics of the medicalisation of abortion in Britain?'. It investigates the research question using a qualitative methodological approach: face-to-face and telephone interviews were conducted with 47 doctors who provide abortions in England and Wales. The findings from this empirical study show how doctors' values are linked to how they view the 'normalisation of abortion'. At the macro-level doctors, openly resisted the medicalisation of abortion through the position ascribed to them by the legal framework, yet at the meso-level doctors construct an identity where normalising abortion is based on further medicalising services. Finally, at the micro-level, the ambiguous position of the abortion provider is further identified in terms of being both a proud provider and a stigmatised individual. This thesis shows that while the existing medicalisation literature has some utility, it has limited explanatory power when investigating the problem of abortion. The thesis thus provides some innovative insights into the relevance and value of medicalisation through a comprehensive study on doctors' values, beliefs and practices

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance

    REDESIGNING THE COUNTER UNMANNED SYSTEMS ARCHITECTURE

    Get PDF
    Includes supplementary material. Please contact [email protected] for access.When the Islamic State used Unmanned Aerial Vehicles (UAV) to target coalition forces in 2014, the use of UAVs rapidly expanded, giving weak states and non-state actors an asymmetric advantage over their technologically superior foes. This asymmetry led the Department of Defense (DOD) and the Department of Homeland Security (DHS) to spend vast sums of money on counter-unmanned aircraft systems (C-UAS). Despite the market density, many C-UAS technologies use expensive, bulky, and high-power-consuming electronic attack methods for ground-to-air interdiction. This thesis outlines the current technology used for C-UAS and proposes a defense-in-depth framework using airborne C-UAS patrols outfitted with cyber-attack capabilities. Using aerial interdiction, this thesis develops a novel C-UAS device called the Detachable Drone Hijacker—a low-size, weight, and power C-UAS device designed to deliver cyber-attacks against commercial UAVs using the IEEE 802.11 wireless communication specification. The experimentation results show that the Detachable Drone Hijacker, which weighs 400 grams, consumes one Watt of power, and costs $250, can interdict adversarial UAVs with no unintended collateral damage. This thesis recommends that the DOD and DHS incorporates aerial interdiction to support its C-UAS defense-in-depth, using technologies similar to the Detachable Drone Hijacker.DASN-OE, Washington DC, 20310Captain, United States Marine CorpsApproved for public release. Distribution is unlimited

    Hunting Wildlife in the Tropics and Subtropics

    Get PDF
    The hunting of wild animals for their meat has been a crucial activity in the evolution of humans. It continues to be an essential source of food and a generator of income for millions of Indigenous and rural communities worldwide. Conservationists rightly fear that excessive hunting of many animal species will cause their demise, as has already happened throughout the Anthropocene. Many species of large mammals and birds have been decimated or annihilated due to overhunting by humans. If such pressures continue, many other species will meet the same fate. Equally, if the use of wildlife resources is to continue by those who depend on it, sustainable practices must be implemented. These communities need to remain or become custodians of the wildlife resources within their lands, for their own well-being as well as for biodiversity in general. This title is also available via Open Access on Cambridge Core

    Estudo do IPFS como protocolo de distribuição de conteúdos em redes veiculares

    Get PDF
    Over the last few years, vehicular ad-hoc networks (VANETs) have been the focus of great progress due to the interest in autonomous vehicles and in distributing content not only between vehicles, but also to the Cloud. Performing a download/upload to/from a vehicle typically requires the existence of a cellular connection, but the costs associated with mobile data transfers in hundreds or thousands of vehicles quickly become prohibitive. A VANET allows the costs to be several orders of magnitude lower - while keeping the same large volumes of data - because it is strongly based in the communication between vehicles (nodes of the network) and the infrastructure. The InterPlanetary File System (IPFS) is a protocol for storing and distributing content, where information is addressed by its content, instead of its location. It was created in 2014 and it seeks to connect all computing devices with the same system of files, comparable to a BitTorrent swarm exchanging Git objects. It has been tested and deployed in wired networks, but never in an environment where nodes have intermittent connectivity, such as a VANET. This work focuses on understanding IPFS, how/if it can be applied to the vehicular network context, and comparing it with other content distribution protocols. In this dissertation, IPFS has been tested in a small and controlled network to understand its working applicability to VANETs. Issues such as neighbor discoverability times and poor hashing performance have been addressed. To compare IPFS with other protocols (such as Veniam’s proprietary solution or BitTorrent) in a relevant way and in a large scale, an emulation platform was created. The tests in this emulator were performed in different times of the day, with a variable number of files and file sizes. Emulated results show that IPFS is on par with Veniam’s custom V2V protocol built specifically for V2V, and greatly outperforms BitTorrent regarding neighbor discoverability and data transfers. An analysis of IPFS’ performance in a real scenario was also conducted, using a subset of STCP’s vehicular network in Oporto, with the support of Veniam. Results from these tests show that IPFS can be used as a content dissemination protocol, showing it is up to the challenge provided by a constantly changing network topology, and achieving throughputs up to 2.8 MB/s, values similar or in some cases even better than Veniam’s proprietary solution.Nos últimos anos, as redes veiculares (VANETs) têm sido o foco de grandes avanços devido ao interesse em veículos autónomos e em distribuir conteúdos, não só entre veículos mas também para a "nuvem" (Cloud). Tipicamente, fazer um download/upload de/para um veículo exige a utilização de uma ligação celular (SIM), mas os custos associados a fazer transferências com dados móveis em centenas ou milhares de veículos rapidamente se tornam proibitivos. Uma VANET permite que estes custos sejam consideravelmente inferiores - mantendo o mesmo volume de dados - pois é fortemente baseada na comunicação entre veículos (nós da rede) e a infraestrutura. O InterPlanetary File System (IPFS - "sistema de ficheiros interplanetário") é um protocolo de armazenamento e distribuição de conteúdos, onde a informação é endereçada pelo conteúdo, em vez da sua localização. Foi criado em 2014 e tem como objetivo ligar todos os dispositivos de computação num só sistema de ficheiros, comparável a um swarm BitTorrent a trocar objetos Git. Já foi testado e usado em redes com fios, mas nunca num ambiente onde os nós têm conetividade intermitente, tal como numa VANET. Este trabalho tem como foco perceber o IPFS, como/se pode ser aplicado ao contexto de rede veicular e compará-lo a outros protocolos de distribuição de conteúdos. Numa primeira fase o IPFS foi testado numa pequena rede controlada, de forma a perceber a sua aplicabilidade às VANETs, e resolver os seus primeiros problemas como os tempos elevados de descoberta de vizinhos e o fraco desempenho de hashing. De modo a poder comparar o IPFS com outros protocolos (tais como a solução proprietária da Veniam ou o BitTorrent) de forma relevante e em grande escala, foi criada uma plataforma de emulação. Os testes neste emulador foram efetuados usando registos de mobilidade e conetividade veicular de alturas diferentes de um dia, com um número variável de ficheiros e tamanhos de ficheiros. Os resultados destes testes mostram que o IPFS está a par do protocolo V2V da Veniam (desenvolvido especificamente para V2V e VANETs), e que o IPFS é significativamente melhor que o BitTorrent no que toca ao tempo de descoberta de vizinhos e transferência de informação. Uma análise do desempenho do IPFS em cenário real também foi efetuada, usando um pequeno conjunto de nós da rede veicular da STCP no Porto, com o apoio da Veniam. Os resultados destes testes demonstram que o IPFS pode ser usado como protocolo de disseminação de conteúdos numa VANET, mostrando-se adequado a uma topologia constantemente sob alteração, e alcançando débitos até 2.8 MB/s, valores parecidos ou nalguns casos superiores aos do protocolo proprietário da Veniam.Mestrado em Engenharia de Computadores e Telemátic

    Pedagogia através de performance: um programa de literacia musical para coros comunitários baseado em Kodály

    Get PDF
    Doutoramento em MúsicaThe primary objective of this research was to develop a musical literacy programme – with correlated repertoire written specifically for the programme –that was implemented during choral rehearsals, creating a bridge between pedagogy and performance. Data from the Música no Meio project’s survey of choral conductors in Portugal shows that although 80% of the surveyed choirs use scores, only 15% of the singers have developed the musical literacy skills required to autonomously read the score. Previous research (Hiney, 2012) has also shown that in the absence of musical literacy, rote-learning (imitating the conductor until the music is memorised) is the most common technique used to transmit repertoire. This thesis addressed two main problems associated with a lack of musical literacy skills; firstly the impact of rote-learning on repertoire selection, rehearsal efficiency and hence standards of performance and secondly the implications for artistic creativity, as the singers confined to the oral as opposed to the literate area (Williams, 1981) may be considered artisans, making art without any involvement in creative or artistic processes (Reimer, 1970). The musical literacy programme, based on Kodály’s Concept of Music Education, was developed with the members of the communitarian choir, Voz Nua in Aveiro, Portugal. Six composers participated in this project, writing pieces with progressive levels of difficulty that corresponded to each of the three phases of the literacy programme. Qualitative data produced through interviews and focus groups with the singers of Voz Nua and the composers was analysed in order to gain an understanding of their experience of participating in the musical literacy programme. This data showed that the development of musical literacy skills increased the efficiency with which the choir learns new repertoire, allowing more time for interpretation and impacting positively on the choir’s quality of performance.O objectivo principal deste trabalho foi o desenvolvimento de um programa de literacia musical, recorrendo a repertório expressamente escrito para este programa, que foi implementado no contexto de ensaios corais, construindo uma ligação entre a pedagogia e a performance. Em anteriores pesquisas, nomeadamente no projecto ‘Música no Meio’, foi realizado um inquérito nacional com maestros de coros em Portugal que demonstrou que, apesar de cerca de 80% dos coros usarem partituras, apenas 15% dos cantores conseguem ler essas mesmas partituras de um modo autónomo. Num dos estudos presentes neste projeto (Hiney, 2015) foi possível ainda perceber que, na ausência de literacia musical, a aprendizagem por memorização (rote-learning) é a técnica mais frequentemente utilizada na transmissão do repertório. Esta tese concentra-se em dois dos problemas ligados à escassez de literacia musical, sendo o primeiro o impacto da aprendizagem por memorização na seleção de repertório, na eficiência do ensaio, e portanto, no nível de performance de um coro, e o segundo nas implicações para a criatividade artística, uma vez que os cantores que pertencem à zona da oralidade ao invés da zona da literacia (Williams, 1981) poderiam ser considerados artesãos, ao ‘fazer’ arte sem participar nos processos criativos ou artísticos (Reimer, 1970). Foi assim concebido um programa de literacia musical, baseado em Kodály, que foi realizado com os cantores do coro comunitário Voz Nua em Aveiro, Portugal. Participaram ainda neste projecto seis compositores que escreveram obras com graus de dificuldade e objectivos específicos para cada uma das três fases do programa. Os dados qualitativos produzidos através de entrevistas e focus groups com os cantores de Voz Nua e com os compositores, foram analisados tendo em vista uma melhor compreensão das experiências vividas pelos participantes no decorrer programa. Estes dados permitiram perceber que, após a desenvolvimento do programa de literacia musical, se verificou um aumento da eficiência nos ensaios e na aprendizagem de novo repertório, libertando mais tempo de ensaios para a componente interpretativa, com impacto positivo na qualidade da performance do coro

    Composing Care: The Aesthetics and Politics of Music Therapy in the Clinic

    Get PDF
    This dissertation examines the care work of music therapists in North American hospitals. Based on sixteen months of fieldwork conducted between 2019 and 2020 in Canada and the United States, this ethnography investigates the clinical aesthetics of music therapy, or how music therapy is sensed and made sense of in the clinic. I show how, through its foundation in Western art music traditions, the profession of music therapy is depoliticized—grounded in the values of universality, rationality, and objectivity—and aligned with biomedicine. It is through an association with biomedical knowledge systems that, I argue, music therapy is made into a health profession. I found that music therapists struggle to have their work taken seriously as they care for patients on the margins of hospital systems. Music therapists are in pursuit of what I call clinical recognition—being seen and valued from a biomedical perspective. As they strive to be recognized as indispensable to biomedical care, I show how music therapists attempt to ameliorate biomedical care structures from within. They cultivate sensitivities to sensory experience, especially to sound, that inform their movement through hospitals and guide their interactions with patients and staff. By intervening in what I describe as the clinical sensorium—the dominant structuring of sensory modes of attention that shape what is sensible in the clinic—music therapists disrupt the stultifying anaesthetic, or numbing, qualities of the clinic by reconfiguring clinical attunements, composing atmospheres of care, and structuring feelings in their extra/ordinary care practices. These care practices, I argue, are grounded in reciprocity; through musical gift exchange, music therapists foster affective connections and attachments for hospital patients that reimagine care in ways that remain partially tethered to yet exceed biomedical logics. Mobilized for and against biopolitical care regimes that attempt to delineate, capture, and govern life and death, I argue the care practices of music therapists reimagine the sensory-affective possibilities of living and dying in the clinic

    Gendered spaces in contemporary Irish poetry

    Get PDF
    The thrust of this thesis is summarized by the following questions: How does contemporary Irish poetry migrate from traditional conceptions of identity drawn on by the cultural nationalism of the Irish Literary Revival, and what effects does this have on understanding gendered and national identity formation? Chapters are on the following: Seamus Heaney, Tom Paulin, Paul Muldoon, MedbhMcGuckian, Eavan Boland and Sara Berkeley. These poets are chosen for discussion since their work most effectively engages with the relationship between woman and nation, the representation of gendered national identity, and the importance of feminist and post-colonial theorization. Focusing on poetry worth and South of the border from the last fifteen years, the thesis asks how a younger generation of poets provide a response to nationality which is significantly different from their predecessors. The thesis is composed of three parts: the first understand how the male poets depart from conventional conceptions of the nation with reference to post-colonial theorization; the second explores how feminist theorization informs readings of how the female poets respond to the nation; the final part investigates migration in the poetry and problematizes this in terms of post-nationalism. Discussing the issue of deterritorialization in Irish poetry, the thesis notice how as the poets attempt to take flight from the mythologies of nationhood, they undermine the monoliths of gendered and national identity inscribed within Irish political discourse, which is typified at a representative level by the figure of Mother Ireland or Cathleen Ni Houlihan. Investigating the ways in which gender and nation, and the body and space are reinscribed by the poets, the thesis argues that their poetry challenges authentic conceptions of Irish identity and the nation-state, so as to loosen the legacy of a colonial and nationalist inheritance
    corecore