Search for dissertations about: "memory intrusion"

Showing result 1 - 5 of 6 swedish dissertations containing the words memory intrusion.

  1. 1. From Cue to Recall : The Temporal Dynamics of Long-Term Memory Retrieval

    Author : Robin Hellerstedt; Institutionen för psykologi; []
    Keywords : SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; think no-think; memory intrusion; retrieval-induced forgetting; ERP; long-term memory; cued recall;

    Abstract : A fundamental function of long-term memory is the ability to retrieve a specific memory when encountering a retrieval cue. The purpose of this dissertation was to further our understanding of such cued recall by investigating the temporal dynamics from the presentation of the retrieval cue until the target memory is recalled. READ MORE

  2. 2. Adaptive Real-time Anomaly Detection for Safeguarding Critical Networks

    Author : Kalle Ring Burbeck; Simin Nadjm-Tehrani; Erland Jonsson; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; intrusion detection; anomaly detection; real-time; clustering; adaptation; IP networks; Computer science; Datalogi;

    Abstract : Critical networks require defence in depth incorporating many different security technologies including intrusion detection. One important intrusion detection approach is called anomaly detection where normal (good) behaviour of users of the protected system is modelled, often using machine learning or data mining techniques. READ MORE

  3. 3. The regulation of B cell responses in systemic autoimmunity

    Author : Amanda Duhlin; Karolinska Institutet; Karolinska Institutet; []
    Keywords : ;

    Abstract : Our immune system is a complex network made up of physical barriers and specialized proteins, cells and organs that all work together to prevent pathogens from causing disease in the body. Once the immune system has successfully mounted an immune response upon intrusion of a pathogen it will mount an immediate and stronger response against any subsequent exposure to it. READ MORE

  4. 4. Efficient Security Protocols for Constrained Devices

    Author : Martin Gunnarsson; Institutionen för reglerteknik; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device. READ MORE

  5. 5. Post-traumatic stress disorder : neurobiology and effects of eye movement desensitization and reprocessing

    Author : Göran Högberg; Karolinska Institutet; Karolinska Institutet; []
    Keywords : ;

    Abstract : The aim of this study was to evaluate a new psychotherapy method, eye movement desensitization and reprocessing (EMDR) in the treatment of post-traumatic stress disorder (PTSD) and to study the biological reactions in PTSD during a script-driven symptom provocation. PTSD is a disorder that may occur after a major psychological trauma. READ MORE