To see the other types of publications on this topic, follow the link: Adversary system.

Journal articles on the topic 'Adversary system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Adversary system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Coughlan, Stephen G. "The “Adversary System”: Rhetoric or Reality?" Canadian journal of law and society 8, no. 2 (1993): 139–70. http://dx.doi.org/10.1017/s0829320100003203.

Full text
Abstract:
AbstractOur system of justice is generally referred to as an “adversary system,” although this term is used very loosely. At times, the term is used in a technical way to refer to a system with structured rules of evidence, party presentation of evidence, and a neutral decision-maker. At other times, the phrase seems to be given a broader meaning, referring to the way in which law is practised—that hard-headed competitiveness is the proper, and normal, approach. In fact, neither the rules of our justice system, whether criminal or civil, nor the way in which lawyers behave most of the time are best described as “adversarial.” The current situation, in which largely nonadversarial behavior and rules are described as an adversary system, gives rise to confusion and, more importantly, to unethical action. A possible solution is to cease calling our system an adversary one, and to acknowledge that other rules and behavior are more defining.
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Zhengxin. "Knowledge discovery and system‐user adversary." Kybernetes 26, no. 4 (June 1997): 425–41. http://dx.doi.org/10.1108/03684929710176430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schulhofer, Stephen J. "The future of the adversary system." Justice Quarterly 3, no. 1 (March 1986): 83–93. http://dx.doi.org/10.1080/07418828600088811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Belliotti, Raymond A. "Our Adversary System: In Search of a Foundation." Canadian Journal of Law & Jurisprudence 1, no. 1 (January 1988): 19–34. http://dx.doi.org/10.1017/s0841820900000588.

Full text
Abstract:
Rhetoric in praise of “our adversary system” flows freely in the prose of many legal insiders. But unexamined rhetoric, like self-praise, is of itself of little recommendation.I will here (I) state and explain the four defining characteristics of our adversary system: (A) formal proceedings, (B) partisan presentation, (C) a neutral, passive fact finder, and (D) principles of professional responsibility. I will then (II) state, explain, and analyze critically the most common justifications advanced in defense of our adversary system: (A) the truth rationale, (B) the rights rationale, (C) the autonomy rationale, (D) the lawyer as friend rationale, (E) the ritualistic function rationale, (F) the dispute rationale, and (G) the pragmatic rationale. I conclude (III) that to date no convincing justification has been advanced which argues persuasively that our adversary system has independent value or that it serves important societal objectives better than other existing or possible legal systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Abrams, Floyd, Robert H. Klonoff, and Paul L. Colby. "Trial Tactics: Sponsorship Costs of the Adversary System." Yale Law Journal 101, no. 5 (March 1992): 1159. http://dx.doi.org/10.2307/796966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keeton, Robert E. "Time Limits as Incentives in an Adversary System." University of Pennsylvania Law Review 137, no. 6 (June 1989): 2053. http://dx.doi.org/10.2307/3312205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vidmar, Neil. "Expert Evidence, the Adversary System, and the Jury." American Journal of Public Health 95, S1 (July 2005): S137—S143. http://dx.doi.org/10.2105/ajph.2004.044677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Salem, Ahmed, Xuening Liao, Yulong Shen, and Xiaohong Jiang. "Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game-Theoretical Framework." Wireless Communications and Mobile Computing 2018 (August 28, 2018): 1–14. http://dx.doi.org/10.1155/2018/1029175.

Full text
Abstract:
This paper investigates the secrecy and reliability of a communication where the user is assisting an Intrusion Detection System (IDS) in detecting the adversary’s attack. The adversary is assumed to be sophisticated such that it can conduct eavesdropping and jamming attacks. The IDS is equipped with the capability of detecting both of those attacks. Two scenarios were considered; the first scenario is that the user is trying to detect the adversary by assisting the IDS, and the second scenario is that the user is equipped with a silent time slot in its communication protocol besides assisting the IDS, in order to provoke the adversary into jamming the channel, thus detecting it with a higher probability. Interestingly, adding the capability of detecting eavesdropping attacks pushed the adversary into conducting jamming attacks much more, thus aiding in detecting the adversary earlier. All of that was modeled by means of stochastic game theory, in order to analyze and study the behavior and the interactions between the user and the adversary. Results show a major improvement in the first scenario by 188% and an improvement by 294% in the second scenario in the game value when the probability of detecting eavesdropping attacks was 0.3, which represents the payoff that the user gains in terms of secrecy and reliability.
APA, Harvard, Vancouver, ISO, and other styles
9

McGill, William L., and Bilal M. Ayyub. "Multicriteria Security System Performance Assessment Using Fuzzy Logic." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 4, no. 4 (October 2007): 356–76. http://dx.doi.org/10.1177/154851290700400405.

Full text
Abstract:
Modern security problems focus on sensibly allocating resources to decrease the magnitude of potential hazards, decrease the chances of adversary success given an attempt, or minimize loss following a successful attack. The focus of this paper is on developing a simple, yet analytically sound tool that facilitates rapid assessments of security system non-performance in terms of probability of adversary success at the facility or asset level using concepts from fuzzy logic. Beginning with a short overview of how security system performance fits within an overall security risk analysis frame-work, this paper presents the basic concepts of fuzzy systems and applies them to develop a model that approximates the true relationship between defensive capabilities and probability of adversary success. A simple example demonstrating the proposed model to support decision making accompanies this discussion. This paper concludes with a strategy for implementation of the proposed model in an operational setting.
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Aaron, Rob Jansen, Nicholas Hopper, Aaron Segal, and Paul Syverson. "PeerFlow: Secure Load Balancing in Tor." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (April 1, 2017): 74–94. http://dx.doi.org/10.1515/popets-2017-0017.

Full text
Abstract:
Abstract We present PeerFlow, a system to securely load balance client traffic in Tor. Security in Tor requires that no adversary handle too much traffic. However, Tor relays are run by volunteers who cannot be trusted to report the relay bandwidths, which Tor clients use for load balancing. We show that existing methods to determine the bandwidths of Tor relays allow an adversary with little bandwidth to attack large amounts of client traffic. These methods include Tor’s current bandwidth-scanning system, TorFlow, and the peer-measurement system EigenSpeed. We present an improved design called PeerFlow that uses a peer-measurement process both to limit an adversary’s ability to increase his measured bandwidth and to improve accuracy. We show our system to be secure, fast, and efficient. We implement PeerFlow in Tor and demonstrate its speed and accuracy in large-scale network simulations.
APA, Harvard, Vancouver, ISO, and other styles
11

MacKenzie, Gavin. "Breaking the Dichotomy Habit: The Adversary System and the Ethics of Professionalism." Canadian Journal of Law and Jurisprudence 9, no. 01 (January 1996): 33–50. http://dx.doi.org/10.1017/s0841820900003337.

Full text
Abstract:
Litigation lawyers learn early in their practices that although the adversary system functions tolerably well in many civil cases, its defects are nevertheless extensive and profound. Tactics calculated to delay, distort, obfuscate, obstruct and wear down opponents through frustration and cost are common. Questionable conduct is justified by appeals to the ethics of the adversary system. The consequences are often born by clients—through increased cost, delay and conflict—and even by lawyers themselves—through stress, fatigue and dissatisfaction with the quality of life that the practice of litigation in our adversary system brings with it.
APA, Harvard, Vancouver, ISO, and other styles
12

Oldham, James. "Truth-Telling in the Eighteenth-Century English Courtroom." Law and History Review 12, no. 1 (1994): 95–121. http://dx.doi.org/10.1017/s0738248000011263.

Full text
Abstract:
Mirjan Damaška, in his 1973 comparative study of criminal procedure in the Anglo-American and continental traditions, asserts that “the continental non-adversary system of procedure is more committed to the search for truth than is the Anglo-American adversary system.” He reasons that the stronger procedural obstacles to truth-finding in the adversary system derive from a collective horror of convicting innocent people.
APA, Harvard, Vancouver, ISO, and other styles
13

Romeo, Andrea. "The Adversary System of Excuse and the Lawyer’s Role." Archiv fuer Rechts- und Sozialphilosophie 104, no. 4 (2018): 570. http://dx.doi.org/10.25162/arsp-2018-0030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

McCullough, Keith P. "Judge without jury: Diplock trials in the adversary system." Journal of Criminal Justice 24, no. 6 (January 1996): 567–69. http://dx.doi.org/10.1016/s0047-2352(97)81180-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jolowicz, J. A. "Exchange of Witnesses' Statements—Privilege and the Adversary System." Cambridge Law Journal 48, no. 1 (March 1989): 41–43. http://dx.doi.org/10.1017/s0008197300108311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

변진석. "Litigation System and Citizen Confidence in Judicial System: Ideas from the US Adversary System." Seoul Law Review 23, no. 3 (February 2016): 265–95. http://dx.doi.org/10.15821/slr.2016.23.3.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kruse, Katherine R. "Wrongful Convictions and Upstream Reform in the Criminal Justice System." Texas A&M Law Review 3, no. 2 (September 2015): 367–93. http://dx.doi.org/10.37419/lr.v3.i2.5.

Full text
Abstract:
The DNA exonerations of the late twentieth century spawned a reform movement arguably as influential in the American criminal justice system as the Warren Court criminal procedure revolution. The goal of innocence reform is to prevent wrongful convictions by increasing the reliability of criminal justice system operations. A basic tenet of the adversary system of justice is that an adversary trial will expose and correct factual errors with procedural tools, such as the exclusion of unreliable evidence, vigorous cross-examination of witnesses, and the introduction of expert testimony. However, DNA exonerations have undermined faith in the capacity of the adversary trial system to produce reliable results—shifting the focus “upstream” in the criminal justice system to earlier stages of law enforcement investigations. Upstream reforms target law enforcement investigative practices for improvements that will reduce or eliminate the production of unreliable evidence that will later need to be excluded, attacked, or explained at trial.
APA, Harvard, Vancouver, ISO, and other styles
18

Brookbank, C. R. "The Adversary System in Canadian Industrial Relations: Blight or Blessing?" Relations industrielles 35, no. 1 (April 12, 2005): 20–40. http://dx.doi.org/10.7202/029035ar.

Full text
Abstract:
This article attempts to explore the "free System of collective bargaining" in Canada, with a view to gaining insight into the validity and the efficacity of the adversary concept in industrial relations.
APA, Harvard, Vancouver, ISO, and other styles
19

Sabir Idrees, Muhammad, Yves Roudier, and Ludovic Apvrille. "Model the System from Adversary Viewpoint: Threats Identification and Modeling." Electronic Proceedings in Theoretical Computer Science 165 (October 13, 2014): 45–58. http://dx.doi.org/10.4204/eptcs.165.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ginsburg, Tom. "The Japanese Adversary System in Context: Controversies and Comparisons (review)." Journal of Japanese Studies 30, no. 2 (2004): 572–77. http://dx.doi.org/10.1353/jjs.2004.0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Head, Brian W. "The Australian party system: Adversary politics and the convergence thesis." Politics 20, no. 2 (November 1985): 89–94. http://dx.doi.org/10.1080/00323268508401967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yoo, Jeong Do, Eunji Park, Gyungmin Lee, Myung Kil Ahn, Donghwa Kim, Seongyun Seo, and Huy Kang Kim. "Cyber Attack and Defense Emulation Agents." Applied Sciences 10, no. 6 (March 21, 2020): 2140. http://dx.doi.org/10.3390/app10062140.

Full text
Abstract:
As the scale of the system and network grows, IT infrastructure becomes more complex and hard to be managed. Many organizations have a serious problem to manage their system and network security. In addition, vulnerabilities of hardware and software are increasing in number rapidly. In such a complex IT environment, security administrators need more practical and automated threat assessment methods to reduce their manual tasks. Adversary emulation based automated assessment is one of the solutions to solve the aforementioned problems because it helps to discover the attack paths and vulnerabilities to be exploited. However, it is still inefficient to perform the adversary emulation because adversary emulation requires well-designed attack scenarios created by security experts. Besides, a manual-based penetration test cannot be frequently performed. To overcome this limitation, we propose an adversary emulation framework composed of the red team and blue team agent. The red team agent carries out automated attacks based on the automatically generated scenarios by the proposed framework. The blue team agent deploys defense measures to react to the red team agent’s attack patterns. To test our framework, we test multiple attack scenarios on remote servers that have various vulnerable software. In the experiment, we show the red team agent can gain an administrator’s privilege from the remote side when the blue team agent’s intervention is not enabled. The blue team agent can successfully block the red team’s incoming attack when enabled. As a result, we show our proposed framework is beneficial to support routine threat assessment from the adversary’s perspective. It will be useful for security administrators to make security defense strategy based on the test results.
APA, Harvard, Vancouver, ISO, and other styles
23

Kruglik, Stanislav. "Minimum-storage regenerating codes resistant to special adversary." Information and Control Systems, no. 1 (March 3, 2021): 38–44. http://dx.doi.org/10.31799/1684-8853-2021-1-38-44.

Full text
Abstract:
Introduction: In order to deal with temporarily unavailable nodes in a distributed storage system, engineers apply special classes of erasure correction codes. These codes allow you to repair a temporarily unavailable node by downloading small amounts of data from the remaining ones. However, this creates safety threats in the presence of an eavesdropper. Purpose: Introducing a new mathematical model in which the eavesdropper has a limited access to all nodes in the system, and developing codes resistant to it. Methods: Information-theoretic arguments, and mixing information symbols with random ones by systematic Reed — Solomon code. Results: We introduced a new mathematical model of an eavesdropper with limited access to all nodes in a distributed storage system. Note that the proposed eavesdropper is passive, being unable to change the accessed data. We found parameters for optimal regenerating codes resistant to such adversary, and provided a technique to ensure necessary resistance. As a result, we obtained the construction of optimal minimum storage regenerating codes resistant to such adversary. Practical relevance: The proposed constructions can provide resistance to adversary while ensuring effective data repair.
APA, Harvard, Vancouver, ISO, and other styles
24

Ball-Rokeach, Sandra J., and William E. Loges. "Ally or Adversary? Using Media Systems for Public Health." Prehospital and Disaster Medicine 15, no. 4 (December 2000): 62–69. http://dx.doi.org/10.1017/s1049023x00025309.

Full text
Abstract:
AbstractThe media system controls information resources that public health agencies may wish to use to accomplish their goals, particularly in a crisis. The resources of the public health system sometimes are prized by the media system, and this provides opportunities for public health agencies to gain access to the media. This paper reviews the goals and resources of the media system as they relate to the mission of public health agencies in the periods before, during, and after a public health crisis. The various media are reviewed with attention to the role each can play for different purposes and at different stages of a crisis. The importance of presenting health information in the form of stories is emphasized, with specific advice regarding the attributes of an effective story.
APA, Harvard, Vancouver, ISO, and other styles
25

KalpanaDhanji, Patel, and Santhoshkumarsingh Santhoshkumarsingh. "Assault Discovery and Localizing Adversary in Remote Networks." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 81. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp81-84.

Full text
Abstract:
Remote Systems are presently prevalent worldwide to help individuals and machines to speak with each other regardless of their area, where it has an unending mission for expanded limit and enhanced quality. Despite the fact that there are many points of interest yet regardless it have a few burdens. This paper manages the vulnerabilities in the remote frameworks. The vulnerabilities show in the remote innovation that is generally identified with dangers and dangers. Despite the fact that much defencelessness are in the remote frameworks this paper for the most part manages the parodying assaults. In remote frameworks the foes can dispatch any kind of assaults to take the information and to lull the execution of the system. The fundamental driver of this paper is to pass on that remote frameworks require a more grounded instrument. So we likewise propose to perform equipment execution utilizing a Zig honey bee handset which utilizes the standard (802.15.4) chiefly in view of Zigbee convention Stack.
APA, Harvard, Vancouver, ISO, and other styles
26

Hosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.

Full text
Abstract:
Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed cryptography and has an important role in secure multiparty computation. In this case, it is tried to share a confidential data as secret, between multiple nodes in a distributed system, in the presence of an active adversary that can destroy some nodes, such that the secret can be reconstructed with the participation of certain size of honest nodes. A dynamic adversary can change its corrupted nodes among the protocol. So far, there is not a formal definition and there are no protocols of dynamic adversaries in VSS context. Also, another important question is, would there exist a protocol to share a secret with a static adversary with at most 1 broadcast round? In this paper, we provide a formal definition of the dynamic adversary. The simulation results prove the efficiency of the proposed protocol in terms of the runtime, the memory usage, and the number of message exchanges. We show that the change period of the dynamic adversary could not happen in less than 4 rounds in order to have a perfectly secure VSS, and then we establish a protocol to deal with this type of adversary. Also, we prove that the lower bound of broadcast complexity for the static adversary is (2,0)-broadcast rounds.
APA, Harvard, Vancouver, ISO, and other styles
27

Sangaiah, Arun Kumar, Darshan Vishwasrao Medhane, Gui-Bin Bian, Ahmed Ghoneim, Mubarak Alrashoud, and M. Shamim Hossain. "Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System." IEEE Transactions on Industrial Informatics 16, no. 5 (May 2020): 3322–29. http://dx.doi.org/10.1109/tii.2019.2953289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Purdy,, Donald A. "Federal Sentencing Training for Private Defense Attorneys in Our Adversary System." Federal Sentencing Reporter 10, no. 6 (May 1, 1998): 314–17. http://dx.doi.org/10.2307/20640109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Qin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.

Full text
Abstract:
A leakproof secret sharing scheme based on environment sensing is proposed, in which the shadows of participants and the shared secret are leakproof, and can be used repeatedly. The counterfeit shadows of the participants and the authentication information of the shared secret can be changed dynamically basing on environment sensing. So the scheme is secure even against a mobile adversary. Besides, through introducing the concept of adversary structure and the transformation of access structure to adversary structure, the secret sharing on general access structure is realized. Compared to the existing schemes, our scheme is more secure and more flexible in practice. Our scheme is particularly suitable for the system which needs to run long time in the open, such as the wireless sensor network and the multi-robots, the property of leakproof based on environment sensing can improve the efficiency and security of these systems effectively.
APA, Harvard, Vancouver, ISO, and other styles
30

Jaggard, Aaron D., Aaron Johnson, Sarah Cortes, Paul Syverson, and Joan Feigenbaum. "20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (April 1, 2015): 4–24. http://dx.doi.org/10.1515/popets-2015-0002.

Full text
Abstract:
Abstract Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions and use them to improve their security. To illustrate this system, we present two novel types of adversaries. First, we study a powerful, pervasive adversary that can compromise an unknown number of Autonomous System organizations, Internet Exchange Point organizations, and Tor relay families. Second, we initiate the study of how an adversary might use Mutual Legal Assistance Treaties (MLATs) to enact surveillance. As part of this, we identify submarine cables as a potential subject of trust and incorporate data about these into our MLAT analysis by using them as a proxy for adversary power. Finally, we present preliminary experimental results that show the potential for our trust framework to be used by Tor clients and services to improve security.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Chenyu, Guoai Xu, and Wenting Li. "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment." Security and Communication Networks 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9062675.

Full text
Abstract:
With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1) their description of the adversary’s abilities is inaccurate; (2) their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.
APA, Harvard, Vancouver, ISO, and other styles
32

Nirmala, Puspita. "Adversary System in Common Law Countries and Possibility for Implementation in Indonesian Court." Amsir Law Journal 2, no. 1 (September 25, 2020): 12–20. http://dx.doi.org/10.36746/alj.v2i1.28.

Full text
Abstract:
This research tries to open the possibility of implementing an adversary system which is very closely related to the common law system in Indonesia, especially concerning the “The Rights of the Accused” in the criminal justice process. This research is carried out normatively by conducting legal studies through literature and legislation. The result of this research is that if the accused declared himself guilty of the crime he committed, this means that the accused will lose his right to be tried and processed fairly trial in the common law system. If a defendant is declared guilty, then the next process is the conviction without trial, in which case there are weaknesses in the rights of the accused that should have been carried out through a jury trial. Is it possible to apply in Indonesian courts? Is it not contrary to the norms contained in the Code of Criminal Procedure (KUHAP), especially regarding the rights of suspects relating to human rights (HAM), such as equal treatment before the law; put forward the presumption of innocence; the right to compensation; right to legal assistance; the defendant's rights before the court; a free, fast and simple trial; and a court that is open to the public. However, if possible in Indonesia to switch to the adversary system, the judge's role can be limited only as a referee to allow the creation of a fair trial. The party in charge of deciding whether or not the defendant is right is the jury.
APA, Harvard, Vancouver, ISO, and other styles
33

Gertner, Nancy, and Joseph Sanders. "Alternatives to Traditional Adversary Methods of Presenting Scientific Expertise in the Legal System." Daedalus 147, no. 4 (October 2018): 135–51. http://dx.doi.org/10.1162/daed_a_00525.

Full text
Abstract:
The twin goals of any litigation are to arrive at a correct outcome and provide the parties with a sense that they were treated justly, even if they do not prevail. Adversarial proceedings are often perceived to be superior to inquisitorial proceedings with respect to the second goal but inferior with respect to the first. This is especially the case when proceedings involve expert testimony. In this essay, we discuss several relatively minor changes to typical adversarial processes that offer the potential of improving trial accuracy without disrupting the overall structure of adversarial proceedings. These changes include 1) alterations to the organization of the trial, including concurrent expert testimony; 2) alterations to the role of the jury, including taking notes, asking questions, and receiving written expert reports; and 3) formal expert witness codes of conduct designed to better arm experts to resist the adversarial pressures that lead to biased testimony.
APA, Harvard, Vancouver, ISO, and other styles
34

Muthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T., and Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring." International Journal of e-Collaboration 17, no. 3 (July 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.

Full text
Abstract:
Organizations have moved from the conventional industries to smart industries by embracing the approach of industrial internet of things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies. In this context, this work presents a public key encryption with equality test based on DLP with decomposition problems over near-ring. The proposed method is highly secure, and it solves the problem of quantum algorithm attacks in industrial internet of thing systems. Further, the proposed system is highly secure, and it prevents the chosen-ciphertext attack in type-I adversary and it is indistinguishable against the random oracle model for the type-II adversary. The proposed scheme is highly secure, and the security analysis measures are comparatively stronger than existing techniques.
APA, Harvard, Vancouver, ISO, and other styles
35

Petrakova, S. A. "Evolution of the adversary (on the example of criminal proceedings)." Institute Bulletin: Crime, Punishment, Correction 13, no. 2 (July 19, 2019): 222–28. http://dx.doi.org/10.46741/2076-4162-2019-13-2-222-228.

Full text
Abstract:
Adversary in juridical science cannot be considered separately from the judicial system, because the changes that took place in the judicial process had an irreversible impact on the evolution of adversarial proceedings. This provision is proved in legal practice. The evolution of competition in criminal proceedings is investigated in chronological order, in historical retrospect. At the beginning of statehood when democratic principles prevailed in society, trials were based on adversarial principles, the court played the role of an impartial arbitrator, and the outcome of the case was determined by the evidence collected by the plaintiffs and defendants. In the process of strengthening of the state, the court has become an active subject of judicial investigations and by the end of the XVII century the state displaces the adversary system of trial, replacing it to prove the guilt of the accused of the results of the investigation: torture, interrogations, etc. Only in the second half of the XIX century in the proceedings returned adversary, but not for long. During the soviet period previous achievements in the field of justice were eradicated. The restoration of adversarial proceedings in legislation and judicial practice began in the early 1990s in the process of judicial reform, which was carried out in order to improve the efficiency of judicial proceedings. At present it is safe to say that the potential of the adversarial principle has not yet been sufficiently disclosed.
APA, Harvard, Vancouver, ISO, and other styles
36

Farshteindiker, Adi, and Rami Puzis. "Leadership Hijacking in Docker Swarm and Its Consequences." Entropy 23, no. 7 (July 19, 2021): 914. http://dx.doi.org/10.3390/e23070914.

Full text
Abstract:
With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, which is often referred to as container infrastructures. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally, discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that Docker Swarm is currently not secured against misbehaving manager nodes. This allows a high impact, high probability privilege escalation attack, which we refer to as leadership hijacking, the possibility of which is neglected by the current cloud security literature. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the Docker Swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and, in particular, incorporate adversary immune leader election algorithms.
APA, Harvard, Vancouver, ISO, and other styles
37

Inthavisas, K., and N. Sungprasert. "Security Evaluation on Speech Biometric Authentication System." Advanced Materials Research 717 (July 2013): 826–31. http://dx.doi.org/10.4028/www.scientific.net/amr.717.826.

Full text
Abstract:
A recent work utilized a transformation function to protect a DTW template. Unfortunately, a matching template was not protected properly. In this paper, we first show that an adversary can exploit the matching template to gain access to the system. Then, we introduce our scheme to address this problem. For this scheme, a hardened template is utilized to protect the DTW template. For the matching template, it is protected by a cryptographic framework. We evaluate the system with a public database: the MIT mobile device speaker verification corpus. The experimental results show that our scheme outperforms the other approaches.
APA, Harvard, Vancouver, ISO, and other styles
38

Antwiwaa, A., A. Kumar, and A. K. Jaiswal. "Source based Security Issues in WDM Systems." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (August 1, 2017): 2101. http://dx.doi.org/10.11591/ijece.v7i4.pp2101-2108.

Full text
Abstract:
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed
APA, Harvard, Vancouver, ISO, and other styles
39

Parande, Somu, and Jayashree D. Mallapur. "Tactical approach to identify and quarantine spurious node participation request in sensory application." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3451. http://dx.doi.org/10.11591/ijece.v10i4.pp3451-3459.

Full text
Abstract:
Securing Wireless Sensor Network (WSN) from variable forms of adversary is still an open end challenge. Review of diversified security apprroaches towards such problems that they are highly symptomatic with respect to resiliency strength against attack. Therefore, the proposed system highlights a novel and effective solution that is capable of identify the spurios request for participating in teh network building process from attacker and in return could deviate the route of attacker to some virtual nodes and links. A simple trust based mechanism is constructed for validating the legitimacy of such request generated from adversary node. The proposed system not only presents a security solution but also assists in enhancing the routing process significantly. The simulated outcome of the study shows that proposed system offers significantly good energy conservation, satisfactory data forwarding performance, reduced processing time in contrast to existing standard security practices.
APA, Harvard, Vancouver, ISO, and other styles
40

SANDERS, ANDREW. "Judge Without Jury: Diplock Trials in the Adversary System, J. Jackson and S. Doran." Howard Journal of Criminal Justice 35, no. 4 (January 26, 2009): 373–74. http://dx.doi.org/10.1111/j.1468-2311.1996.tb00885.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Barbosa, Geraldo. "A Wireless Physically Secure Key Distribution System." Journal of Information Security and Cryptography (Enigma) 3, no. 1 (September 3, 2016): 9. http://dx.doi.org/10.17648/enig.v3i1.56.

Full text
Abstract:
A fast and secure key distribution system is shown that operates in classical channels but with a dynamic protection given by the shot noise of light. The binary signals in the communication channel are protected by coding in random bases and by addition of physical noise that was recorded and added bit by bit to the signals. While the resulting signals are classical they carry the uncontrollable randomness information in the signal sent. The legitimate users start with a shared secret between them creating a measuring advantage over the adversary. This way the introduced noise does not affect the users but frustrates the attacker.
APA, Harvard, Vancouver, ISO, and other styles
42

Jung, Junwoo, Jaesung Lim, Sungyeol Park, Haengik Kang, and Seungbok Kwon. "Analysis of Low Probability of Detection Capability for Chaotic Standard Map-Based FH-OFDMA System." Applied Sciences 11, no. 5 (March 3, 2021): 2198. http://dx.doi.org/10.3390/app11052198.

Full text
Abstract:
A frequency hopping orthogonal frequency division multiple access (FH-OFDMA) can provide low probability of detection (LPD) and anti-jamming capabilities to users against adversary detectors. To obtain an extreme LPD capability that cannot be provided by the basic symbol-by-symbol (SBS)-based FH pattern, we proposed two FH patterns, namely chaotic standard map (CSM) and cat map for FH-OFDMA systems. In our previous work, through analysis of complexity to regenerate the transmitted symbol sequence, at the point of adversary detectors, we found that the CSM had a lower probability of intercept than the cat map and SBS. It is possible when a detector already knows symbol and frame structures, and the detector has been synchronized to the FH-OFDMA system. Unlike the previous work, here, we analyze whether the CSM provides greater LPD capability than the cat map and SBS by detection probability using spectrum sensing technique. We analyze the detection probability of the CSM and provide detection probabilities of the cat map and SBS compared to the CSM. Based on our analysis of the detection probability and numerical results, it is evident that the CSM provides greater LPD capability than both the cat map and SBS-based FH-OFDMA systems.
APA, Harvard, Vancouver, ISO, and other styles
43

Bergadano, Francesco, Fabio Carretto, Fabio Cogno, and Dario Ragno. "Defacement Detection with Passive Adversaries." Algorithms 12, no. 8 (July 29, 2019): 150. http://dx.doi.org/10.3390/a12080150.

Full text
Abstract:
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modifications that would result in significant reputational damage. As in many other anomaly detection contexts, the algorithm used to identify possible defacements is obtained via an Adversarial Machine Learning process. We consider an exploratory setting, where the adversary can observe the detector’s alarm-generating behaviour, with the purpose of devising and injecting defacements that will pass undetected. It is then necessary to make to learning process unpredictable, so that the adversary will be unable to replicate it and predict the classifier’s behaviour. We achieve this goal by introducing a secret key—a key that our adversary does not know. The key will influence the learning process in a number of different ways, that are precisely defined in this paper. This includes the subset of examples and features that are actually used, the time of learning and testing, as well as the learning algorithm’s hyper-parameters. This learning methodology is successfully applied in this context, by using the system with both real and artificially modified Web sites. A year-long experimentation is also described, referred to the monitoring of the new Web Site of a major manufacturing company.
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Mingzhen, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, and Guangcan Yang. "Cross-Platform Strong Privacy Protection Mechanism for Review Publication." Security and Communication Networks 2021 (June 8, 2021): 1–22. http://dx.doi.org/10.1155/2021/5556155.

Full text
Abstract:
As a review system, the Crowd-Sourced Local Businesses Service System (CSLBSS) allows users to publicly publish reviews for businesses that include display name, avatar, and review content. While these reviews can maintain the business reputation and provide valuable references for others, the adversary also can legitimately obtain the user’s display name and a large number of historical reviews. For this problem, we show that the adversary can launch connecting user identities attack (CUIA) and statistical inference attack (SIA) to obtain user privacy by exploiting the acquired display names and historical reviews. However, the existing methods based on anonymity and suppressing reviews cannot resist these two attacks. Also, suppressing reviews may result in some reiews with the higher usefulness not being published. To solve these problems, we propose a cross-platform strong privacy protection mechanism (CSPPM) based on the partial publication and the complete anonymity mechanism. In CSPPM, based on the consistency between the user score and the business score, we propose a partial publication mechanism to publish reviews with the higher usefulness of review and filter false or untrue reviews. It ensures that our mechanism does not suppress reviews with the higher usefulness of reviews and improves system utility. We also propose a complete anonymity mechanism to anonymize the display name and avatars of reviews that are publicly published. It ensures that the adversary cannot obtain user privacy through CUIA and SIA. Finally, we evaluate CSPPM from both theoretical and experimental aspects. The results show that it can resist CUIA and SIA and improve system utility.
APA, Harvard, Vancouver, ISO, and other styles
45

Hatzivassiliou, Evanthis. "Images of the Adversary: NATO Assessments of the Soviet Union, 1953–1964." Journal of Cold War Studies 11, no. 2 (April 2009): 89–116. http://dx.doi.org/10.1162/jcws.2009.11.2.89.

Full text
Abstract:
The article presents the analysis of the study groups set up by the North Atlantic Treaty Organization (NATO) to assess the non-military aspects of Soviet power and potential during the era of Nikita Khrushchev. Following Stalin's death, the Western alliance tried to form a comprehensive view of the strengths and weaknesses of the USSR's economy and political system. This was part of NATO's effort to adjust to the realities of a long Cold War, the outcome of which would not be decided by military force alone. The NATO reports were largely successful in describing the long-term trends of the Soviet economy and the weaknesses of the Soviet system. However, they usually failed to anticipate specific, though significant and potentially dangerous, initiatives of the Soviet regime. On balance they were a crucial input for NATO ministers, and their importance in the shaping of Western policies needs to be evaluated carefully.
APA, Harvard, Vancouver, ISO, and other styles
46

Bundy, Stephen McG, and Einer Richard Elhauge. "Do Lawyers Improve the Adversary System? A General Theory of Litigation Advice and Its Regulation." California Law Review 79, no. 2 (March 1991): 313. http://dx.doi.org/10.2307/3480690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cohen, Elliot D. "Pure legal advocates and moral agents: Two concepts of a lawyer in an adversary system." Criminal Justice Ethics 4, no. 1 (January 1985): 38–59. http://dx.doi.org/10.1080/0731129x.1985.9991769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Glasser, Cyril. "Civil Procedure and the Lawyers-The Adversary System and the Decline of the Orality Principle." Modern Law Review 56, no. 3 (May 1993): 307–24. http://dx.doi.org/10.1111/j.1468-2230.1993.tb02675.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Shuman, Daniel W., and Stuart A. Greenberg. "The expert witness, the adversary system, and the voice of reason: Reconciling impartiality and advocacy." Professional Psychology: Research and Practice 34, no. 3 (2003): 219–24. http://dx.doi.org/10.1037/0735-7028.34.3.219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ormrod, David, and Benjamin Turnbull. "Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success." International Journal of Cyber Warfare and Terrorism 7, no. 4 (October 2017): 1–13. http://dx.doi.org/10.4018/ijcwt.2017100101.

Full text
Abstract:
Modern military forces rely heavily on cyber-enabled systems; for logistics, communication, and control. Modern military platforms are heavily integrated with computing capability. This integration and reliance will only increase over time. Modern military operations require the support of flexible, responsive and resilient cyber-capabilities. Current information system security models and information assurance constructs seek to achieve information assurance, a high degree of certainty in the confidentiality, integrity and availability of cyber-systems supporting combat operations. However, this approach assumes that an information assurance approach is a complete and comprehensive defense. History though, has proven otherwise. This work argues that the information assurance approach, whilst a worthy goal, is not reflective of the lessons of history or warfare. Specifically, this work outlines the need for, and introduces The Military Cyber-Maturity Model, a pragmatic model that assumes a technically capable and intelligent adversary. This model assumes the possibility of an adversary utilizing an unknown vulnerability to attack the system, and expends resources to minimise the impact of the successful attack rather than relying entirely on an impregnable defense. This approach extends beyond the assumption that a cyber-attack immediately causes mission failure, by recognizing that each cyber-attack has different requirements and outcomes and will affect different assets and processes. The Military Cyber-Maturity Model seeks to model business continuity through a high degree of cultural change, embedded work practices that parallel analogue and digital work practices with deceptive counterintelligence behavior. The Military Cyber-Maturity Model incorporates the concepts of behavioral defense and mission assurance to provide agility and increase the likelihood of success in combat. Information deception provides a behavioral defense, creating uncertainty and doubt in the adversary's mind and reducing the degree of trust they have in the information available. This paper introduces the model, outlines its aims, components and justifications. This work also outlines the need for simulation and testing to validate the model's effectiveness, and introduces a number of potential use-cases.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography