Academic literature on the topic 'Adversary system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversary system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Adversary system"

1

Coughlan, Stephen G. "The “Adversary System”: Rhetoric or Reality?" Canadian journal of law and society 8, no. 2 (1993): 139–70. http://dx.doi.org/10.1017/s0829320100003203.

Full text
Abstract:
AbstractOur system of justice is generally referred to as an “adversary system,” although this term is used very loosely. At times, the term is used in a technical way to refer to a system with structured rules of evidence, party presentation of evidence, and a neutral decision-maker. At other times, the phrase seems to be given a broader meaning, referring to the way in which law is practised—that hard-headed competitiveness is the proper, and normal, approach. In fact, neither the rules of our justice system, whether criminal or civil, nor the way in which lawyers behave most of the time are best described as “adversarial.” The current situation, in which largely nonadversarial behavior and rules are described as an adversary system, gives rise to confusion and, more importantly, to unethical action. A possible solution is to cease calling our system an adversary one, and to acknowledge that other rules and behavior are more defining.
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Zhengxin. "Knowledge discovery and system‐user adversary." Kybernetes 26, no. 4 (June 1997): 425–41. http://dx.doi.org/10.1108/03684929710176430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schulhofer, Stephen J. "The future of the adversary system." Justice Quarterly 3, no. 1 (March 1986): 83–93. http://dx.doi.org/10.1080/07418828600088811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Belliotti, Raymond A. "Our Adversary System: In Search of a Foundation." Canadian Journal of Law & Jurisprudence 1, no. 1 (January 1988): 19–34. http://dx.doi.org/10.1017/s0841820900000588.

Full text
Abstract:
Rhetoric in praise of “our adversary system” flows freely in the prose of many legal insiders. But unexamined rhetoric, like self-praise, is of itself of little recommendation.I will here (I) state and explain the four defining characteristics of our adversary system: (A) formal proceedings, (B) partisan presentation, (C) a neutral, passive fact finder, and (D) principles of professional responsibility. I will then (II) state, explain, and analyze critically the most common justifications advanced in defense of our adversary system: (A) the truth rationale, (B) the rights rationale, (C) the autonomy rationale, (D) the lawyer as friend rationale, (E) the ritualistic function rationale, (F) the dispute rationale, and (G) the pragmatic rationale. I conclude (III) that to date no convincing justification has been advanced which argues persuasively that our adversary system has independent value or that it serves important societal objectives better than other existing or possible legal systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Abrams, Floyd, Robert H. Klonoff, and Paul L. Colby. "Trial Tactics: Sponsorship Costs of the Adversary System." Yale Law Journal 101, no. 5 (March 1992): 1159. http://dx.doi.org/10.2307/796966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keeton, Robert E. "Time Limits as Incentives in an Adversary System." University of Pennsylvania Law Review 137, no. 6 (June 1989): 2053. http://dx.doi.org/10.2307/3312205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vidmar, Neil. "Expert Evidence, the Adversary System, and the Jury." American Journal of Public Health 95, S1 (July 2005): S137—S143. http://dx.doi.org/10.2105/ajph.2004.044677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Salem, Ahmed, Xuening Liao, Yulong Shen, and Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.

Full text
Abstract:
This paper investigates the secrecy and reliability of a communication where the user is assisting an Intrusion Detection System (IDS) in detecting the adversary’s attack. The adversary is assumed to be sophisticated such that it can conduct eavesdropping and jamming attacks. The IDS is equipped with the capability of detecting both of those attacks. Two scenarios were considered; the first scenario is that the user is trying to detect the adversary by assisting the IDS, and the second scenario is that the user is equipped with a silent time slot in its communication protocol besides assisting the IDS, in order to provoke the adversary into jamming the channel, thus detecting it with a higher probability. Interestingly, adding the capability of detecting eavesdropping attacks pushed the adversary into conducting jamming attacks much more, thus aiding in detecting the adversary earlier. All of that was modeled by means of stochastic game theory, in order to analyze and study the behavior and the interactions between the user and the adversary. Results show a major improvement in the first scenario by 188% and an improvement by 294% in the second scenario in the game value when the probability of detecting eavesdropping attacks was 0.3, which represents the payoff that the user gains in terms of secrecy and reliability.
APA, Harvard, Vancouver, ISO, and other styles
9

McGill, William L., and Bilal M. Ayyub. "Multicriteria Security System Performance Assessment Using Fuzzy Logic." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4, no. 4 (October 2007): 356–76. http://dx.doi.org/10.1177/154851290700400405.

Full text
Abstract:
Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. The focus of this paper is on developing a simple, yet analytically sound tool that facilitates rapid assessments of security system non-performance in terms of probability of adversary success at the facility or asset level using concepts from fuzzy logic. Beginning with a short overview of how security system performance fits within an overall security risk analysis frame-work, this paper presents the basic concepts of fuzzy systems and applies them to develop a model that approximates the true relationship between defensive capabilities and probability of adversary success. A simple example demonstrating the proposed model to support decision making accompanies this discussion. This paper concludes with a strategy for implementation of the proposed model in an operational setting.
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Aaron, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson. "PeerFlow: Secure Load Balancing in Tor." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (April 1, 2017): 74–94. http://dx.doi.org/10.1515/popets-2017-0017.

Full text
Abstract:
Abstract We present PeerFlow, a system to securely load balance client traffic in Tor. Security in Tor requires that no adversary handle too much traffic. However, Tor relays are run by volunteers who cannot be trusted to report the relay bandwidths, which Tor clients use for load balancing. We show that existing methods to determine the bandwidths of Tor relays allow an adversary with little bandwidth to attack large amounts of client traffic. These methods include Tor’s current bandwidth-scanning system, TorFlow, and the peer-measurement system EigenSpeed. We present an improved design called PeerFlow that uses a peer-measurement process both to limit an adversary’s ability to increase his measured bandwidth and to improve accuracy. We show our system to be secure, fast, and efficient. We implement PeerFlow in Tor and demonstrate its speed and accuracy in large-scale network simulations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Adversary system"

1

Fulchino, Matthew T. "An assessment of uncertainty due to adversary mobility." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100373.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2015..
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 47-50).
Uncertainty related to an adversary's tactics, techniques, and procedures is often difficult to characterize, particularly during the period immediately before a conflict, when planning for a face-to-face confrontation with a combatant. Adversarial freedom of maneuver and the fixed nature of asset defense leaves limited room for error or half-assessments, yet past analysis of regional defendability presumes a static, symmetric adversary, rather than a nimble, cunning one. This thesis examines historical events to identify the source of uncertainty with respect to defensive operations, and proposes that an alternative measure of performance be evaluated to fully characterize the effectiveness and limitations of defensive elements in the face of a determined peer.
by Matthew T. Fulchino.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
2

Crispin, K. J., and n/a. "Ethics and the advocate." University of Canberra. Law, 1995. http://erl.canberra.edu.au./public/adt-AUC20060630.172938.

Full text
Abstract:
This thesis examines the ethical implications of legal professional advocacy in an adversary system of justice. It identifies a standard conception of the advocate's duty which is encapsulated in the various professional codes and its fundamental principles of partisanship and zealous advocacy. It acknowledges that the standard conception involves a duty to pursue the interests of clients without regard for the interests of others and explores the inevitable moral ambivalence which such an absolute loyalty entails. The concept of role morality upon which this conception is based is explored. This involves an examination of the adversary system of justice and the extent to which it serves the public interest. It is concluded that the adversary system is of considerable utility in maintaining individual rights, eliciting the truth, providing an important element of ritual and sublimating conflict. Consequently, its value provides ethical justification for lawyers to fulfil the adversarial roles upon which it depends. However, it is contended that it neither requires nor justifies the absolutism inherent in the standard conception of the advocate's duty. A number of alternative paradigms are considered but rejected as inadequate. It is argued that the existing norms of partisanship and zealous advocacy should be retained but relegated to prima facie duties which may have to be balanced against competing ethical demands such as the need to avoid causing undue harm to others.
APA, Harvard, Vancouver, ISO, and other styles
3

Fukasaka, M. "The adversary system of the International Court of Justice : an analytical study." Thesis, University College London (University of London), 2016. http://discovery.ucl.ac.uk/1526961/.

Full text
Abstract:
This dissertation analyses the role of the International Court of Justice in dealing with technical facts, including those of a scientific nature. Specifically, it examines (1) how the ICJ has traditionally adopted a passive approach in dealing with technical evidence, but that this has been changing in recent years; (2) the factors that have contributed both to this traditional passive approach and the recent transformation, analysing different legal and non-legal factors, some of which limit its active approach in fact-finding, while others encourage the ICJ to adopt progressive methods; (3) how the ICJ may balance these different factors, with a view to examining how the ICJ can balance its responsibility to effectively settle international disputes against its fundamental consensual character. The dissertation proposes how to strike this balance by examining the historical background of the ICJ Statute and Rules, the historical development of Court’s practice, as well as related procedural principles and the function of the Expert Opinion.
APA, Harvard, Vancouver, ISO, and other styles
4

Gaines, Phil. "Cross purposes : a critical analysis of the representational force of questions in adversarial legal examination /." Thesis, Connect to this title online; UW restricted, 1998. http://hdl.handle.net/1773/9431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ascensi, Lionel. "Du principe de la contradiction /." Paris : L.G.D.J, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/51222952X.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Timmerbeil, Sven. "Witness coaching und adversary system : der Einfluss der Parteien und ihrer Prozessbevollmächtigten auf Zeugen und Sachverständige im deutschen und U.S.-amerikanischen Zivilprozess /." Tübingen : Mohr Siebeck, 2004. http://www.gbv.de/dms/ilmenau/toc/376083883.PDF.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.

Full text
Abstract:
Nous abordons des problèmes de sécurité dans des systèmes cyber-physiques industriels. Les attaques contre ces systèmes doivent être traitées à la fois en matière de sûreté et de sécurité. Les technologies de contrôles imposés par les normes industrielles, couvrent déjà la sûreté. Cependant, du point de vue de la sécurité, la littérature a prouvé que l’utilisation de techniques cyber pour traiter la sécurité de ces systèmes n’est pas suffisante, car les actions physiques malveillantes seront ignorées. Pour cette raison, on a besoin de mécanismes pour protéger les deux couches à la fois. Certains auteurs ont traité des attaques de rejeu et d’intégrité en utilisant une attestation physique, p. ex., le tatouage des paramètres physiques du système. Néanmoins, ces détecteurs fonctionnent correctement uniquement si les adversaires n’ont pas assez de connaissances pour tromper les deux couches. Cette thèse porte sur les limites mentionnées ci-dessus. Nous commençons en testant l’efficacité d’un détecteur qui utilise une signature stationnaire afin de détecter des actions malveillantes. Nous montrons que ce détecteur est incapable d’identifier les adversaires cyber-physiques qui tentent de connaître la dynamique du système. Nous analysons son ratio de détection sous la présence de nouveaux adversaires capables de déduire la dynamique du système. Nous revisitons le design original, en utilisant une signature non stationnaire, afin de gérer les adversaires visant à échapper à la détection. Nous proposons également une nouvelle approche qui combine des stratégies de contrôle et de communication. Toutes les solutions son validées à l’aide de simulations et maquettes d’entraînement
We address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
APA, Harvard, Vancouver, ISO, and other styles
8

Barreto, Carolina Pereira. "O princípio do contraditório e da ampla defesa no processo administrativo disciplinar." Pós-Graduação em Direito, 2013. https://ri.ufs.br/handle/riufs/4357.

Full text
Abstract:
The research aims to study the adversarial principle and legal defense in administrative disciplinary proceedings, examined not only in its formal aspect, but also the material. For this, we start from the vision neoconstitucionalista law, especially characterized by the transformations that the rule of law and its influence on the administrative performance, highlighting the constitutionalization of administrative law as a result of this movement. At the time that will discuss the true meaning of democracy and the approximation of the relationship between state and citizen, was launched as a result of the shift in focus to administrative act administrative process. The approach will bring extensive administrative processuality sedimented as a new paradigm in consensual, citizen participation and democratic legitimacy of state activity, with the administrative process as a true instrument of positive role of government in the implementation of fundamental rights and the effective democratization of the State of Right. In this context, the research aims to deepen the study of the adversarial principle and wide defense in administrative disciplinary proceedings as a fundamental right of the citizen, serving as a tool for democratization of the state, and is in line with the new interpretation and application of the principles and values constitutional. With the effectiveness of this principle procedural constitutional guarantees to the citizen the full defense before the Disciplinary Committees, and to be effective, the defense should be performed technical point of influencing the decision of the judge in the administrative process. Thus, the discussion of the controversy will give around the analysis of the new vision of the right neoconstitucionalista, more focused on achievement of constitutional values and the effectiveness of fundamental rights, as opposed to the judicial practice of the Supreme Court, on the grounds that motivated Binding Precedent n. 05.
A pesquisa se propõe a estudar o princípio do contraditório e da ampla defesa no processo administrativo disciplinar, analisado não apenas sob seu aspecto formal, mas também material. Para isso, parte-se da visão neoconstitucionalista do direito, caracterizado especialmente pelas transformações verificadas no Estado de Direito e sua influência na atuação administrativa, destacando a constitucionalização do direito administrativo como decorrência deste movimento. Ao tempo que discorrerá sobre o verdadeiro sentido de democracia e a aproximação das relações entre o Estado e o cidadão, lançando como consequência a mudança de enfoque do ato administrativo para processo administrativo. A abordagem trará a ampla processualidade administrativa como novo paradigma sedimentado na consensualidade, participação do cidadão e na legitimidade democrática da atividade estatal, apresentando o processo administrativo como verdadeiro instrumento de atuação positiva do poder público na concretização dos direitos fundamentais e da efetiva democratização do Estado de direito. Nesse contexto, a pesquisa tem como objetivo aprofundar o estudo do princípio do contraditório e da ampla defesa no processo administrativo disciplinar como direito fundamental do cidadão, servindo de instrumento de democratização do Estado, coadunando-se com a nova interpretação e aplicação dos princípios e valores constitucionais. Com a efetividade deste princípio processual constitucional, garante-se ao cidadão a ampla defesa perante as Comissões de Processo Disciplinar, e para que seja efetiva, a defesa deve ser realizada de forma técnica a ponto de influenciar a decisão do julgador no processo administrativo. Dessa forma, a discussão da controvérsia dar-se-á em torno da análise da nova visão do direito neoconstitucionalista, mais voltada para concretização dos valores constitucionais e na efetividade dos direitos fundamentais, em contraposição à prática jurisprudencial da Corte Suprema, diante das razões que motivaram a Súmula Vinculante n. 05.
APA, Harvard, Vancouver, ISO, and other styles
9

Queiroz, Pedro Gomes de. "O princípio da cooperação e a exibição de documento ou coisa no Processo Civil." Universidade do Estado do Rio de Janeiro, 2014. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=7474.

Full text
Abstract:
A dissertação procura estabelecer os fundamentos constitucionais e legais do princípio da cooperação no processo civil, descrevendo-o como um princípio constitucional implícito, decorrente do princípio da solidariedade (art. 3, I, CF/1988), da isonomia (art. 5., caput, CF/1988), do acesso à ordem jurídica justa (art. 5., XXXV, CF/1988), do devido processo legal (art. 5., LIV, CF/1988), do contraditório, da ampla defesa (art. 5., LV, CF/1988) e da duração razoável do processo (art. 5., LXXVIII, CF/1988). O trabalho procura demonstrar que o princípio da cooperação é a ideia base de vários dispositivos do Código de Processo Civil (CPC) de 1973 e do Projeto do Novo CPC, entre eles o art. 339 do CPC/1973 e aqueles que disciplinam a exibição de documento ou coisa. A dissertação procura estabelecer os limites do princípio da cooperação existentes no ordenamento jurídico brasileiro, em especial o direito à privacidade (art. 5., X, CF/1988) e o direito ao silêncio (art. 5., LXIII, CF/1988). Enfim, a dissertação procura estabelecer o conteúdo do princípio da cooperação e a forma como este opera no processo civil.
The dissertation seeks to establish the constitutional and legal foundations of the principle of cooperation in civil procedure, describing it as an implicit constitutional principle deriving from the principle of solidarity (art. 3., I, Constitution of the Federative Republic of Brazil - CFRB), access to justice (art. 5., XXXV , CFRB), due process of law (art. 5, LIV , CFRB), adversary system (art. 5., LV , CF/1988) and reasonable duration of proceedings ( art. 5. , LXXVIII , CF/1988) . The essay seeks to demonstrate that the principle of cooperation is the basic idea of various provisions of the Code of Civil Procedure (CPC) of 1973 and of the Project of the New CPC, including the art. 339 of CPC/1973 and those that discipline the disclosure of documents and things. The dissertation seeks to establish the limits to the principle of cooperation in the Brazilian legal system, in particular the right to privacy (art. 5. , X, CF/1988) and the right to remain silent (art. 5. , LXIII , CF / 1988). At last, the dissertation seeks to establish the essence of the principle of cooperation and the way it operates in civil procedure.
APA, Harvard, Vancouver, ISO, and other styles
10

Cambazoglu, Volkan. "Protocol, mobility and adversary models for the verification of security." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202017.

Full text
Abstract:
The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. Users and adversaries interact with security and privacy protocols, and even affect the outcome of the protocols. We propose user mobility and adversary models to examine how the location privacy of users is affected when they move relative to each other in specific patterns while adversaries with varying strengths try to identify the users based on their historical locations. The location privacy of the users are simulated with the support of the K-Anonymity protection mechanism, the Distortion-based metric, and our models of users' mobility patterns and adversaries' knowledge about users. Security and privacy protocols need to operate on various computing and communication resources. Some of these protocols can be adjusted for different situations by changing parameters. A common example is to use longer secret keys in encryption for stronger security. We experiment with the trade-off between the security and the performance of the Fiat–Shamir identification protocol. We pipeline the protocol to increase its utilisation as the communication delay outweighs the computation. A mathematical specification based on a formal method leads to a strong proof of security. We use three formal languages with their tool supports in order to model and verify the Secure Hierarchical In-Network Aggregation (SHIA) protocol for Wireless Sensor Networks (WSNs). The three formal languages specialise on cryptographic operations, distributed systems and mobile processes. Finding an appropriate level of abstraction to represent the essential features of the protocol in three formal languages was central.

QC 20170217


ProFuN
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Adversary system"

1

Strier, Franklin D. The adversary system: An annotated bibliography. Littleton, Colo: F.B. Rothman, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tidmarsh, Jay. Complex litigation and the adversary system. New York: Foundation Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

American Bar Association. Section of Litigation., ed. Readings on adversarial justice: The American approach to adjudication. St. Paul, Minn: West Pub. Co., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Witness Coaching und Adversary System: Der Einfluss der Parteien und ihrer Prozessbevollmächtigten auf Zeugen und Sachverständige im deutschen und US-amerikanischen Zivilprozess. Tübingen: Mohr Siebeck, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

D, Jackson John. Judge without jury: Diplock trials in the adversary system. Oxford: Clarendon Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The origins of adversary criminal trial. Oxford: Oxford University Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sosti͡azatelʹnyĭ ugolovnyĭ prot͡sess. Moskva: R. Valent, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Darovskikh, S. M. Pravovye pozit︠s︡ii Konstitut︠s︡ionnogo Suda RF, kasai︠u︡shchiesi︠a︡ realizat︠s︡ii print︠s︡ipa sosti︠a︡zatelʹnosti v ugolovnom sudoproizvodstve. Moskva: I︠U︡rlitinform, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Belkin, A. R. Teorii︠a︡ ugolovnogo prot︠s︡essa: Sosti︠a︡zatelʹnostʹ : monografii︠a︡. Moskva: Izdatelʹstvo "I︠U︡rlitinform", 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Darovskikh, S. M. Pravovye pozit︠s︡ii Konstitut︠s︡ionnogo Suda RF, kasai︠u︡shchiesi︠a︡ realizat︠s︡ii print︠s︡ipa sosti︠a︡zatelʹnosti v ugolovnom sudoproizvodstve. Moskva: I︠U︡rlitinform, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Adversary system"

1

Adkins, Steve, Slobodan Djordjević, and Dragan A. Savić. "Wastewater System Ventilation – A Friend or Adversary?" In New Trends in Urban Drainage Modelling, 712–16. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99867-1_123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

De, Sourya Joyee, and Asim K. Pal. "Auctions with Rational Adversary." In Information Systems Security, 91–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Galib, Asadullah Al, and Rashedur Mohammad Rahman. "Cloud Location Verification and Adversary Identification." In Advances in Intelligent Systems and Computing, 337–48. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-13153-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Davis, Paul K. "Simple Culture-Informed Cognitive Models of the Adversary." In Intelligent Systems Reference Library, 235–61. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67024-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jani, Athraa Juhi. "Consensus Problem with the Existence of an Adversary Nanomachine." In Advances in Intelligent Systems and Computing, 407–19. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16184-2_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reddy, Ankinapalli Uma Maheswara, Agepati Sai Hareesh, and B. Ankayarkanni. "An Internal Adversary Model to Prevent Selective Jamming Attacks." In Advances in Power Systems and Energy Management, 591–97. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-7504-4_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Callen, Craig R. "Othello Could Not Optimize: Economics, Hearsay, and Less Adversary Systems." In The Dynamics of Judicial Proof, 437–53. Heidelberg: Physica-Verlag HD, 2002. http://dx.doi.org/10.1007/978-3-7908-1792-8_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chan, T. H. Hubert, Li Ning, and Yong Zhang. "Maximizing the Expected Influence in Face of the Non-progressive Adversary." In Wireless Algorithms, Systems, and Applications, 28–39. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chandel, Sonali, Wenxuan Cao, Zijing Sun, Jiayi Yang, Bailu Zhang, and Tian-Yi Ni. "A Multi-dimensional Adversary Analysis of RSA and ECC in Blockchain Encryption." In Lecture Notes in Networks and Systems, 988–1003. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Amini, M. Hadi, Javad Khazaei, Darius Khezrimotlagh, and Arash Asrari. "Bi-level Adversary-Operator Cyberattack Framework and Algorithms for Transmission Networks in Smart Grids." In Advances in Intelligent Systems and Computing, 183–202. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34094-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Adversary system"

1

Bai, Xiaofei, Jian Gao, Chenglong Hu, and Liang Zhang. "Constructing an Adversary Solver for Equihash." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

LeMay, Elizabeth, Willard Unkenholz, Donald Parks, Carol Muehrcke, Ken Keefe, and William H. Sanders. "Adversary-driven state-based system security evaluation." In the 6th International Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1853919.1853926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Azfar, Abdullah, Kim-Kwang Raymond Choo, and Lin Liu. "An Android Social App Forensics Adversary Model." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Graf, Jonathan, and Graf Research. "Towards system-level adversary attack surface modeling for microelectronics trust." In 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS). IEEE, 2016. http://dx.doi.org/10.1109/naecon.2016.7856852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rege, Aunshul, Frank Ferrese, Saroj Biswas, and Li Bai. "Adversary dynamics and smart grid security: A multiagent system approach." In 2014 7th International Symposium on Resilient Control Systems (ISRCS). IEEE, 2014. http://dx.doi.org/10.1109/isrcs.2014.6900101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Komalarajun, Kanpirom. "Should the Non-Adversary System be Adopted for Criminal Courts in Thailand?" In International Conference on Economics and Management Innovations (ICEMI). Volkson Press, 2017. http://dx.doi.org/10.26480/icemi.01.2017.299.301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goodge, Adam, Bryan Hooi, See Kiong Ng, and Wee Siong Ng. "Robustness of Autoencoders for Anomaly Detection Under Adversarial Impact." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/173.

Full text
Abstract:
Detecting anomalies is an important task in a wide variety of applications and domains. Deep learning methods have achieved state-of-the-art performance in anomaly detection in recent years; unsupervised methods being particularly popular. However, deep learning methods can be fragile to small perturbations in the input data. This can be exploited by an adversary to deliberately hinder model performance; an adversarial attack. This phenomena has been widely studied in the context of supervised image classification since its discovery, however such studies for an anomaly detection setting are sorely lacking. Moreover, the plethora of defense mechanisms that have been proposed are often not applicable to unsupervised anomaly detection models. In this work, we study the effect of adversarial attacks on the performance of anomaly-detecting autoencoders using real data from a Cyber physical system (CPS) testbed with intervals of controlled, physical attacks as anomalies. An adversary would attempt to disguise these points as normal through adversarial perturbations. To combat this, we propose the Approximate Projection Autoencoder (APAE), which incorporates two defenses against such attacks into a general autoencoder. One of these involves a novel technique to improve robustness under adversarial impact by optimising latent representations for better reconstruction outputs.
APA, Harvard, Vancouver, ISO, and other styles
8

Князь, Владимир, Vladimir Knyaz', Марк Козырев, Mark Kozyrev, Артём Бордодымов, and Artem Bordodymov. "Thermal-to-color image translation for visualization on the pilot's display." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-1-70-73.

Full text
Abstract:
Long range infrared cameras may provide increasing crew situational awareness in limited vision and night conditions. Similar cameras are installed in modern civil aircrafts as part of an improved vision system. Correct thermal image interpritation by the crew requires certain expiriance, due to the fact that view of the scene very different from the visible range and may change within time of day and season. This paper discusses the deep generative-adversary neural network to automatically convert thermal images to semantically similar color images of the visible range.
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Vivek K., and Mohan S. Kankanhalli. "Towards Adversary Aware Surveillance Systems." In Multimedia and Expo, 2007 IEEE International Conference on. IEEE, 2007. http://dx.doi.org/10.1109/icme.2007.4285081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kontouras, Efstathios, Anthony Tzes, and Leonidas Dritsas. "Adversary control strategies for discrete-time systems." In 2014 European Control Conference (ECC). IEEE, 2014. http://dx.doi.org/10.1109/ecc.2014.6862519.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Adversary system"

1

Merkle, Peter Benedict. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment. Office of Scientific and Technical Information (OSTI), March 2006. http://dx.doi.org/10.2172/883485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Megersa, Kelbesa. Tax Transparency for an Effective Tax System. Institute of Development Studies (IDS), January 2021. http://dx.doi.org/10.19088/k4d.2021.070.

Full text
Abstract:
This rapid review examines evidence on the transparency in the tax system and its benefits; e.g. rising revenue, strengthen citizen/state relationship, and rule of law. Improvements in tax transparency can help in strengthening public finances in developing countries that are adversely affected by COVID-19. The current context (i.e. a global pandemic, widespread economic slowdown/recessions, and declining tax revenues) engenders the urgency of improving domestic resource mobilisation (DRM) and the fight against illicit financial flows (IFFs). Even before the advent of COVID-19, developing countries’ tax systems were facing several challenges, including weak tax administrations, low taxpayer morale and “hard-to-tax” sectors. The presence of informational asymmetry (i.e. low tax transparency) between taxpayers and tax authorities generates loopholes for abuse of the tax system. It allows the hiding of wealth abroad with a limited risk of being caught. Cases of such behaviour that are exposed without proper penalty may result in a decline in the morale of citizens and a lower level of voluntary compliance with tax legislation. A number of high-profile tax leaks and scandals have undermined public confidence in the fairness of tax systems and generated a strong demand for effective counteraction and tax transparency. One of the key contributing factors to lower tax revenues in developing countries (that is linked to low tax transparency) is a high level of IFFs. These flows, including international tax evasion and the laundering of corruption proceeds, build a major obstacle to successful DRM efforts. Research has also identified an association between organisational transparency (e.g. transparency by businesses and tax authorities) and stakeholder trust (e.g. between citizens and the state). However, the evidence is mixed as to how transparency in particular influences trust and perceptions of trustworthiness.
APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Alison, Sherry Hutchinson, and Ellen Weiss. Psychosocial support for children. Population Council, 2005. http://dx.doi.org/10.31899/hiv14.1003.

Full text
Abstract:
Masiye Camp in Matopos National Park, and Kids’ Clubs in downtown Bulawayo, Zimbabwe, are examples of a growing number of programs in Africa and elsewhere that focus on the psychological and social needs of AIDS-affected children. Given the traumatic effects of grief, loss, and other hardships faced by these children, there is increasing recognition of the importance of programs to help them strengthen their social and emotional support systems. This Horizons Report describes findings from operations research in Zimbabwe and Rwanda that examines the psychosocial well-being of orphans and vulnerable children and ways to increase their ability to adapt and cope in the face of adversity. In these studies, a person’s psychosocial well-being refers to his/her emotional and mental state and his/her network of human relationships and connections. A total of 1,258 youth were interviewed. All were deemed vulnerable by their communities because they had been affected by HIV/AIDS and/or other factors such as severe poverty.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography