نتایج جستجو برای: sabotage

تعداد نتایج: 598  

2010
S. Massoud Amin

In the aftermath of the tragic events of 9/11, I became responsible for research and development (R&D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports and files claiming either that “we were bullet proof” or that “the sky was falling.” It turned out that neither extreme was true of the entire electric-power sector. The truth de...

2007

The coastal zone, with their vast resources of food, energy, and minerals, not only are composed of various fragile ecosystems, but are scenes of a variety of often conflicting uses. At present, the uncontrolled development of the coastal zone and the almost haphazard exploitation of their natural resources threaten to turn the promise of economic prosperity into an environmental nightmare that...

Journal: :CoRR 2017
Samuel Bennett Moore Jacob Gatlin Sofia Belikovetsky Mark Yampolskiy Wayne E. King Yuval Elovici

Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM’s dependence on computerization raises the concern that the AM process can be tampered with, and a part’s mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputa...

Journal: :JoWUA 2013
William R. Claycomb Carly L. Huth

Analyzing historical cases of insider crimes to identify patterns or specific indicators of attack is a challenging task, particularly when using large volumes of free-text input sources, such as court documents and media reports. In this workshop paper, we offer a new process for processing, or coding, free-text descriptions of insider crimes for future analysis; specifically, we study cases o...

Journal: :Proceedings. Biological sciences 2005
Eleanor R Haine Karelle Boucansaud Thierry Rigaud

Competition between parasites within a host can influence the evolution of parasite virulence and host resistance, but few studies examine the effects of unrelated parasites with conflicting transmission strategies infecting the same host. Vertically transmitted (VT) parasites, transmitted from mother to offspring, are in conflict with virulent, horizontally transmitted (HT) parasites, because ...

Journal: : 2023

This review article is devoted to a methodological notebook published by Ukrainian polygraphers. They presented ready-to-use solutions that can be applied when investigating sabotage and espionage suspects. Among other things, the reviewed publication discusses techniques for conducting polygraph examinations provides examples of question sets used during testing.

2013
Trevor Johnston

Contrary to conventional wisdom, few autocrats rely exclusively, or even principally, on repression to survive. Instead, they exploit a variety of distributive strategies, buying popular support and co-opting elite challengers as necessary. According to existing theory, however, none of these strategies should involve targeted goods to politically disenfranchised minorities or other marginalize...

Journal: :JoWUA 2012
William R. Claycomb Carly L. Huth Lori Flynn David M. McIntire Todd B. Lewellen

The threat of malicious insiders to organizations is persistent and increasing. We examine 15 real cases of insider threat sabotage of IT systems to identify several key points in the attack time-line, such as when the insider clearly became disgruntled, began attack preparations, and carried out the attack. We also determine when the attack stopped, when it was detected, and when action was ta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید