To see the other types of publications on this topic, follow the link: Defense Threat Reduction Agency.

Journal articles on the topic 'Defense Threat Reduction Agency'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Defense Threat Reduction Agency.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

McDonald, Kenneth, Marshall Malone, Alex Fumerelle, Madison Oliver, and Mack Ohlinger. "Consequence Management Assessment Method Synthesis for Combatant Commands." Industrial and Systems Engineering Review 3, no. 2 (July 16, 2015): 131–42. http://dx.doi.org/10.37266/iser.2015v3i2.pp131-142.

Full text
Abstract:
One of the most important roles that the US fulfills in the global war on terror and their integration with Partner Nations (PNs) is minimizing the threats and effects of weapons of mass destruction (WMD) as well as Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) attacks by enemy nations, rogue elements, or terrorist groups around the world. The Defense Threat Reduction Agency (DTRA) currently implements an assessment framework for determining a PN’s state of CBRNE readiness, but it is unable to conceptualize that assessment at a regional or Combatant Command (CCMD) level. This research uses the Systems Decision Process (SDP) to create an assessment metric that is capable of synchronizing PN CBRNE readiness across a CCMD into a single assessment. This research is focused on developing an effective and flexible Microsoft Access database, which evaluates all global PNs across a wide array of metrics and then synthesizes them through multi-purpose objectives in order to develop an encompassing assessment framework at the CCMD level.
APA, Harvard, Vancouver, ISO, and other styles
2

McDonald, Kenneth, Derek Sanchez, Kenneth Voet, Ryan Powis, Joshua Norris, and Rob Prins. "Developing Fuzzy Cognitive Mapping Techniques for Consequence Analysis of Second and Third Order Effects." Industrial and Systems Engineering Review 3, no. 2 (July 16, 2015): 71–81. http://dx.doi.org/10.37266/iser.2015v3i2.pp71-81.

Full text
Abstract:
The Defense Threat Reduction Agency (DTRA) is the Department of Defense’s (DOD) official Combat Support Agency for countering weapons of mass destruction (WMD). DTRA focuses on WMD and mitigating the consequences of a chemical, biological, radiological, nuclear and high yield explosive threat (CBRNE). The initial direct effects of a CBRNE incident are well defined and documented; however, the second and third order effect’s are complex and not thoroughly understood or documented. Consequence analysis is the practice of analyzing the effects of major events such as a CBRNE event and can assist in predicting the second and third order effects. Currently there is no method to predict or analyze the second and third order effects of CBRNE events. This research focused on identifying the entities associated with a CBRNE event initially. The use of experts and surveys developed an exhaustive list of entities and associated realtionships. The follow-on research focused on the type and strength of the entity relationships. Next, Fuzzy Cognitive Mapping (FCM) techniques identify and evaluate the complex relationships of the second and third order effects. Using a mind mapping computer program, FCM techniques produced second and third order effect relationships. The final product provided a solid first attempt at analyzing a CBRNE event and the associated second and third order effects. Subsequent research will require greater effort to employ system dynamics techniques to enhance the product and develop a more thorough model.
APA, Harvard, Vancouver, ISO, and other styles
3

Broadway, Katherine M., Kierstyn T. Schwartz-Watjen, Anna L. Swiatecka, Steven J. Hadeed, Akeisha N. Owens, Sweta R. Batni, and Aiguo Wu. "Operational Considerations in Global Health Modeling." Pathogens 10, no. 10 (October 19, 2021): 1348. http://dx.doi.org/10.3390/pathogens10101348.

Full text
Abstract:
Epidemiological modeling and simulation can contribute cooperatively across multifaceted areas of biosurveillance systems. These efforts can be used to support real-time decision-making during public health emergencies and response operations. Robust epidemiological modeling and simulation tools are crucial to informing risk assessment, risk management, and other biosurveillance processes. The Defense Threat Reduction Agency (DTRA) has sponsored the development of numerous modeling and decision support tools to address questions of operational relevance in response to emerging epidemics and pandemics. These tools were used during the ongoing COVID-19 pandemic and the Ebola outbreaks in West Africa and the Democratic Republic of the Congo. This perspective discusses examples of the considerations DTRA has made when employing epidemiological modeling to inform on public health crises and highlights some of the key lessons learned. Future considerations for researchers developing epidemiological modeling tools to support biosurveillance and public health operations are recommended.
APA, Harvard, Vancouver, ISO, and other styles
4

Bishop, Jordan W., Philip S. Blom, and David Fee. "Infrasound propagation with realistic terrain and atmospheres using a finite-difference time-domain method." Journal of the Acoustical Society of America 152, no. 4 (October 2022): A251. http://dx.doi.org/10.1121/10.0016176.

Full text
Abstract:
Numerous infrasound observations and complementary numerical simulations have shown that infrasound propagation is strongly influenced by terrain within approximately 10 km from the source. Recent computational efforts using ray theory have shown that terrain influence extends over hundreds of km and is especially strong for waves ducted in the troposphere. Wind and temperature gradients also have a strong influence on propagation at these distances, which suggests that both terrain and atmospheric structure need to be accounted for in waveform modeling at a wide range of distances. Here we show preliminary results from numerical simulations of linear acoustic propagationthrough a moving, inhomogeneous atmosphere using a finite-difference time domain propagation code. We compare our synthetic waveforms in two and three dimensions with existing community infrasound propagation codes and discuss future developments, including open source licensing. Finally, we present preliminary comparisons between modeling and observations from a large-scale explosion at the Utah Testing and Training Range. This scenario highlights the importance of using full-wave modeling compared to ray methods to explain the observed waveforms. [Work funded by the Defense Threat Reduction Agency. Cleared for release.]
APA, Harvard, Vancouver, ISO, and other styles
5

Joshi, Sunil K., Gillian Lang, T. Scott Devera, Lindsay M. Aye, Hemangi B. Shah, Jimmy Ballard, and Mark Lang. "Bacillus anthracis lethal toxin abrogates TCR-induced cytokine production by CD1d-restricted Natural killer like - T cells (134.15)." Journal of Immunology 182, no. 1_Supplement (April 1, 2009): 134.15. http://dx.doi.org/10.4049/jimmunol.182.supp.134.15.

Full text
Abstract:
Abstract Exogenous CD1d-binding glycolipid (α-Galactosylceramide, α-GC) stimulates TCR signaling and activation and proliferation of type-1 natural killer like - T (NKT) cells. These activated NKT cells play a central role in regulation of adaptive and protective immune responses against pathogens and tumors. In the present study, we tested the direct in vivo and in vitro effect of Bacillus anthracis lethal toxin (LT) on NKT cells. LT is a complex protein formed by pore-forming protective antigen (PA) upon binary combination with lethal factor (LF) subunit. A sub-lethal dose of LT administered in vivo in C57BL/6 mice altered expression of the activation receptor NKG2D by NKT cells but not by NK cells. We observed that NKT cells expressed anthrax toxin receptors (CMG-2 and TEM-8) and bound PA more than other immune cell types. The in vivo administration of LT led to decreased TCR-induced cytokine secretion but did not affect TCR expression. We propose that Bacillus anthracis-derived LT contributes to immune evasion by altering NKT function. This work was supported by Defense Threat Reduction Agency (DTRA) grant CBDIF-07-PRET-01 to M.L.L and by a pilot award to M.L.L. as part of NIH grant 5 U19 AI062629-05.
APA, Harvard, Vancouver, ISO, and other styles
6

Bugayko, Dmytro, Yuliya Ierkovska, Fariz Aliyev, and Mariia Bahrii. "The concept of national integrated risk management of aviation transport of Ukraine." Electronic Scientific Journal Intellectualization of Logistics and Supply Chain Management #1 2020 1, no. 10 (December 2021): 6–18. http://dx.doi.org/10.46783/smart-scm/2021-10-1.

Full text
Abstract:
In the context of modern conditions of air transport development, the concept of the national air transport integrated risk management system is substantiated. The concept is based on the definition of risk as the probability of occurrence of events in a complex of hazards of different nature, manifestations of safety vulnerabilities, consequences of past negative phenomena and explains the danger of the threat due to determination "maximum potential energy". Its remaining part is subsequently converted into kinetic energy, which affects the safety management system of air transport and has a negative impact on the sustainable development of the national economy as a whole. At the same time, priority attention is paid to the list of hazards by the criterion of deviation from the point of sustainable development, the importance of the impact of threats on the coefficient of elasticity, which allows more adequate assessment of hazards and respond to them. The classification of the main risks in the functioning of Ukrainian air transport has been developed, which includes the negative consequences of the COVID-19 pandemic, reduction of export-import operations in the economic downturn, number of flights and air passenger traffic, low congestion of airports and air infrastructure. Risks are identified in the following areas of operation and development of air transport in Ukraine: export-import operations, aviation infrastructure, air cargo, airports, air navigation service providers and general aviation, which allows early detection of risks and response to them. The concept was implemented by the State Aviation Regulation Department of the Ministry of Defense of Ukraine, the State Civil Aviation Agency of Azerbaijan, Almaty International Airport (Kazakhstan), Ukraine-Air Alliance, ICAO NAU Institute, Georgian Aviation Training Center (Georgia).
APA, Harvard, Vancouver, ISO, and other styles
7

Watson, David E., Rosemarie Hunziker, and John P. Wikswo. "Fitting tissue chips and microphysiological systems into the grand scheme of medicine, biology, pharmacology, and toxicology." Experimental Biology and Medicine 242, no. 16 (October 2017): 1559–72. http://dx.doi.org/10.1177/1535370217732765.

Full text
Abstract:
Microphysiological systems (MPS), which include engineered organoids (EOs), single organ/tissue chips (TCs), and multiple organs interconnected to create miniature in vitro models of human physiological systems, are rapidly becoming effective tools for drug development and the mechanistic understanding of tissue physiology and pathophysiology. The second MPS thematic issue of Experimental Biology and Medicine comprises 15 articles by scientists and engineers from the National Institutes of Health, the IQ Consortium, the Food and Drug Administration, and Environmental Protection Agency, an MPS company, and academia. Topics include the progress, challenges, and future of organs-on-chips, dissemination of TCs into Pharma, children’s health protection, liver zonation, liver chips and their coupling to interconnected systems, gastrointestinal MPS, maturation of immature cardiomyocytes in a heart-on-a-chip, coculture of multiple cell types in a human skin construct, use of synthetic hydrogels to create EOs that form neural tissue models, the blood–brain barrier-on-a-chip, MPS models of coupled female reproductive organs, coupling MPS devices to create a body-on-a-chip, and the use of a microformulator to recapitulate endocrine circadian rhythms. While MPS hardware has been relatively stable since the last MPS thematic issue, there have been significant advances in cell sourcing, with increased reliance on human-induced pluripotent stem cells, and in characterization of the genetic and functional cell state in MPS bioreactors. There is growing appreciation of the need to minimize perfusate-to-cell-volume ratios and respect physiological scaling of coupled TCs. Questions asked by drug developers are followed by an analysis of the potential value, costs, and needs of Pharma. Of highest value and lowest switching costs may be the development of MPS disease models to aid in the discovery of disease mechanisms; novel compounds including probes, leads, and clinical candidates; and mechanism of action of drug candidates. Impact statement Microphysiological systems (MPS), which include engineered organoids and both individual and coupled organs-on-chips and tissue chips, are a rapidly growing topic of research that addresses the known limitations of conventional cellular monoculture on flat plastic – a well-perfected set of techniques that produces reliable, statistically significant results that may not adequately represent human biology and disease. As reviewed in this article and the others in this thematic issue, MPS research has made notable progress in the past three years in both cell sourcing and characterization. As the field matures, currently identified challenges are being addressed, and new ones are being recognized. Building upon investments by the Defense Advanced Research Projects Agency, National Institutes of Health, Food and Drug Administration, Defense Threat Reduction Agency, and Environmental Protection Agency of more than $200 million since 2012 and sizable corporate spending, academic and commercial players in the MPS community are demonstrating their ability to meet the translational challenges required to apply MPS technologies to accelerate drug development and advance toxicology.
APA, Harvard, Vancouver, ISO, and other styles
8

Warner, Steve, Nathan Platt, James F. Heagy, Jason E. Jordan, and George Bieberbach. "Comparisons of Transport and Dispersion Model Predictions of the Mock Urban Setting Test Field Experiment." Journal of Applied Meteorology and Climatology 45, no. 10 (October 1, 2006): 1414–28. http://dx.doi.org/10.1175/jam2410.1.

Full text
Abstract:
Abstract The potential effects of a terrorist attack involving the atmospheric release of chemical, biological, radiological, nuclear, or other hazardous materials continue to be of concern to the United States. The Defense Threat Reduction Agency has developed a Hazard Prediction Assessment Capability (HPAC) that includes initial features to address hazardous releases within an urban environment. Improved characterization and understanding of urban transport and dispersion are required to allow for more robust modeling. In 2001, a scaled urban setting was created in the desert of Utah using shipping containers, and tracer gases were released. This atmospheric tracer and meteorological study is known as the Mock Urban Setting Test (MUST). This paper describes the creation of sets of HPAC predictions and comparisons with the MUST field experiment. Strong consistency between the conclusions of this study and a previously reported HPAC evaluation that relied on urban tracer observations within the downtown area of Salt Lake City was found. For example, in both cases, improved predictions were associated with the inclusion of a simple empirically based urban dispersion model within HPAC, whereas improvements associated with the inclusion of a more computationally intensive wind field module were not found. The use of meteorological observations closest to the array and well above the obstacle array—the sonic anemometer measurements 16 m above ground level—resulted in predictions with the best fit to the observed tracer concentrations. The authors speculate that including meteorological observations or vertical wind profiles above or upwind of an urban region might be a sufficient input to create reasonable HPAC hazard-area predictions.
APA, Harvard, Vancouver, ISO, and other styles
9

Zeng, Xianlin, and Qing Hui. "Partial Cluster Stabilization and Partial Cascade Stabilization of Physical Networks**This work was supported by the Defense Threat Reduction Agency, Basic Research Award #HDTRA1-10-1-0090 and Fundamental Research Award #HDTRA1-13-1-0048." IFAC-PapersOnLine 48, no. 27 (2015): 230–35. http://dx.doi.org/10.1016/j.ifacol.2015.11.180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Warner, Steve, Nathan Platt, Jeffry T. Urban, and James F. Heagy. "Comparisons of Transport and Dispersion Model Predictions of the Joint Urban 2003 Field Experiment." Journal of Applied Meteorology and Climatology 47, no. 7 (July 1, 2008): 1910–28. http://dx.doi.org/10.1175/2007jamc1802.1.

Full text
Abstract:
Abstract For a hazardous material release in a city or densely populated area, effective mitigation requires an understanding of the transport and dispersion of these hazards in the complex urban environment. Improved characterization and understanding of urban transport and dispersion will allow for more robust modeling. The Defense Threat Reduction Agency has developed a Hazard Prediction Assessment Capability (HPAC) that includes features to address hazardous releases within an urban environment. During the summer of 2003, a series of tracer gas releases were carried out in Oklahoma City, Oklahoma, and extensive meteorological and tracer concentration measurements were collected in a field experiment known as Joint Urban 2003 (JU03). This analysis uses the observations of JU03 to evaluate “Urban HPAC.” Twenty sets of simulations, or “predictions,” using four Urban HPAC modes and five meteorological input options, were created and compared using a variety of metrics. Strong consistency was found between the conclusions of this study and those of two previously reported Urban HPAC evaluations. For example, improved predictions were associated with the inclusion of a simple empirically based urban dispersion model within HPAC, whereas improvements associated with the inclusion of a more computationally intensive urban wind module were not found. In this study, two new results are reported. First, there was a substantial difference in the performance of Urban HPAC as a function of release time—day or night—that was not discovered earlier because the previously examined urban field experiments focused on nighttime releases only. Daytime releases tended to be underpredicted and nighttime releases tended to be overpredicted. Second, and with respect to the under- and overpredictions described above, the inclusion of the new “Micro” Stationary Wind Fit and Turbulence (SWIFT) “SPRAY” (MSS) Urban HPAC mode typically led to less underprediction during the day and less overprediction at night than the other Urban HPAC modes. In addition, predictions that included MSS typically resulted in the least scatter between observations and predictions. These improvements warrant further investigation to determine whether this conclusion can be extended to other urban environments.
APA, Harvard, Vancouver, ISO, and other styles
11

Carter, Samuel G., Ignas Lekavicius, Hunter B. Banks, Oney O. Soykal, Shojan P. Pavunny, Dan Pennachio, Jenifer R. Hajzus, et al. "(Invited) Spin and Optical Properties of the Silicon Vacancy in 4H-SiC for Quantum Science and Technology." ECS Meeting Abstracts MA2022-02, no. 34 (October 9, 2022): 1249. http://dx.doi.org/10.1149/ma2022-02341249mtgabs.

Full text
Abstract:
Silicon vacancies in SiC are of significant interest for quantum information and sensing due to their unusual combination of long spin coherence time, optical addressability, and room-temperature operation in an industrially-relevant semiconductor. We characterize the spin and optical properties of the V2 silicon vacancy in 4H-SiC for both single defects and ensembles. We also show that they can be deterministically placed with sub-micron precision using focused Li ion implantation. Low-temperature photoluminescence excitation spectroscopy of the spin-dependent optical transitions of single silicon vacancies reveals two sharp lines with linewidths near the radiative lifetime limit. These lines correspond to the ms=±1/2 and ms=±3/2 states of an S=3/2 spin system that can be optically initialized, coherently manipulated with RF pulses, and read out via spin-dependent photoluminescence. We measure the different properties of spins in the two bases, and compare them to theoretical models. To suppress the limiting effects of the nuclear spin bath, we grow isotopically purified SiC with a very low abundance of 29Si and 13C. Our room temperature spin coherence measurements show orders-of-magnitude improvement of the coherence times in these materials. In particular, the inhomogeneous dephasing time T2 * in the ms=±1/2 basis shows a ~100x improvement, reaching 20 μs. We consider the prospects of this system for quantum sensing and as an efficient spin-photon interface for use in quantum networks. This work was supported by the U.S. Office of Naval Research, the OSD Quantum Sciences and Engineering Program, the Defense Threat Reduction Agency, and the Center for Integrated Nanotechnologies, an Office of Science User Facility operated for the U.S. Department of Energy (DOE) Office of Science. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.
APA, Harvard, Vancouver, ISO, and other styles
12

Lopez, Natalia, Srishti Tyagi, and Matthew P. DeLisa. "Changes in the structure of lipid A in glycosylated outer membrane vesicles (glycOMVs) suppress the activation of glycan-specific B1 cells in vivo." Journal of Immunology 208, no. 1_Supplement (May 1, 2022): 116.12. http://dx.doi.org/10.4049/jimmunol.208.supp.116.12.

Full text
Abstract:
Abstract B1 cells differ from B2 cells in their developmental origin, phenotype, and function. They are anatomically located in various tissues of the immune system, and contribute to around 90% of the circulating antibodies in blood. B1 cells are often activated in a T-cell independent manner promoted by either antigens that contain a B-cell mitogen such as LPS, or by molecules that have highly repetitive structures such as bacterial capsular polysaccharides, with both pathways having the potential to undergo class-switch recombination and somatic hypermutation. Previously, we have shown that immunization with bacterial outer membrane vesicles engineered to display defined glycan structures on their surface (glycOMVs) promotes a strong glycan-specific IgG response for a wide range of bacterial and mammalian glycans. Here, we show that the structure of lipid A in these (glycOMVs) displaying the oncofetal antigen polysialic acid (polySia), influences the activation and class-switching of polySia-specific B1 cells from the spleen and peritoneal cavity in mice. We found that structural remodeling of lipid A from its normal hexa-acylated structure to a penta-acylated variant prevents the activation of polySia-specific B1 cells in the spleen and enhances the activation of polySia-specific B2 cells from the peritoneal cavity. Interestingly, we observed no changes in the glycan-specific IgG titers following immunization of wildtype B6 mice with either construct, even though there was no B cell activation in the spleen of mice receiving penta-acylated glycOMVs. However, these same glycOMVs failed to promote a glycan-specific IgG response in T-deficient mice, suggesting that this response was entirely T-cell dependent. This work was supported by Bill and Melinda Gates Foundation grant OPP1217652 (to MPD), NSF grants CBET-1159581, CBET-1264701 and CBET-1936823 (to MPD), the Defense Threat Reduction Agency (DTRA) grants HDTRA1-15-10052 and HDTRA1-20-10004 (to MPD), NIH grants 1R01GM137314 and 1R01GM127578 (to MPD) and the Fleming Scholars Fellowship (to NLB).
APA, Harvard, Vancouver, ISO, and other styles
13

Schreiner, James. "Foreword by Guest Editor LTC James H. Schreiner, PhD, PMP, CPEM." Industrial and Systems Engineering Review 8, no. 1 (March 6, 2021): 1. http://dx.doi.org/10.37266/iser.2020v8i1.pp1.

Full text
Abstract:
FOREWORD This special issue of the Industrial and Systems Engineering Review highlights top papers from the 2020 annual General Donald R. Keith memorial capstone conference held at the United States Military Academy in West Point, NY. The conference was certainly a first of its kind virtual conference including asynchronous delivery of paper presentations followed by synchronous question and answer sessions with evaluation panels. Following a careful review of 63 total submissions, eleven were selected for publication in this journal. Unique to this year’s special edition is the mixed selection of seven project team capstone papers, and four honors research papers. Each paper incorporated features of systems or industrial engineering and presented detailed and reflective analysis on the topic. Although there are many elements which cut across the works, three general bodies of knowledge emerged in the papers including: systems engineering and decision analysis, systems design, modeling and simulation, and system dynamics. Systems Engineering and Decision Analysis topics included three unique contributions. Recognized as ‘best paper’ at the 2020 virtual conference, the work of Robinson et al. designed a multi-year predictive cost engineering model enabled through an MS O365 Power BI decision support interface to support U.S. Army Corps of Engineer (USACE) inland waterway national investment strategies. Schloo and Mittal’s work presents research in testing and evaluation of the Engagement Skills Trainer (EST) 2000 towards improving real-world soldier performance. Gerlica et al. employs a robust and scalable K-means clustering methodology to improve decision making in defensive shift schemes for Air Force Baseball outfield personnel. Systems Design works included three unique contributions. Binney et al. worked to design evaluation criteria for military occupational specialties associated with open-source intelligence (OSINT) analysts for the Army’s OSINT Office. Hales et al. interdisciplinary work aided in the design of search and identification systems to be incorporated on autonomous robotics to enable survivability improvements for the Army’s chemical, biological, radiological, nuclear, and explosives (CBRNE) units. Burke and Connell evaluated and designed a performance measurement-based assessment methodology for U.S. Pacific Command’s Key Leader Engagement process. System modeling and simulation included three unique contributions: Arderi et al. simulated and assessed how the Hyper-Enabled Operator (HEO) project improves situational awareness for U.S. Special Forces using the Infantry Warrior Simulation (IWARS). Blanks et al. employed a VBA module and Xpress software for a scheduling optimization model for enhancement of final exam scheduling at the U.S. Air Force Academy. Kelley and Mittal utilized a Batch Run Analysis and Simulation Studio (BRASS) program to batch multiple iterations of IWARS scenarios to study the integration of autonomous systems alongside military units. Finally, two unique contributions utilizing system dynamics (SD) modeling is presented: Dixon and Krueger developed a Vensim SD model to examine how policy recommendations across Central America could restrict gang activities while positively promoting women’s involvement in society. Cromer et al. utilized systems design approaches and a K-means clustering machine learning techniques to develop SD models in support of the U.S. Africa Command and Defense Threat Reduction Agency to examine the interdependence of threats across the Horn of Africa. Thank you and congratulations to the 2020 undergraduate scholars and all authors who provided meaningful contributions through steadfast intellectual efforts in their fields of study! Well done! LTC James H. Schreiner, PhD, PMP, CPEM Program Director, Systems and Decision Sciences (SDS) Department of Systems Engineering United States Military Academy Mahan Hall, Bldg 752, Room 423 West Point, NY 10996, USA james.schreiner@westpoint.edu
APA, Harvard, Vancouver, ISO, and other styles
14

Williams, Adam, and Rodney Wilson. "“Defense by other means”: future evolution(s) of cooperative threat reduction." Nonproliferation Review 25, no. 5-6 (September 2, 2018): 501–22. http://dx.doi.org/10.1080/10736700.2018.1593685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wicaksono, Harimurti, Syaiful Anwar, and Bambang Eko Suhariyanto. "THE ROLE OF THE ELECTION SUPERVISORY AGENCY ASNIRMILITARY DEFENSE COMPONENT." International Journal of Advanced Research 8, no. 10 (October 31, 2020): 1268–74. http://dx.doi.org/10.21474/ijar01/11965.

Full text
Abstract:
This study aims to analyze the role of Bawaslu in implementing non-military defence that occurs in the context of money politics. The research process tries to examine the cases that occurred in the Regional Head Election in Malang Raya. Money politics is a type of election violation, namely by giving and distributing money to prospective voters to be able to vote for that candidate. Money politics is closely related to corrupt behaviour and is a national threat. Therefore we need one step in anticipating this so that this does not happen again. This research uses qualitative research methods. Data mining was carried out, utilizing in-depth interviews with several sources to be able to extract primary data. Furthermore, literature studies are also used to enrich research data. The results showed that the General Election that occurred in Malang Raya was an election that was quite lively with money politics. Although the steps taken by the regional Bawaslu are quite reasonable, some adjustments and strengthening are still needed so that a similar thing does not happen. Some things that can be done are to include Bawaslu and money politics into the PKBN module. Besides, strengthening the intelligence function in election supervision is also essential.
APA, Harvard, Vancouver, ISO, and other styles
16

Zvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information." Mediaforum : Analytics, Forecasts, Information Management, no. 6 (December 17, 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.

Full text
Abstract:
The focus of the article revolves around NATO’s roadmap of smart defense against cyber attacks as the bedrock of Euro-Atlantic security. The author discloses NATO’S new policy and cutting-edge technical initiatives, aimed at focusing on countering global threats and cyber security challenges. It is stressed out, that new ideas towards a more synergetic approach between all the NATO Cyber Defense agencies should be explored to develop a shared framework for cybersecurity that might provide up-to-the date intelligence in order to ensure the development, acquisition and maintenance of the necessary military capabilities. The research highlights the core aspects of the 2010 Lisbon Summit that adopted NATO’s Strategic Concept ‘Active Engagement, Modern Defense: Strategic Concept for the Members of the North Atlantic. Treaty Organization’, that recognizes Cyber Defense as one of its strategic priorities. In particular, to foster Allied Nations’ cooperative efforts to counter terrorism, cyber attacks, prevent the proliferation of nuclear weapons and other weapons of mass destruction (WMD), Reinforce energy security and environmental constraints. Develop the capacity to contribute to energy security, including protection of critical energy infrastructure and transit areas and lines, cooperation with partners, and consultations among Allies on the basis of trategic assessments and contingency planning; In July 2011, NATO Defense Ministers adopted revised NATO Policy on Cyber Defense, which highlighted three areas: • The principles of subsidiarity and proportionality, which involve the assistance provided only upon request, in any other cases, the principle of selfresponsibility of sovereign states is applied; • Avoiding unnecessary duplication of the structures or capabilities and approaches on the international, regional and national levels; • Collaboration based on trust, with regard to the potential sensitivity and vulnerability of the system, the access to which has to be given. After the 2014 Wales Summit, in the revised NATO Cyber Defense Policy, cyber threats were identified as a potential prerequisite for collective defense under the Article 5 of the NATO Treaty. Noteworthy, Cyber Security is responsible for providing the broad spectrum of services in the following specialist security areas: CIS Security, Cyber Defense, Information Assurance, and Computer & Communications Security. Cyber defense is provided by many Alliance bodies: any NATO response concerning collective defense against cyber attacks will be subordinated to the North Atlantic Council (NAC), The Cyber Defense Committee (CDC) – the leading advisory body of the NAC. The executive level is represented by The Cyber Defense Management Board (CDMB), NATO Communications and Information Agency (NCI Agency), Cyber Security incorporates the NATO Computer Incident Response Capability (NCIRC) Technical Centre, providing specialist services to prevent, detect, respond to and recover from cyber security incidents.
APA, Harvard, Vancouver, ISO, and other styles
17

Ginanjar, Yusep. "STRATEGI INDONESIA MEMBENTUK CYBER SECURITY DALAM MENGHADAPI ANCAMAN CYBER CRIME MELALUI BADAN SIBER DAN SANDI NEGARA." Jurnal Dinamika Global 7, no. 02 (December 15, 2022): 291–312. http://dx.doi.org/10.36859/jdg.v7i02.1187.

Full text
Abstract:
Cyber security has become a priority issue for all countries in the world since information and communication technology is used in various aspects of life, both in social, economic, legal, organizational, health, education, culture, government, security, defense, and other aspects. In direct proportion to the high level of utilization of information and communication technology, the level of risk and threat of misuse of information and communication technology is also getting higher and more complex. In response to these events, Indonesia then formed the National Cyber and Crypto Agency (BSSN) as a model for national cyber security institutions. This study uses a qualitative method with a descriptive approach. The purpose of this research is to find out how Indonesia's strategy in establishing cyber security in dealing with the threat of cyber crime through the National Cyber and Crypto Agency.
APA, Harvard, Vancouver, ISO, and other styles
18

Taquechel, Eric. "Layered defense: modeling terrorist transfer threat networks and optimizing network risk reduction." IEEE Network 24, no. 6 (November 2010): 30–35. http://dx.doi.org/10.1109/mnet.2010.5634440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Gabrieli, Fanema, and Hikmat Zakky Almubaroq. "The Potential of The Hydroponic Vegetables to Support Food Security in Defense Management Perspective." JESS (Journal of Education on Social Science) 5, no. 2 (January 31, 2022): 194. http://dx.doi.org/10.24036/jess.v5i2.386.

Full text
Abstract:
In order to support food security, it would be better if the food priority is not only limited to rice, but also supports and optimizes the diversity of technology-based products such as hydroponic vegetables. In Medan City, the hydroponic market was still relatively small. This was seen from the unavailability of hydroponic products sold in various shopping canters. The objective of the study was to identify the internal and external factors in increasing the management of hydroponic vegetables and to formulate the development strategy of hydroponic vegetables in Medan, in order to support food security. The research used a descriptive analytic method by using SWOT, defence management, and food security theory. The samples were taken by using snowball sampling technique. Respondents consisted of several farmers, members of the Hydroponic Community in Medan City (HCM), consumers, officials of the Food Security Agency (BKP) of Medan, and a counsellor from the Agriculture Agency. SWOT matrix analysis of internal and external factors of the Food Security Agency (BKP), Medan showed that the hydroponic vegetables farming development strategy was in quadrant one. The recommended strategy was aggressive strategy which was focused on using strength and opportunity owned by the Food Security Agency (BKP) in order to cope with weakness and threat
APA, Harvard, Vancouver, ISO, and other styles
20

Candra, Ahmad, Suhardi Suhardi, and Pratama Dahlian Persadha. "INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 3 (December 31, 2021): 441. http://dx.doi.org/10.33172/jp.v7i3.1424.

Full text
Abstract:
<div><p class="Els-history-head">The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age. An effective strategy is needed to be carried out by the Government of Indonesia. This article analyzes the strategies implemented by the Government of Indonesia in dealing with the threat of cyber warfare. This study represents the use qualitative approach with an analytical descriptive design. The results of this study explain that the threat of cyber warfare in the future may have an impact that could shake the stability of national security. Through the National Cyber and Crypto Agency (Badan Siber dan Sandi Negara, BSSN) as the leading sector in handling national cyber problems, the Indonesian Government has taken strategic steps to safeguard the national interests and goals of the Indonesian nation and other state institutions stakeholders involved in the management of cyber security and defense. However, in practice, there are still several obstacles such as the unreadiness of regulation, quality, and quantity of human resources and technology infrastructure owned by Indonesia in dealing with any threats that can occur at any time.</p></div>
APA, Harvard, Vancouver, ISO, and other styles
21

Johnson, Loch K. "James Angleton and the Church Committee." Journal of Cold War Studies 15, no. 4 (October 2013): 128–47. http://dx.doi.org/10.1162/jcws_a_00397.

Full text
Abstract:
James J. Angleton, who served as chief of counterintelligence for the U.S. Central Intelligence Agency (CIA) from 1954 to 1974, was an important figure in the Cold War and, in a sense, the first line of defense against clandestine Soviet intelligence operations directed against the United States and its allies. In 1975 a U.S. Senate investigative committee—informally known as the Church Committee and led by Senator Frank Church—called Angleton to testify in public on his approach to counterintelligence, especially how he had become involved in illegal domestic operations in the United States. His testimony to committee staff investigators preceding the hearing, along with his public statements to senators during the hearing, displayed an extreme view of the global Communist threat. Amid ongoing revelations in the mid-1970s of illegal CIA actions, Angleton proved unable to mount an effective public defense of his approach.
APA, Harvard, Vancouver, ISO, and other styles
22

Bahtiar, Andhi, and Adis Imam Munandar. "Narrative Policy Framework (NPF) Analysis Terhadap Pelibatan Intelijen Negara dalam Penanganan Covid-19 di Indonesia." Jurnal Keamanan Nasional 6, no. 2 (January 12, 2021): 184–201. http://dx.doi.org/10.31599/jkn.v6i2.476.

Full text
Abstract:
The policy of involving and taking steps by the State Intelligence Agency (BIN) as a secret agency in handling Covid-19 is deemed incompatible with its main duties and functions. The polemic arose when it was feared that this involvement could potentially lead to abuse of authority and practice of reducing BIN to the role of other, more credible institutions in handling Covid-19. Through the analysis of the Narrative Policy Framework (NPF) on the existing literature review, this study will confront the policy counter-narrative with the dominant narrative used, namely that Covid-19 is a national security threat which is the responsibility of BIN as the first line of national defense. The metanarative results in this study explain that the difference in perceptions between the two narratives originates from the trauma of intelligence practices in the past, which is faced with the dynamics of national security threats today and in the future.
APA, Harvard, Vancouver, ISO, and other styles
23

Kustana, Tatan. "Islamic terrorism in Indonesia: Addressing Government Strategies and Muslim Population." Jurnal Pertahanan 3, no. 2 (December 18, 2017): 77. http://dx.doi.org/10.33172/jp.v3i2.145.

Full text
Abstract:
<p><em>This paper shows how Terrorism has been emerging in the world, the potency to be spread out in the South-East Asian nations, and how Indonesia could face internal challenges to do counter-terrorism of the false Jihad, with multitrack diplomacy, primarily with Police and National Agency for Combating Terrorism counter-terrorism programs. In the perspective of defense strategy, the issue of terrorism brings several implications (Indonesian White Paper 2008, p. 9). The condition of Indonesian community with low educational levels and low economic income becomes target for terrorist actors to expand the network by developing and recruiting new members. The threat of Islamic terrorism is categorized as a national security threat. The Indonesian Government through its security apparatus still have to work hard to hunt down other terrorists, to undertake preventive efforts to prevent Islamic fundamentalist beliefs not to develop and increased education level and the understanding of Islam more comprehensively.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
24

Parshkova, J. Yu. "The Development of the US National Missile Defense and its Impact on the International Security." MGIMO Review of International Relations, no. 1(40) (February 28, 2015): 43–48. http://dx.doi.org/10.24833/2071-8160-2015-1-40-43-48.

Full text
Abstract:
The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.
APA, Harvard, Vancouver, ISO, and other styles
25

Widia Aprilia, Rudy Sutanto, Lukman Yudho Prakoso, Priyanto Priyanto, and Agus Adriyanto. "THE EFFORTS OF THE MARITIME SECURITY AGENCY IN PREVENTING TRANSNATIONAL CRIME AT THE STATE FRONTIER ARE VIEWED FROM THE STRATEGIC POSITION OF THE RIAU ISLANDS." International Journal of Social Science 2, no. 5 (February 2, 2023): 2253–60. http://dx.doi.org/10.53625/ijss.v2i5.4962.

Full text
Abstract:
Indonesia is an archipelagic country that has abundant potential marine resources which have the potential to cause exploitation and create vulnerability to transnational crimes. One of them is the Riau Archipelago, the outer archipelago of Indonesia. It is directly adjacent to Singapore and Malaysia, a crossroads for international shipping that makes it a strategic place. Because of this strategic location, security is needed by the authorized institution. In this case, the author intends to analyze BAKAMLA's efforts in securing the waters of the Riau Archipelago. This paper will analyze BAKAMLA's strategy for preventing transnational crimes at national borders in terms of the strategic position of the Riau Archipelago using the theory of threat and national defense. The writing method used is a descriptive qualitative literature study
APA, Harvard, Vancouver, ISO, and other styles
26

Toman, Eric, Melanie Stidham, Bruce Shindler, and Sarah McCaffrey. "Reducing fuels in the wildland - urban interface: community perceptions of agency fuels treatments." International Journal of Wildland Fire 20, no. 3 (2011): 340. http://dx.doi.org/10.1071/wf10042.

Full text
Abstract:
Wildland fires and resulting effects have increased in recent years. Efforts are under way nationwide to proactively manage vegetative conditions to reduce the threat of wildland fires. Public support is critical to the successful implementation of fuels reduction programs, particularly at the wildland–urban interface. This study examines public acceptance of fuels treatments and influencing factors in five neighbourhoods in Oregon and Utah located adjacent to public lands. Support for treatment use was high across locations. Findings suggest citizen trust in agency managers to successfully implement treatment activities is particularly influential on treatment acceptance. Thus, building and maintaining trust with local citizens is an essential element in the successful implementation of fuel management programs.
APA, Harvard, Vancouver, ISO, and other styles
27

Fisher, Rodney A., and Roger Schlicht. "E-Smart Threat Agent System." Transportation Research Record: Journal of the Transportation Research Board 1822, no. 1 (January 2003): 49–55. http://dx.doi.org/10.3141/1822-07.

Full text
Abstract:
The Environmental Systems Management, Analysis and Reporting neTwork (E-SMART) was developed as a system of smart sensors; active controls; and data acquisition, data reduction, and adaptive decision software to sample, analyze, and report on environmental contamination and cleanup activities on an installation. The prototype system was installed and demonstrated and is operating at Tinker Air Force Base (AFB), Oklahoma. The system is based on ANSI/EIA-709.1-A networking protocol originally developed for building environmental systems automation and process control. Sensor interfaces have been developed that allow E-SMART to network commercial off-the-shelf “smart” or “dumb” environmental sensors, new innovative sensors, or both. The network architecture can support communications media connections via wire, radio frequency, fiber optics, and so on. The system has been on line at Tinker AFB since 1998 and originally consisted of about 100 sensors and has a present array of 30 sensors, measuring up to six variables each. Most recently, development has begun to expand the E-SMART sensor suite to include threat-agent sensors: E-SMART → E-SMART Threat Agent (E-SMART TA). This effort is integrating online chemical and biological sensors and monitoring systems to demonstrate an E-SMART TA system to enhance protection, warning, and response. The emphasis is on maximizing adaptability and flexibility by accepting the widest possible variety of toxic industrial chemical and material and chemical and biological agent sensors (current, emerging, and future), responding to a wide range of deployment and employment requirements, having the capability to incorporate existing and future analysis models, and providing data sharing and interoperability across all users, U.S. Department of Defense and civilian.
APA, Harvard, Vancouver, ISO, and other styles
28

Boeing, Wiebke J., Björn Wissel, and Charles W. Ramcharan. "Costs and benefits of Daphnia defense against Chaoborus in nature." Canadian Journal of Fisheries and Aquatic Sciences 62, no. 6 (June 1, 2005): 1286–94. http://dx.doi.org/10.1139/f05-043.

Full text
Abstract:
To estimate costs and benefits of antipredator defenses in the Chaoborus–Daphnia system, we employed lake enclosures wherein controls (C) had no predators, the predation (P) treatment had freely swimming Chaoborus, and the kairomone (K) treatment predators were sequestered in a mesh tube apart from the Daphnia. Population growth (r) of two Daphnia pulex clones, one responsive (RC) and the other nonresponsive (NRC) to Chaoborus kairomone, was estimated for each predator treatment. Cost of defense was calculated as r(C,RC) – r(K,RC). Benefit was calculated as r(P,RC) – r(P,NRC). Antipredator defenses of Daphnia towards Chaoborus kairomone led to a 32% reduction in population growth in nature. The benefit of the defense, however, was a short-term 68% enhanced population growth by a responsive over a nonresponsive clone in the presence of the actual predation threat. The benefit of the defense exceeded the cost, but cost was nevertheless substantial. Our results verify that the in situ effects of Chaoborus on Daphnia involve direct and indirect impacts.
APA, Harvard, Vancouver, ISO, and other styles
29

Anderson, RaeAnn E., Shawn P. Cahill, Kristin E. Silver, and Douglas L. Delahanty. "Predictors of Assertive and Nonassertive Styles of Self-Defense Behavior During a Lab-Based Sexual Assault Scenario." Violence Against Women 26, no. 1 (February 25, 2019): 46–65. http://dx.doi.org/10.1177/1077801219828542.

Full text
Abstract:
The current study examined how psychological factors influence hypothetical behavioral responses to threat (BRTT). College women ( n = 113) with a history of sexual victimization completed a standardized lab-based self-defense scenario. Interpersonal skills, coping style, and assertive and nonassertive BRTT during a prior assault predicted assertive BRTT during the task. The use of nonassertive BRTT during past assaults no longer predicted assertive BRTT during the task when accounting for rape acknowledgment. Findings regarding rape acknowledgment demonstrate the complexity of recovery from sexual assault. Our results highlight interpersonal skills as an intervention target for innovative sexual assault risk reduction interventions.
APA, Harvard, Vancouver, ISO, and other styles
30

Kim, Gakgyu, Hojun Lee, Yongju Cho, and Kyoungchan Won. "Improvement plan for cost management system of military executive agencies in supply field." Journal of Advances in Military Studies 5, no. 2 (August 31, 2022): 1–19. http://dx.doi.org/10.37944/jams.v5i2.144.

Full text
Abstract:
This paper presents an improvement plan for the cost management system of a military executive agency in the supply field. The military introduced an executive agency system to improve the efficiency of defense operations. As of 2022, 18 units, including the land, sea, and air general supply depots, are being operated as military executive agencies. The first step in improving management efficiency is establishing a cost management system. It is necessary to eliminate inefficient processes, redundant or unnecessary work, and cost information is an approach to improve work efficiency. Currently, military executive agencies manage costs based on arbitrary standards set by the cost manager of each institution instead of systematic standards. Consequently, cost management is superficial and has not led to cost reduction. Furthermore, because the cost management standards are inconsistent, it is impossible to use them for comparing and analyzing the cost information of each institution. In particular, it is recommended that cost information be synthesized and utilized without data omission by establishing a common standard according to the guidelines for calculating corporate logistics costs announced by the Ministry of Land, Infrastructure, and Transport and using the national defense-integrated financial information system. Finally, the application of data-based analytical procedures can improve the efficiency of military operating agencies by identifying abnormal areas and eliminating inefficient processes.
APA, Harvard, Vancouver, ISO, and other styles
31

Grayson, Timothy P., and Samuele Lilliu. "Mosaic Warfare and Human–Machine Symbiosis." Scientific Video Protocols 1, no. 1 (January 24, 2021): 1–12. http://dx.doi.org/10.32386/scivpro.000024.

Full text
Abstract:
As the director of the Strategic Technology Office at the Defense Advanced Research Projects Agency (or DARPA), Timothy leads the office in development of breakthrough technologies to enable war fighters to field, operate, and adapt distributed, joint, multi-domain combat capabilities at continuous speed. He is also founder and president of Fortitude Mission Research LLC and spent several years as a senior intelligence officer with the CIA. Here he illustrates the concept of Mosaic Warfare, in which individual warfighting platforms, just like ceramic tiles in a mosaic, are placed together to make a larger picture. This philosophy can be applied to tackle a variety of human challenges including natural disasters, disruption of supply chains, climate change, pandemics, etc. He also discusses why super AI won’t represent an existential threat in the foreseeable future, but rather an opportunity for an effective division of labour between humans and machines (or human-machine symbiosis). See video at https://youtu.be/_5MkXD_m6Qc
APA, Harvard, Vancouver, ISO, and other styles
32

ANWAR, Ali, Shu ZHANG, Lilong HE, and Jianwei GAO. "Understanding the physiological and molecular mechanism of salinity stress tolerance in plants." Notulae Botanicae Horti Agrobotanici Cluj-Napoca 50, no. 4 (December 7, 2022): 12959. http://dx.doi.org/10.15835/nbha50312959.

Full text
Abstract:
Salinity is considered a global threat to agriculture and causes a significant reduction in crop yield. In particular, salinity stress promotes reactive oxygen species (ROS) accumulation and ionic imbalance in cells, leading to oxidative stress and even cell death. A large number of genes which are involved in defense, hormone, carbohydrate and metabolic pathways are down-regulated under salinity stress. Plants respond to salinity stress through a series of physiological and molecular mechanisms including antioxidant enzymes, hormones, defense related genes and signaling pathway activation. Plant defense systems modulate the overproduction of ROS through the activation of stress responsive-genes such as superoxide dismutase (SOD), peroxidase (POD), catalase (CAT) and glutamine synthetase (GS) and transcription factors such as MYBs, WRKY, and ERF. The salt overly sensitive (SOS) pathway is potentially involved in salt stress tolerance. SOS1, SOS3 and SOS2 are required for the oxidative stress tolerance by reducing the uptakes, and inter-cellular and intra-cellular distribution of Na+ and Cl−. This review discusses the discovery of stress-responsive genes and signaling pathways, and summarizes the research progress on the regulatory mechanisms of salinity stress tolerance in plants, which will help accelerate breeding programs for salinity stress tolerance.
APA, Harvard, Vancouver, ISO, and other styles
33

Lewis, Janet L., Elizabeth Haase, and Alexander Trope. "Climate Dialectics in Psychotherapy: Holding Open the Space Between Abyss and Advance." Psychodynamic Psychiatry 48, no. 3 (September 2020): 271–94. http://dx.doi.org/10.1521/pdps.2020.48.3.271.

Full text
Abstract:
The complexity, uncertainty and charged nature of climate change make it a unique stressor that is irreconcilable at an individual level. This experience of impossibility leads to splitting of reactions into polarities, or dialectics, which must be contained to reduce climate distress and held open for generative use towards climate adaptation. We present a dynamic model for addressing climate change material within psychotherapy, wherein these climate dialectics are identified, explored, and held open. Clinical vignettes* illustrate therapeutic work with the particular climate dialectics of Climate Reality–Social Reality, Individual Agency-Collective Agency, Hope-Hopelessness, Certainty-Uncertainty, and Nature as Comfort-Nature as Threat. Situations of climate anxiety, solastalgia, disavowal, and the climate dismissive patient are addressed, as is the therapeutic use of the wordlessness that accompanies our relationship with the natural world. We explore and emphasize how a focus on the containment and transformation of climate anxiety, rather than on its reduction, assists in aligning with new realities and in the reduction of distress. Use of a developmental stage metaphor, attention to climate-specific counter-transference enactments, and emphasis on authentic action are central to this process.
APA, Harvard, Vancouver, ISO, and other styles
34

Bluth, C. "Cooperative Threat Reduction, Missile Defense, and the Nuclear Future. Michael Krepon. New York and London: Palgrave, 2003. 35. 295 pp." Survival 45, no. 2 (June 1, 2003): 213–14. http://dx.doi.org/10.1093/survival/45.2.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Duntemann, Mark. "ELEMENTS OF AN URBAN TREE RISK MANAGEMENT PROGRAM." Revista da Sociedade Brasileira de Arborização Urbana 1, no. 1 (December 10, 2006): 99. http://dx.doi.org/10.5380/revsbau.v1i1.66503.

Full text
Abstract:
The development of effective hazard trees assessment practices has been an important focus of urban forestry for many years. When a publicly owned tree fails and causes property damage, personal injury or death in the United States, a potential consequence for a government agency is litigation. Although managing a large public tree resource can seem daunting, simple assessment parameters can be used to identify high-risk features within the tree population. Through analysis of the interaction between high-risk elements in the tree population and definition of a long-term, managed approach to tree risk reduction, strong policies and practices can be initiated. This program emphasizes two concepts. First, implementation of a well thought out risk reduction strategy improves the overall health of the urban forest, which results in a safer urban environment. This goal is universal, regardless of national boundaries. Second, documentation and implementation of tree risk management policies forms the foundation for a government agency’s defense, if litigation ever occurred.
APA, Harvard, Vancouver, ISO, and other styles
36

Ahmad, Ahmad, Panji Suwarno, Djamarel Hermanto, and Susilo Adi Purwantoro. "IMPLEMENTATION OF GOOD CORPORATE GOVERNANCE TO SUPPORT THE DEFENSE INDUSTRY." International Journal of Social Science 2, no. 5 (January 28, 2023): 2187–96. http://dx.doi.org/10.53625/ijss.v2i5.4931.

Full text
Abstract:
This research focuses on the implementation of Good Corporate Governance at PT Dok and Kodja Bahari (Persero) Jakarta to support the defense industry. This research is based on agency theory and the theory of Good Corporate Governance. The research method used in this study is a qualitative method with a descriptive approach. In this study, the research subject to be used was purposive sampling in determining the informants. The data analysis steps used in this study are the Analysis Interactive Model from Miles and Huberman, which divides the steps in data analysis activities into several parts: data collection, data reduction, data presentation, and drawing conclusions or verification. The results of the study stated that the implementation of GCG at PT DKB was quite good even though some had not been implemented as example from SPI before GCG still making reports that were not by the evaluation of the Audit Committee or other divisions, in this case, such as lack of documentation or written reports, then after GCG implementation is an obligation that must be implemented. Likewise, if there are matters related to problems that must be coordinated with the audit committee or other divisions, SPI will make a request letter in terms of coordination related to these problems. While the implementation of GCG at PT DKB still requires improvement and follow-up as a result of the Assessment results report, this requires support from all stakeholders and aspects of the company's organization, but the company still wants to always work hard to make this happen.
APA, Harvard, Vancouver, ISO, and other styles
37

Dian Saputra Taher, Muhammad. "ENGGANO LANGUAGE VIABILITY: DIGLOSSIA LEAKAGE PHENOMENON AND ENDANGERED LANGUAGE DEFENSE STRATEGY IN ENGGANO." Linguistik, Terjemahan, Sastra (LINGTERSA) 3, no. 1 (February 24, 2022): 50–65. http://dx.doi.org/10.32734/lingtersa.v3i1.8847.

Full text
Abstract:
The Enggano language is experiencing a threat of extinction due to the leak of diglossia among its speakers in Enggano Island, Bengkulu. Diglossia leakage is when a language is not spoken because of its most minor prestige level compared to other more superior languages. The conservation and revitalization efforts are needed because of the lack of the society's optimization in maintaining the Enggano language. This research aimed to analyze the speakers' conditions, language choice, and forms of diglossia leakage among the speakers and devise the most appropriate Enggano language conservation and revitalization strategy model. The research used diglossia leakage theory, language extinction, and language conservation and revitalization. This research used an ethno-sociolinguistic approach through interviews, questionnaires, and study literature. The data analysis is mixed between correlation test, reduction, display, verification data, and conclusion. The research obtained results as follows; correlation coefficient score of 0,949 with sig.0,023, so there is a significant and strong relationship between attitudes in the speakers' language selection with the existence of Enggano language use. The forms of diglossia leakage are code-switching, code-mixing, and the loss of the speech level in four phases. The language conservation and revitalization model collaborates with cultural institutions through the critical stakeholders, primary and secondary.
APA, Harvard, Vancouver, ISO, and other styles
38

Aguirrebengoa, Martin, Caroline Müller, Peter A. Hambäck, and Adela González-Megías. "Density-Dependent Effects of Simultaneous Root and Floral Herbivory on Plant Fitness and Defense." Plants 12, no. 2 (January 7, 2023): 283. http://dx.doi.org/10.3390/plants12020283.

Full text
Abstract:
Plants are attacked by multiple herbivores, and depend on a precise regulation of responses to cope with a wide range of antagonists. Simultaneous herbivory can occur in different plant compartments, which may pose a serious threat to plant growth and reproduction. In particular, plants often face co-occurring root and floral herbivory, but few studies have focused on such interactions. Here, we investigated in the field the combined density-dependent effects of root-chewing cebrionid beetle larvae and flower-chewing pierid caterpillars on the fitness and defense of a semiarid Brassicaceae herb. We found that the fitness impact of both herbivore groups was independent and density-dependent. Increasing root herbivore density non-significantly reduced plant fitness, while the relationship between increasing floral herbivore density and the reduction they caused in both seed number and seedling emergence was non-linear. The plant defensive response was non-additive with regard to the different densities of root and floral herbivores; high floral herbivore density provoked compensatory investment in reproduction, and this tolerance response was combined with aboveground chemical defense induction when also root herbivore density was high. Plants may thus prioritize specific trait combinations in response to varying combined below- and aboveground herbivore densities to minimize negative impacts on fitness.
APA, Harvard, Vancouver, ISO, and other styles
39

Bar-Cohen, Avram, Joseph J. Maurer, and Abirami Sivananthan. "Near-Junction Microfluidic Cooling for Wide Bandgap Devices." MRS Advances 1, no. 2 (2016): 181–95. http://dx.doi.org/10.1557/adv.2016.120.

Full text
Abstract:
ABSTRACTGaN has emerged as the material of choice for advanced power amplifier devices for both industrial and defense applications but near-junction thermal barriers severely limit the inherent capability of high-quality GaN materials. Recent “embedded cooling” efforts, funded by Defense Advanced Research Projects Agency Microsystems Technology Office (DARPA-MTO), have focused on reduction of this near-junction thermal resistance, through the use of diamond substrates and efficient removal of the dissipated power with convective and evaporative microfluidics. An overview of the accomplishments of the DARPA Near-Junction Thermal Transport (NJTT) program and recent results from the on-going DARPA Intra-Chip Embedded Cooling (ICECool) program are provided. It is shown that growth or bonding of diamond to GaN epitaxy has enabled a 3-5× increase in power handling capability per transistor unit area, while use of microfluidic cooling has enabled heat fluxes of 30 kW/cm2at the transistor level and 1 kW/cm2at the die-level, for a 3-6× improvement in the total RF output power of GaN power amplifiers. These demonstrations provide near-term validation of the large improvement in output power gained through embedded cooling and confirm the potential for well above a 6× improvement in GaN power amplifier output power to the electrical, rather than thermal, limits of GaN.
APA, Harvard, Vancouver, ISO, and other styles
40

Yacoub, Amira, Noel Magnin, Jonathan Gerbore, Rana Haidar, Emilie Bruez, Stéphane Compant, Rémy Guyoneaud, and Patrice Rey. "The Biocontrol Root-Oomycete, Pythium Oligandrum, Triggers Grapevine Resistance and Shifts in the Transcriptome of the Trunk Pathogenic Fungus, Phaeomoniella Chlamydospora." International Journal of Molecular Sciences 21, no. 18 (September 19, 2020): 6876. http://dx.doi.org/10.3390/ijms21186876.

Full text
Abstract:
The worldwide increase in grapevine trunk diseases, mainly esca, represents a major threat for vineyard sustainability. Biocontrol of a pioneer fungus of esca, Phaeomoniella chlamydospora, was investigated here by deciphering the tripartite interaction between this trunk-esca pathogen, grapevine and the biocontrol-oomycete, Pythium oligandrum. When P. oligandrum colonizes grapevine roots, it was observed that the wood necroses caused by P. chlamydospora were significantly reduced. Transcriptomic analyses of plant and fungus responses were performed to determine the molecular events occurring, with the aim to relate P.chlamydospora degradation of wood to gene expression modulation. Following P. oligandrum-root colonization, major transcriptomic changes occurred both, in the grapevine-defense system and in the P. chlamydospore-virulence factors. Grapevine-defense was enhanced in response to P. chlamydospora attacks, with P. oligandrum acting as a plant-systemic resistance inducer, promoting jasmonic/ethylene signaling pathways and grapevine priming. P. chlamydospora pathogenicity genes, such as those related to secondary metabolite biosynthesis, carbohydrate-active enzymes and transcription regulators, were also affected in their expression. Shifts in grapevine responses and key-fungal functions were associated with the reduction of P. chlamydospora wood necroses. This study provides evidence of wood fungal pathogen transcriptional changes induced by a root biocontrol agent, P. oligandrum, in which there is no contact between the two microorganisms.
APA, Harvard, Vancouver, ISO, and other styles
41

Shepherd, Jon K., R. John Rodgers, Robert J. Blanchard, Linda K. Magee, and D. Caroline Blanchard. "Ondansetron, gender and antipredator defensive behaviour." Journal of Psychopharmacology 7, no. 1_suppl (January 1993): 72–81. http://dx.doi.org/10.1177/026988119300700111.

Full text
Abstract:
The 5-HT3 receptor antagonist ondansetron has provided a somewhat equivocal profile in a number of animal models of anxiety. The present study assessed the effects of this compound in two ethological test batteries. The Fear/Defense Test Battery (F/DTB) and the Anxiety/Defense Test Battery (A/DTB) have been developed to investigate antipredator defensive reactions in rats. The F/DTB measures behavioural reactions of wild-trapped rats to human threat, while the A/DTB assesses behavioural responding in laboratory rats as a consequence of exposure to a domestic cat, and to cat odour per se. Ondansetron (0.001–0.10 mg/kg) failed to provide any reliable and consistent profile of anxiety/fear reduction in either test battery. In addition to the elucidation of drug effects, previous studies have provided clear evidence of gender differences with female rats showing higher levels of defensiveness than males in the A/DTB. Until now, no such differences have been observed with wild-trapped rats in the F/DTB. Thus, the present study indicated a clear gender difference with females exhibiting greater defensiveness. This finding is discussed with reference to the general decrease in defensiveness of the first generation animals compared with their wild-trapped parents.
APA, Harvard, Vancouver, ISO, and other styles
42

Shapiro, BSHS, EMT-P, Geoffrey L., John H. Armstrong, MD, Kathryn Roberts, BA, James Gordon, SGT (Ret.), E. Reed Smith, MD, FACEP, Jeffrey Afman, MS, and Scott M. Sasser, MD, FACEP. "The Joint Counterterrorism Awareness Workshop Series (JCTAWS): Integrating disciplines for enhanced capabilities during a complex coordinated attack." Journal of Emergency Management 17, no. 3 (May 1, 2019): 210–12. http://dx.doi.org/10.5055/jem.2019.0419.

Full text
Abstract:
Evolving threats, such as Complex Coordinated Terrorist Attacks (CCTAs) and other High-Threat Active Violence Incidents, require a comprehensive “Whole of Community” approach to enhance readiness within the emergency management mission. Engaging all community stakeholders, inclusive of the private sector, public safety organizations, and the health and healthcare communities, is essential for risk reduction by preventing and limiting consequences from such critical incidents. The Joint Counterterrorism Awareness Workshop Series (JCTAWS) is a unique interdisciplinary table-top exercise sponsored by the Department of Homeland Security/Federal Emergency Management Agency, Federal Bureau of Investigation, and National Counterterrorism Center, and is designed to test plans and capabilities surrounding a CCTA. JCTAWS focuses on response integration between and across disciplines and jurisdictions. The workshop stimulates participant identification of best practices and gaps so that plans can be refined and resources realigned to improve response coordination for CCTAs.
APA, Harvard, Vancouver, ISO, and other styles
43

Ducatti, Rafael Dal Bosco, João Americo Wordell Filho, and Sergio Miguel Mazaro. "Deoxynivalenol biosynthesis and accumulation in wheat under application of carrageenan." Revista de Ciências Agroveterinárias 21, no. 2 (March 25, 2022): 176–81. http://dx.doi.org/10.5965/223811712122022176.

Full text
Abstract:
Mycotoxins pose a large threat to human and livestock besides reducing the quality of food/feed. It is believed that these toxins are biosynthesized as a mechanism of defense (stress-response) of fungi. The most important mycotoxin for winter-cereal crops is known by deoxynivalenol (DON), a trichothecene biosynthesized mainly by Fusarium graminearum. This manuscript brings data of three years (2018, 2019 and 2020) of field research (24 field experiments) in Western Santa Catarina and North-Western Rio Grande do Sul, Brazil using a sulphated polysaccharide exclusive from red seaweed, carrageenan, associated with fungicides to help suppressing deoxynivalenol (DON) biosynthesis and accumulation in wheat kernels. A reduction of 36.4% in DON contamination was observed. Weather conditions have influenced the accumulation of DON in wheat kernels. Carrageenan has shown to be a biological compound capable of helping on the suppression of DON biosynthesis and accumulation in wheat kernels regardless of weather conditions.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Tao, Yong Wang, Xiaojing Ma, Zhaopeng Ouyang, Lei Deng, Shunshan Shen, Xiaoxing Dong, et al. "Melatonin Alleviates Copper Toxicity via Improving ROS Metabolism and Antioxidant Defense Response in Tomato Seedlings." Antioxidants 11, no. 4 (April 11, 2022): 758. http://dx.doi.org/10.3390/antiox11040758.

Full text
Abstract:
The excessive accumulation of copper (Cu2+) has become a threat to worldwide crop production. Recently, it was revealed that melatonin (MT) could play a crucial role against heavy metal (HM) stresses in plants. However, the underlying mechanism of MT function acted upon by Cu2+ stress (CS) has not been substantiated in tomatoes. In the present work, we produced MT-rich tomato plants by foliar usage of MT, and MT-deficient tomato plants by employing a virus-induced gene silencing methodology and exogenous foliar application of MT synthesis inhibitor para-chlorophenylalanine (pCPA). The obtained results indicate that exogenous MT meaningfully alleviated the dwarf phenotype and impeded the reduction in plant growth caused by excess Cu2+. Furthermore, MT effectively restricted the generation of reactive oxygen species (ROS) and habilitated cellular integrity by triggering antioxidant enzyme activities, especially via CAT and APX, but not SOD and POD. In addition, MT increased nonenzymatic antioxidant activity, including FRAP and the GSH/GSSG and ASA/DHA ratios. MT usage improved the expression of several defense genes (CAT, APX, GR and MDHAR) and MT biosynthesis-related genes (TDC, SNAT and COMT). Taken together, our results preliminarily reveal that MT alleviates Cu2+ toxicity via ROS scavenging, enhancing antioxidant capacity when subjected to excessive Cu2+. These results build a solid foundation for developing new insights to solve problems related to CS.
APA, Harvard, Vancouver, ISO, and other styles
45

Song, Jiyoung, Donghyeon Kim, and J. S. Kim. "Cancellation of multiple interferers in communication signal." Journal of the Acoustical Society of America 151, no. 4 (April 2022): A280. http://dx.doi.org/10.1121/10.0011340.

Full text
Abstract:
The broadband impulse signal emitted by marine animals is difficult to separate from the communication signal and contaminates the phase of the symbol, causing performance reduction. In a previous study, the Green’s function of this undesired signal was estimated for each path, and the impulse signal was spatially canceled by combining it with adaptive time-reversal processing [Kim et al., J. Acoust. Soc. Am. 150, A195 (2021)]. However, when the number of impulse signals to be canceled exceeds the number of receivers, the degree of freedom in the process of designing the weight vector is limited. In this presentation, we propose an approach that provides degrees of freedom by treating the signal vectors from multiple arrivals as a single constraint. The spatially nulling impulse signal without distorting the phase of the communication signal showed a remarkable improvement in communication performance in the seagoing experimental data. [Work supported by the Agency for Defense Development, South Korea, under Grant UD200010DD.]
APA, Harvard, Vancouver, ISO, and other styles
46

Bondarenko, O., O. Gudovych, O. Kovaliov, and V. Mazurenko. "METHODICAL ASPECTS OF BUSINESS GAME ON THE MANAGEMENT AUTHORITY ACTIONS IN EMERGENCY SITUATIONS." Collected Scientific Papers of the Institute of Public Administration in the Sphere of Civil Protection 7 (December 22, 2019): 5–16. http://dx.doi.org/10.35577/iducz.2019.07.01.

Full text
Abstract:
Successful implementation of civil protection measure depends on the level of training of executive bodies, staffs, services, command and staff of the civil protection governing bodies. Conducting exercises and trainings with a certain frequency allows to work out the whole set of events connected with the civil protection reality plans check, preparing the executive bodies for the intended purpose, organizing and conducting rescue and other emergency operations in difficult emergency situations within the short period of time. According to the experience obtained, one of the response emergency drawbacks is the lack of theoretical and practical training of both governing bodies and civil defense forces, which fulfill the tasks of preventing and eliminating the emergency response. It should be noted that one of the most important drawbacks during the process of performing these tasks is the executive bodies’ lack of competence. This, in turn, leads to the violation of the algorithm of safety actions that can result in injury of employees and sometimes even fatal outcome. Functional training organization on managerial decision making by SESU bodies in the event of threat or emergency are described in professional publications. The aim of the article is to study all possible approaches to SESU executive bodies’ training on actions in the event of threat or emergency. Threat and emergency require the sequential actions from the sequential management bodies which are aimed at restoration of vital activity of the emergency areas, prevention of people’s death, injuries, losses as well as damages reduction. We believe that providing such training activity as simulation exercise gives the opportunity to improve knowledge and develop skills of executive bodies’ managerial actions organization in the event of threat and emergencies. We are sure that such training activity as a simulation exercise gives the opportunity to improve knowledge and develop the skills of executive bodies’ managerial actions organization in the event of threat and emergencies. The exercises components can be used in pre-exercise training and conducting exercises in the area of civil protection.
APA, Harvard, Vancouver, ISO, and other styles
47

Yeh, Parekh, Musralina, Sansyzbai, Tabynov, Shapieva, Richards, and Hay. "A Case History in Cooperative Biological Research: Compendium of Studies and Program Analyses in Kazakhstan." Tropical Medicine and Infectious Disease 4, no. 4 (November 9, 2019): 136. http://dx.doi.org/10.3390/tropicalmed4040136.

Full text
Abstract:
Kazakhstan and the United States have partnered since 2003 to counter the proliferation of weapons of mass destruction. The US Department of Defense (US DoD) has funded threat reduction programs to eliminate biological weapons, secure material in repositories that could be targeted for theft, and enhance surveillance systems to monitor infectious disease outbreaks that would affect national security. The cooperative biological research (CBR) program of the US DoD’s Biological Threat Reduction Program has provided financing, mentorship, infrastructure, and biologic research support to Kazakhstani scientists and research institutes since 2005. The objective of this paper is to provide a historical perspective for the CBR involvement in Kazakhstan, including project chronology, successes and challenges to allow lessons learned to be applied to future CBR endeavors. A project compendium from open source data and interviews with partner country Kazakhstani participants, project collaborators, and stakeholders was developed utilizing studies from 2004 to the present. An earlier project map was used as a basis to determine project linkages and continuations during the evolution of the CBR program. It was determined that consistent and effective networking increases the chances to collaborate especially for competitive funding opportunities. Overall, the CBR program has increased scientific capabilities in Kazakhstan while reducing their risk of biological threats. However, there is still need for increased scientific transparency and an overall strategy to develop a capability-based model to better enhance and sustain future research. Finally, we offer a living perspective that can be applied to further link related studies especially those related to One Health and zoonoses and the assessment of similar capability-building programs.
APA, Harvard, Vancouver, ISO, and other styles
48

Mizin, V. "The US ABM system and global strategic stability." Journal of International Analytics, no. 1 (March 28, 2016): 71–83. http://dx.doi.org/10.46272/2587-8476-2016-0-1-71-83.

Full text
Abstract:
The problems of antimissile defense constitutes one of the key issues of global arms control domain of today. No advancement toward the lowering of global military threat, reciprocal reduction of nuclear weapons’ arsenals and the solving of contemporary tasks in the vast realm of today’s strategic stability are feasible, if a suitable arrangement on it is not to be found. At the same time, this conundrum is the major irritant in the Russia-West interrelationship, first and foremost, in our dealings with the NATO military-political alliance led by the USA. Therefore, finding the mutually acceptable solutions to this end would have promoted the consolidation of mutual trust and created the prerequisites for moving toward a safer and more stable world. The paper suggests a set of specific urgent steps that would show the ways out of the current negotiating impasse related to the ABM problematic and created the basis for a potential agreement while not afflicting the national security of any state in the world.
APA, Harvard, Vancouver, ISO, and other styles
49

Sulistyani, Aprin, Arief Syaifullah, and Mr Kusmiarto. "Penyajian Informasi Spasial Pertanahan Berbasis Bencana Tanah Longsor di Gedangsari, Gunungkidul." BHUMI: Jurnal Agraria dan Pertanahan 2, no. 2 (November 30, 2016): 239. http://dx.doi.org/10.31292/jb.v2i2.74.

Full text
Abstract:
Abstract : Indonesia is in the region with high potential threat of natural disasters. Landslides is the largest and most deadly threat in Indonesia (Gema BNPB 2015). Therefore, disaster risk reduction is needed to minimize the impact of disaster, by encouraging collection, management and access to the risk information using location-based database. To support these efforts, this research sought to describe the distribution of the level of threat, vulnerability, capacity and risk of landslides in the district of Gedangsari through decisive element of risk weighting, which are threats, vulnerabilities and capacities for 67 hamlets in study area. The result were presented as Threat Map, Vulnerability Map, Capacity Map and Landslide Risk Map. Furthermore, these maps were overlayed with Land Registry Map and Technique Base-Map. The results were analyzed using spatial and quantitative descriptive methods to provide land information-based landslides in Kecamatan Gedangsari. This information is useful to support the work of National Land Agency in providing safe land relocation near to the disaster site and to maintain Cadastral Control Points. Keywords : landslide, land relocation, contol pointsIntisari : Wilayah Indonesia berada pada potensi tinggi ancaman bencana alam. Bencana tanah longsor merupakan ancaman terbesar dan paling mematikan di Indonesia (Gema BNPB 2015). Oleh karena itu perlu upaya pengurangan risiko bencana untuk meminimalisir dampak yang ditimbulkan dengan mendorong pengumpulan, manajemen dan akses informasi risiko menggunakan dasar data berbasis lokasi. Dalam rangka mendukung upaya tersebut, penelitian ini mencoba menggambarkan sebaran tingkat ancaman, kerentanan, kapasitas dan risiko bencana tanah longsor di Kecamatan Gedangsari melalui pembobotan unsur penentu risiko yaitu ancaman, kerentanan dan kapasitas pada 67 dusun. Hasilnya, disajikan dalam bentuk Peta Ancaman, Peta Kerentanan, Peta Kapasitas dan Peta Risiko Bencana Tanah Longsor. Selanjutnya, peta-peta tersebut dipadukan dengan Peta Pendaftaran Tanah dan Peta Dasar Teknik. Hasil overlay kemudian dianalisis secara spasial dan deskriptif kuantitatif untuk menyajikan informasi pertanahan berbasis bencana tanah longsor di Kecamatan Gedangsari. Informasi tersebut bermanfaat dalam rangka melaksanakan fungsi Badan Pertanahan Nasional seperti kegiatan penyediaan tanah relokasi yang aman dan dekat dengan lokasi bencana dan pemeliharaan TDT. Kata Kunci : tanah longsor, relokasi tanah, TDT
APA, Harvard, Vancouver, ISO, and other styles
50

Zhao, Yuntao, Wenbo Zhang, Yongxin Feng, and Bo Yu. "A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9463653.

Full text
Abstract:
The application-layer distributed denial of service (AL-DDoS) attack makes a great threat against cyberspace security. The attack detection is an important part of the security protection, which provides effective support for defense system through the rapid and accurate identification of attacks. According to the attacker’s different URL of the Web service, the AL-DDoS attack is divided into three categories, including a random URL attack and a fixed and a traverse one. In order to realize identification of attacks, a mapping matrix of the joint entropy vector is constructed. By defining and computing the value of EUPI and jEIPU, a visual coordinate discrimination diagram of entropy vector is proposed, which also realizes data dimension reduction from N to two. In terms of boundary discrimination and the region where the entropy vectors fall in, the class of AL-DDoS attack can be distinguished. Through the study of training data set and classification, the results show that the novel algorithm can effectively distinguish the web server DDoS attack from normal burst traffic.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography