Figure 1 - uploaded by Julio Hernandez-Castro
Content may be subject to copyright.
The Gros Michel banana is now almost extinct and no longer viable for commercial exploitation because of its massive popularity and consequent monoculture in the first half of the 20 th century. The Cavendish banana, seriously threaten now by a variant of same pathogen that wroke havoc 50 years ago on the Gros Michel, is another example of the dangers of massive monoculture in the Biological World.

The Gros Michel banana is now almost extinct and no longer viable for commercial exploitation because of its massive popularity and consequent monoculture in the first half of the 20 th century. The Cavendish banana, seriously threaten now by a variant of same pathogen that wroke havoc 50 years ago on the Gros Michel, is another example of the dangers of massive monoculture in the Biological World.

Source publication
Article
Full-text available
In this work, we briefly introduce and discuss some of the diversity measures used in Ecology. After a succinct description and analysis of the most relevant ones, we single out the Shannon-Weiner index. We justify why it is the most informative and relevant one for measuring software diversity. Then, we show how it can be used for effectively asse...

Similar publications

Conference Paper
Full-text available
With the tremendous growth of published news articles, a key issue is how to help users find diverse and interesting news stories. To this end, it is crucial to understand and build accurate profiles for both users and news articles. In this paper, we define a user profile based on (1) the set of entities she/he talked about it in her/his comments...
Article
Full-text available
The propagation techniques and the payload of Duqu have been closely studied over the past year and it has been said that Duqu shared functionalities with Stuxnet. We focused on the driver used by Duqu during the infection, our contribution consists in reverse-engineering the driver: we rebuilt its source code and analyzed the mechanisms it uses to...

Citations

Chapter
Suppose you assessed or analyzed the resilience of a system using approaches described in Part II of this book or similar approaches. Chances are, you determined that the resilience of the system is inadequate, at least in part. What should you do to improve it? This is the theme of Part III of this book: methods, techniques, and approaches to enhancing cyber resilience of a system, either via an appropriate initial design or by adding mitigation measures or by defensive actions during a cyberattack.