Results for 'Cybersecurity, cyberattack, malware, out-of-distribution detection'

970 found
Order:
  1.  50
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  52
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  52
    Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art approaches in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  26
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  18
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  29
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  30
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  22
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly follows (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  43
    Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  66
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. [REVIEW]Tosin Ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:11.
    To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for real-time detection of vulnerabilities to improve security around information systems. Of all the proposed methods, machine learning had been the most effective method in securing a system with capabilities ranging from early detection of software vulnerabilities to real-time detection of ongoing compromise in a system. As there are different types of cyberattacks, each of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  77
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. The logic of distributive bilattices.Félix Bou & Umberto Rivieccio - 2011 - Logic Journal of the IGPL 19 (1):183-216.
    Bilattices, introduced by Ginsberg as a uniform framework for inference in artificial intelligence, are algebraic structures that proved useful in many fields. In recent years, Arieli and Avron developed a logical system based on a class of bilattice-based matrices, called logical bilattices, and provided a Gentzen-style calculus for it. This logic is essentially an expansion of the well-known Belnap–Dunn four-valued logic to the standard language of bilattices. Our aim is to study Arieli and Avron’s logic from the perspective of abstract (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  18. In defence of gullibility: The epistemology of testimony and the psychology of deception detection.Kourken Michaelian - 2010 - Synthese 176 (3):399-427.
    Research in the psychology of deception detection implies that Fricker, in making her case for reductionism in the epistemology of testimony, overestimates both the epistemic demerits of the antireductionist policy of trusting speakers blindly and the epistemic merits of the reductionist policy of monitoring speakers for trustworthiness: folk psychological prejudices to the contrary notwithstanding, it turns out that monitoring is on a par (in terms both of the reliability of the process and of the sensitivity of the beliefs that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  19. Review of Distributed Like Bread – Jonathan M. Ciraulo. [REVIEW]Steven Umbrello - 2024 - Homiletic and Pastoral Review.
    In Distributed Like Bread: Hans Urs von Balthasar Speaks to Seminarians, Jonathan Ciraulo engages with the theological insights of Hans Urs von Balthasar, especially as they pertain to the priesthood and seminary formation. This work not only introduces readers to Balthasar's complex and nuanced understanding of the priestly vocation but also serves as a guide for those discerning or living out this calling. Through a detailed examination of Balthasar’s life and writings, Ciraulo uncovers the profound notion that the priesthood is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Out of School Children in Vietnam: How Structural Adjustment Programs Have Reduced Capabilities for Vietnam’s Most Vulnerable.Aneesa Kara - 2023 - Medium.
    A pressing issue in Vietnam which is attracting attention from INGOs and the Vietnamese government is out-of-school-children (OOSC). Comparatively with other developing and middle-income countries, Vietnam hosts some of the most impressive educational attainment rates, on par with developed countries, comprising of almost equal gender parity rates, and ‘achieving’ Millennium Development Goal 4 (MDG), universal primary education, ahead of schedule. There are a wide range of historical, social, structural, cultural and economic factors outside the formal education setting which contribute to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Systemising Triage: COVID-19 Guidelines and Their Underlying Theories of Distributive Justice.Lukas J. Meier - 2022 - Medicine, Health Care and Philosophy 25 (4):703-714.
    The COVID-19 pandemic has been overwhelming public health-care systems around the world. With demand exceeding the availability of medical resources in several regions, hospitals have been forced to invoke triage. To ensure that this difficult task proceeds in a fair and organised manner, governments scrambled experts to draft triage guidelines under enormous time pressure. Although there are similarities between the documents, they vary considerably in how much weight their respective authors place on the different criteria that they propose. Since most (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. Calibration dilemmas in the ethics of distribution.Jacob M. Nebel & H. Orri Stefánsson - 2023 - Economics and Philosophy 39 (1):67-98.
    This paper presents a new kind of problem in the ethics of distribution. The problem takes the form of several “calibration dilemmas,” in which intuitively reasonable aversion to small-stakes inequalities requires leading theories of distribution to recommend intuitively unreasonable aversion to large-stakes inequalities. We first lay out a series of such dilemmas for prioritarian theories. We then consider a widely endorsed family of egalitarian views and show that they are subject to even more forceful calibration dilemmas than prioritarian (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  23.  56
    Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results demonstrate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Minds in and out of time: memory, embodied skill, anachronism, and performance.Evelyn Tribble & John Sutton - 2012 - Textual Practice 26 (4):587-607.
    Contemporary critical instincts, in early modern studies as elsewhere in literary theory, often dismiss invocations of mind and cognition as inevitably ahistorical, as performing a retrograde version of anachronism. Arguing that our experience of time is inherently anachronistic and polytemporal, we draw on the frameworks of distributed cognition and extended mind to theorize cognition as itself distributed, cultural, and temporal. Intelligent, embodied action is a hybrid process, involving the coordination of disparate neural, affective, cognitive, interpersonal, ecological, technological, and cultural resources. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Humeans Aren’t Out of their Minds.Brian Weatherson - 2007 - Noûs 41 (3):529–535.
    Humeanism is “the thesis that the whole truth about a world like ours supervenes on the spatiotemporal distribution of local qualities.” (Lewis, 1994, 473) Since the whole truth about our world contains truths about causation, causation must be located in the mosaic of local qualities that the Humean says constitute the whole truth about the world. The most natural ways to do this involve causation being in some sense extrinsic. To take the simplest possible Humean analysis, we might say (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  27. Distributed Cognition and Memory Research: History and Current Directions.Kourken Michaelian & John Sutton - 2013 - Review of Philosophy and Psychology 4 (1):1-24.
    According to the hypotheses of distributed and extended cognition, remembering does not always occur entirely inside the brain but is often distributed across heterogeneous systems combining neural, bodily, social, and technological resources. These ideas have been intensely debated in philosophy, but the philosophical debate has often remained at some distance from relevant empirical research, while empirical memory research, in particular, has been somewhat slow to incorporate distributed/extended ideas. This situation, however, appears to be changing, as we witness an increasing level (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  28. Why the de Broglie-Bohm theory is probably wrong.Shan Gao - manuscript
    We investigate the validity of the field explanation of the wave function by analyzing the mass and charge density distributions of a quantum system. It is argued that a charged quantum system has effective mass and charge density distributing in space, proportional to the square of the absolute value of its wave function. This is also a consequence of protective measurement. If the wave function is a physical field, then the mass and charge density will be distributed in space simultaneously (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  18
    CAREER GUIDANCE APPLICATION FOR STUDENTS – AI ASSISTED.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):609-619.
    The rapid advancement of artificial intelligence (AI) technologies has revolutionized various industries, including the realm of education and career guidance. This project endeavors to harness the power of AI to develop a sophisticated career guidance application that offers personalized and effective recommendations to students and job seekers. The primary objective of this project is to address the limitations of traditional career guidance methods, which often lack customization and fail to adapt to individual preferences, skills, and aspirations. Through the integration of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Frequencies Dominations for Different Rating of Distribution Transformer under Transients.Haseeb Faisal, Dr Kashif Imdad, Najeeb Hussain & Faisal Sharif - 2020 - International Journal of Engineering Works 7 (04):211-216.
    Power transients faults on high voltage lines are prominently due to high frequency transients. These transients affect the predicted life and efficiency of equipment. The Fast Fourier Transform (FFT) is helpful in analysing the effect of high frequencies and Frequency Response Analysis (FRA) provide support in diagnosis and detection of deformation in a transformers. The major aim of this study is to analyse the incorporation of frequencies based on resonating core of a particular transformer. Using transfer function method an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  32. On Unemployment: Volume I: A Micro-Theory of Distributive Justice.Mark R. Reiff - 2015 - Palgrave-Macmillan.
    Unemployment has been at historically high rates for an extended period, and while it has recently improved in certain countries, the unemployment that remains may be becoming structural. Aside from inequality, unemployment is accordingly the problem that is most likely to put critical pressure on our political institutions, disrupt the social fabric of our way of life, and even threaten the continuation of liberalism itself. Despite the obvious importance of the problem of unemployment, however, there has been a curious lack (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The psychology of memory, extended cognition, and socially distributed remembering.John Sutton, Celia B. Harris, Paul G. Keil & Amanda J. Barnier - 2010 - Phenomenology and the Cognitive Sciences 9 (4):521-560.
    This paper introduces a new, expanded range of relevant cognitive psychological research on collaborative recall and social memory to the philosophical debate on extended and distributed cognition. We start by examining the case for extended cognition based on the complementarity of inner and outer resources, by which neural, bodily, social, and environmental resources with disparate but complementary properties are integrated into hybrid cognitive systems, transforming or augmenting the nature of remembering or decision-making. Adams and Aizawa, noting this distinctive complementarity argument, (...)
    Download  
     
    Export citation  
     
    Bookmark   123 citations  
  36. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: beneficence, non-maleficence, autonomy, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. 'Distributive Justice and Climate Change'.Simon Caney - 2018 - In Serena Olsaretti (ed.), The Oxford Handbook of Distributive Justice. New York, NY: Oxford University Press.
    This paper discusses two distinct questions of distributive justice raised by climate change. Stated very roughly, one question concerns how much protection is owed to the potential victims of climate change (the Just Target Question), and the second concerns how the burdens (and benefits) involved in preventing dangerous climate change should be distributed (the Just Burden Question). In Section II, I focus on the first of these questions, the Just Target Question. The rest of the paper examines the second question, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  38. Must We Vaccinate the Most Vulnerable? Efficiency, Priority, and Equality in the Distribution of Vaccines.Emma J. Curran & Stephen D. John - 2022 - Journal of Applied Philosophy 39 (4):682-697.
    In this article, we aim to map out the complexities which characterise debates about the ethics of vaccine distribution, particularly those surrounding the distribution of the COVID-19 vaccine. In doing so, we distinguish three general principles which might be used to distribute goods and two ambiguities in how one might wish to spell them out. We then argue that we can understand actual debates around the COVID-19 vaccine – including those over prioritising vaccinating the most vulnerable – as (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Deception Detection Research: Some Lessons for Epistemology.Peter Graham - 2024 - In Waldomiro J. Silva-Filho (ed.), Epistemology of Conversation: First essays. Cham: Springer.
    According to our folk theory of lying, liars leak observable cues of their insincerity, observable cues that make it easy to catch a liar in real time. Various prominent social epistemologists rely on the correctness of our folk theory as empirically well-confirmed when building their normative accounts of the epistemology of testimony. Deception detection research in communication studies, however, has shown that our folk-theory is mistaken. It is not empirically well-confirmed but empirically refuted. Michaelian (2010) and Shieber (2012) have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Distributive Justice as a Matter of Love: A Relational Approach to Liberty and Property.Thaddeus Metz - 2019 - In Ingolf Dalferth (ed.), Love and Justice (Claremont Studies in Philosophy of Religion). pp. 339-352.
    Usually a relational approach, such as one appealing to care or love, is contrasted with an account of justice. In this chapter, however, I argue that distributive justice is well conceived as itself a matter of honouring people in virtue of their capacity to love and to be loved. After spelling out a familiar conception of love, I explain how treating people with respect in light of this capacity provides a plausible basis for human rights, one that rivals influential individualist (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Standards and the distribution of cognitive labour: A model of the dynamics of scientific activity.Langhe Rogieder & Greiff Matthias - 2010 - Logic Journal of the IGPL 18 (2):278-294.
    We present a model of the distribution of labour in science. Such models tend to rely on the mechanism of the invisible hand . Our analysis starts from the necessity of standards in distributed processes and the possibility of multiple standards in science. Invisible hand models turn out to have only limited scope because they are restricted to describing the atypical single-standard case. Our model is a generalisation of these models to J standards; single-standard models such as Kitcher are (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  42. Phonological Ambiguity Detection Outside of Consciousness and Its Defensive Avoidance.Ariane Bazan, Ramesh Kushwaha, E. Samuel Winer, J. Michael Snodgrass, Linda A. W. Brakel & Howard Shevrin - 2019 - Frontiers in Human Neuroscience 13.
    Freud proposes that in unconscious processing, logical connections are also (heavily) based upon phonological similarities. Repressed concerns, for example, would also be expressed by way of phonologic ambiguity. In order to investigate a possible unconscious influence of phonological similarity, 31 participants were submitted to a tachistoscopic subliminal priming experiment, with prime and target presented at 1ms. In the experimental condition, the prime and one of the 2 targets were phonological reversed forms of each other, though graphemically dissimilar (e.g., “nice” and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Distributed utterances.Mark McCullagh - 2020 - In Tadeusz Ciecierski & Pawel Grabarczyk (eds.), The Architecture of Context and Context-Sensitivity. Springer. pp. 113-24.
    I propose an apparatus for handling intrasentential change in context. The standard approach has problems with sentences with multiple occurrences of the same demonstrative or indexical. My proposal involves the idea that contexts can be complex. Complex contexts are built out of (“simple”) Kaplanian contexts by ordered n-tupling. With these we can revise the clauses of Kaplan’s Logic of Demonstratives so that each part of a sentence is taken in a different component of a complex context. I consider other applications (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Distributed cognition and distributed morality: Agency, artifacts and systems.Richard Heersmink - 2017 - Science and Engineering Ethics 23 (2):431-448.
    There are various philosophical approaches and theories describing the intimate relation people have to artifacts. In this paper, I explore the relation between two such theories, namely distributed cognition and distributed morality theory. I point out a number of similarities and differences in these views regarding the ontological status they attribute to artifacts and the larger systems they are part of. Having evaluated and compared these views, I continue by focussing on the way cognitive artifacts are used in moral practice. (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  45. What Is the Validity Domain of Einstein’s Equations? Distributional Solutions over Singularities and Topological Links in Geometrodynamics.Elias Zafiris - 2016 - 100 Years of Chronogeometrodynamics: The Status of the Einstein's Theory of Gravitation in Its Centennial Year.
    The existence of singularities alerts that one of the highest priorities of a centennial perspective on general relativity should be a careful re-thinking of the validity domain of Einstein’s field equations. We address the problem of constructing distinguishable extensions of the smooth spacetime manifold model, which can incorporate singularities, while retaining the form of the field equations. The sheaf-theoretic formulation of this problem is tantamount to extending the algebra sheaf of smooth functions to a distribution-like algebra sheaf in which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. So What's My Part? Collective Duties, Individual Contributions, and Distributive Justice.Moritz A. Schulz - 2023 - Historical Social Research 48 (3: Collective Agency):320-349.
    Problems in normative ethics paradigmatically concern what it is obligatory or permissible for an individual to do. Yet sometimes, each of us ought to do something individually in virtue of what we ought to do together. Unfortunately, traversing these two different levels at which a moral obligation can arise – individual and collective – is fraught with difficulties that easily lure us into conclusions muddying our understanding of collective obligations. This paper seeks to clearly lay out a systematic problem central (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Oliver and Smiley on the Collective–Distributive Opposition.Gustavo Picazo - 2022 - Logos and Episteme 13 (2):201-205.
    Two objections are raised against Oliver and Smiley’s analysis of the collective–distributive opposition in their 2016 book: They take it as a basic premise that the collective reading of ‘baked a cake’ corresponds to a predicate different from its distributive reading, and the same applies to all predicate expressions that admit both a collective and a distributive interpretation. At the same time, however, they argue that inflectional forms of the same lexeme reveal a univocity that should be preserved in a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. (1 other version)Collaborative memory knowledge: A distributed reliabilist perspective.Kourken Michaelian & Santiago Arango-Munoz - 2017 - In Michelle L. Meade, Celia B. Harris, Penny Van Bergen, John Sutton & Amanda J. Barnier (eds.), Collaborative Remembering: Theories, Research, Applications. Oxford University Press. pp. 231-247.
    Collaborative remembering, in which two or more individuals cooperate to remember together, is an ordinary occurrence. Ordinary though it may be, it challenges traditional understandings of remembering as a cognitive process unfolding within a single subject, as well as traditional understandings of memory knowledge as a justified memory belief held within the mind of a single subject. Collaborative memory has come to be a major area of research in psychology, but it has so far not been investigated in epistemology. In (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  50. PIV Measurement of Velocity Distribution in the Moderator Circulation Test (MCT).Hyoung Tae Kim - 2014 - Journal of Power and Energy Engineering 2 (9):74-80.
    Korea Atomic Energy Research Institute (KAERI) has been carrying out a scaled-down moderator test program to simulate the CANDU-6 moderator circulation phenomena during steady state operation and accident conditions. The Moderator Circulation Test (MCT) facility was designed and constructed as 1/4 scale of the prototype of CANDU-6 reactor. In the present work spatial distribution of two-dimensional velocity in the MCT facility under isothermal condition was measured using planar Particle Image Velocimetry (PIV) system which consists of double pulsed laser, synchronizer, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 970