The Second Day at Gettysburg: The Attack and Defense of Cemetery Ridge, July 2, 1863 by David L. Shultz and Scott L. Mingus

2017 ◽  
Vol 56 (1) ◽  
pp. 102-103
Author(s):  
Robert Grandchamp
Keyword(s):  
2020 ◽  
Author(s):  
Tam ngoc Nguyen

We proposes a new scientific model that enables the ability to collect evidence, and explain the motivations behind people's cyber malicious/ethical behaviors. Existing models mainly focus on detecting already-committed actions and associated response strategies, which is not proactive. That is the reason why little has been done in order to prevent malicious behaviors early, despite the fact that issues like insider threats cost corporations billions of dollars annually, and its time to detection often lasts for more than a year.We address those problems by our main contributions of:+ A better model for ethical/malicious behavioral analysis with a strong focus on understanding people's motivations. + Research results regarding ethical behaviors of more than 200 participants, during the historic Covid-19 pandemic. + Novel attack and defense strategies based on validated model and survey results. + Strategies for continuous model development and integration, utilizing latest technologies such as natural language processing, and machine learning. We employed mixed-mode research approach of: integrating and combining proven behavioral science models, case studying of hackers, survey research, quantitative analysis, and qualitative analysis. For practical deployments, corporations may utilize our model in: improving HR processes and research, prioritizing plans based on the model's informed human behavioral metrics, better analysis in existing or potential cyber insider threat cases, generating more defense tactics in information warfare and so on.


Author(s):  
Prashanth AS ◽  
Praveenkumar H Bagali

In the process of evolution from quadrupeds to bipeds, the forelimbs developed into upper limbs. In quadrupeds they serve the purpose of weight bearing and attack. In bipeds they serve fine functions, holding an object, attack and defense. It has been estimated by research group that the hand performs approximately thousand different functions in an ordinary day today’s activity. Apabahuka is one such disease which hampers most of the foresaid functions of the hand. Although any of the classics do not mention about the Shoola as a Laxana of Apabahuka, it still is a feature practically seen in Avabahuka patients. Chikitsa Sara Sangraha and Nidana Sara, clearly mentions about Svedana as a predominant Laxana of Avabahuka, along with other Laxana. It is often said that ‘the pain is often severe enough to disturb the sleep’. Amsa Marma is primarily involved in Avabahuka, it is a Snayu Marma and one of Vaikalyakara Marma, any trauma to this will produce disability or deformity of the shoulder joint. Management of pain is facilitated by Marma Chikitsa i.e. Nidana Parivarjana, Abhyanga, Swedana, Uttarabhaktika Snehapana, Vata Hara Oushadha Sevana, Marmabhighata Chikitsa, Brumhana, Nasya, Lepa, Seka, Nasya, Nasaapaana, Agnikarma, Siravyadha, etc.


2021 ◽  
Vol 1865 (2) ◽  
pp. 022043
Author(s):  
JinFeng Li ◽  
Bingcheng Sun ◽  
Hongfeng Cui

Author(s):  
Dianqi Han ◽  
Ang Li ◽  
Lili Zhang ◽  
Yan Zhang ◽  
Jiawei Li ◽  
...  

Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 215 ◽  
Author(s):  
Yu Yang ◽  
Bichen Che ◽  
Yang Zeng ◽  
Yang Cheng ◽  
Chenyang Li

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.


Sign in / Sign up

Export Citation Format

Share Document