Academic literature on the topic 'Communicative attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Communicative attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Communicative attack"

1

Baryshnikov, N. V. "STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION." MGIMO Review of International Relations, no. 6(33) (December 28, 2013): 90–94. http://dx.doi.org/10.24833/2071-8160-2013-6-33-90-94.

Full text
Abstract:
This article is aimed at arguing a professional type of intercultural communication,at substantiating status equality as a paramount distinctive feature of professional interculturalcommunication and also at presenting some of the strategies associated with it.Thereupon, in the article:– the notion of professional intercultural communication is validated and its integral part – statusequality - is grounded,– original strategies of equal status intercultural communication are presented, some of which include:rabulistic strategies of communicative attack, eristic strategies of communicative self-defense,– hypothetical interaction patterns of certain strategies are described, including: compliment - wittyremark pattern, bluff - improvisation pattern, negative imperative - negative imperative transformationpattern,– the hypothesis is proved that for successful intercultural communication to take place, the partnersmust be equally aware of the communicative attack and self-defense strategies.Acquiring and mastering the communicative attack and self-defense strategies enables specialistsin international relations to participate in equal status intercultural communication the content of whichis characterized by high effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
2

Bahrom, Umarov, and Safarova Zamira. "Questions Communicative Attack in the Technology of Pedagogical Communication." International Journal of Social Science And Human Research 04, no. 04 (2021): 807–11. https://doi.org/10.47191/ijsshr/v4-i4-35.

Full text
Abstract:
The article presents the characteristics of the “communication attack”, as the conquest of initiative in communication and the integral communicative advantage, providing further management of communication with the audience
APA, Harvard, Vancouver, ISO, and other styles
3

Olsson, Eva-Karin, Malin Söderlund, and Jesper Falkheimer. "Communicating Terror." Scandinavian Journal of Public Administration 19, no. 1 (2015): 3–22. http://dx.doi.org/10.58235/sjpa.v19i1.15625.

Full text
Abstract:

 
 
 In essence, terror attacks are communicative events. From the perspective of political leaders, the challenge is to make sense of the event by explaining what has happened, who is behind the attack, what is the most appropriate response, and how to move forward. Adding to the difficulties is the fact that leaders have to communicate in a highly mediated environment. In this article, we explore the Norwegian government’s crisis communication in the terrorist attacks in Oslo and on the island of Utöya on July 22, 2011. We do so by applying a model of crisis framing. According to the model, political leaders have to be able to select appropriate frames that reinforce each other and match the media coverage. The study proved managerial, responsibility and cultural congruence frames to be central. Moreover, the study demonstrated how the crisis produced a certain type of news coverage characterized by high levels of descriptive journalism, which, in combination with issue and episodic framing, supported the government’s communication strategy.
 
 
APA, Harvard, Vancouver, ISO, and other styles
4

Sirajuddin, Mohammad. "Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.2 (2017): 178. http://dx.doi.org/10.14419/ijet.v7i1.2.9061.

Full text
Abstract:
In the communicative world each and every individual needs to perform global communication with failure-free intelligent model. Wireless Sensor Network, a medium which provides efficient communication modes to clients to satisfy their communication needs. However, this kind of wireless network channels are also facing lots of communication issues by means of several fault strategies, such as: link failures, node failures, bandwidth inefficiency, poor energy level, attacks and many more. So that, a fast growing network scheme is required as well as it provides lots of features to communication strategies and routing protocols, called Intelligent-Channel-Aware-Reputation Scheme [ICARS]. In the proposed system, the main objective is to provide the strong and failure-free wireless communication medium over networking with multiple numbers of nodes. As well as to provide high-level of security while the data is communicating from source to destination. For that powerful cryptographic algorithm is employed, called Modified Rijndael Algorithm (MRA) and to clearly state that the attack-free wireless communication channel with the help of intelligent routing strategies such as Route Request (RREQ) and Route Response (RREP).
APA, Harvard, Vancouver, ISO, and other styles
5

Gukosyants, O. Yu, O. A. Alimuradov, and Z. U. Khakiyeva. "Communicative Strategies and Tactics of Trolls-Aggressors in Computer-Mediated Communication during COVID-19 Pandemic." Nauchnyi dialog 11, no. 7 (2022): 175–96. http://dx.doi.org/10.24224/2227-1295-2022-11-7-175-196.

Full text
Abstract:
The article considers the aggressive communicative behaviour of a virtual linguistic personality provoking a communication conflict in the virtual space (a troll-aggressor). The data include comments retrieved from LiveJournal posts and Internet memes published during the COVID-19 pandemic. In the course of the analysis, the authors reveal the communicative roles, strategies and tactics of trolls-aggressors. The common strategy of the troll’s aggressive conflict interaction in the indicated time period is the strategy of hostility which is embodied in particular strategies (micro-strategies) of discrediting and attack. It is concluded that discrediting as a micro-strategy can be implemented via a false compliment, the tactic of taunt, the tactic of insult and the tactic of blaming. The micro-strategy of attack is implemented by means of threat and indignation. Particular attention is paid to the description of the markers of the above-listed tactics observed in trolls-aggressors’ communicative behaviour. Enumeration of the tactics used for provoking conflicts in virtual environment made it possible to concretize the typology of trolls-aggressors which has been revealed in the course of empiric data analysis. As a result, the authors present a scheme which reflects the types of trolls, belonging to the general type “troll-aggressor”, and the implemented communicative strategies and tactics within the framework of the common strategy of hostility.
APA, Harvard, Vancouver, ISO, and other styles
6

Myasnikov, Stanislav. "THE JUSTIFICATION STRATEGIES OF RUSSIAN FOREIGN POLICY SINCE 2014: A STUDY OF THE CASES OF CRIMEA JOINING RUSSIA AND RUSSIAN MILITARY OPERATION IN SYRIA." Вестник Пермского университета. Политология 14, no. 4 (2020): 14–26. http://dx.doi.org/10.17072/2218-1067-2020-4-14-26.

Full text
Abstract:
The trajectory of the Russian foreign policy changed in 2014 as Russia deviated from its foreign policy principles. A specific justification was needed in order to legitimize Russian foreign policy domestically and abroad. Russian officials provided such a justification. It was successful on the domestic level, but its effectiveness on the international level was questionable. This article undertakes an analysis of the justification strategies of Russian foreign policy after 2014, with a focus on those, which were used by Russian authorities in their justification of Crimea joining Russia and Russian actions in the Syrian Arab Republic. It is shown why the justification could be considered as strategic. Applying the instruments of the strategic narratives’ theory, the author reveals the main strategic narratives of Russian foreign policy officials. The article discovers that the main justification strategies were communicative defense, communicative attack, communicative counter-attack, and position declaration. The communicative position of the Russian Federation in the case of Crimean justification could be explained as initially difficult, but gaining a communicative position in the justification of Russian actions in Syria could positively support the justification of the Crimean case.
APA, Harvard, Vancouver, ISO, and other styles
7

Demirdiş, Semra. "Networked Gatekeeping in ‘Twitter’ During a Crisis Event: A Case Study of #Taksim in Türkiye." Etkileşim 6, no. 12 (2023): 216–34. http://dx.doi.org/10.32739/etkilesim.2023.6.12.220.

Full text
Abstract:
Social media allows both elites and non-elites to share real-time information about crisis events, such as terrorist attacks, and express support and sympathy for victims using hashtags. Recently, a terrorist attack occurred in Taksim Square, Türkiye, resulting in numerous deaths and injuries. Following the attack, Turkish citizens created the popular hashtag #Taksim to share information and express their emotions about the incident. This article explores the key influencers within #Taksim during the attack on Taksim Square by reviewing literature on hashtags, crisis events, gatekeeping, and networked gatekeeping theory. Through a quantitative and qualitative content analysis of 285,081 tweets under the hashtag #Taksim, the article examines how key users became prominent in the information flow. The findings demonstrate that Twitter's communicative practices (retweets, likes, replies, and quote tweets) allowed primarily elite actors, such as politicians and mass media journalists, to become key gatekeepers following the attack. This suggests that views of Twitter hashtags and their democratizing effects in crisis events need to be reconsidered, as the study highlights the significant role of elites. The findings also confirm that users who played crucial roles in the information flow through #Taksim became more prominent by addressing problematic issues like the refugee problem and freedom of the internet in Türkiye. Additionally, users gained prominence within #Taksim by posting messages accompanied by influential visuals.
APA, Harvard, Vancouver, ISO, and other styles
8

Troshchenkova, Ekaterina. "“Communicative Parasitism” in the Russian Segment of Telegram Channels." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 2. Jazykoznanije, no. 5 (November 2023): 53–71. http://dx.doi.org/10.15688/jvolsu2.2023.5.4.

Full text
Abstract:
The article examines manifestations of "communicative parasitism" as a variant of communicative alignment in Russian-language Telegram channels. It examines how the adjustment to other people's communication products begins to serve fundamentally different interests and values. The peculiarities of new media and conditions of technologically mediated communication such as interactivity, recombinativeness, multimodality, etc., as well as the specificity of high conflict nature of social-and-political discourse, which plays a significant role in the processes of using power and struggling for it, are taken into account. "Communicative parasitism" is analyzed within both the description of Telegram channel and the subscribers' posts and comments. It was found out that when "communicative parasitism" is used by a Telegram channel to build its own brand and promote itself at someone else's expense, parasitic manifestations are usually limited to elements of design. However, there are often more complex cases in the ideological confrontation of social groups, where this phenomenon is exploited to consolidate one's own group, represent it in a positive way and distance it from the opposing group, which is being discredited. Thus, "communicative parasitism" becomes an integral part of defense-attack strategies realized by a whole group of users for a long time. In this situation, a large number of customers are involved in a kind of language game with intertwining and interacting borrowings, contributing to the formation of group identity.
APA, Harvard, Vancouver, ISO, and other styles
9

Kuchynska, Valeriiya. "IMPLEMENTATION OF COMMUNICATIVE STRATEGY OF DISCREDITATION AND ATTACK IN SPANISH POLITICAL DISCOURSE." PROBLEMS OF SEMANTICS, PRAGMATICS AND COGNITIVE LINGUISTICS, no. 41 (2022): 111–22. http://dx.doi.org/10.17721/2663-6530.2022.41.11.

Full text
Abstract:
The article examines speech and language ways of expressing one of the main communicative and pragmatic strategies characteristic of political discourse - the strategy of discrediting the opponent. The research is based on the material of the speeches of the figures of the Spanish political space. The article examines the speeches of the leaders of competing political forces and analyzes the revealed linguistic features of the discrediting strategy and a number of tactics for its implementation. The strategy of discrediting and attacking the opponent is one of the most used and vividly presented in political discourse, which is explained by its effectiveness, since its use allows the speaker to simultaneously attack the authority of the opponent and raise authority of their own. Special attention was paid to negatively marked lexical units as the main means of expressing the considered strategy. Attention is also paid to features at other linguistic levels, in particular grammatical. Definitions of communicative strategies and tactics, the importance of their application for political discourse, examples of implementation of the discrediting strategy in Spanish-language political discourse are considered in the work. The tactic of verbal insinuation was singled out as the most vividly represented in the sample of examples for the study.
APA, Harvard, Vancouver, ISO, and other styles
10

Browning, Blair, and Jimmy Sanderson. "The Positives and Negatives of Twitter: Exploring How Student-Athletes Use Twitter and Respond to Critical Tweets." International Journal of Sport Communication 5, no. 4 (2012): 503–21. http://dx.doi.org/10.1123/ijsc.5.4.503.

Full text
Abstract:
Twitter has become a popular topic in sport communication research. Little research to date, however, has examined Twitter from the perspective of student-athletes. This research explored how student-athletes at an NCAA Division I university used Twitter and reacted to critical tweets from fans. Semistructured interviews with 20 student-athletes were conducted. Analysis revealed that student-athletes used Twitter in 3 primary ways: keeping in contact, communicating with followers, and accessing information. With respect to critical tweets, student-athletes reported various perceptions about them and diverse strategies for responding to them. The results suggest that Twitter is a beneficial communicative tool for student-athletes but also presents challenges, given the ease with which fans attack them via this social-media platform. Accordingly, athletic departments must be proactive in helping student-athletes use Twitter strategically, particularly in responding to detractors.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Communicative attack"

1

Corzine, Larry M. "Communication breakdown DHS operations during a cyber attack." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4987.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Department of Homeland Security (DHS) leverages information technology to increase the effectiveness of first responders during disaster recovery. At the same time, cyber attacks against these information technologies have significantly increased. Unfortunately, cyber attacks have grown faster than the technologies used to defend them. The reliance on technology coupled with the difficulty of defending it makes it unrealistic to assume that communications will always be available when needed. Therefore, it is critical that first responders are prepared to operate when one or some of their communications abilities are lost. Alarmingly, DHS has the responsibility to prepare first responders to operate during disasters; however, they lack the authority to enforce programs to ensure this happens. This lack of authority affects how first responders communicate and provides gaps in DHS efforts to prepare for disasters. Until DHS has the authority to enforce change across all levels of government, communications will not be guaranteed during disaster recovery operations. However, DHS could leverage communication outages during operational exercises to better prepare first responders. This thesis explores DHS exercises on the federal, state and local levels and how they are preparing first responders to operate through cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Bas, Ali Karaca Volkan. "A simulation on organizational communication patterns during a terrorist attack." Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483636.

Full text
Abstract:
Thesis (M.S. in Management)--Naval Postgraduate School, June 2008.<br>Thesis Advisor(s): Gibbons, Deborah E. ; Suchan, James E. "June 2008." Description based on title screen as viewed on August 28, 2008. Includes bibliographical references (p. 57-61). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Karaca, Volkan. "A simulation on organizational communication patterns during a terrorist attack." Thesis, Monterey, California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/4106.

Full text
Abstract:
The purpose of this project is to provide a simulation which includes communication structures during a terrorist attack. Different communication patterns will provide different results in terms of effectiveness and efficiency. We are planning to identify some key variables to form an effective network structure in a military action. According to key variables of an organization, centralized and decentralized structures produce different communication patterns and different outputs as well. In a combat environment these different patterns will result in distinct results in terms of effectiveness and efficiency. This environment can be modeled by the help of software like Arena. As a part of the Global War on Terrorism NATO forces are conducting operations in Afghanistan. To enhance stability in Afghanistan, NATO established PRTs (Provincial Reconstruction Teams) composed of multinational elements (partly civilian, but mostly military. These teams are static, and form potential targets for terrorist attacks. We will use PRTs in our model as the target of the terrorists and try to discriminate communication structures in these ambush scenarios.
APA, Harvard, Vancouver, ISO, and other styles
4

Shahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.

Full text
Abstract:
This dissertation addresses physical layer security concerns, resiliency of the Orthogonal Frequency Division Multiplexing (OFDM) and the Multiple Input Multiple Output (MIMO) systems; the `de-facto' air-interface of most wireless broadband standards including LTE and WiMAX. The major contributions of this dissertation are: 1) developing jamming taxonomy, 2) proposing OFDM and MIMO equalization jamming attacks and countermeasures, 3) developing antijam (AJ) MIMO systems, and 4) designing null space projected overlapped-MIMO radar waveform for spectrum sharing between radar and communications system. First, we consider OFDM systems under various jamming attacks. Previous research is focused on jamming OFDM data transmissions. We focus on energy efficient attacks that can disrupt communication severely by exploiting the knowledge of target waveform. Specifically, these attacks seek to manipulate information used by the equalization algorithm to cause errors to a significant number of symbols, i.e., pilot tones jamming and nulling. Potential countermeasures are presented in an attempt to make OFDM waveform robust and resilient. The threats were mitigated by randomizing the location and value of pilot tones, causing the optimal attack to devolve into barrage jamming. We also address the security aspects of MIMO systems in this dissertation. All MIMO systems need a method to estimate and equalize channel, whether through channel reciprocity or sounding. Most OFDM-based MIMO systems use sounding via pilot tones. Like OFDM attacks, this research introduces MIMO channel sounding attack, which attempts to manipulate pilot tones to skew the channel state information (CSI) at the receiver. We describe methods of designing AJ MIMO system. The key insight is that many of the theoretical concepts learned from transmit beamforming and interference alignment (IA) in MIMO systems can be applied to the field of AJ and robust communications in the presence of jammers. We consider a realistic jamming scenario and provide a `receiver-only' and a transmitter `precoding' technique that allow a pair of two-antenna transceivers to communicate while being jammed by a malicious non-cooperative single-antenna adversary. Finally, we consider designing a collocated MIMO radar waveform, which employs a new MIMO architecture where antenna arrays are allowed to overlap. This overlapped-MIMO radar poses many advantages including superior beampattern and improvement in SNR gain. We combine this radar architecture with a projection-based algorithm that allows the radar waveform to project onto the null space of the interference channel of MIMO communications system, thus enabling the coexistence of radar and communications system.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.

Full text
Abstract:
La complexité croissante des cyberattaques, caractérisée par une diversification des techniques d'attaque, une expansion des surfaces d'attaque et une interconnexion croissante d'applications avec Internet, rend impérative la gestion du trafic réseau en milieu professionnel. Les entreprises de tous types collectent et analysent les flux réseau et les journaux de logs pour assurer la sécurité des données échangées et prévenir la compromission des systèmes d'information. Cependant, les techniques de collecte et de traitement des données du trafic réseau varient d'un jeu de données à l'autre, et les approches statiques de détection d'attaque présentent des limites d'efficacité et précision, de temps d'exécution et de scalabilité. Cette thèse propose des approches dynamiques de détection de cyberattaques liées au trafic réseau, en utilisant une ingénierie d'attributs basée sur les différentes phases de communication d'un flux réseau, couplée aux réseaux de neurones à convolution (1D-CNN) et leur feature detector. Cette double extraction permet ainsi une meilleure classification des flux réseau, une réduction du nombre d'attributs et des temps d'exécution des modèles donc une détection efficace des attaques. Les entreprises sont également confrontées à des cybermenaces qui évoluent constamment, et les attaques "zero-day", exploitant des vulnérabilités encore inconnues, deviennent de plus en plus fréquentes. La détection de ces attaques zero-day implique une veille technologique constante et une analyse minutieuse, mais coûteuse en temps, de l'exploitation de ces failles. Les solutions proposées garantissent pour la plupart la détection de certaines techniques d'attaque. Ainsi, nous proposons un framework de détection de ces attaques qui traite toute la chaîne d'attaque, de la phase de collecte des données à l'identification de tout type de zero-day, même dans un environnement en constante évolution. Enfin, face à l'obsolescence des jeux de données et techniques de génération de données existants pour la détection d'intrusion et à la nature figée, non évolutive, et non exhaustive des scénarios d'attaques récents, l'étude d'un générateur de données de synthèse adapté tout en garantissant la confidentialité des données est abordée. Les solutions proposées dans cette thèse optimisent la détection des techniques d'attaque connues et zero-day sur les flux réseau, améliorent la précision des modèles, tout en garantissant la confidentialité et la haute disponibilité des données et modèles avec une attention particulière sur l'applicabilité des solutions dans un réseau d'entreprise<br>The increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
APA, Harvard, Vancouver, ISO, and other styles
6

Groeling, Tim. "When politicians attack : the causes, contours, and consequences of partisan political communication /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2001. http://wwwlib.umi.com/cr/ucsd/fullcit?p3027048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lambert, Maria T. "Attack of the Mommy Mafia| Examining The Honest Company's Use of Coombs' SCCT Strategies." Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1593182.

Full text
Abstract:
<p> A crisis can threaten the existence of an organization, and in this social media age, information is spread at lightning-fast speeds forcing crisis communication managers to work quickly to quell any unflattering press. Companies in crisis situations attempt to mitigate damage and repair reputations using crisis communication strategies, such as Coombs&rsquo; Situational Crisis Communication Theory (SCCT). This thesis explored social media as a crisis communication channel for these strategies, by studying an organizational crisis that played out almost entirely on social media, through the lens of SCCT.</p><p> This thesis used six statements made by The Honest Company during a 2013 crisis where stakeholders accused the company of bullying a working mother over trademark rights. The company&rsquo;s crisis communication messages were retrieved, and by using discourse analysis the messages were examined through the guidelines of the SCCT model, which allowed categorization of the messages according to SCCT, analysis of their effectiveness, and the defining of SCCT challenges in analyzing this organizational conflict aggrandized through social media.</p><p> This study found that even though The Honest Company did not strictly adhere to SCCT&rsquo;s guidelines, it was able to flourish and surpass consumer expectations after the crisis ended. The examination of this crisis offered insight into SCCT&rsquo;s lack of clarity and direction concerning its crisis types, strategies, and guidelines. It also offered suggestions for more specific crisis types and the expansion of crisis types for SCCT. </p>
APA, Harvard, Vancouver, ISO, and other styles
8

Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.

Full text
Abstract:
The Swedish Defence Research Agency (FOI) simulates cyber attacks for research and education purposes in their cyber range, CRATE, with a system called SVED. This thesis describes the process of creating a visualization of the log files produced by SVED, with the purpose of increasing the users’ comprehension of the log files and thereby increasing their knowledge of the simulated attacks. To create an effective visualization a user study was held to know the users’ needs, experiences and requirements. Several designs were created based on the results and one was selected and refined using feedback from workshops. A web-based implementation of the design was created using the D3.js library, which included a directed graph, icicle chart and network graph to visualize the data. Thereafter an evaluation was held to analyze if the implementation was more effective than the log files, by letting the participants solve tasks defined by the user study. The results from the evaluation indicates that the visualization has a higher success rate than the log files when solving the tasks. They also indicate that finding the solution requires less time with the visualization. However, since the evaluation tasks were based on the user study, the results only conclude that the visualization is more effective when solving similar tasks. For further development the visualization could be improved with features like real time rendering and linkage with FOI’s internal systems. Additionally, with more research and further testing, the visualization could be used as a tool for standardization of graphics in cyber space. In conclusion, a visualization of the log files has been implemented and according to the evaluation does the visualization increase the users’ comprehension of the data in SVED’s log files.
APA, Harvard, Vancouver, ISO, and other styles
9

Franz, Elke, Stefan Pfennig, and André Fischer. "Communication Overhead of Network Coding Schemes Secure against Pollution Attacks." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-89807.

Full text
Abstract:
Network coding is a promising approach for increasing performance of multicast data transmission and reducing energy costs. Of course, it is essential to consider security aspects to ensure a reliable data transmission. Particularly, pollution attacks may have serious impacts in network coding since a single attacker can jam large parts of the network. Therefore, various approaches have been introduced to secure network coding against this type of attack. However, introducing security increases costs. Even though there are some performance analysis of secure schemes, to our knowledge there are no details whether these schemes are worthwhile to replace routing under the facet of efficiency. Thus, we discuss in this report parameters to assess the efficiency of secure network coding schemes. Using three network graphs, we evaluate parameters focusing on communication overhead for selected schemes. Our results show that there are still benefits in comparison to routing depending on the network topology.
APA, Harvard, Vancouver, ISO, and other styles
10

Atiiq, Syafiq Al. "Adaptive Counteraction Against Denial of Service Attack." Thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219382.

Full text
Abstract:
The Internet of Things (IoT) is the next generation of networked society where billions of, everyday-life, devices are directly connected to the Internet and able to communicate with each other. In particular, the Constrained Application Protocol (CoAP) has become the de-facto IoT standard for communication at the application layer, as a lightweight web transfer protocol affordable also for resource-constrained platforms. However, as IoT devices are directly connected to the Internet, they are especially vulnerable to a number of security attacks including Denial of Service (DoS), which can seriously worsen their performance and responsiveness, and even make them totally unavailable to serve legitimate requests. In this Master's Thesis project, we have developed a cross-layer and context-aware approach that adaptively counteracts DoS attacks against CoAP server devices, by dynamically adjusting their operative state according to the attack intensity. This considerably limits the impact of DoS attacks and preserves service availability of victim devices to the best possible extent. The proposed approach leverages a trusted Proxy that adaptively shields victim devices, while effectively forwarding and caching messages if needed. We have made a proof-of-concept implementation of our solution for the Californium framework and the CoAP protocol, and experimentally evaluated its effectiveness in counteracting DoS and preserving availability of devices under attack. This Master's Thesis project has been conducted in collaboration with RISE SICS, a research institute for applied information and communication technology in Sweden.<br>Sakernas Internet (IoT) är nästa generations nätverkssamhälle där miljarder av, vardagliga, enheter är direkt anslutna till Internet och har möjlighet att kommunicera med varandra. Särskilt har CoAP, ett lättviktsprotokoll för webbtrafik som även fungerar för plattformar med begränsade resurser, blivit Sakernas Internets standard för kommunikation på applikationslagret. Men eftersom IoT-enheter är direkt anslutna till Internet så är de också speciellt utsatta för ett antal säkerhetsattacker, inklusive DoS, som kan försämra deras prestanda och mottaglighet avsevärt och i värsta fall göra dem helt otillgängliga för legitima förfrågningar. I detta examensarbete har vi utvecklat en lageröverskridande och kontextmedveten metod som adaptivt motverkar DoS attacker mot CoAP serverenheter genom att dynamiskt anpassa enhetens operativa tillstånd i enlighet med attackintensiteten. Detta begränsar DoS-attackers påverkan på enheterna avsevärt samtidigt som det bibehåller tillgänglighet för tjänster på utsatta enheter till största möjliga utsträckning. Den föreslagna metoden utnyttjar en betrodd proxy som adaptivt skyddar utsatta enheter, samtidigt som den effektivt vidarebefordrar och sparar meddelanden om så behövs. I detta arbete har vi skapat en proof of concept-implementation av vår lösning för Californium-ramverket och CoAP protokollet. Arbetet har utvärderats experimentellt för att undersöka lösningens effektivitet när det gäller att motarbeta DoS-attacker samt hur den bibehåller enheters tillgänglighet under attacker. Detta uppsatsprojekt har utförts i samarbete med RISE SICS som är ett forskningsinstitut för tillämpad informations- och kommunikationsteknik i Sverige.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Communicative attack"

1

Baryshnikov, Nikolay. Fundamentals of professional intercultural communication. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1391408.

Full text
Abstract:
The textbook examines the fundamental problems of professional intercultural communication, outlines the main components of the professional competence of a specialist in intercultural communication, his personal qualities necessary for successful professional activity.&#x0D; The author's concept of attack strategies and self-defense strategies in the communicative battles of professionals is presented.&#x0D; Meets the requirements of the federal state educational standards of higher education of the latest generation.&#x0D; For students studying in the areas of training and specialties: 45.03.02 "Linguistics": profiles "Theory and practice of intercultural communication" and "Theory and methodology of teaching foreign languages and cultures"; 45.05.01 "Translation and translation studies"; 41.03.05 "International relations"; 41.06.01 "Political sciences and regional studies". It is also of interest to specialists in the field of intercultural communication.
APA, Harvard, Vancouver, ISO, and other styles
2

Groeling, Tim J. When politicians attack: Party cohesion in the media. Cambridge University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chakravarty, Sambuddho. Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication. [publisher not identified], 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pang, Zhong-Hua, Guo-Ping Liu, Donghua Zhou, and Dehui Sun. Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-0520-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. VTT Technical Research Centre of Finland, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

David, Sanders, ed. Advocacy versus attack: The imipact of political adverstising in the 2001 UK general election. John F. Kennedy School of Government, Harvard University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jr, Denton Robert E., ed. Language, symbols, and the media: Communication in the aftermath of the World Trade Center attack. Transaction Publishers, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jr, Denton Robert E., ed. Language, symbols, and the media: Communication in the aftermath of the World Trade Center attack. Transaction Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. General Accounting Office, ed. Army aviation: Apache Longbow weight and communication issues : report to the Secretary of Defense. The Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Army aviation: Modernization strategy needs to be reassessed : report to Congressional requesters. The Office, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Communicative attack"

1

Almström Persson, Gunilla. "Crisis Communication on Social Media: Informalization in the Hour-by-Hour Struggle for Information." In Nordic Perspectives on the Discourse of Things. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33122-0_6.

Full text
Abstract:
AbstractThis chapter concerns the communicative conditions in the relation between informal practice of sakprosa and informal style in social media communication. By focusing on knowledge and interaction in authorities’ crisis communication, the objective is to discuss whether the public discourse undergoes an informalization within the framework of critical discourse analysis. The aim of this study is to shed light on communicative strategies in authorities’ prose on social media. The data consist of two corpora from the Twitter platform of the Swedish crisis authority—the first from the terror attack in Stockholm in 2017 and the second from an official false alarm for a total number of 1,951 tweets. Methodologically, the data are arranged chronologically and rest on a qualitative approach to style.A result of this study is that boundaries within the public discourse in social media are not blending, but rather are parallel. When the authority takes the initiative to post informative tweets, they use formal written style. On the contrary, when they write responses to citizens’ tweets, they often use a personal and informal style. Another result is that when the authority does not communicate, it seems to trigger citizens to post informal and sometimes harsh comments.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Qing, and Lin Huang. "Satellite Communication." In Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gazdag, András, György Lupták, and Levente Buttyán. "Correlation-Based Anomaly Detection for the CAN Bus." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_4.

Full text
Abstract:
AbstractPrevious attacks have shown that in-vehicle networks have vulnerabilities and a successful attack could lead to significant financial loss and danger to life. In this paper, we propose a Pearson correlation based anomaly detection algorithm to detect CAN message modification attacks. The algorithm does not need a priori information about the communication: it identifies signals based on statistical properties, finds the important correlation coefficients for the correlating signals, and detects attacks as deviations from a previously learned normal state.
APA, Harvard, Vancouver, ISO, and other styles
4

Fritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.

Full text
Abstract:
AbstractArtificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in new forms of phishing attacks and enables hard-to-detect cyber-physical sabotage. Malware creators increasingly deploy AI and ML methods to improve their attack’s capabilities. Defenders must therefore expect unconventional malware with new, sophisticated and changing features and functions. AI’s potential for automation of complex tasks serves as a challenge in the face of defensive deployment of anti-malware AI techniques. This article summarizes the state of the art in AI-enhanced malware and the evasion and attack techniques it uses against AI-supported defensive systems. Our findings include articles describing targeted attacks against AI detection functions, advanced payload obfuscation techniques, evasion of networked communication with AI methods, malware for unsupervised-learning-based cyber-physical sabotage, decentralized botnet control using swarm intelligence and the concealment of malware payloads within neural networks that fulfill other purposes.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Qing, and Lin Huang. "433/315 MHz Communication." In Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Briddick, Curtis, Pam Briggs, and James Nicholson. "Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young Adults." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62918-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jap, Dirmanto, and Jakub Breier. "Differential Fault Attack on LEA." In Information and Communication Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-24315-3_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kwatra, Saloni, and Vicenç Torra. "Empirical Evaluation of Synthetic Data Created by Generative Models via Attribute Inference Attack." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57978-3_18.

Full text
Abstract:
AbstractThe disclosure risk of synthetic/artificial data is still being determined. Studies show that synthetic data generation techniques generate similar data to the original data and sometimes even the exact original data. Therefore, publishing synthetic datasets can endanger the privacy of users. In our work, we study the synthetic data generated from different synthetic data generation techniques, including the most recent diffusion models. We perform a disclosure risk assessment of synthetic datasets via an attribute inference attack, in which an attacker has access to a subset of publicly available features and at least one synthesized dataset, and the aim is to infer the sensitive features unknown to the attacker. We also compute the predictive accuracy and F1 score of the random forest classifier trained on several synthetic datasets. For sensitive categorical features, we show that Attribute Inference Attack is not highly feasible or successful. In contrast, for continuous attributes, we can have an approximate inference. This holds true for the synthetic datasets derived from Diffusion models, GANs, and DPGANs, which shows that we can only have approximated Attribute Inference, not the exact Attribute Inference.
APA, Harvard, Vancouver, ISO, and other styles
9

Kantzavelou, Ioanna, and Patel A. "Issues of attack in distributed systems - A Generic Attack Model." In IFIP Advances in Information and Communication Technology. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34943-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sirur, Sean, and Tim Muller. "The Reputation Lag Attack." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33716-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Communicative attack"

1

Kumar, Atul, and Kalpna Guleria. "Comprehensive Analysis and Detection of Multi-Step Cyber Attacks: Insights from the Multi-Step Cyber-Attack Dataset." In 2024 8th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2024. https://doi.org/10.1109/iceca63461.2024.10801010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.

Full text
Abstract:
Abstract A system-in-package (SiP) design takes advantage of cutting-edge packaging technology and heterogeneous integration (HI) in response to the growing need for aggressive time-to-market, high-performance, less expensive, and smaller systems. However, aggregating dies with different functionalities introduces new attack vectors with fault-injection attacks (FIA) that can effectively alter a circuit's data and control flow maliciously to cause disruptions of secure communication or sensitive information leakage. Additionally, traditional threat models associated with FIA on a 2D monolithic system-on-chip (SoC), and the corresponding mitigation techniques may not be compatible with modern 2.5D and 3D SiP architectures. To address these limitations, we propose system-aware fault injection attack detection for SiP architectures (SYSFID), a real-time and on-chip sensor-based fault monitoring approach integrated into a system-level design. SYSFID detects any fault-induced anomalous alterations in path delays of the components of inter-chiplet networks by strategically placing on-chip fault-to-time converter (FTC) sensors and controlling them efficiently to safeguard overall system security. To demonstrate the effectiveness of SYSFID, we detect several fault injection attempts on the FPGA implementation of a network-on-chip (NoC) based architecture during secure network packet transfers. Our experiments also illustrate that the SYSFID framework reliably senses both global and local FIAs with minimal overheads.
APA, Harvard, Vancouver, ISO, and other styles
3

K, Ananthajothi, Adharshin C, and Amirdha M. "Security-Aware IoT Attack Detection Framework." In 2025 International Conference on Computing and Communication Technologies (ICCCT). IEEE, 2025. https://doi.org/10.1109/iccct63501.2025.11019030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alahmadi, Mohammed. "Detecting SYN Flood Attack Using CSA-Nets." In 9th International Conference on Computer Science, Engineering and Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.132301.

Full text
Abstract:
Distributed Denial of Service (DDOS) attacks pose a persistent threat to network security by interrupting server functions. One common DDOS attack is the SYN-flood attack, which targets the three-way handshake process of TCP protocol. This technique overwhelms a system by sending a vast number of SYN messages, thereby exhausting its computational and communicative resources. A visual simulation for this scenario offers deeper insights into the intricacies of the TCP-SYN-flood attack. This paper presents a novel approach that combines TCP protocol anomaly detection with visual analysis through Communication Structured Acyclic nets (CSA-nets). The strategy provides a clear visualisation of attack behaviours, granting a deeper understanding of DDOS patterns and their underlying causes. A new concept of TCCSA-nets is introduced. TCCSA-nets allow elaborating on the system’s performance and emphasizing the system’s operations in real-time. This approach allows for the classification of messages as abnormal if their duration exceeds a predetermined time limit. Messages within this time frame are considered normal communication. The effectiveness of this approach was tested on public datasets, demonstrating its capability in detecting SYN-flood attacks
APA, Harvard, Vancouver, ISO, and other styles
5

Segura, Gustavo A. Nunez, Arsenia Chorti, and Cíntia Borges Margi. "IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.

Full text
Abstract:
Software-Defined Networking has been used to leverage security solutions for wireless sensor networks. However, this paradigm turns networks vulnerable to distributed denial of service attacks. IDIT-SDN is a tool for Software-defined Wireless Sensor Networks devised for DoS and DDoS attacks simulation and detection. This tool provides a framework for anomaly detection and a communication protocol to share security wise information from the sensor network to the controller. We demonstrate its use by showing a cooperative DDoS attack detection and attacker identification application based on distributed (every node) and centralized (controller) anomaly detection.
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Yangyang, Zheng O’Neill, Jin Wen, and Veronica Adetola. "Evaluating the Impact of Cyber-Attacks on Grid-Interactive Efficient Buildings." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-73694.

Full text
Abstract:
Abstract Grid-interactive efficient buildings (GEBs) are not only exposed to passive threats (e.g., physical faults) but also active threats such as cyber-attacks launched on the network-based control systems. The impact of cyber-attacks on GEB operation are not yet fully understood, especially as regards the performance of grid services. To quantify the consequences of cyber-attacks on GEBs, this paper proposes a modeling and simulation framework that includes different cyber-attack models and key performance indexes to quantify the performance of GEB operation under cyber-attacks. The framework is numerically demonstrated to model and evaluate cyber-attacks such as data intrusion attacks and Denial-of-Service attacks on a typical medium-sized office building that uses the BACnet/IP protocol for communication networks. Simulation results show that, while different types of attacks could compromise the building systems to different extents, attacks via the remote control of a chiller yield the most significant consequences on a building system’s operation, including both the building service and the grid service. It is also noted that a cyber-attack impacts the building systems during the attack period as well as the post-attack period, which suggests that both periods should be considered to fully evaluate the consequences of a cyber-attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Sinha, Somnath, and Sindhu B. "Impact of DoS attack in IoT system and identifying the attacker location for interference attacks." In 2021 6th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2021. http://dx.doi.org/10.1109/icces51350.2021.9489041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dayarathne, M. A. S. P., M. S. M. Jayathilaka, and R. M. V. A. Bandara. "Analysis of cyber attacks in power grids with increasing renewable energy penetration." In Engineering Research Unit Symposium 2023. Engineering Research Unit, 2023. http://dx.doi.org/10.31705/eru.2023.13.

Full text
Abstract:
With the application of advanced computer and communication technologies, traditional power systems are converting to cyber-physical power systems. [1] Several secondary systems, like SCADA (Supervisory Control and Data Acquisition), WAMS (Wide Area Monitoring System), AMI (Advanced Metering Infrastructure), and smart substations, are the main cyber-physical subsystems that could be vulnerable to cyber-attacks. [1], [3] Mathematically modeled cyber-attack types such as FDIA (False Data Injection Attack) [1], [2], [3], [4], DoS (Denial of Service) [1], [3], replay attacks, etc. can be modeled using the PSCAD power system model with the addition of renewable power source models to the system. The goal of this project is to develop a PSCAD power system model with increasing renewable power sources, simulate the different kinds of cyber-attacks mentioned above in the PSCAD power system model, collect faulty data, and develop a deep learning model to detect and act against the cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Jovanović, Dragana, Vesna Karadžić, and Milena Vasić. "Risk communication challenges in a biological or chemical terror attack." In Proceedings of the International Congress Public Health - Achievements and Challenges. Institute of Public Health of Serbia "Dr Milan Jovanović Batut", 2024. http://dx.doi.org/10.5937/batutphco24020j.

Full text
Abstract:
Background: Risk and crisis communication is very challenging and even more so in a terrorist attack caused by biological or chemical agents due to its unpredictable emergency scenario and health consequences. Under the EU framework for improving preparedness and strengthening the response capacities to health emergencies of biological, chemical, environmental, and unknown origin, the project "Joint Action to Strengthen Health Preparedness and Response to Biological and Chemical Terror Attacks" (JA TERROR) aims, amongst others, to address gaps in health preparedness to response to biological and chemical terror attacks by cross-sectoral work. Promoting the implementation of risk and crisis communication in all stages of risk management is a focus of the WP7. This article aims to present identified challenges in risk communication in a biological or chemical terror attack. Objective and Methods: A literature review of scientific findings about risk and crisis communication about biological or chemical terror attacks after 2000 and before October 2023 in peer-reviewed journals and English-language publications was performed. Exchange knowledge and lessons learned through project meetings and workshops Results: Overall findings singled out the following risk communication challenges: nature of the threat (differing threat types, unpredictable, global threat), resources (lack of experts and competence, lack of training, lack of experience), cooperation (roles and responsibilities), public perception (psychological reactions, fear, panic, misinformation, etc.), preparedness communication, and communication and providing information during a crisis. In-depth analysis for identification of challenges from the angle of emergency management phases pointed to those Conclusions: The list of identified challenges is not exhausted here, but their sorting out through the emergency management cycle is to highlight and point to those that should be recognised on time and considered for appropriate and time actions to be taken.
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Wei Heng, Weng Foong Liew, Chun Yew Lum, and Seah Fang Lee. "Phishing Security: Attack, Detection, and Prevention Mechanisms." In International Conference on Digital Transformation and Applications (ICDXA 2020). Tunku Abdul Rahman University College, 2020. http://dx.doi.org/10.56453/icdxa.2020.1017.

Full text
Abstract:
While the Internet technologies have been developed over the decades, a significant issue has been coming along with it, the cybercrime. Cybercrime consists of various types of cyberattacks which could bring mild to serious adverse effects to individuals or organizations’ operations. Among those cybercrime attacks, phishing is one of the common mechanisms used. The phishing attack could target on any of the electronic communication users. The paper provides an overview insight on the phishing security concepts, ranging from various types of phishing attack techniques, phishing detection mechanism to prevention approaches. Comparison were included for each of the phishing aspects. Keywords: Phishing attack, phishing detection, phishing prevention, phishing security
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Communicative attack"

1

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under this type of attack is to assume that everything will eventually get compromised. The incident makes a case for why companies should always deploy additional defenses, such as employing security keys, to stay secure in the long term.
APA, Harvard, Vancouver, ISO, and other styles
2

Smythe, Lucy, and Lydia Harriss. Defence of space-based assets. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/pn654.

Full text
Abstract:
Space-based assets (satellites and the terrestrial ground stations that communicate with them) provide critical support to military and civilian operations. They are vulnerable to unintentional damage and disruption, and to deliberate attack. This POSTnote outlines how the UK uses and accesses satellites, potential risks to satellites, and approaches to mitigation.
APA, Harvard, Vancouver, ISO, and other styles
3

Martínez Solana, MY, AG Frazão Nogueira, and KP Valarezo. Communication of crisis management at the United Kingdom 2017’s attacks. Proposal for a protocol 2.0 for the communication of crisis. Revista Latina de Comunicación Social, 2017. http://dx.doi.org/10.4185/rlcs-2017-1235en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report analyzes photographic, video, and written documentation from the incident to evaluate the timeline of the incident and to assess the fire conditions present. Computer modeling using the Fire Dynamics Simulator (FDS) was performed to provide further insight into the fire conditions and the impact of decisions and actions on the fire ground. Additionally, data from a full scale fire test of a similar fire in a similar structure was used to provide additional insight. Four FDS simulations were performed in support of the analysis. These included a simulation of the event as it unfolded and three simulations looking at the impact of alternate tactics which included: initial exterior attack prior to entry, the use of a smoke curtain to protect the building exit path, and interior only attack. FDS simulations provided insight on the heat present in the apartment during the fire and the impact of the interior and exterior suppression on conditions inside the apartment. Full scale test data of a similar fire showed similar behavior to the FDS predictions and gives credence to the FDS results. Results of the analysis suggest that injuries resulted from the length of time the interior attack team was present inside the apartment before actions were taken to reduce the severity of the fire. Six contributing factors were identified including size-up, communication and accountability, delayed exterior attack, lack of entry hall protection, the apartment layout and construction, thermal imager use, and mayday procedures and training. The last contributing factor was a positive contribution that helped avoid more serious injuries. Based on the contributing factors, five recommendations were made that include improved size-up, exterior fire control to prevent exterior spread, protection of exit pathways, basing fire ground tactics on known information, and recognizing when a change in tactics is needed.
APA, Harvard, Vancouver, ISO, and other styles
5

Oliveira, Andrea, and Asunción Huertas-Roig. La comunicación de crisis de Barcelona tras el atentado terrorista / The crisis communication of Barcelona after the terrorist attack. Revista Internacional de Relaciones Públicas, 2018. http://dx.doi.org/10.5783/rirp-15-2018-02-05-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sotello, Wendy J., John T. Penner, Cynthia K. Scharf, and James B. Keeth. F-16 Avionic Systems Attack Control, Instrument and Flight Control, Communication, Navigation, and Penetration Aids. Training Requirements Analysis 452X2. Volume 1. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada252786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Torres-Mancera, Rocio, Carlos de las Heras-Pedrosa, Carmen Jambrino-Maldonado, and Patricia P. Iglesias-Sanchez. Public Relations and the Fundraising professional in the Cultural Heritage Industry: a study of Spain and Mexico / Las relaciones públicas y el profesional de la captación de fondos en la industria del patrimonio cultural: un estudio de España y México. Revista Internacional de Relaciones Públicas, 2021. http://dx.doi.org/10.5783/rirp-21-2021-03-27-48.

Full text
Abstract:
The present research aims to understand the current situation of strategic communication and public relations applied in the professional field of fundraising in the cultural heritage environment. It observes the current patterns used in the sector to obtain and generate long-term sustainable funding, through the stimulation of investors and International Cooperation projects from the European Union in line with UNESCO. Two international case studies are compared: Spain and Mexico, through the selection of territorial samples in Malaga and San Luis Potosi. The methodology used is based on a combination of in-depth interviews with key informants and content analysis. In the first instance, the degree of application of communication and public relations tools for strategic purposes to directly attract economic resources to the management of cultural heritage (tangible and intangible) in the region is studied. In line with the results obtained, the current parameters and key indicators of the profile of the fundraising professional in public and private cultural management are presented.
APA, Harvard, Vancouver, ISO, and other styles
8

Totten, Annette, Dana M. Womack, Marian S. McDonagh, et al. Improving Rural Health Through Telehealth-Guided Provider-to-Provider Communication. Agency for Healthcare Research and Quality, 2022. http://dx.doi.org/10.23970/ahrqepccer254.

Full text
Abstract:
Objectives. To assess the use, effectiveness, and implementation of telehealth-supported provider-to-provider communication and collaboration for the provision of healthcare services to rural populations and to inform a scientific workshop convened by the National Institutes of Health Office of Disease Prevention on October 12–14, 2021. Data sources. We conducted a comprehensive literature search of Ovid MEDLINE®, CINAHL®, Embase®, and Cochrane CENTRAL. We searched for articles published from January 1, 2015, to October 12, 2021, to identify data on use of rural provider-to-provider telehealth (Key Question 1) and the same databases for articles published January 1, 2010, to October 12, 2021, for studies of effectiveness and implementation (Key Questions 2 and 3) and to identify methodological weaknesses in the research (Key Question 4). Additional sources were identified through reference lists, stakeholder suggestions, and responses to a Federal Register notice. Review methods. Our methods followed the Agency for Healthcare Research and Quality Methods Guide (available at https://effectivehealthcare.ahrq.gov/topics/cer-methods-guide/overview) and the PRISMA reporting guidelines. We used predefined criteria and dual review of abstracts and full-text articles to identify research results on (1) regional or national use, (2) effectiveness, (3) barriers and facilitators to implementation, and (4) methodological weakness in studies of provider-to-provider telehealth for rural populations. We assessed the risk of bias of the effectiveness studies using criteria specific to the different study designs and evaluated strength of evidence (SOE) for studies of similar telehealth interventions with similar outcomes. We categorized barriers and facilitators to implementation using the Consolidated Framework for Implementation Research (CFIR) and summarized methodological weaknesses of studies. Results. We included 166 studies reported in 179 publications. Studies on the degree of uptake of provider-to-provider telehealth were limited to specific clinical uses (pharmacy, psychiatry, emergency care, and stroke management) in seven studies using national or regional surveys and claims data. They reported variability across States and regions, but increasing uptake over time. Ninety-seven studies (20 trials and 77 observational studies) evaluated the effectiveness of provider-to-provider telehealth in rural settings, finding that there may be similar rates of transfers and lengths of stay with telehealth for inpatient consultations; similar mortality rates for remote intensive care unit care; similar clinical outcomes and transfer rates for neonates; improvements in medication adherence and treatment response in outpatient care for depression; improvements in some clinical monitoring measures for diabetes with endocrinology or pharmacy outpatient consultations; similar mortality or time to treatment when used to support emergency assessment and management of stroke, heart attack, or chest pain at rural hospitals; and similar rates of appropriate versus inappropriate transfers of critical care and trauma patients with specialist telehealth consultations for rural emergency departments (SOE: low). Studies of telehealth for education and mentoring of rural healthcare providers may result in intended changes in provider behavior and increases in provider knowledge, confidence, and self-efficacy (SOE: low). Patient outcomes were not frequently reported for telehealth provider education, but two studies reported improvement (SOE: low). Evidence for telehealth interventions for other clinical uses and outcomes was insufficient. We identified 67 program evaluations and qualitative studies that identified barriers and facilitators to rural provider-to-provider telehealth. Success was linked to well-functioning technology; sufficient resources, including time, staff, leadership, and equipment; and adequate payment or reimbursement. Some considerations may be unique to implementation of provider-to-provider telehealth in rural areas. These include the need for consultants to better understand the rural context; regional initiatives that pool resources among rural organizations that may not be able to support telehealth individually; and programs that can support care for infrequent as well as frequent clinical situations in rural practices. An assessment of methodological weaknesses found that studies were limited by less rigorous study designs, small sample sizes, and lack of analyses that address risks for bias. A key weakness was that studies did not assess or attempt to adjust for the risk that temporal changes may impact the results in studies that compared outcomes before and after telehealth implementation. Conclusions. While the evidence base is limited, what is available suggests that telehealth supporting provider-to-provider communications and collaboration may be beneficial. Telehealth studies report better patient outcomes in some clinical scenarios (e.g., outpatient care for depression or diabetes, education/mentoring) where telehealth interventions increase access to expertise and high-quality care. In other applications (e.g., inpatient care, emergency care), telehealth results in patient outcomes that are similar to usual care, which may be interpreted as a benefit when the purpose of telehealth is to make equivalent services available locally to rural residents. Most barriers to implementation are common to practice change efforts. Methodological weaknesses stem from weaker study designs, such as before-after studies, and small numbers of participants. The rapid increase in the use of telehealth in response to the Coronavirus disease 2019 (COVID-19) pandemic is likely to produce more data and offer opportunities for more rigorous studies.
APA, Harvard, Vancouver, ISO, and other styles
9

Horton, David, Victoria Soroker, Peter Landolt, and Anat Zada Byers. Characterization and Chemistry of Sexual Communication in Two Psyllid Pests of Pears (Homoptera: Psyllidae). United States Department of Agriculture, 2011. http://dx.doi.org/10.32747/2011.7592653.bard.

Full text
Abstract:
Pear-feeding psyllids in the genus Cacopsylla (Hemiptera: Psyllidae) are among the most important arthropod pests of pears worldwide. These pests are exceedingly difficult to control, and new management tools are needed. Sex attractantpheromones have been used in IPM programs for pests of pome fruits (especially Lepidoptera), but not as yet for pest Hemiptera. Results of the current project showed that males of two psyllid pests of pears, Cacopsylla bidens (Israel) and Cacopsylla pyricola (North America), use volatile or semi-volatile compounds to locate female psyllids for mating. For both species, the attractants can be collected from the cuticle of females by washing live female psyllids with an appropriate solvent. Analysis of these washes by gas chromatography – mass spectrometry led to the following discoveries: Psyllid cuticles contain a mix of hydrocarbons, straight chain and branched alkanes, and long chain aldehydes The two species have different chemical profiles Chemical profiles change seasonally and with reproductive status Chemical profiles differ between male and reproductive female psyllids Several specific compounds found to be more abundant in attractive females than males were identified and synthesized. Behavioral assays (olfactometer) were then used to determine whether these compounds were attractive to males. Two compounds showed promise as attractants for male psyllids: 7-methylheptacosane (C. bidens) and 13-methylheptacosane (C. pyricola and C. bidens). These are the first sex attractantpheromones identified for any psyllid species. Field tests showed that the chemicals could be used to attract males under orchard conditions, but that effectiveness in the field appeared to be seasonally variable. Future research plans include: (a) test mixtures of compounds; (b) explore seasonality in field response to compounds; (c) determine whether chirality of the two compounds affects their attractiveness; and (d) compare different types of traps and release devices to optimize lure performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Drury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.

Full text
Abstract:
Background: Public behaviour and the new hostile threats • Civil contingencies planning and preparedness for hostile threats requires accurate and up to date knowledge about how the public might behave in relation to such incidents. Inaccurate understandings of public behaviour can lead to dangerous and counterproductive practices and policies. • There is consistent evidence across both hostile threats and other kinds of emergencies and disasters that significant numbers of those affected give each other support, cooperate, and otherwise interact socially within the incident itself. • In emergency incidents, competition among those affected occurs in only limited situations, and loss of behavioural control is rare. • Spontaneous cooperation among the public in emergency incidents, based on either social capital or emergent social identity, is a crucial part of civil contingencies planning. • There has been relatively little research on public behaviour in response to the new hostile threats of the past ten years, however. • The programme of work summarized in this briefing document came about in response to a wave of false alarm flight incidents in the 2010s, linked to the new hostile threats (i.e., marauding terrorist attacks). • By using a combination of archive data for incidents in Great Britain 2010-2019, interviews, video data analysis, and controlled experiments using virtual reality technology, we were able to examine experiences, measure behaviour, and test hypotheses about underlying psychological mechanisms in both false alarms and public interventions against a hostile threat. Re-visiting the relationship between false alarms and crowd disasters • The Bethnal Green tube disaster of 1943, in which 173 people died, has historically been used to suggest that (mis)perceived hostile threats can lead to uncontrolled ‘stampedes’. • Re-analysis of witness statements suggests that public fears of Germany bombs were realistic rather than unreasonable, and that flight behaviour was socially structured rather than uncontrolled. • Evidence for a causal link between the flight of the crowd and the fatal crowd collapse is weak at best. • Altogether, the analysis suggests the importance of examining people’s beliefs about context to understand when they might interpret ambiguous signals as a hostile threat, and that. Tthe concepts of norms and relationships offer better ways to explain such incidents than ‘mass panic’. Why false alarms occur • The wider context of terrorist threat provides a framing for the public’s perception of signals as evidence of hostile threats. In particular, the magnitude of recent psychologically relevant terrorist attacks predicts likelihood of false alarm flight incidents. • False alarms in Great Britain are more likely to occur in those towns and cities that have seen genuine terrorist incidents. • False alarms in Great Britain are more likely to occur in the types of location where terrorist attacks happen, such as shopping areass, transport hubs, and other crowded places. • The urgent or flight behaviour of other people (including the emergency services) influences public perceptions that there is a hostile threat, particularly in situations of greater ambiguity, and particularly when these other people are ingroup. • High profile tweets suggesting a hostile threat, including from the police, have been associated with the size and scale of false alarm responses. • In most cases, it is a combination of factors – context, others’ behaviour, communications – that leads people to flee. A false alarm tends not to be sudden or impulsive, and often follows an initial phase of discounting threat – as with many genuine emergencies. 2.4 How the public behave in false alarm flight incidents • Even in those false alarm incidents where there is urgent flight, there are also other behaviours than running, including ignoring the ‘threat’, and walking away. • Injuries occur but recorded injuries are relatively uncommon. • Hiding is a common behaviour. In our evidence, this was facilitated by orders from police and offers from people staff in shops and other premises. • Supportive behaviours are common, including informational and emotional support. • Members of the public often cooperate with the emergency services and comply with their orders but also question instructions when the rationale is unclear. • Pushing, trampling and other competitive behaviour can occur,s but only in restricted situations and briefly. • At the Oxford Street Black Friday 2017 false alarm, rather than an overall sense of unity across the crowd, camaraderie existed only in pockets. This was likely due to the lack of a sense of common fate or reference point across the incident; the fragmented experience would have hindered the development of a shared social identity across the crowd. • Large and high profile false alarm incidents may be associated with significant levels of distress and even humiliation among those members of the public affected, both at the time and in the aftermath, as the rest of society reflects and comments on the incident. Public behaviour in response to visible marauding attackers • Spontaneous, coordinated public responses to marauding bladed attacks have been observed on a number of occasions. • Close examination of marauding bladed attacks suggests that members of the public engage in a wide variety of behaviours, not just flight. • Members of the public responding to marauding bladed attacks adopt a variety of complementary roles. These, that may include defending, communicating, first aid, recruiting others, marshalling, negotiating, risk assessment, and evidence gathering. Recommendations for practitioners and policymakers • Embed the psychology of public behaviour in emergencies in your training and guidance. • Continue to inform the public and promote public awareness where there is an increased threat. • Build long-term relations with the public to achieve trust and influence in emergency preparedness. • Use a unifying language and supportive forms of communication to enhance unity both within the crowd and between the crowd and the authorities. • Authorities and responders should take a reflexive approach to their responses to possible hostile threats, by reflecting upon how their actions might be perceived by the public and impact (positively and negatively) upon public behaviour. • To give emotional support, prioritize informative and actionable risk and crisis communication over emotional reassurances. • Provide first aid kits in transport infrastructures to enable some members of the public more effectively to act as zero responders.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography