نتایج جستجو برای: sabotage
تعداد نتایج: 598 فیلتر نتایج به سال:
In the aftermath of the tragic events of 9/11, I became responsible for research and development (R&D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports and files claiming either that “we were bullet proof” or that “the sky was falling.” It turned out that neither extreme was true of the entire electric-power sector. The truth de...
The coastal zone, with their vast resources of food, energy, and minerals, not only are composed of various fragile ecosystems, but are scenes of a variety of often conflicting uses. At present, the uncontrolled development of the coastal zone and the almost haphazard exploitation of their natural resources threaten to turn the promise of economic prosperity into an environmental nightmare that...
Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM’s dependence on computerization raises the concern that the AM process can be tampered with, and a part’s mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputa...
Analyzing historical cases of insider crimes to identify patterns or specific indicators of attack is a challenging task, particularly when using large volumes of free-text input sources, such as court documents and media reports. In this workshop paper, we offer a new process for processing, or coding, free-text descriptions of insider crimes for future analysis; specifically, we study cases o...
Competition between parasites within a host can influence the evolution of parasite virulence and host resistance, but few studies examine the effects of unrelated parasites with conflicting transmission strategies infecting the same host. Vertically transmitted (VT) parasites, transmitted from mother to offspring, are in conflict with virulent, horizontally transmitted (HT) parasites, because ...
This review article is devoted to a methodological notebook published by Ukrainian polygraphers. They presented ready-to-use solutions that can be applied when investigating sabotage and espionage suspects. Among other things, the reviewed publication discusses techniques for conducting polygraph examinations provides examples of question sets used during testing.
Contrary to conventional wisdom, few autocrats rely exclusively, or even principally, on repression to survive. Instead, they exploit a variety of distributive strategies, buying popular support and co-opting elite challengers as necessary. According to existing theory, however, none of these strategies should involve targeted goods to politically disenfranchised minorities or other marginalize...
The threat of malicious insiders to organizations is persistent and increasing. We examine 15 real cases of insider threat sabotage of IT systems to identify several key points in the attack time-line, such as when the insider clearly became disgruntled, began attack preparations, and carried out the attack. We also determine when the attack stopped, when it was detected, and when action was ta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید