Saturday, December 28, 2019

Media Influence On Women s Body Image - 1688 Words

Over time, the perfect body image has changed in many ways. This is very evident in the female sex, especially through media. â€Å"Americans spend about 68 hours per week exposed to various forms of media† (US Census Bureau 2009). This media exposure through outlets such as t.v., radio, music videos, movies, and the internet, all influence the way people think about gender. The media influence is very evident in the way people view women and think about women in different cultures. Media influence on women creates negative viewpoints with how women view themselves and even how men view themselves, in turn making it hard to break certain beliefs and stereotypes instilled on society. There are many different products developed that are designed to help people alter their bodies in some way. Some of these products are tanning lotions/sprays, body sprays/lotions of odor, shavers, nail cutters, trimmers, acme medicine, wrinkle lotions, different types of make-up, hair dyes, hair straighteners and curlers, anti-aging creams, and many other different things. The advertisements for these different products preach all different kinds of messages to men and women alike. Women’s products and commercials typically promise men will want them, they will look 10 years younger, they will lose as much weight as they want without really doing anything, and that they will look like the models they use in the commercials. Some of the gender messages that are being sent by these advertisementsShow MoreRelated The Medias Influence on Eating Disorders Essay example1100 Words   |  5 PagesThe Medias Influence on Eating Disorders The National Eating Disorders Association states that eating disorders are conditions that arise from factors including physical, psychological, interpersonal, and social issues. Media images help define cultural definitions of beauty and attractiveness and are often acknowledged as one of the factors that contribute to the rise of eating disorders (NEDA). The National Eating Disorders Associations website, The Effect of the Media on Body SatisfactionRead MoreTodays Unrealistic Body Expectations1311 Words   |  5 Pagesabs, and a small waist while good looking women are viewed to have the characteristics of being slim and fit, having a small waist, lean hips, and perfect skin complexion. As a result, many people are affected by our own societys portrayals of good looking men and women that they feel pressured into doing whatever it takes and going through extreme measures, most of the time, spending countless hours in the gym trying to achieve that perfect body. Body image is ev ident in the gym, as the men are liftingRead MoreThe Impact Of Media On Body Image1538 Words   |  7 Pagesthe concept of body image is influenced by external factors as culture, society norms, especially with the development of modern social media, it has grown up to be an important element in affecting the perception of body image to shape the body image. The influence of mass media may be related to the social comparison process of appearance in female and male. The ideal media body image, it is easy to compare in everyday life, and that will result to dissatisfaction with people s body size. On theRead MoreAnalysis Of Snow White And The Seven Dwarfs 1179 Words   |  5 Pagesevery day lives . From these new technologies, Americans can connect with the media and they are constantly attacked by the messages of the media. A superior message the media is depicting is ultra-thin as a reference point of beauty. Everyday an abundance of women are bombarded with the media s concep t and interpretation of the flawless body. The photos being represented in popular magazines typically issued for women all over the country are impractical and illogical. According to Adam Cloe,Read MoreThe Influences Of Mass Media On Society864 Words   |  4 PagesThe Influences of Mass Media on Society For the greater majority of the American society, the presence of mass media is a normal part of everyday lives. With the purpose of mass media being to educate, entertain and inform, the excessive violence, self imaging, and lack of full detail on world events, is having negative influences and unhealthy impacts on society. As early as the 1920s, a form of the media has been present in the American society. Although broadcasted content wasRead MoreSocial Media Allows People To Share Pictures And Ideas1057 Words   |  5 PagesSocial media allows people to share pictures and ideas with others across the world. Women and girls can use social media to earn approval for their appearance and compare themselves to others. Women during this time period that are so heavily impacted by the media can link their self-worth to their looks. I used scholarly articles all relating to how social media affects body image to decide what my view point was. After research, we can conclude that social media has a negative effect on a woman’sRead MoreThe Media s Influence On The Body Image804 Words   |  4 Pagespoint! She s so skinny and fit looking. Her skin is absolutely flawless! I wish I looked like her! Why can t I be like those girls? How many times have you watched television, searched the web, looked at magazines, or used your cell phone and have thought those things about a woman/teen gir l that you have seen? Media has photoshopped, airbrushed, and tweaked pictures and videos to appear as perfect! The media has made young women feel as if their bodies are not good enough. Young women are beingRead MoreEffects Of Social Media Essay1322 Words   |  6 Pagestypes of effects social media has on society, especially adolescent girls as that age group is mainly targeted. The role of media has changed drastically from when it first started to now. It was first created for the main purpose of communicating information. Although that is still true to this day, there are also other purposes for the media now. Media presents information through books, posters, the web and etc. One of the most popular forms of media today is social media. That includes FacebookRead MoreThe Impact Of Media On Society s Actions, Personalities, And Beliefs Essay1476 Words   |  6 PagesComposition Per. 3 November 19 2015 Media in Our World The media today is one of the greatest influences on society’s actions, personalities, and beliefs. The Society conducts their lives to the point where they are just living a life that media has created for them. Sometimes this influence is taken into consideration to deeply and starts to harm society. The image of a woman in today’s society as portrayed by the media are one that is almost artificial. Mass media have come to develop this idea thatRead MoreMedia Negatively Affects Body Image1153 Words   |  5 PagesMedia negatively affects body image. medias are technology based platforms for opinions and facts, and have a wide spectrum of views. Body image must do with how one sees themselves and it can be either positive or negative. Across the board, the biggest platforms media has used to distort the image of the body are social media, TV, and magazines. Body images have been an ongoing controversial issue throughout history, especially with women, but with men as well. As technology grows and furthers

Friday, December 20, 2019

Leadership Profile What Makes A Great Leader Essay

What is leadership profile and what it means to you as an individual? What makes a great leader? These are questions that have been asked and researched for years. Well, I’m going to try to explain my theory on what leadership profile means from my point of view. Leadership profile is the mode you view a leader from your observation on how they lead. Research has been conducted by Evans., and Matthew (2016) at Development Dimensions (DDI) International exam database of assessment data for more the 15,000-plus leaders in 300 organizations, 20 industries and 18 countries and the results reported high –resolution leadership including numerous findings about leadership skill and readiness. There is no one pattern of how these leadership profile can be governed; however, you can rest assure it can be effective if used appropriately. These results have lead me to my definition of a leader, which is a leader is anyone who has affected your life by taking the role of a leader o r anyone who you would follow to the ends of this earth. Though the way I understand leadership profiles may be somewhat different from the way you perceive it, nonetheless in my understanding leadership profile is the manner in which you interpret the person who has the knowledge to lead. Nowadays, with all this research being conducted on the subject there is no truthful way to narrow down an accurate answer to the questions above, but researchers are determined to continue their endless research in thisShow MoreRelatedSelf Assessment Of Leadership Practices1019 Words   |  5 PagesSelf-Assessment of Leadership Practices The road to becoming an exceptional leader while rewarding, is one filled with numerous challenges. Developing the necessary skills required in order to successfully lead others is a life-long process. In this paper, I will discuss in details my leadership qualities. I will include results from my Seven Habits Profile, evaluate my strength and weaknesses and adopt leadership theories that will help guide my self-evaluation. In addition, I will analyze provenRead MoreSeven Habits Profile : An Evaluation Of My Personal Leadership Style1498 Words   |  6 PagesSeven Habits Profile: An Evaluation of my Personal Leadership Style I have always thought of myself as a strong, motivated leader, and based on the results of my seven habits profile I can confirm that there will always be room to grow. There are areas of the seven habits profile in which I thought I excelled, but in reality those are the areas that I need to develop the most. I have always seemed to complete whatever task I may have had in mind, and was always successful in the path that I had takenRead MoreQualities Of Winston Churchill913 Words   |  4 Pagesminister of Great Britain during World War 2.Winston Churchill helped lead a successful allied strategy with the USA and the Soviet Union to defeat the Axis Powers. He cooperated with the Communist Russian government, led by Joseph Stalin, because he believed it was the best way to keep England from falling into the German hands. St. Ignatius College Preparatory seeks to define leadership in the Profile 2020. Qualities that Winston Churchill exemplified as being a great leader is he recognizedRead MoreHow Strategies Can Foster Employee Engagement Essay1212 Words   |  5 Pagesinternal policies. Managing and leadership skills can be developed and nurtured; without these efforts, promoting from within could lead to disastrous results from the weaknesses of disengaged, autocratic or self-serving managers who lack true leadership skills. The Characteristics of Great Leaders Great leaders make the best managers, and leadership can be cultivated by a company s culture, HR policies and executive support. The personal attributes of great leaders include focus, energy, confidenceRead MoreWhat Did You Learn About Leadership Effectiveness And Flexibility? Essay1201 Words   |  5 Pages1. What did you learn about leadership effectiveness and flexibility? The Leader Behavior Analysis II Self Report provides insight on the flexibility associated with leadership effectiveness. True to the Ken Blanchard model, the results reflect the level in which the leader’s engagement strategy with the shifts to meet the situation of the follower (employee). Each situation of this partnership presents unforeseen challenges affecting the employee’s level of commitment. It is up to the leader toRead MoreQCP 100 Quiz 2 Ch 4 Questions 21626 Words   |  7 Pages4. Strategic objectives are what an organization must change or improve to remain or become competitive. Answer: T 5. A key role of strategic planning is to align work processes and learning initiatives with an organization’s strategic directions. Answer: T 6. The concept of strategic leadership has moved leadership perspectives away from team- and system-based â€Å"great group† concept toward the solitary â€Å"great leader† paradigm. Answer: F 7. The Organizational Profile provides the â€Å"finer picture†Read MoreLeadership Theory Analysis And Application862 Words   |  4 PagesLeadership Theory Analysis and Application There are many different leadership theories that have been proposed, tested, and studied over the years. Many organizations utilize these theories and practices to collect and analyze data within their own organizations which may allow them to find ways of increasing the effectiveness of their company. Although there are not any theories deemed completely perfect in leadership, many have been given lots of validity based on the and studies done involvingRead MoreLeadership Is Good And Bad Leadership954 Words   |  4 Pages(a) the United States Coast Guard defines leadership as â€Å"You influencing others to achieve a goal.† Ref (b) defines leadership as â€Å"the ability to work through others to accomplish a task.† My definition of leadership is â€Å"Things you do to get people to do things†. My definition covers both â€Å"good† and â€Å"bad† leadership. I feel that I have been influenced equally as much by â€Å"bad† leadership as â€Å"good† leadership. I have observed as much of what not to do, as what to do. I occasionally find myself compelledRead MoreLeader Self Assesment Essay examples1012 Words   |  5 Pageschildren we see leadership in action. A gutsy young child decides that she will be the captain of the kickball game; she stands up proudly and takes control. There is a raw quality to her leading, alliances are made and alliances are broken. If her team wins, the cheers abound. If her team loses it may be the last time she picks the players. Though this is anecdotal and elementary it is perhaps one of the earliest examples that I saw of leadership. Some of those so-called leaders became bulliesRead MoreLeadership Is A God Given Gift. De Facto Not Just Anyone Can Be A Leader983 Words   |  4 Pagesheart and patience. One might say that leadership is a God-given gift; de facto not just anyone can be a leader. Education today is an embodiment of diversity. Each aspect of the educatio nal institution’s architecture demands an array of varying needs be meet with precision, dedication, mastery, and fortitude. A leader must personify patience, enthusiasm, and a desire for continued learning. A leader must lead by example. These traits embody an exceptional leader, which in the fast-paced, instant gratification

Wednesday, December 11, 2019

Comparison of Porphyrias Lover and My Last Duchess Essay Example For Students

Comparison of Porphyrias Lover and My Last Duchess Essay These two poems have many things in common they both are written by the same poet Robert Browning. Porphyrias Lover and My Last Duchess are written through the eyes of the murder and are dramatic monologues. I suppose they can be seen as biased and one sided as the story is only told by one person. They also have a silent listener. In My Last Duchess the silent listener is the Ambassador for the Count, who is the father of the Dukes next bride. My Last The Count your masters known munificence Duchess: Is ample warrant that no just pretence Of mine for drowy will be disallowed; Though his fair daughters self, as I avowed At starting, is my object. (Page 8 lines 49-53) In the quotation written above the reason in which why I think that he is talking to the Ambassador of the Count is that Robert Browning uses the word Count and his fair daughters both emphases that he is talking to someone about his next Duchess. In Porphyrias Lover the silent listener could be a number of people it could be a police officer, or he could just be telling the story to a friend. The reason why I am not sure of whom he is talking to is that there is no evidence in the poem, which tells me who he is talking to. As the poems are dramatic monologues you get to learn about some of the characteristics of the characters. You gain knowledge of the Duke being cold, ruthless and possessive. The characteristics that you discover about Phorphyrias Lover, is that he is abnormally possessive lover, passionate and obsessive. From the knowledge of the characters you are given through the poems you see that they are both possessive and this is the reason why both of the characters kill their lovers. Because of all the jealously and possessiveness going on it gets too much for them and they kill their loved ones to get what they want. Phorphyrias To set it struggling passion free Lover: From pride, and vainer ties dissever, And give herself to me forever (Page 30 lines 22-25) My Last Since none puts by Duchess: The curtain I have drawn for you, but I. (Page 8 lines 9-10) In Phorphyrias Lover you learn that he does kill her through possessiveness because it says And give herself to me forever and if you want something to stay with you for ever then that is possessive as he didnt want no one else to have her, not even her husband. The lover also shows to be possessive by saying That moment she was mine, mine. He feels that by killing her it makes her, his that he has won her love forever and that she wont ever forget him or leave him. In My Last Duchess you are taught that the Duke is possessive by him saying I have drawn for you, but I which he is saying that he is keeping the curtain in front of the picture he has of her shut so no one can the see Duchess but himself. The language used by Robert Browning makes the Duke and the Lover very similar although he uses different language in the poems. Both the Duke and the Lover gets jealous of the way that Phorphyria and the Duchess are living their lives. The Duke feels as though he is not important to her as she gives him the same smile as she gives everyone else. The same smile when she receives a little gift and the same smile when he gave her a nine hundred year old name. To the Duke that nine hundred year old name is much more of an honour and privilege and should receive a better smile than anyone else. He feels as though she should act differently around him. He is jealous of her smile and the way that she goes about her life and the way that she blushes at almost everything. My Last all and each Duchess: Would draw from her a like the approving speech, Or blush at the least. (Page 8 lines 29-31) The Lover in Phorphyrias Lover is jealous but for a different kind of reason. The reason why the Lover is jealous is because Phorphyria cannot only be his as she already has a husband. The Lover believes that Phorphyria does not worship him or love him as much as he wants as same of that affection would be going to her husband. This is until the night that Phorphyria goes to him during the storm and he then realises that she does in fact worship him. All this jealousy stops for a few moments and he wants to keep this moment forever and the only way he thinks he can do this is by killing her. He also believes that he has granted her, her one and only wish. That wish was to be with him forever. Contemporary Poetry And Nature EssayThree times her little throat around and he does this thinking it is what she wants. He believes that Phorphyria wants to be with him forever and that she wanted to die so that she could be with him all the time. He thinks this because of the affectionate way that she is acting around him. He is surprised when he realises that she worships him. Robert Browning uses a semi-colon in line thirty-three which emphasises the fact that he is surprised as there is a pause. Robert Browning uses that same type of technique in My Last Duchess. My Last Much the same smile? This grew; I gave command; Duchess: Then all smiles stopped together By Robert Browning using two semi-colons in one line I got the impression that maybe he thought of the idea of killing her at the first semi-colon, then at the second semi-colon I thought that the Duke could be thinking one of two things. He could be thinking twice about the decision/command that he just gave or he could be happy about the fact that from that moment forward it will be only him getting the affection and smiles (the picture in his gallery is only for him to see). Robert Browning makes the Lover in Phorphyrias Lover and the Duke in My Last Duchess similar as after they both have killed their lovers they both think that they havent done anything wrong. They also believe that their lovers are both with them forever and that no one else other than themselves will be getting any of their affection. Phorphyrias And all night long we have not stirred, Lover: And yet God has not said a word. By the Lover saying that God has not said a word he believes that he has done nothing wrong. In these two poems it seems to me that the two ladies involved are very beautiful and very friendly towards others and dont care about class. They do choose to stoop in a way as the Duchess blushes at compliments and Phorphyria is having an affair with a poorer man than herself. You know that the Duchess was beautiful and passionate as she blushes at compliments and blushing is a sign of beauty. Half-flush that dies along her throat and the depths of passion of that earnest glance. You also know that Phorphyria is beautiful and passionate because she has blonde hair and blue eyes. In one yellow string and Laughed the blue eyes You know that Phorphyria is passionate because of her name. Phorphyria is the colour red and you associate red with passion. The Duke seems to have a lot of power as he just orders the soldiers to kill the Duchess and they do. My Last Whenever I passed her, but who passed without Duchess: Much the same smile? This grew; I gave commands; Then all smiles stopped together (page 8 lines 44-46) In the same sort of way the Lover (in Porphyrias Lover) had just as much power but under different circumstances. He thinks that it is Prophyrias wish is to stay with him forever (he comes to this conclusion by finding out that she worships him). This quotation tells you this. Prophyrias So, she was come through wind and rain Lover: Be sure I looked up at her eyes Happy and proud; at last I knew Prophyria worshipped me (page 30 lines 30-33) He is convinced that Porphyria worshipped him because she left an important feast and travelled through a storm just to be with him. He may have made the wrong decision but he had the power to kill her physically. Porphyrias That moment she was mine, mine fair Lover: Perfectly pure and good; found A thing to do, and all her hair In one yellow string I wound Three times her little throat round(Page 30 lines 36-40) The two poems written by Robert Browning are very similar yet also very different. They are similar in the fact that they are both dramatic monologues and that they are both involve murdering someone that they love. The differences between the poems are the language used during the two poems. In Phorphyrias Lover the language is trying to make you feel sorry for Phorphyria but also it makes you feel for the Lover. However in My Last Duchess the language is trying to persuade you that the Duke did the wrong thing killing the Duchess. Both poems give you a lot of information on how the Duke and the lover are feeling. Overall I think that the poems are similar as they basically have the same plot and the same kind of characters.

Wednesday, December 4, 2019

Bridge Intrusion Detection System

Question: Describe about the Bridge Intrusion Detection System? Answer: Host-based Intrusion Detection Systems Host-Based Anomaly Intrusion Detection Host-based IDS is classified within two sorts as misuse HIDS and commercial virus checking processes. The host-based anomaly includes some of the factors with networking, real-time, and computing resources (Hu 2013). The sequencing patterns are included for showing the system calls and the equivalent positions. The fundamentals of Hidden Markov Model are analyzed in this context of states and probabilities. Mimicry Attacks on Host-Based Intrusion Detection Systems The journal discusses the typical host-based IDS architecture. Then in support to one theoretical framework, the HIDS threats depicted with respect to the modeling and malicious sequences (Wagner and Soto 2014). In many cases, empirical studies show that the mimicry attacks are with shortcomings of the serial riskiness and repeated threats. The article cited some of the steady attack sequences with tools applications. Steady attacks with several system calls and their individual impact on the systems are included in tabular format in the article. Host-based Intrusion Detection and Prevention System (HIDPS) The article incorporates the IDS and prevention systems with separate types of instructions. The intrusions are identified as the attempted break-ins, masquerade attacks, and leakage of typical use in systems resources. The IDPS classification is performed for showing the types of intruders, intrusions, techniques, and detection and prevention process (Letou, Devi and Singh 2013). There were certain levels of HIDPS with several strengths and limitations in this context of the study. The advantages and disadvantages are demonstrated with signature-level, anomaly-level, and state analysis in the study. Analysis of Host-Based and Network-Based Intrusion Detection System The article discusses about the root-kit threats, misuse risks, anomaly-based problems, and architecture analysis. The host-based and network-based architecture is demonstrated with the three types of structure. The article is important about the establishment of environment with the centralized, decentralized, or hierarchical patterns (Singh and Singh 2014). The research is conducted with setting the questions along with certain constraints and topic discussion. The sniffing activity is analyzed with charts and graphs in this aspect (Modi et al. 2013). The overall study is relevant with comparison of the host and network based IDS discussion and their analysis. An Implementation of Intrusion Detection System Using Genetic Algorithm The article is on the Genetic Algorithm and its application in the HIDS implementation. The IDS implementation is incorporated with algorithm and related further works are depicted in this aspect (Hoque et al. 2012). The study is supportive with anomaly and intrusion detection system according to the networking attacks. The attacks are identified as the denial of services attack, user to root level attacks, and probing process. Knowledge-based and Behavior Intrusion Detection System A Knowledge-Based Approach to Intrusion Detection Modeling This particular article is about the intrusion detection systems analysis and architecture discussion with knowledge based implementation. The vulnerabilities stay in the situation awareness and the knowledge as in situation aware IDS architecture. The article shows the sample reasoning rules with prototype design and validation (More et al. 2012). The ontology shows how the systematic attack occurs in case of logic and input validation. The on-bound and out-bound access is shown with malicious process execution. The related works suggest that the web browsers are vulnerable with intimate attacks as unauthorized, malicious insiders and web-text situation. A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment This article discusses the cloud oriented aspects and the vulnerabilities incorporated with it, again, the shared access files and document needs more security for mitigating the IDS to occur (Gupta, Kumar and Abraham 2013). The present scenarios of the cloud risks are mostly showing the abstract IDS with knowledge and behavior based attacks. The identified research gaps are in this study as the existing schemes are with virtual machine profiling. The normal analysis includes the intrusion with wasting the resources with authentic virtual machines (Ou 2012). The profile based IDS is less effective than the knowledge based ones, therefore, the identified gaps are with implementation of the realistic architecture. A Survey of Intrusion Detection Techniques for Cyber-Physical Systems Cyber-Physical systems are dispersed, federated with unequal and critical with comprising actuators, sensors and networking components. The systems are with multiple controlling loops, strict timings, and predictable network traffics. The attack model for CPSs is shorted with long duration and concerned processes are propagated into the sophisticated and unique traits (Mitchell and Chen 2014). The core IDS functions comprised with collection of data with analysis. The performance metrics include the True Positive Rate, False-Positive Rate for measuring the effectiveness. CIDS: A framework for Intrusion Detection in Cloud Systems This particular journal includes the cloud computing security, related IDS application for mitigation of the risks. Therefore, the journal incorporates the idea of another new framework named as CIDS with several nodes, attack scheduler machine, and other components (Kholidy and Baiardi 2012). The CIDS deployment models are included with detection model as well with audit exchange and independent models. Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge The journal demonstrates the related research with problems and their mitigation process (Casas, Mazel and Owezarski 2012). The problems of the framework are with non-supervision and therefore the network design is related with anomaly detection and the relevant change detection process. Summary Host-based IDS is classified within two sorts as misuse HIDS and commercial virus checking processes. Some of the journal discusses the typical host-based IDS architecture comparing the network-based IDS architecture. Some researchers cited the steady attack sequences with tools applications. Steady attacks with several system calls and their individual impact on the systems are included in tabular format in the article. Analysts incorporated the IDS and prevention systems with separate types of instructions. Researchers have identified and specified about the root-kit threats, misuse risks, anomaly-based problems, and architecture analysis. The overall study is relevant with comparison of the host and network based IDS discussion and their analysis. The study is supportive with anomaly and intrusion detection system according to the networking attacks. The attacks are identified as the denial of services attack, user to root level attacks, and probing process. This particular articl e is about the intrusion detection systems analysis and architecture discussion with knowledge based implementation. The vulnerabilities stay in the situation awareness and the knowledge as in situation aware IDS architecture. The CIDS deployment models are included with detection model as well with audit exchange and independent models. References Casas, P., Mazel, J. and Owezarski, P., 2012. Unsupervised network intrusion detection systems: Detecting the unknown without knowledge.Computer Communications,35(7), pp.772-783. Gupta, S., Kumar, P. and Abraham, A., 2013. A profile based network intrusion detection and prevention system for securing cloud environment.International Journal of Distributed Sensor Networks,2013. Hoque, M.S., Mukit, M., Bikas, M. and Naser, A., 2012. An implementation of intrusion detection system using genetic algorithm.arXiv preprint arXiv:1204.1336. Hu, J., 2013. Host-Based Anomaly Intrusion Detection. [online] https://goanna.cs.rmit.edu.au. Available at: https://goanna.cs.rmit.edu.au/~jiankun/Sample_Publication/Host_Based.pdf [Accessed 26 Feb. 2016]. Kholidy, H.A. and Baiardi, F., 2012, April. CIDS: a framework for intrusion detection in cloud systems. InInformation Technology: New Generations (ITNG), 2012 Ninth International Conference on(pp. 379-385). IEEE. Letou, K., Devi, D. and Singh, Y.J., 2013. Host-based Intrusion Detection and Prevention System (HIDPS).International Journal of Computer Applications,69(26). Mitchell, R. and Chen, I.R., 2014. A survey of intrusion detection techniques for cyber-physical systems.ACM Computing Surveys (CSUR),46(4), p.55. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A. and Rajarajan, M., 2013. A survey of intrusion detection techniques in cloud.Journal of Network and Computer Applications,36(1), pp.42-57. More, S., Matthews, M., Joshi, A. and Finin, T., 2012, May. A knowledge-based approach to intrusion detection modeling. InSecurity and Privacy Workshops (SPW), 2012 IEEE Symposium on(pp. 75-81). IEEE. Ou, C.M., 2012. Host-based intrusion detection systems adapted from agent-based artificial immune systems.Neurocomputing,88, pp.78-86. Singh, A.P. and Singh, M.D., 2014. Analysis of Host-Based and Network-Based Intrusion Detection System.International Journal of Computer Network and Information Security,6(8), p.41. Wagner, D. and Soto, P., 2014. Mimicry Attacks on Host-Based Intrusion Detection Systems. [online] https://www.eecs.berkeley.edu. Available at: https://www.eecs.berkeley.edu/~daw/papers/mimicry.pdf [Accessed 26 Feb. 2016].