Narrow your search
Listing 1 - 9 of 9
Sort by

Article
Mice: postpartum aggression elicited by the presence of an intruder.
Author:
Year: 1972

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Aggression. --- Intruder. --- Mice.


Article
Pain and aggression in the Rat.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Aggression. --- Dominance. --- Intruder. --- Pain. --- Rat.


Article
Fear and aggression in the rat.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Aggression. --- Fear. --- Intruder. --- Predator. --- Rat.


Article
Mise en évidence d'une augmentation de l'activité locomotrice des groupes de souris femelles en réponse à l'odeur d'un groupe de mâles étrangers.
Authors: ---
Year: 1968

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Activity. --- Female. --- Locomotion. --- Male intruder. --- Mice.


Article
The effects of intrusion on the behaviour of caged laboratory rats (Rattus norvegicus): consequences for welfare.
Author:
Year: 2001

Loading...
Export citation

Choose an application

Bookmark

Abstract


Article
Factors affecting agonistic interactions of pigs after regrouping in pens with a box.

Loading...
Export citation

Choose an application

Bookmark

Abstract

ABSTRACT To determine the factors affecting agonistic interactions after regrouping, 24 pigs were allocated to six pens that each had a box. Half of the pigs were experienced in using the box. One castrated male and one female pig were transferred from each pen to another pen at random. The number of pigs attacked was particularly large for the pigs that had no experience in using the box and were transferred on the first day (P<0.05). The duration of access to the box was markedly longer for the pigs that had experience in using the box and were not transferred on the first day (P<0.05). The number and duration of attacks were significantly larger and longer toward unfamiliar individuals than toward familiar ones (both P< 0.01). The number of attacks toward the same sex was significantly larger than toward the opposite sex (P<0.01). A negative correlation was found between the number of agonistic interactions on the first day and the range of body weights in the pen mates (r=-0.78, P=0.07). In conclusion, regrouping with unfamiliar individuals should be avoided, but when unavoidable, the following methods are recommended to reduce agonistic interactions: (1) ensure the intruders are experienced in using a box, (2) move experienced intruders in with residents that have no experience in using a box, (3) mix different sexes, and (4) have wide variations in body weights in a pen


Article
Measuring aggressiveness in growing pigs in a resident-intruder situation.
Authors: ---
Year: 1997

Loading...
Export citation

Choose an application

Bookmark

Abstract

Studies concerning aggression after mixing unfamiliar pigs have shown that there is a great variability in the levels of aggression shown by individual pigs. This study examined whether individual aggressiveness can be measured in a resident-intruder situation and whether it is a stable characteristic of individuals, which does not simply reflect the age or sex class of the animal. These latter requirements are of fundamental importance in establishing the existence of individual personality or temperament characteristics in animals. The research was carried out in three datasets, with a total of 218 pigs, females and entire males, at the age of 7 and 11 weeks. For the test, individual pigs were isolated in one half of their home pen, and an intruder pig was introduced. This pig was 2-3 weeks younger than the resident pig. The time from when the resident first made contact to when it attacked the intruder pig was used as a measure of aggressiveness. If the resident did not attack, the test was terminated after 3.5 min. The test was repeatable across two consecutive days as well as across four weeks. Aggressiveness was found to be unrelated to characteristics of the test pigs, such as sex, age, body weight and body weight ranked within litter. Attack latency was not affected by the sex of the intruder pig. If the intruder was less than half the body weight of the test pig, it was less likely to be attacked. Considerable variation was found within as well as between litters. The importance of the nature of the test arena, and implications of the duration of the test are discussed. Using attack latency as a measure of aggressiveness and a relatively short time limit, the test provides a useful tool for measuring aggressiveness without compromising the welfare of the animals involved


Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
Authors: --- --- ---
ISBN: 3642392342 3642392350 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Keywords

Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing

Listing 1 - 9 of 9
Sort by