WorldWideScience

Sample records for attack registry rationale

  1. Rationale and design of a large registry on renal denervation: the Global SYMPLICITY registry.

    Science.gov (United States)

    Böhm, Michael; Mahfoud, Felix; Ukena, Christian; Bauer, Axel; Fleck, Eckart; Hoppe, Uta C; Kintscher, Ulrich; Narkiewicz, Krzysztof; Negoita, Manuela; Ruilope, Luis; Rump, L Christian; Schlaich, Markus; Schmieder, Roland; Sievert, Horst; Weil, Joachim; Williams, Bryan; Zeymer, Uwe; Mancia, Giuseppe

    2013-08-22

    Hypertension is a global healthcare concern associated with a wide range of comorbidities. The recognition that elevated sympathetic drive plays an important role in the pathogenesis of hypertension led to the use of renal artery denervation to interrupt the efferent and afferent sympathetic nerves between the brain and kidneys to lower blood pressure. Clinical trials of the Symplicity™ renal denervation system have demonstrated that radiofrequency ablation of renal artery nerves is safe and significantly lowers blood pressure in patients with severe resistant (systolic BP >160 mmHg) hypertension. Smaller ancillary studies in hypertensive patients suggest a benefit from renal denervation in a variety of conditions such as chronic kidney disease, glucose intolerance, sleep apnoea and heart failure. The Global SYMPLICITY registry, which incorporates the GREAT SYMPLICITY registry initiated in Germany, is being conducted worldwide to evaluate the safety and efficacy of treatment with the Symplicity renal denervation system in real-world uncontrolled hypertensive patients, looking first at subjects with severe resistant hypertension to confirm the results of prior clinical trials, but then also subjects with a wider range of baseline blood pressure and coexisting comorbidities. The rationale, design and first baseline data from the Global SYMPLICITY registry are presented.

  2. The design, rationale, and baseline characteristics of a nationwide cohort registry in China: blood pressure and clinical outcome in TIA or ischemic stroke.

    Science.gov (United States)

    Xu, Jie; Liu, Yi; Tao, Yongli; Xie, Xuewei; Gu, Hongqiu; Pan, Yuesong; Zhao, Xingquan; Wang, Yongjun; Yan, Aoshuang; Wang, Yilong

    2016-01-01

    The relationship between poststroke blood pressure (BP) and clinical outcomes in ischemic stroke (IS) is still controversial. However, there is no large BP database for IS or transient ischemic attack (TIA) in China. This study aims to describe the rationale, study design, and baseline characteristics of a nationwide BP database in IS or TIA patients in China. The BOSS (blood pressure and clinical outcome in TIA or ischemic stroke) study was a hospital-based, prospective cohort study aiming to assess BP parameters and clinical outcome in IS/TIA patients. BP parameters were based on office BP, ambulatory BP, and home BP. Clinical outcomes included stroke recurrence, combined vascular events, and disability. Electronic case-report forms were used to record baseline and follow-up data. The patients were followed up for clinical outcomes at 3 months through face-to-face interview and at 12 months by telephone. Between October 2012 and February 2014, the BOSS registry recruited 2,608 patients from 61 hospitals, with a mean age of 62.5 years, 32.4% of whom were female, 88.9% with an entry diagnosis of IS, and 86% diagnosed with hypertension. The rates of patients lost-to-follow-up were 3.1% at 3 months and 5.1% at 1 year; 93% of patients completed ambulatory BP monitoring during hospitalization and 94.7% finished a 3-month BP diary. The BOSS registry will provide important evidence about BP management in the acute phase and secondary prevention for IS/TIA patients.

  3. [Short-term prognosis of transient ischemic attacks. Mexican multicenter stroke registry].

    Science.gov (United States)

    Arauz, Antonio; Cantú, Carlos; Ruiz-Sandoval, José Luis; Villarreal-Careaga, Jorge; Barinagarrementeria, Fernando; Murillo-Bonilla, Luis; Fernández, José Antonio; Torres, Bertha; León, Carolina; Rodríguez-Leyva, Idelfonso; Rangel-Guerra, Ricardo

    2006-01-01

    There are no data on Mexican population referring to frequency and prognosis of transient ischemic attacks (TIA). The purpose of the present study was to: (1) estimate the prevalence, vascular risk factors and short-term outcome in patients with TIA included in the first Mexican registry of cerebrovascular disease, and (2) analyze the acute care provided in these patients. This national registry of cerebrovascular diseases is a multicenter, observational, and hospital-based registry that was conducted from November 2002 to October 2004. The registry was developed to improve our knowledge in Mexico regarding risk factors profile, outcome, current diagnostic and treatment strategies, and short-term follow-up in patients with acute cerebral ischemia. Standardized data assessment was used by all centers which included information on demographics, pre-hospital events (including stroke onset and arrival to hospital), emergency department triage and workup. Short-term outcome was evaluated at day 30. Of this registry, TIA cases were selected and associated risk factors, clinical characteristics, diagnosis and treatment were analyzed. During the study time period, 2,000 patients were enrolled; 97 (5%) with diagnosis of TIA; 51 women and 46 men, mean age 69.3 +/- 11.4 years. Among these 97 patients; 51 (52.6%) were admitted to the hospital for evaluation. The main risk factors were; age > or = 65 years in 74%, hypertension in 64%, diabetes in 45%, and dislipidemia in 36% and obesity in 31%. The affected arterial territory was carotid TIA in 74% and vertebrobasilar in 26%. TIA was attributed to atherosclerosis in 63% of the patients, cardioembolism in 17%, and small vessels disease in 5%. At 30 days follow-up; three patients died during the initial evaluation (two secondary to cardiac arrhythmia, and one secondary to pneumonia). Among 14 of the 94 survivors (14.9%) we documented an early stroke recurrence, including cerebral infarction in nine patients (9.6%) and new TIA in

  4. Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD: Design and Rationale of the EFFORTLESS S-ICD Registry

    DEFF Research Database (Denmark)

    Pedersen, Susanne S; Lambiase, Pier; Boersma, Lucas V A

    2012-01-01

    utilization. Methods: The Registry is an observational, nonrandomized, standard of care evaluation to be conducted at approximately 50 investigational centers in Europe and New Zealand where the S-ICD is approved for use and distribution. Clinical Registry endpoints include perioperative (30 days postimplant......Background: Leads in and on the heart of the transvenous implantable cardioverter defibrillator (ICD) form the Achilles' heel of this system due to potential for peri- and postimplant complications. The S-ICD is a newer generation of the ICD that does not require leads on the heart...... or in the vasculature. We present the rationale and study design of the Evaluation oF FactORs ImpacTing CLinical Outcome and Cost EffectiveneSS of the S-ICD (EFFORTLESS S-ICD) Registry which was designed to evaluate the long-term performance of the S-ICD including patient quality of life and long-term resource...

  5. The new Childhood Arthritis and Rheumatology Research Alliance (CARRA) registry: design, rationale, and characteristics of patients enrolled in the first 12 months.

    Science.gov (United States)

    Beukelman, Timothy; Kimura, Yukiko; Ilowite, Norman T; Mieszkalski, Kelly; Natter, Marc D; Burrell, Grendel; Best, Brian; Jones, Jason; Schanberg, Laura E

    2017-04-17

    Herein we describe the history, design, and rationale of the new Childhood Arthritis and Rheumatology Research Alliance (CARRA) Registry and present the characteristics of patients with juvenile idiopathic arthritis (JIA) enrolled in the first 12 months of operation. The CARRA Registry began prospectively collecting data in the United States and Canada in July 2015 to evaluate the safety of therapeutic agents in persons with childhood-onset rheumatic disease, initially restricted to JIA. Secondary objectives include the evaluation of disease outcomes and their associations with medication use and other factors. Data are collected every 6 months and include clinical assessments, detailed medication use, patient-reported outcomes, and safety events. Follow-up is planned for at least 10 years for each participant and is facilitated by a telephone call center. As of July 2016, 1192 patients with JIA were enrolled in the CARRA Registry at 49 clinical sites. At enrollment, their median age was 12.4 years old and median disease duration was 2.6 years. Owing to preferential enrollment, patients with systemic JIA (13%) and with a polyarticular course (75%) were over-represented compared to patients in typical clinical practice. Approximately 49% were currently using biologic agents and ever use of oral glucocorticoids was common (47%). The CARRA Registry provides safety surveillance data to pharmaceutical companies to satisfy their regulatory requirements, and several independently-funded sub-studies that use the Registry infrastructure are underway. The new CARRA Registry successfully enrolled nearly 1200 participants with JIA in the first 12 months of its operation. Sustainable funding has been secured from multiple sources. The CARRA Registry may serve as a model for the study of other uncommon diseases.

  6. Genetic, clinical and pharmacological determinants of out-of-hospital cardiac arrest: rationale and outline of the AmsteRdam Resuscitation Studies (ARREST) registry

    Science.gov (United States)

    Blom, M T; van Hoeijen, D A; Bardai, A; Berdowski, J; Souverein, P C; De Bruin, M L; Koster, R W; de Boer, A; Tan, H L

    2014-01-01

    Introduction Out-of-hospital cardiac arrest (OHCA) is a major public health problem. Recognising the complexity of the underlying causes of OHCA in the community, we aimed to establish the clinical, pharmacological, environmental and genetic factors and their interactions that may cause OHCA. Methods and analysis We set up a large-scale prospective community-based registry (AmsteRdam Resuscitation Studies, ARREST) in which we prospectively include all resuscitation attempts from OHCA in a large study region in the Netherlands in collaboration with Emergency Medical Services. Of all OHCA victims since June 2005, we prospectively collect medical history (through hospital and general practitioner), and current and previous medication use (through community pharmacy). In addition, we include DNA samples from OHCA victims with documented ventricular tachycardia/fibrillation during the resuscitation attempt since July 2007. Various study designs are employed to analyse the data of the ARREST registry, including case–control, cohort, case only and case-cross over designs. Ethics and dissemination We describe the rationale, outline and potential results of the ARREST registry. The design allows for a stable and reliable collection of multiple determinants of OHCA, while assuring that the patient, lay-caregiver or medical professional is not hindered in any way. Such comprehensive data collection is required to unravel the complex basis of OHCA. Results will be published in peer-reviewed journals and presented at relevant scientific symposia. PMID:25332818

  7. The Canadian Registry for Pulmonary Fibrosis: Design and Rationale of a National Pulmonary Fibrosis Registry

    Directory of Open Access Journals (Sweden)

    Christopher J. Ryerson

    2016-01-01

    Full Text Available Background. The relative rarity and diversity of fibrotic interstitial lung disease (ILD have made it challenging to study these diseases in single-centre cohorts. Here we describe formation of a multicentre Canadian registry that is needed to describe the outcomes of fibrotic ILD and to enable detailed healthcare utilization analyses that will be the cornerstone for future healthcare planning. Methods. The Canadian Registry for Pulmonary Fibrosis (CARE-PF is a prospective cohort anticipated to consist of at least 2,800 patients with fibrotic ILD. CARE-PF will be used to (1 describe the natural history of fibrotic ILD, specifically determining the incidence and outcomes of acute exacerbations of ILD subtypes and (2 determine the impact of ILD and acute exacerbations of ILD on health services use and healthcare costs in the Canadian population. Consecutive patients with fibrotic ILD will be recruited from five Canadian ILD centres over a period of five years. Patients will be followed up as clinically indicated and will complete standardized questionnaires at each clinic visit. Prespecified outcomes and health services use will be measured based on self-report and linkage to provincial health administrative databases. Conclusion. CARE-PF will be among the largest prospective multicentre ILD registries in the world, providing detailed data on the natural history of fibrotic ILD and the healthcare resources used by these patients. As the largest and most comprehensive cohort of Canadian ILD patients, CARE-PF establishes a network for future clinical research and early phase clinical trials and provides a platform for translational and basic science research.

  8. The Lombardia Stroke Unit Registry: a year experience

    Directory of Open Access Journals (Sweden)

    Giuseppe Micieli

    2010-12-01

    Full Text Available Stroke is the third cause of death and the first long-term disability cause in industrialised countries. It is therefore an important problem, not only from a clinical point of view, but also because of the high costs involved in its management. The results of clinical trials, reviews and meta-analysis highlight the importance of the Stroke Unit in the correct and adequate management of the patient with stroke. This article describes the Lombardia Stroke Unit and the related Stroke Registry. In 2010 this Registry includes 27 Centres and recruits patients with acute stroke or transient ischaemic attacks (TIAs. The Registry aims at measuring performance parameters, identifying guidelines, non-compliance causes, and analysing care processes.

  9. The design and rationale of the primary angioplasty registry of Kerala

    Directory of Open Access Journals (Sweden)

    Jabir A

    2017-11-01

    Conclusions: The primary angioplasty registry of Kerala would help analyze the quality and outcomes of primary PCI services in Kerala, thereby yielding insights that can help limit unacceptable procedural variations in the performance of primary PCI. Identifying deviations from guideline based therapies can form the basis of quality improvement programs, which in turn will enable hospitals to achieve better patient outcomes.

  10. Plasma Exchange in Severe Attacks of Neuromyelitis Optica

    Directory of Open Access Journals (Sweden)

    Mickael Bonnan

    2012-01-01

    Full Text Available Background. Neuromyelitis optica (NMO attacks are poorly controlled by steroids and evolve in stepwise neurological impairments. Assuming the strong humoral response underlying NMO attacks, plasma exchange (PLEX is an appropriate technique in severe NMO attacks. Objective. Presenting an up-to-date review of the literature of PLEX in NMO. Methods. We summarize the rationale of PLEX in relation with the physiology of NMO, the main technical aspects, and the available studies. Results. PLEX in severe attacks from myelitis or optic neuritis are associated with a better outcome, depending on PLEX delay (“time is cord and eyes”. NMO-IgG status has no influence. Finally, we build up an original concept linking the inner dynamic of the lesion, the timing of PLEX onset and the expected clinical results. Conclusion. PLEX is a safe and efficient add-on therapy in NMO, in synergy with steroids. Large therapeutic trials are required to definitely assess the procedure and define the time opportunity window.

  11. The Vermont oxford neonatal encephalopathy registry: rationale, methods, and initial results

    Science.gov (United States)

    2012-01-01

    Background In 2006, the Vermont Oxford Network (VON) established the Neonatal Encephalopathy Registry (NER) to characterize infants born with neonatal encephalopathy, describe evaluations and medical treatments, monitor hypothermic therapy (HT) dissemination, define clinical research questions, and identify opportunities for improved care. Methods Eligible infants were ≥ 36 weeks with seizures, altered consciousness (stupor, coma) during the first 72 hours of life, a 5 minute Apgar score of ≤ 3, or receiving HT. Infants with central nervous system birth defects were excluded. Results From 2006–2010, 95 centers registered 4232 infants. Of those, 59% suffered a seizure, 50% had a 5 minute Apgar score of ≤ 3, 38% received HT, and 18% had stupor/coma documented on neurologic exam. Some infants experienced more than one eligibility criterion. Only 53% had a cord gas obtained and only 63% had a blood gas obtained within 24 hours of birth, important components for determining HT eligibility. Sixty-four percent received ventilator support, 65% received anticonvulsants, 66% had a head MRI, 23% had a cranial CT, 67% had a full channel encephalogram (EEG) and 33% amplitude integrated EEG. Of all infants, 87% survived. Conclusions The VON NER describes the heterogeneous population of infants with NE, the subset that received HT, their patterns of care, and outcomes. The optimal routine care of infants with neonatal encephalopathy is unknown. The registry method is well suited to identify opportunities for improvement in the care of infants affected by NE and study interventions such as HT as they are implemented in clinical practice. PMID:22726296

  12. Rationale and design of the PREDICT (Plaque Registration and Evaluation Detected In Computed Tomography) registry.

    Science.gov (United States)

    Yamamoto, Hideya; Awai, Kazuo; Kuribayashi, Sachio; Kihara, Yasuki

    2014-01-01

    At least two-thirds of cases of acute coronary syndrome are caused by disruption of an atherosclerotic plaque. The natural history of individual plaques is unknown and needs to be established. The Plaque Registration and Evaluation Detected In Computed Tomography (PREDICT) registry is a prospective, multicenter, longitudinal, observational registry. This registry was designed to examine the relationships among coronary CT angiography (CTA) findings and clinical findings, mortality, and morbidity. The relationships among progression of coronary atherosclerosis, including changes in plaque characteristics on coronary CTA, and serum lipid levels and modification of coronary risk factors will also be evaluated. From October 2009 to December 2012, 3015 patients who underwent coronary CTA in 29 centers in Japan were enrolled. These patients were followed for 2 years. The primary end points were considered as all-cause mortality and major cardiac events, including cardiac death, nonfatal myocardial infarction, and unstable angina that required hospitalization. The secondary end points were heart failure that required administration of diuretics, target vessel revascularization, cerebral infarction, peripheral arterial disease, and invasive coronary angiography. Blood pressure, serum lipid, and C-reactive protein levels and all cardiovascular events were recorded at 1 and 2 years. If the initial coronary CTA showed any stenosis or plaques, follow-up coronary CTA was scheduled at 2 years to determine changes in coronary lesions, including changes in plaque characteristics. Analysis of the PREDICT registry data will clarify the relationships between coronary CTA findings and cardiovascular mortality and morbidity in a collaborative multicenter fashion. This trial is registered at www.clinicaltrials.gov as NCT 00991835. Copyright © 2014 Society of Cardiovascular Computed Tomography. All rights reserved.

  13. Comparison of Clinical Characteristics among Subtypes of Visual Symptoms in Patients with Transient Ischemic Attack: Analysis of the PROspective Multicenter registry to Identify Subsequent cardiovascular Events after TIA (PROMISE-TIA) Registry.

    Science.gov (United States)

    Tanaka, Koji; Uehara, Toshiyuki; Kimura, Kazumi; Okada, Yasushi; Hasegawa, Yasuhiro; Tanahashi, Norio; Suzuki, Akifumi; Nakagawara, Jyoji; Arii, Kazumasa; Nagahiro, Shinji; Ogasawara, Kuniaki; Uchiyama, Shinichiro; Matsumoto, Masayasu; Iihara, Koji; Toyoda, Kazunori; Minematsu, Kazuo

    2018-06-01

    A transient visual symptom (TVS) is a clinical manifestation of transient ischemic attack (TIA). The aim of this study was to investigate differences in clinical characteristics among subtypes of TVS using multicenter TIA registry data. Patients with TIA visiting within 7 days of onset were prospectively enrolled from 57 hospitals between June 2011 and December 2013. Clinical characteristics were compared between patients with 3 major subtypes of TVS (transient monocular blindness [TMB], homonymous lateral hemianopia [HLH], and diplopia). Of 1365 patients, 106 (7.8%) had TVS, including 40 TMB (38%), 34 HLH (32%), 17 diplopia (16%), and 15 others/unknown (14%). Ninety-one patients with 1 of the 3 major subtypes of TVS were included. Symptoms persisted on arrival in 12 (13%) patients. Isolated TVS was significantly more common in TMB than in HLH and diplopia (88%, 62%, and 0%, respectively; P TIA multicenter cohort. Some differences in clinical characteristics were found among subtypes of TVS. Copyright © 2018 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  14. JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Jiang, Lijun; Wang, Yu

    2017-01-01

    Smartphones have become necessities in people' lives, so that many more public charging stations are under deployment worldwide to meet the increasing demand of phone charging (i.e., in airports, subways, shops, etc). However, this situation may expose a hole for cyber-criminals to launch various...... attacks especially charging attacks and threaten user's privacy. As an example, juice filming charging (JFC) attack is able to steal users' sensitive and private information from both Android OS and iOS devices, through automatically recording phone-screen and monitoring users' inputs during the whole...... charging period. More importantly, this attack does not need any permission or installing any pieces of apps on user's side. The rationale is that users' information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential...

  15. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  16. The Comparing Options for Management: Patient-centered Results for Uterine Fibroids (COMPARE-UF) Registry: Rationale and Design.

    Science.gov (United States)

    Stewart, Elizabeth A; Lytle, Barbara L; Thomas, Laine; Wegienka, Ganesa R; Jacoby, Vanessa; Diamond, Michael P; Nicholson, Wanda K; Anchan, Raymond M; Venable, Sateria; Wallace, Kedra; Marsh, Erica E; Maxwell, George L; Borah, Bijan J; Catherino, William H; Myers, Evan R

    2018-05-08

    To design and establish a uterine fibroid (UF) registry based in the United States (US) to provide comparative effectiveness data regarding UF treatment. We report here the design and initial recruitment for the Comparing Options for Management: Patient-centered Results for Uterine Fibroids (COMPARE-UF) registry (Clinicaltrials.gov, NCT02260752), funded by the Agency for Healthcare Research and Quality (AHRQ) in collaboration with the-Patient-Centered Outcomes Research Institute (PCORI). COMPARE-UF is designed to help answer critical questions about treatment options for women with symptomatic UF. Women undergoing a procedure for UF (hysterectomy, myomectomy [abdominal, hysteroscopic, vaginal and laparoscopic/robotic], endometrial ablation, radiofrequency fibroid ablation, uterine artery embolization, magnetic resonance guided focused ultrasound or progestin-releasing intrauterine device insertion) at one of the COMPARE-UF sites are invited to participate in a prospective registry with three years follow-up for post-procedural outcomes. Enrolled participants provide annual follow-up through an online portal or through traditional phone contact. A central data abstraction center provides information obtained from imaging, operative or procedural notes and pathology reports. Women with uterine fibroids and other stakeholders are a key part of the COMPARE-UF registry and participate at all points from study design to dissemination of results. We built a network of nine clinical sites across the US with expertise in the care of women with UF to capture geographic, racial, ethnic and procedural diversity. Of the initial 2031 women enrolled in COMPARE-UF, 42% are self-identified as Black or African-American and 40% are age 40 years or younger with 16% of participants under age 35. Women undergoing myomectomy comprise the largest treatment group at 46% of all procedures with laparoscopic or robotic myomectomy comprising the largest subset of myomectomies at 19% of all

  17. Rationale, design and objectives of ARegPKD, a European ARPKD registry study.

    Science.gov (United States)

    Ebner, Kathrin; Feldkoetter, Markus; Ariceta, Gema; Bergmann, Carsten; Buettner, Reinhard; Doyon, Anke; Duzova, Ali; Goebel, Heike; Haffner, Dieter; Hero, Barbara; Hoppe, Bernd; Illig, Thomas; Jankauskiene, Augustina; Klopp, Norman; König, Jens; Litwin, Mieczyslaw; Mekahli, Djalila; Ranchin, Bruno; Sander, Anja; Testa, Sara; Weber, Lutz Thorsten; Wicher, Dorota; Yuzbasioglu, Ayse; Zerres, Klaus; Dötsch, Jörg; Schaefer, Franz; Liebau, Max Christoph

    2015-02-18

    Autosomal recessive polycystic kidney disease (ARPKD) is a rare but frequently severe disorder that is typically characterized by cystic kidneys and congenital hepatic fibrosis but displays pronounced phenotypic heterogeneity. ARPKD is among the most important causes for pediatric end stage renal disease and a leading reason for liver-, kidney- or combined liver kidney transplantation in childhood. The underlying pathophysiology, the mechanisms resulting in the observed clinical heterogeneity and the long-term clinical evolution of patients remain poorly understood. Current treatment approaches continue to be largely symptomatic and opinion-based even in most-advanced medical centers. While large clinical trials for the frequent and mostly adult onset autosomal dominant polycystic kidney diseases have recently been conducted, therapeutic initiatives for ARPKD are facing the challenge of small and clinically variable cohorts for which reliable end points are hard to establish. ARegPKD is an international, mostly European, observational study to deeply phenotype ARPKD patients in a pro- and retrospective fashion. This registry study is conducted with the support of the German Society for Pediatric Nephrology (GPN) and the European Study Consortium for Chronic Kidney Disorders Affecting Pediatric Patients (ESCAPE Network). ARegPKD clinically characterizes long-term ARPKD courses by a web-based approach that uses detailed basic data questionnaires in combination with yearly follow-up visits. Clinical data collection is accompanied by associated biobanking and reference histology, thus setting roots for future translational research. The novel registry study ARegPKD aims to characterize miscellaneous subcohorts and to compare the applied treatment options in a large cohort of deeply characterized patients. ARegPKD will thus provide evidence base for clinical treatment decisions and contribute to the pathophysiological understanding of this severe inherited disorder.

  18. eRegistries: Electronic registries for maternal and child health.

    Science.gov (United States)

    Frøen, J Frederik; Myhre, Sonja L; Frost, Michael J; Chou, Doris; Mehl, Garrett; Say, Lale; Cheng, Socheat; Fjeldheim, Ingvild; Friberg, Ingrid K; French, Steve; Jani, Jagrati V; Kaye, Jane; Lewis, John; Lunde, Ane; Mørkrid, Kjersti; Nankabirwa, Victoria; Nyanchoka, Linda; Stone, Hollie; Venkateswaran, Mahima; Wojcieszek, Aleena M; Temmerman, Marleen; Flenady, Vicki J

    2016-01-19

    The Global Roadmap for Health Measurement and Accountability sees integrated systems for health information as key to obtaining seamless, sustainable, and secure information exchanges at all levels of health systems. The Global Strategy for Women's, Children's and Adolescent's Health aims to achieve a continuum of quality of care with effective coverage of interventions. The WHO and World Bank recommend that countries focus on intervention coverage to monitor programs and progress for universal health coverage. Electronic health registries - eRegistries - represent integrated systems that secure a triple return on investments: First, effective single data collection for health workers to seamlessly follow individuals along the continuum of care and across disconnected cadres of care providers. Second, real-time public health surveillance and monitoring of intervention coverage, and third, feedback of information to individuals, care providers and the public for transparent accountability. This series on eRegistries presents frameworks and tools to facilitate the development and secure operation of eRegistries for maternal and child health. In this first paper of the eRegistries Series we have used WHO frameworks and taxonomy to map how eRegistries can support commonly used electronic and mobile applications to alleviate health systems constraints in maternal and child health. A web-based survey of public health officials in 64 low- and middle-income countries, and a systematic search of literature from 2005-2015, aimed to assess country capacities by the current status, quality and use of data in reproductive health registries. eRegistries can offer support for the 12 most commonly used electronic and mobile applications for health. Countries are implementing health registries in various forms, the majority in transition from paper-based data collection to electronic systems, but very few have eRegistries that can act as an integrating backbone for health

  19. Rationale, design, and baseline characteristics of the CLARIFY registry of outpatients with stable coronary artery disease.

    Science.gov (United States)

    Sorbets, Emmanuel; Greenlaw, Nicola; Ferrari, Roberto; Ford, Ian; Fox, Kim M; Tardif, Jean-Claude; Tendera, Michal; Steg, Philippe Gabriel

    2017-10-01

    Despite major advances in prevention and treatment, coronary artery disease (CAD) remains the leading cause of death worldwide. Whereas many sources of data are available on the epidemiology of acute coronary syndromes, fewer datasets reflect the contemporary management and outcomes of stable CAD patients. A worldwide contemporary registry would improve our knowledge about stable CAD. The main objectives are to describe the demographics, clinical profile, contemporary management and outcomes of outpatients with stable CAD; to identify gaps between evidence and treatment; and to investigate long-term prognostic determinants. CLARIFY (ProspeCtive observational LongitudinAl RegIstry oF patients with stable coronary arterY disease) is an ongoing international observational longitudinal registry. Stable CAD patients from 45 countries in Europe, Asia, America, Middle East, Australia and Africa were enrolled between November 2009 and June 2010. The inclusion criteria were previous myocardial infarction, evidence of coronary stenosis >50%, proven symptomatic myocardial ischemia or prior revascularization procedure. The main exclusion criteria were serious non-cardiovascular disease, conditions interfering with life expectancy or severe other cardiovascular disease (including advanced heart failure). Follow-up visits were planned annually for up to 5 years, interspersed with 6-month telephone calls. Of the 32,703 patients enrolled, most (77.6%) were male, age (mean ± SD) was 64.2 ± 10.5 years, and 71.0% were receiving treatment for hypertension; mean ± SD resting heart rate was 68.2 ± 10.6 bpm. Patients were enrolled based on a history of myocardial infarction >3 months earlier (57.7%), having at least one stenosis >50% on coronary angiography (61.1%), proven symptomatic myocardial ischemia on non-invasive testing (23.1%), or history of percutaneous coronary intervention or coronary artery bypass graft (69.8%). Baseline characteristics were similar across the four

  20. EMI Registry Design

    CERN Document Server

    Memon, S

    2011-01-01

    Grid services are the fundamental building blocks of today's Distributed Computing Infrastructures (DCI). The discovery of services in the DCI is a primary function that is a precursor to other tasks such as workload and data management. In this context, a service registry can be used to fulfil such a requirement. Existing service registries, such as the ARC Information Index or UNICORE Registry, are examples that have proven themselves in production environments. Such implementations provide a centralized service registry, however, todays DCIs, such as EGI, are based on a federation model. It is therefore necessary for the service registry to mirror such a model in order for it to seamlessly fit into the operational and management requirements - a DCI built using federated approach. This document presents an architecture for a federated service registry and a prototype based on this architecture, the EMI Registry. Special attention is given to how the federated service registry is robust to environment failu...

  1. Longitudinal determinants of depression among World Trade Center Health Registry enrollees, 14-15 years after the 9/11 attacks.

    Science.gov (United States)

    Jacobson, Melanie H; Norman, Christina; Nguyen, Angela; Brackbill, Robert M

    2018-03-15

    Exposure to the September 11, 2001 (9/11) terrorist attacks has been found to be associated with posttraumatic stress disorder (PTSD) and comorbid PTSD and depression up to 10-11 years post-disaster. However, little is known about the longitudinal predictors of mental health conditions over time. We examined longitudinal determinants of depression within strata of PTSD among 21,258 enrollees of the World Trade Center Health Registry who completed four questionnaires over 14 years of follow-up (Wave 1 in 2003-04; Wave 2 in 2005-06; Wave 3 in 2011-12; and Wave 4 in 2015-16). PTSD status was measured using the PTSD checklist on all four waves and defined as a score of ≥ 44; depression was assessed using the 8-item Patient Health Questionnaire at Waves 3 and 4 and defined as a score of ≥ 10. Across Waves 3 and 4, 18.6% experienced depression, and it was more common among those who ever had PTSD (56.1%) compared with those who had not (5.6%). Across PTSD strata, predictors of depression included low income, unemployment, low social integration and support, post-9/11 traumatic life events, and chronic physical illness. These factors also decreased the likelihood of recovering from depression. Depression symptoms were not measured at Waves 1 and 2; data was self-reported. These findings highlight the substantial burden of depression in a trauma-exposed population 14-15 years post-disaster, especially among those with PTSD. Similar life stressors predicted the course of depression among those with and without PTSD which may inform public health and clinical interventions. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  2. Design and rationale of dabigatran's stroke prevention in real life in Turkey (D-SPIRIT).

    Science.gov (United States)

    Türk, Uğur Önsel; Alioğlu, Emin; Tunçer, Eşref; Özpelit, Mehmet Emre; Pekel, Nihat; Tengiz, İstemihan; Çetin, Nurullah; Dalgıç, Onur; Topaloğlu, Caner; Bilgin, Nazile; Altın, Cihan; Özdemirkıran, Tolga; Tülüce, Kamil; Türkoğlu, Ebru İpek; Özpelit, Ebru

    2016-04-01

    The D-SPIRIT registry is designed to investigate the safety and efficacy of dabigatran etexilate in patients with nonvalvular atrial fibrillation (NVAF) and to collect data on outcomes in clinical practice. The D-SPIRIT is a national, prospective, observational, post-marketing registry involving patients with NVAF who have been taking dabigatran etexilate therapy for stroke prevention for a minimum of 6 months prior to enrollment. The registry will collect and analyze data from routine care, enrolling up to 600 patients in 9 centers. Patients will be followed up for 2 years to evaluate effectiveness and safety. A sample size of 600 subjects is proposed based on the following assumptions; Two-sided significance level of 0.05 (1-sided significance level of 0.025), ischemic stroke incidence rate of 0.768%-1.111%, hemorrhagic stroke incidence rate of 0.109%-0.130%, transient ischemic attack incidence rate of 0.722%-0.623%, therapy discontinuation incidence rate of 40% at day 730, and duration of enrollment period of 12 months with non-uniformed enrollment rate. Ethics approval was given by Dokuz Eylül University Ethics Committee of Clinical Research (2014/54) and approved by the Turkish Ministry of Health. Potential results of D-SPIRIT registry will add data from clinical practice to those from the RE-LY trial to expand knowledge of dabigatran etexilate treatment in patients with NVAF.

  3. Registry of patients with stroke stated in a public hospital of Peru, 2000-2009

    OpenAIRE

    Castañeda-Guarderas, Ana; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Beltrán-Ale, Guillermo; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Casma-Bustamante, Renzo; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Ruíz-Grosso, Paulo; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Grupo de Trabajo en Salud Mental, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Cirujano.; Málaga, Germán; Conocimiento y Evidencia (CONEVID), Universidad Peruana Cayetano Heredia. Lima, Perú. Centro de Excelencia en Enfermedades Crónicas (CRONICAS), Universidad Peruana Cayetano Heredia. Lima, Perú. Departamento de Medicina, Universidad Peruana Cayetano Heredia. Lima, Perú. Médico Internista, Magíster en Medicina.

    2014-01-01

    We performed a descriptive study taking on account the characteristics of the registries of the patients hospitalized at the Hospital Nacional Cayetano Heredia between the years 2000 and 2009 with stroke as hospitalization diagnosis. 2225 records were obtained from patients older than 18, with stroke. According to ICD-10, 1071 had diagnosis of ischemic stroke, 554 were hemorrhagic, 183 were subarachnoid hemorrhage, 49 were ischemic plus hemorrhagic, 10 were transient ischemic attack (TIA)...

  4. Windows registry forensics advanced digital forensic analysis of the Windows registry

    CERN Document Server

    Carvey, Harlan

    2011-01-01

    Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Windows to analyze in forensics! Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques will be presented that take the analyst beyond the current use of viewers and into real analysis of data contained in the Registry. This book also has a DVD containing tools, instructions and videos.

  5. Second generation registry framework.

    Science.gov (United States)

    Bellgard, Matthew I; Render, Lee; Radochonski, Maciej; Hunter, Adam

    2014-01-01

    Information management systems are essential to capture data be it for public health and human disease, sustainable agriculture, or plant and animal biosecurity. In public health, the term patient registry is often used to describe information management systems that are used to record and track phenotypic data of patients. Appropriate design, implementation and deployment of patient registries enables rapid decision making and ongoing data mining ultimately leading to improved patient outcomes. A major bottleneck encountered is the static nature of these registries. That is, software developers are required to work with stakeholders to determine requirements, design the system, implement the required data fields and functionality for each patient registry. Additionally, software developer time is required for ongoing maintenance and customisation. It is desirable to deploy a sophisticated registry framework that can allow scientists and registry curators possessing standard computing skills to dynamically construct a complete patient registry from scratch and customise it for their specific needs with little or no need to engage a software developer at any stage. This paper introduces our second generation open source registry framework which builds on our previous rare disease registry framework (RDRF). This second generation RDRF is a new approach as it empowers registry administrators to construct one or more patient registries without software developer effort. New data elements for a diverse range of phenotypic and genotypic measurements can be defined at any time. Defined data elements can then be utilised in any of the created registries. Fine grained, multi-level user and workgroup access can be applied to each data element to ensure appropriate access and data privacy. We introduce the concept of derived data elements to assist the data element standards communities on how they might be best categorised. We introduce the second generation RDRF that

  6. Variation in performance measure criteria significantly affects cardiology practice rankings: Insights from the National Cardiovascular Data Registry's Practice Innovation and Clinical Excellence Registry.

    Science.gov (United States)

    Eapen, Zubin J; Tang, Fengming; Jones, Phil G; Maddox, Thomas M; Oetgen, William J; Spertus, John A; Rumsfeld, John S; Heidenreich, Paul A; Peterson, Eric D; Drozda, Joseph P

    2015-06-01

    Million Hearts is a national initiative to prevent 1 million heart attacks and strokes over 5 years by improving cardiovascular prevention. An important tool in the success of programs like Million Hearts is public ranking on the quality of practices, yet different measures may provide different rankings, so the true quality of practices is difficult to discern. We evaluated the quality of ambulatory cardiology care using performance measure metrics. We compared rankings of practices participating in the National Cardiovascular Data Registry's Practice Innovation and Clinical Excellence Registry using measures from (1) the physician quality reporting system and (2) the American College of Cardiology/American Heart Association/Physician Consortium for Performance Improvement. We compared achievement rates for measures between the 2 frameworks and determined correlations in rankings using Spearman correlation coefficients. From January 1, 2008 to December 31, 2012, there were 1,711,326 patients enrolled from 111 US practices. Among eligible patients, the physician quality reporting system and American College of Cardiology/American Heart Association/Physician Consortium for Performance Improvement measures were achieved in 76.1% versus 77.4% for antiplatelet prescription (P performance and failing to achieve public health goals. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Linked Registries: Connecting Rare Diseases Patient Registries through a Semantic Web Layer.

    Science.gov (United States)

    Sernadela, Pedro; González-Castro, Lorena; Carta, Claudio; van der Horst, Eelke; Lopes, Pedro; Kaliyaperumal, Rajaram; Thompson, Mark; Thompson, Rachel; Queralt-Rosinach, Núria; Lopez, Estrella; Wood, Libby; Robertson, Agata; Lamanna, Claudia; Gilling, Mette; Orth, Michael; Merino-Martinez, Roxana; Posada, Manuel; Taruscio, Domenica; Lochmüller, Hanns; Robinson, Peter; Roos, Marco; Oliveira, José Luís

    2017-01-01

    Patient registries are an essential tool to increase current knowledge regarding rare diseases. Understanding these data is a vital step to improve patient treatments and to create the most adequate tools for personalized medicine. However, the growing number of disease-specific patient registries brings also new technical challenges. Usually, these systems are developed as closed data silos, with independent formats and models, lacking comprehensive mechanisms to enable data sharing. To tackle these challenges, we developed a Semantic Web based solution that allows connecting distributed and heterogeneous registries, enabling the federation of knowledge between multiple independent environments. This semantic layer creates a holistic view over a set of anonymised registries, supporting semantic data representation, integrated access, and querying. The implemented system gave us the opportunity to answer challenging questions across disperse rare disease patient registries. The interconnection between those registries using Semantic Web technologies benefits our final solution in a way that we can query single or multiple instances according to our needs. The outcome is a unique semantic layer, connecting miscellaneous registries and delivering a lightweight holistic perspective over the wealth of knowledge stemming from linked rare disease patient registries.

  8. Rationale and Design for the Peripartum Cardiomyopathy in Nigeria (PEACE Registry

    Directory of Open Access Journals (Sweden)

    Kamilu M Karaye

    2017-01-01

    Full Text Available Background Nigeria probably has the highest burden of Peripartum Cardiomyopathy (PPCM in the world. The primary objective of this study is to describe the burden, ventricular remodelling and survival of PPCM in Nigeria. In the sub-studies, we aim to describe the relationship between selenium deficiency, oxidative stress and PPCM, the impact of sodium selenite supplementation on left ventricular reverse remodelling, change in New York Heart Association functional class and survival in PPCM, and the prevalence of selenium deficiency and its relationship with cardiac function in apparently healthy pregnant women. Methods The main registry and the first sub-study are prospective longitudinal studies, while the second sub-study is an open-label randomised trial. 36 study centres across Nigeria have been registered and 14 of them are already recruiting subjects. Patients will be recruited from June to December 2017 and followed up till December 2018. Serum selenium and glutathione peroxidase will be assayed at recruitment for consecutive PPCM patients with LV ejection fraction (LVEF <45% at 6 months postpartum. 200 subjects with selenium deficiency will be randomised into treatment (Selenium Selenite 200μg tablets daily for 3 months and no-treatment arms. In the second sub-study, 120 apparently healthy pregnant women (Controls will be recruited at 28-38 weeks of gestation and reviewed at 6-8 weeks postpartum, and their serum selenium and GPO levels will be measured at recruitment. Conclusions This will be the largest systematic evaluation of PPCM in Nigeria, and it is hoped that the information will assist in understanding the disease better and developing locally applicable interventions for the disease. ClinicalTrials.gov Identifier: NCT03081949

  9. Clinical Case Registries (CCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Clinical Case Registries (CCR) replaced the former Immunology Case Registry and the Hepatitis C Case Registry with local and national databases. The CCR:HIV and...

  10. The Western Denmark Heart Registry

    DEFF Research Database (Denmark)

    Schmidt, Morten; Maeng, Michael; Madsen, Morten

    2018-01-01

    The WDHR (Western Denmark Heart Registry) is a seminational, multicenter-based registry with longitudinal registration of detailed patient and procedure data since 1999. The registry includes as of January 1, 2017 approximately 240,000 coronary angiographies, 90,000 percutaneous coronary interven......The WDHR (Western Denmark Heart Registry) is a seminational, multicenter-based registry with longitudinal registration of detailed patient and procedure data since 1999. The registry includes as of January 1, 2017 approximately 240,000 coronary angiographies, 90,000 percutaneous coronary...

  11. Rationale, design and goals of the HeartFlow assessing diagnostic value of non-invasive FFRCT in Coronary Care (ADVANCE) registry

    DEFF Research Database (Denmark)

    Chinnaiyan, Kavitha M; Akasaka, Takashi; Amano, Tetsuya

    2016-01-01

    ) optimal medical therapy, (b) percutaneous coronary intervention, (c) coronary artery bypass graft surgery, or (d) more information required. The primary endpoint of the registry is the reclassification rate between the management plan based on coronary CTA alone versus CTA plus FFRCT. The secondary...

  12. Rationales for Commonly "Challenged" Taught Books.

    Science.gov (United States)

    Shugert, Diane P., Ed.; And Others

    1983-01-01

    Intended for teachers, this focused journal issue contains separate rationales for teaching books that have been challenged as appropriate instructional materials. Following a discussion of the purpose for rationales and suggestions for using them, the journal presents rationales for teaching the following books: "To Kill a Mockingbird,""The Diary…

  13. Reasons for (not) signing the state registry: surveying Department of Motor Vehicles customers in New York state.

    Science.gov (United States)

    Feeley, Thomas Hugh; Reynolds-Tylus, Tobias; Anker, Ashley E; Evans, Melanie

    2014-03-01

    Prior research examining rationales for enrolling as an organ donor is biased because of its reliance on college student samples and retrospective recall. To characterize New York state residents' registry enrollment decisions in close proximity to a registration opportunity. -Surveys were conducted with customers exiting Department of Motor Vehicle offices. A total of 1325 customers were surveyed upon exiting 1 of 18 Department of Motor Vehicle offices spanning 9 counties. Customers making donation-relevant transactions (ie, license renewal/registration) reported whether they had registered as a donor that day, and all other customers reported whether they had registered as a donor in the past. Customers reported reasons to justify their enrollment decision through short interview questions. Among current donation-relevant transactions (n = 299), 27% reported enrolling in the registry. Of remaining customers, 39% reported enrolling in the state registry in the past. For those who elected not to enroll, many failed to communicate a reason for their decision, or reported a lack of opportunity to sign or decisional uncertainty. Among enrollees, reasons for registration included the altruistic benefits of donation, prior registration, personal experience with donation, and rational arguments for donation. The value of point-of-decision survey data are discussed in relation to strategic efforts to promote organ donor registration.

  14. Workload and time management in central cancer registries: baseline data and implication for registry staffing.

    Science.gov (United States)

    Chapman, Susan A; Mulvihill, Linda; Herrera, Carolina

    2012-01-01

    The Workload and Time Management Survey of Central Cancer Registries was conducted in 2011 to assess the amount of time spent on work activities usually performed by cancer registrars. A survey including 39 multi-item questions,together with a work activities data collection log, was sent by email to the central cancer registry (CCR) manager in each of the 50 states and the District of Columbia. Twenty-four central cancer registries (47%) responded to the survey.Results indicate that registries faced reductions in budgeted staffing from 2008-2009. The number of source records and total cases were important indicators of workload. Four core activities, including abstracting at the registry, visual editing,case consolidation, and resolving edit reports, accounted for about half of registry workload. We estimate an average of 12.4 full-time equivalents (FTEs) are required to perform all cancer registration activities tracked by the survey; however,estimates vary widely by registry size. These findings may be useful for registries as a benchmark for their own registry workload and time-management data and to develop staffing guidelines.

  15. Review of patient registries in dermatology.

    Science.gov (United States)

    DiMarco, Gabriella; Hill, Dane; Feldman, Steven R

    2016-10-01

    Patient registries are datasets containing information on patients with a particular disease or patients who are undergoing a specific treatment. Our objective was to search for and catalog the types of registries being used in dermatology and investigate their characteristics and uses. We searched Google, the Registry of Patient Registries, Orphanet, and ClinicalTrials.gov to compile a list of dermatology disease registries. We also conducted a literature review on the uses of dermatology registries using PubMed. We identified 48 dermatology patient registries, with 23 distinct diseases represented. We also identified 11 registries used for postmarketing surveillance of skin disease. Our search was limited to registries in English. Registries are commonly used for the study of rare dermatologic diseases and for postsurveillance monitoring of systemic therapies in more common dermatologic diseases, such as psoriasis. Copyright © 2016 American Academy of Dermatology, Inc. Published by Elsevier Inc. All rights reserved.

  16. Instantaneous Wave-Free Ratio versus Fractional Flow Reserve guided intervention (iFR-SWEDEHEART): Rationale and design of a multicenter, prospective, registry-based randomized clinical trial.

    Science.gov (United States)

    Götberg, Matthias; Christiansen, Evald H; Gudmundsdottir, Ingibjörg; Sandhall, Lennart; Omerovic, Elmir; James, Stefan K; Erlinge, David; Fröbert, Ole

    2015-11-01

    Instantaneous wave-free ratio (iFR) is a new hemodynamic resting index for assessment of coronary artery stenosis severity. iFR uses high frequency sampling to calculate a gradient across a coronary lesion during a period of diastole. The index has been tested against fractional flow reserve (FFR) and found to have an overall classification agreement of 80% to 85%. Whether the level of disagreement is clinically relevant is unknown. Clinical outcome data on iFR are scarce. This study is a registry-based randomized clinical trial, which is a novel strategy using health quality registries as on-line platforms for randomization, case record forms, and follow-up. iFR-SWEDEHEART is a multicenter, prospective, randomized, controlled, clinical open-label clinical trial. Two thousand patients with stable angina or acute coronary syndrome and an indication for physiology-guided assessment of one or more coronary stenoses will be randomized 1:1 to either iFR- or FFR-guided intervention. The randomization will be conducted online in the Swedish web-based system for enhancement and development of evidence-based care in heart disease evaluated according to recommended therapies (SWEDEHEART) registry. The trial has a non-inferiority design, with a primary combined end point of all-cause death, non-fatal myocardial infarction, and unplanned revascularization at 12 months. End points will be identified through national registries and undergo central blind adjudication to ensure data quality. The iFR-SWEDEHEART trial is an registry-based randomized clinical trial evaluating the safety and efficacy of the diagnostic method iFR compared to FFR. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. A web-based, patient driven registry for Angelman syndrome: the global Angelman syndrome registry.

    Science.gov (United States)

    Napier, Kathryn R; Tones, Megan; Simons, Chloe; Heussler, Helen; Hunter, Adam A; Cross, Meagan; Bellgard, Matthew I

    2017-08-01

    Angelman syndrome (AS) is a rare neurodevelopmental disorder that is characterised by severe global developmental delays, ataxia, loss of speech, epilepsy, sleep disorders, and a happy disposition. There is currently no cure for AS, though several pharmaceutical companies are anticipating drug trials for new therapies to treat AS. The Foundation for Angelman Therapeutics (FAST) Australia therefore identified a need for a global AS patient registry to identify patients for recruitment for clinical trials.The Global AS Registry was deployed in September 2016 utilising the Rare Disease Registry Framework, an open-source tool that enables the efficient creation and management of patient registries. The Global AS Registry is web-based and allows parents and guardians worldwide to register, provide informed consent, and enter data on individuals with AS. 286 patients have registered in the first 8 months since deployment.We demonstrate the successful deployment of the first patient-driven global registry for AS. The data generated from the Global AS Registry will be crucial in identifying patients suitable for clinical trials and in informing research that will identify treatments for AS, and ultimately improve the lives of individuals and their families living with AS.

  18. Chronic probable PTSD in police responders in the world trade center health registry ten to eleven years after 9/11.

    Science.gov (United States)

    Cone, James E; Li, Jiehui; Kornblith, Erica; Gocheva, Vihra; Stellman, Steven D; Shaikh, Annum; Schwarzer, Ralf; Bowler, Rosemarie M

    2015-05-01

    Police enrolled in the World Trade Center Health Registry (WTCHR) demonstrated increased probable posttraumatic stress disorder (PTSD) after the terrorist attack of 9/11/2001. Police enrollees without pre-9/11 PTSD were studied. Probable PTSD was assessed by Posttraumatic Stress Check List (PCL). Risk factors for chronic, new onset or resolved PTSD were assessed using multinomial logistic regression. Half of police with probable PTSD in 2003-2007 continued to have probable PTSD in 2011-2012. Women had higher prevalence of PTSD than men (15.5% vs. 10.3%, P = 0.008). Risk factors for chronic PTSD included decreased social support, unemployment, 2+ life stressors in last 12 months, 2+ life-threatening events since 9/11, 2+ injuries during the 9/11 attacks, and unmet mental health needs. Police responders to the WTC attacks continue to bear a high mental health burden. Improved early access to mental health treatment for police exposed to disasters may be needed. © 2015 Wiley Periodicals, Inc.

  19. Meta-analysis of individual registry results enhances international registry collaboration.

    Science.gov (United States)

    Paxton, Elizabeth W; Mohaddes, Maziar; Laaksonen, Inari; Lorimer, Michelle; Graves, Stephen E; Malchau, Henrik; Namba, Robert S; Kärrholm, John; Rolfson, Ola; Cafri, Guy

    2018-03-28

    Background and purpose - Although common in medical research, meta-analysis has not been widely adopted in registry collaborations. A meta-analytic approach in which each registry conducts a standardized analysis on its own data followed by a meta-analysis to calculate a weighted average of the estimates allows collaboration without sharing patient-level data. The value of meta-analysis as an alternative to individual patient data analysis is illustrated in this study by comparing the risk of revision of porous tantalum cups versus other uncemented cups in primary total hip arthroplasties from Sweden, Australia, and a US registry (2003-2015). Patients and methods - For both individual patient data analysis and meta-analysis approaches a Cox proportional hazard model was fit for time to revision, comparing porous tantalum (n = 23,201) with other uncemented cups (n = 128,321). Covariates included age, sex, diagnosis, head size, and stem fixation. In the meta-analysis approach, treatment effect size (i.e., Cox model hazard ratio) was calculated within each registry and a weighted average for the individual registries' estimates was calculated. Results - Patient-level data analysis and meta-analytic approaches yielded the same results with the porous tantalum cups having a higher risk of revision than other uncemented cups (HR (95% CI) 1.6 (1.4-1.7) and HR (95% CI) 1.5 (1.4-1.7), respectively). Adding the US cohort to the meta-analysis led to greater generalizability, increased precision of the treatment effect, and similar findings (HR (95% CI) 1.6 (1.4-1.7)) with increased risk of porous tantalum cups. Interpretation - The meta-analytic technique is a viable option to address privacy, security, and data ownership concerns allowing more expansive registry collaboration, greater generalizability, and increased precision of treatment effects.

  20. Racionalidade e métodos: estudo BREATHE - I registro brasileiro de insuficiência cardíaca Rationale and design: BREATHE registry - I brazilian registry of heart failure

    Directory of Open Access Journals (Sweden)

    2013-05-01

    Full Text Available FUNDAMENTO: Diversos registros locais buscam de forma isolada retratar características clínicas de pacientes internados com Insuficiência Cardíaca (IC em hospitais e comunidades brasileiras. De forma geral, a análise desses dados sugere que existam diferenças importantes na etiologia, nos fatores de descompensação, no tratamento e no prognóstico de pacientes com IC nas diferentes regiões brasileiras. OBJETIVOS: Avaliar as características demográficas, clínicas, prognósticas de 1.200 pacientes admitidos com diagnóstico clínico de insuficiência cardíaca descompensada em um grupo de 60 hospitais representativos das diferentes regiões brasileiras. MÉTODOS: Estudo observacional transversal (registro com seguimento longitudinal de doze meses (visitas de admissão, alta hospitalar, três meses, seis meses e doze meses após inclusão, em que pacientes admitidos em hospitais da rede pública e privada com quadro clínico primariamente de IC definida serão estudados. RESULTADOS: Os resultados serão apresentados logo após o término da coleta, avaliação da qualidade e análise estatística dos dados. CONCLUSÕES: A análise dos resultados deste registro multicêntrico permitirá um planejamento mais adequado do aporte de recursos financeiros, pessoais e tecnológicos para a área da saúde, bem como o planejamento de medidas preventivas mais eficazes na IC descompensada.BACKGROUND: Several local registries have sought to individually depict clinical characteristics of patients hospitalized with heart failure (HF in Brazilian hospitals and communities. Overall, the analysis of these data suggests that there are important differences in etiology, decompensation factors, treatment and prognosis of patients with HF in different Brazilian regions. OBJECTIVES: To evaluate the demographic, clinical and prognostic characteristics of 1,200 patients admitted with a clinical diagnosis of decompensated HF in a group of 60 hospitals

  1. Converged Registries Solution (CRS)

    Data.gov (United States)

    Department of Veterans Affairs — The Converged Registries platform is a hardware and software architecture designed to host individual patient registries and eliminate duplicative development effort...

  2. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  3. Review of U.S. registries for psoriasis.

    Science.gov (United States)

    Amin, Mina; No, Daniel J; Wu, Jashin J

    2017-12-01

    Patient registries are databases comprised of standardized clinical data for a specific population of patients with a particular disease or medical condition. Information from patient registries allows clinicians to assess long-lasting outcomes in patients with a specific disease, such as psoriasis. Our primary objective was to identify available psoriasis registries in the United States (U.S.) and evaluate the application of patient registries compared to clinical trials. We searched Google, the Registry of Patient Registries, Orphanet and ClinicalTrials.gov to create a list of U.S. psoriasis registries. We also performed a literature review on the application of psoriasis registries using PubMed. We identified 6 psoriasis patient registries in the United States. Patient registries are frequently used for psoriasis in the U.S. and provide important information about the safety, efficacy and long-term effects of systemic therapies.

  4. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  5. Nordic registry-based cohort studies: Possibilities and pitfalls when combining Nordic registry data.

    Science.gov (United States)

    Maret-Ouda, John; Tao, Wenjing; Wahlin, Karl; Lagergren, Jesper

    2017-07-01

    All five Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) have nationwide registries with similar data structure and validity, as well as personal identity numbers enabling linkage between registries. These resources provide opportunities for medical research that is based on large registry-based cohort studies with long and complete follow-up. This review describes practical aspects, opportunities and challenges encountered when setting up all-Nordic registry-based cohort studies. Relevant articles describing registries often used for medical research in the Nordic countries were retrieved. Further, our experiences of conducting this type of study, including planning, acquiring permissions, data retrieval and data cleaning and handling, and the possibilities and challenges we have encountered are described. Combining data from the Nordic countries makes it possible to create large and powerful cohorts. The main challenges include obtaining all permissions within each country, usually in the local language, and retrieving the data. These challenges emphasise the importance of having experienced collaborators within each country. Following the acquisition of data, data management requires the understanding of the differences between the variables to be used in the various countries. A concern is the long time required between initiation and completion. Nationwide Nordic registries can be combined into cohorts with high validity and statistical power, but the considerable expertise, workload and time required to complete such cohorts should not be underestimated.

  6. The EuroMyositis registry

    DEFF Research Database (Denmark)

    Lilleker, James B; Vencovsky, Jiri; Wang, Guochun

    2018-01-01

    AIMS: The EuroMyositis Registry facilitates collaboration across the idiopathic inflammatory myopathy (IIM) research community. This inaugural report examines pooled Registry data. METHODS: Cross-sectional analysis of IIM cases from 11 countries was performed. Associations between clinical subtyp...

  7. Danish Hip Arthroscopy Registry

    DEFF Research Database (Denmark)

    Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten; Maagaard, Niels

    2016-01-01

    Danish Hip Arthroscopy Registry (DHAR) was initiated in 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the epidemiologic and perioperative data of the first 2000 procedures in a Danish hip arthroscopy population and to describe the development of DHAR...... was 0.65 and HAGOS sub-scores were 51 (pain), 49 (symptoms), 53 (ADL), 35 (sport), 20 (physical activity) and 29, respectively. We conclude that patients undergoing hip arthroscopy report considerable pain, loss of function, reduced level of activity and reduced quality-of-life prior to surgery....... The problems with development and maintaining a large clinical registry are described and further studies are needed to validate data completeness. We consider the development of a national clinical registry for hip arthroscopy as a successful way of developing and maintaining a valuable clinical...

  8. Iranian Joint Registry(Iranian National Hip and Knee Arthroplasty Registry

    Directory of Open Access Journals (Sweden)

    Hamidreza Aslani

    2016-04-01

    Full Text Available Periodic evaluation and monitoring the health and economic outcome of joint replacement surgery is a common and popular process under the territory of joint registries in many countries. In this article we introduce the methodology used for the foundation of the National Iranian Joint Registry (IJR with a joint collaboration of the Social Security Organization (SSO and academic research departments considering the requirements of the Iran’s Ministry of Health and Education.

  9. [Types of medical registries - definitions, methodological aspects and quality of the scientific work with registries].

    Science.gov (United States)

    Mathis-Edenhofer, Stefan; Piso, Brigitte

    2011-12-01

    This work presents a comprehensive list of registry definitions including broader and narrower definitions. Compared to each other different methodological issues can be identified. Some of these issues are common for all registry types; some can be assigned more easily to a specific registry type. Instruments for evaluating the quality of registers reflect many of the mentioned aspects. Generally, and especially at registers with a descriptive or exploratory research dimension it is important to consider their intended purpose and in about it was achieved. This includes, for instance, whether the purpose and the methodology are coordinated. From the start of registration an initiator should be - based on the purpose - aware of the methodological dimension of the registry. This helps to apply the correct type of the registry, the appropriate guidance and, ultimately, the arguments for the effort (cost-benefit ratio).

  10. Immunization registries in the EMR Era

    Science.gov (United States)

    Stevens, Lindsay A.; Palma, Jonathan P.; Pandher, Kiran K.; Longhurst, Christopher A.

    2013-01-01

    Background: The CDC established a national objective to create population-based tracking of immunizations through regional and statewide registries nearly 2 decades ago, and these registries have increased coverage rates and reduced duplicate immunizations. With increased adoption of commercial electronic medical records (EMR), some institutions have used unidirectional links to send immunization data to designated registries. However, access to these registries within a vendor EMR has not been previously reported. Purpose: To develop a visually integrated interface between an EMR and a statewide immunization registry at a previously non-reporting hospital, and to assess subsequent changes in provider use and satisfaction. Methods: A group of healthcare providers were surveyed before and after implementation of the new interface. The surveys addressed access of the California Immunization Registry (CAIR), and satisfaction with the availability of immunization information. Information Technology (IT) teams developed a “smart-link” within the electronic patient chart that provides a single-click interface for visual integration of data within the CAIR database. Results: Use of the tool has increased in the months since its initiation, and over 20,000 new immunizations have been exported successfully to CAIR since the hospital began sharing data with the registry. Survey data suggest that providers find this tool improves workflow and overall satisfaction with availability of immunization data. (p=0.009). Conclusions: Visual integration of external registries into a vendor EMR system is feasible and improves provider satisfaction and registry reporting. PMID:23923096

  11. Cohort Profile : The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry)

    NARCIS (Netherlands)

    Gatz, Margaret; Harris, Jennifer R.; Kaprio, Jaakko; McGue, Matt; Smith, Nicholas L.; Snieder, Harold; Spiro, Avron; Butler, David A.

    The National Academy of Sciences-National Research Council Twin Registry (NAS-NRC Twin Registry) is a comprehensive registry of White male twin pairs born in the USA between 1917 and 1927, both of the twins having served in the military. The purpose was medical research and ultimately improved

  12. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  13. A Registry Framework Enabling Patient-Centred Care.

    Science.gov (United States)

    Bellgard, Matthew I; Napier, Kathryn; Render, Lee; Radochonski, Maciej; Lamont, Leanne; Graham, Caroline; Wilton, Steve D; Fletcher, Sue; Goldblatt, Jack; Hunter, Adam A; Weeramanthri, Tarun

    2015-01-01

    Clinical decisions rely on expert knowledge that draws on quality patient phenotypic and physiological data. In this regard, systems that can support patient-centric care are essential. Patient registries are a key component of patient-centre care and can come in many forms such as disease-specific, recruitment, clinical, contact, post market and surveillance. There are, however, a number of significant challenges to overcome in order to maximise the utility of these information management systems to facilitate improved patient-centred care. Registries need to be harmonised regionally, nationally and internationally. However, the majority are implemented as standalone systems without consideration for data standards or system interoperability. Hence the task of harmonisation can become daunting. Fortunately, there are strategies to address this. In this paper, a disease registry framework is outlined that enables efficient deployment of national and international registries that can be modified dynamically as registry requirements evolve. This framework provides a basis for the development and implementation of data standards and enables patients to seamlessly belong to multiple registries. Other significant advances include the ability for registry curators to create and manage registries themselves without the need to contract software developers, and the concept of a registry description language for ease of registry template sharing.

  14. Registries in European post-marketing surveillance

    DEFF Research Database (Denmark)

    Bouvy, Jacoline C; Blake, Kevin; Slattery, Jim

    2017-01-01

    at gaining further insight into the European Medicines Agency's (EMA) requests for new registries and registry studies using existing registries and to review the experience gained in their conduct. METHODS: European Public Assessment Reports were consulted to identify products for which a request...

  15. Contextualized B2B Registries

    OpenAIRE

    Radetzki, U; Boniface, M.J.; Surridge, M.

    2007-01-01

    Abstract. Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and underlying registry technologies into busi-ness relationships, procurement and project management functions has not been examined and hence existing Web Service registries lack capabilities required by business today. In this paper we present a novel contextualized B2B registry that supports dynamic regist...

  16. Applying Registry Services to Spaceflight Technologies to Aid in the Assignment of Assigned Numbers to Disparate Systems and their Technologies to Further Enable Interoperability

    Science.gov (United States)

    Bradford, Robert N.; Nichols, Kelvin F.; Witherspoon, Keith R.

    2006-01-01

    technologies will be those that are currently in need of expansion namely the assignment of satellite designations and the process which controls assignments. Second, we will analyze the technologies currently standardized under the Consultative Committee for Space Data Systems (CCSDS) banner. Third, we will analyze the current CCSDS working group and Birds of a Feather (BoF) activities to ascertain registry requirements. Lastly, we will identify technologies that are either currently under the auspices of another standards body or technologies that are currently not standardized. For activities one through three, we will provide the analysis by either discipline or technology with rationale, identification and brief description of requirements and precedence. For activity four, we will provide a list of current standards bodies e.g. IETF and a list of potential candidates.

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Glocal clinical registries: pacemaker registry design and implementation for global and local integration--methodology and case study.

    Directory of Open Access Journals (Sweden)

    Kátia Regina da Silva

    Full Text Available The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings.Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems.We developed a device registry framework involving the following steps: (1 Data standards definition and representation of the research workflow, (2 Development of electronic case report forms using REDCap (Research Electronic Data Capture, (3 Data collection according to the clinical research workflow and, (4 Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5 Data quality control and (6 Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT we found 130 clinical trials which are potentially correlated with our pacemaker registry.This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re-usable framework. Such approach has the potential to

  19. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  20. Current situation and challenge of registry in China.

    Science.gov (United States)

    Zhang, Yang; Feng, Yuji; Qu, Zhi; Qi, Yali; Zhan, Siyan

    2014-09-01

    Increasing emphasis has been placed on registries for an organized system used in developing clinical research to improve health care. China has sufficient data that can be applied broadly, but the heterogeneity and irregularity of registries limit their applicability. This article aims to describe the status of registries in China and the related challenges. Patient registries for observational studies were retrieved from the International Clinical Trials Registry to quantitatively evaluate the number of comparatively high-quality registries in China. A literature search was also performed to provide support and updates. A total of 64 patient registries were retrieved from ClinicalTrials.gov using disease, product, and health service as criteria. The sample sizes ranged from 15 to 30,400, with only 12 registries marked as completed. This article describes and compares the detailed information in many aspects. The efficient use of registries has already made considerable progress in China; however, registries still require standardization, high-quality transition, and coordinated development.

  1. Clinical Case Registries: Simultaneous Local and National Disease Registries for Population Quality Management

    Science.gov (United States)

    Backus, Lisa I.; Gavrilov, Sergey; Loomis, Timothy P.; Halloran, James P.; Phillips, Barbara R.; Belperio, Pamela S.; Mole, Larry A.

    2009-01-01

    The Department of Veterans Affairs (VA) has a system-wide, patient-centric electronic medical record system (EMR) within which the authors developed the Clinical Case Registries (CCR) to support population-centric delivery and evaluation of VA medical care. To date, the authors have applied the CCR to populations with human immunodeficiency virus (HIV) and hepatitis C virus (HCV). Local components use diagnosis codes and laboratory test results to identify patients who may have HIV or HCV and support queries on local care delivery with customizable reports. For each patient in a local registry, key EMR data are transferred via HL7 messaging to a single national registry. From 128 local registry systems, over 60,000 and 320,000 veterans in VA care have been identified as having HIV and HCV, respectively, and entered in the national database. Local and national reports covering demographics, resource usage, quality of care metrics and medication safety issues have been generated. PMID:19717794

  2. [Trauma registry and injury].

    Science.gov (United States)

    Shapira, S C

    2001-10-01

    The trauma registry network constitutes an essential database in every injury prevention system. In order to rationally estimate the extent of injury in general, and injuries from traffic accidents in particular, the trauma registry systems should contain the most comprehensive and broad database possible, in line with the operational definitions. Ideally, the base of the injury pyramid should also include mild injuries and even "near-misses". The Israeli National Trauma Registry has come a long way in the last few years. The eventual inclusion of all trauma centers in Israel will enable the establishment of a firm base for the allocation of resources by decision-makers.

  3. The Qingdao Twin Registry

    DEFF Research Database (Denmark)

    Duan, Haiping; Ning, Feng; Zhang, Dongfeng

    2013-01-01

    In 1998, the Qingdao Twin Registry was initiated as the main part of the Chinese National Twin Registry. By 2005, a total of 10,655 twin pairs had been recruited. Since then new twin cohorts have been sampled, with one longitudinal cohort of adolescent twins selected to explore determinants of me...

  4. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  5. The value of trauma registries.

    Science.gov (United States)

    Moore, Lynne; Clark, David E

    2008-06-01

    Trauma registries are databases that document acute care delivered to patients hospitalised with injuries. They are designed to provide information that can be used to improve the efficiency and quality of trauma care. Indeed, the combination of trauma registry data at regional or national levels can produce very large databases that allow unprecedented opportunities for the evaluation of patient outcomes and inter-hospital comparisons. However, the creation and upkeep of trauma registries requires a substantial investment of money, time and effort, data quality is an important challenge and aggregated trauma data sets rarely represent a population-based sample of trauma. In addition, trauma hospitalisations are already routinely documented in administrative hospital discharge databases. The present review aims to provide evidence that trauma registry data can be used to improve the care dispensed to victims of injury in ways that could not be achieved with information from administrative databases alone. In addition, we will define the structure and purpose of contemporary trauma registries, acknowledge their limitations, and discuss possible ways to make them more useful.

  6. On Domain Registries and Website Content

    DEFF Research Database (Denmark)

    Schwemer, Sebastian Felix

    2018-01-01

    such as Internet access service providers, hosting platforms, and websites that link to content. This article shows that in recent years, however, that the (secondary) liability of domain registries and registrars, and more specifically country code top-level domain registries (ccTLDs) for website content, has...... been tested in several EU Member States. The article investigates tendencies in the national lower-court jurisprudence and explores to what extent the liability exemption regime of the E-Commerce Directive applies to domain registries. The analysis concludes that whereas domain registries fall under...

  7. EMI Registry Development Plan

    CERN Document Server

    Memon, S.; Szigeti, G.; Field, L.

    2012-01-01

    This documents describes the overall development plan of the EMI Registry product, the plan focuses on the realisation of the EMI Registry specification as defined in the document. It is understood that during the course of the development phase the specification will likely evolve and the changes will be fed into the specification document.

  8. Effects of Role and Assignment Rationale on Attitudes Formed During Peer Tutoring

    Science.gov (United States)

    Bierman, Karen Linn; Furman, Wyndol

    2012-01-01

    This study examined the role of contextual factors, such as assignment rationale, on the attitudinal effects of peer tutoring. Fourth-grade children engaged in brief tutoring experiences as either a tutor or tutee. Subjects received four rationales for being selected as tutor or tutee: (a) a competence rationale, (b) a physical characteristic rationale, (c) a chance rationale, or (d) no rationale. As predicted, tutors had more positive attitudes than tutees when they had been given a competence or physical characteristic rationale but not when the tutors were provided a chance rationale or no rationale. Additionally, the tutors’ and tutees’ attitudes were enhanced when no rationale was provided. Results are discussed in terms of their implications for a role-theory analysis of tutoring and their implications for applied programs. PMID:23946549

  9. The European Cystic Fibrosis Society Patient Registry: valuable lessons learned on how to sustain a disease registry.

    Science.gov (United States)

    Viviani, Laura; Zolin, Anna; Mehta, Anil; Olesen, Hanne Vebert

    2014-06-07

    Disease registries have the invaluable potential to provide an insight into the natural history of the disease under investigation, to provide useful information (e.g. through health indicators) for planning health care services and to identify suitable groups of patients for clinical trials enrolment. However, the establishment and maintenance of disease registries is a burdensome initiative from economical and organisational points of view and experience sharing on registries management is important to avoid waste of resources. The aim of this paper is to discuss the problems embedded in the institution and management of an international disease registry to warn against common mistakes that can derail the best of intentions: we share the experience of the European Cystic Fibrosis Society Patient Registry, which collects data on almost 30,000 patients from 23 countries. We discuss the major problems that researchers often encounter in the creation and management of disease registries: definition of the aims the registry has to reach, definition of the criteria for patients referral to the registry, definition of the information to record, set up of a data quality process, handling of missing data, maintenance of data confidentiality, regulation of data use and dissemination of research results. We give examples on how many crucial aspects were solved by the European Cystic Fibrosis Society Patient Registry regarding objectives, inclusion criteria and variables definition, data management, data quality controls, missing data handling, confidentiality maintenance, data use and results dissemination. We suggest an extensive literature research and discussions in working groups with different stake holders, including patient representatives, on the objectives, inclusion criteria and the information to record. We propose to pilot the recording of few variables and test the applicability of their definition first. The use of a shared electronic platform for data

  10. Rationale and methods of the EFCOSUM project

    NARCIS (Netherlands)

    Brussaard, J.H.; Johansson, L.; Kearney, J.

    2002-01-01

    Objective: To describe the rationale and methods for a European project (EFCOSUM) to develop a method for a European food consumption survey that delivers internationally comparable data on a set of policy-relevant nutritional indicators. Rationale and methods: Currently Member States are collecting

  11. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  12. Glocal Clinical Registries: Pacemaker Registry Design and Implementation for Global and Local Integration – Methodology and Case Study

    Science.gov (United States)

    da Silva, Kátia Regina; Costa, Roberto; Crevelari, Elizabeth Sartori; Lacerda, Marianna Sobral; de Moraes Albertini, Caio Marcos; Filho, Martino Martinelli; Santana, José Eduardo; Vissoci, João Ricardo Nickenig; Pietrobon, Ricardo; Barros, Jacson V.

    2013-01-01

    Background The ability to apply standard and interoperable solutions for implementing and managing medical registries as well as aggregate, reproduce, and access data sets from legacy formats and platforms to advanced standard formats and operating systems are crucial for both clinical healthcare and biomedical research settings. Purpose Our study describes a reproducible, highly scalable, standard framework for a device registry implementation addressing both local data quality components and global linking problems. Methods and Results We developed a device registry framework involving the following steps: (1) Data standards definition and representation of the research workflow, (2) Development of electronic case report forms using REDCap (Research Electronic Data Capture), (3) Data collection according to the clinical research workflow and, (4) Data augmentation by enriching the registry database with local electronic health records, governmental database and linked open data collections, (5) Data quality control and (6) Data dissemination through the registry Web site. Our registry adopted all applicable standardized data elements proposed by American College Cardiology / American Heart Association Clinical Data Standards, as well as variables derived from cardiac devices randomized trials and Clinical Data Interchange Standards Consortium. Local interoperability was performed between REDCap and data derived from Electronic Health Record system. The original data set was also augmented by incorporating the reimbursed values paid by the Brazilian government during a hospitalization for pacemaker implantation. By linking our registry to the open data collection repository Linked Clinical Trials (LinkedCT) we found 130 clinical trials which are potentially correlated with our pacemaker registry. Conclusion This study demonstrates how standard and reproducible solutions can be applied in the implementation of medical registries to constitute a re-usable framework

  13. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  14. Using Rationale To Assist Student Cognitive And Intellectual Development

    Directory of Open Access Journals (Sweden)

    Janet E. Burge

    2010-01-01

    Full Text Available One of the questions posed at the National Science Foundation (NSF-sponsored workshop on Creativity and Rationale in Software Design was on the role of rationale in supporting idea generation in the classroom. College students often struggle with problems where more than one possible solution exists. Part of the difficulty lies in the need for students to progress through different levels of development cognitively and intellectually before they can tackle creative problem solving. Argumentation-based rationale provides a natural mechanism for representing problems, candidate solutions, criteria, and arguments relating those criteria to the candidate solutions. Explicitly expressing rationale for their work encourages students to reflect on why they made their choices, and to actively consider multiple alternatives. We report on an experiment performed during a Data Structures course where students captured rationale.

  15. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  16. Acute management of stroke patients taking non-vitamin K antagonist oral anticoagulants Addressing Real-world Anticoagulant Management Issues in Stroke (ARAMIS) Registry: Design and rationale.

    Science.gov (United States)

    Xian, Ying; Hernandez, Adrian F; Harding, Tina; Fonarow, Gregg C; Bhatt, Deepak L; Suter, Robert E; Khan, Yosef; Schwamm, Lee H; Peterson, Eric D

    2016-12-01

    Non-vitamin K antagonist oral anticoagulants (NOACs, dabigatran, rivaroxaban, apixaban, and edoxaban) have been increasingly used as alternatives to warfarin for stroke prophylaxis in patients with atrial fibrillation. Yet there is substantial lack of information on how patients on NOACs are currently treated when they have an acute ischemic stroke and the best strategies for treating intracerebral hemorrhage for those on chronic anticoagulation with warfarin or a NOAC. These are critical unmet needs for real world clinical decision making in these emergent patients. The ARAMIS Registry is a multicenter cohort study of acute stroke patients who were taking chronic anticoagulation therapy prior to admission and are admitted with either an acute ischemic stroke or intracerebral hemorrhage. Built upon the existing infrastructure of American Heart Association/American Stroke Association Get With the Guidelines Stroke, the ARAMIS Registry will enroll a total of approximately 10,000 patients (5000 with acute ischemic stroke who are taking a NOAC and 5000 with anticoagulation-related intracerebral hemorrhage who are on warfarin or a NOAC). The primary goals of the ARAMIS Registry are to provide a comprehensive picture of current treatment patterns and outcomes of acute ischemic stroke patients on NOACs, as well as anticoagulation-related intracerebral hemorrhage in patients on either warfarin or NOACs. Beyond characterizing the index hospitalization, up to 2500 patients (1250 ischemic stroke and 1250 intracerebral hemorrhage) who survive to discharge will be enrolled in an optional follow-up sub-study and interviewed at 3 and 6 months after discharge to assess longitudinal medication use, downstream care, functional status, and patient-reported outcomes. The ARAMIS Registry will document the current state of management of NOAC treated patients with acute ischemic stroke as well as contemporary care and outcome of anticoagulation-related intracerebral hemorrhage. These

  17. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  19. Terror attacks increases the risk of vascular injuries

    Directory of Open Access Journals (Sweden)

    Eitan eHeldenberg

    2014-05-01

    Full Text Available Objectives: Extensive literature exists about military trauma as opposed to the very limited literature regarding terror-related civilian trauma. However, terror-related vascular trauma (VT, as a unique type of injury, is yet to be addressed.Methods: A retrospective analysis of the Israeli National Trauma Registry was performed. All patients in the registry from 09/2000 to 12/2005 were included. The subgroup of patients with documented vascular trauma (VT (N=1,545 was analyzedand further subdivided into those suffering from Terror-related Vascular Trauma (TVT and Non-Terror related Vascular Trauma (NTVT. Both groups were analyzed according to mechanism of trauma, type and severity of injury and treatment.Results: Out of 2,446 terror related trauma admissions 243 sustained TVT (9.9% compared to 1302 VT patients from Non Terror trauma (1.1%. TVT injuries tend to be more complex and most patients were operated on. ICU admissions and hospitallength of stay was higher in the TVT group. Penetrating trauma was the prominent cause of injury among the TVT group. TVT group had a higher proportion of patients with severe injuries (ISS>16 and mortality. Thorax injuries were more frequent in the TVT group. Extremity injuries were the most prevalent vascular injuries in both groups; however NTVT group had more upper extremity injuries, while the TVT group had significantly more lower extremity injuries.Conclusion: Vascular injuries are remarkably more common among terror attack victims than among non-terror trauma victims and the injuries of terror casualties tend to be more complex. The presence of a vascular surgeon will ensure a comprehensive clinical care.

  20. Utility of registries for post-marketing evaluation of medicines. A survey of Swedish health care quality registries from a regulatory perspective.

    Science.gov (United States)

    Feltelius, Nils; Gedeborg, Rolf; Holm, Lennart; Zethelius, Björn

    2017-06-01

    The aim of this study was to describe content and procedures in some selected Swedish health care quality registries (QRs) of relevance to regulatory decision-making. A workshop was organized with participation of seven Swedish QRs which subsequently answered a questionnaire regarding registry content on drug treatments and outcomes. Patient populations, coverage, data handling and quality control, as well as legal and ethical aspects are presented. Scientific publications from the QRs are used as a complementary measure of quality and scientific relevance. The registries under study collect clinical data of high relevance to regulatory and health technology agencies. Five out of seven registries provide information on the drug of interest. When applying external quality criteria, we found a high degree of fulfillment, although information on medication was not sufficient to answer all questions of regulatory interest. A notable strength is the option for linkage to the Prescribed Drug Registry and to information on education and socioeconomic status. Data on drugs used during hospitalization were also collected to some extent. Outcome measures collected resemble those used in relevant clinical trials. All registries collected patient-reported outcome measures. The number of publications from the registries was substantial, with studies of appropriate design, including randomized registry trials. Quality registries may provide a valuable source of post-marketing data on drug effectiveness, safety, and cost-effectiveness. Closer collaboration between registries and regulators to improve quality and usefulness of registry data could benefit both regulatory utility and value for health care providers.

  1. Clinical disease registries in acute myocardial infarction.

    Science.gov (United States)

    Ashrafi, Reza; Hussain, Hussain; Brisk, Robert; Boardman, Leanne; Weston, Clive

    2014-06-26

    Disease registries, containing systematic records of cases, have for nearly 100 years been valuable in exploring and understanding various aspects of cardiology. This is particularly true for myocardial infarction, where such registries have provided both epidemiological and clinical information that was not readily available from randomised controlled trials in highly-selected populations. Registries, whether mandated or voluntary, prospective or retrospective in their analysis, have at their core a common study population and common data definitions. In this review we highlight how registries have diversified to offer information on epidemiology, risk modelling, quality assurance/improvement and original research-through data mining, transnational comparisons and the facilitation of enrolment in, and follow-up during registry-based randomised clinical trials.

  2. Danish Hip Arthroscopy Registry (DHAR)

    DEFF Research Database (Denmark)

    Lund, Bent; Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten

    2017-01-01

    The Danish Hip Arthroscopy Registry (DHAR) was initiated in January 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the first registry based outcome data of a national population with radiological and clinical femoroacetabular impingement (FAI......) data from DHAR between January 2012 and November 2015 were extracted. Radiological pincer-type FAI was defined as LCE > 35° and cam FAI as alpha-angle > 55°. These data were combined with FAI surgical data such as osteochondroplasty and labral repair or resection. PROMs consisting of HAGOS, EQ-5 D...

  3. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  4. New Rationales for Women on Boards

    OpenAIRE

    Choudhury, B.

    2014-01-01

    Should measures promoting women to corporate boards be solely justified in terms of economic arguments? Traditionally, such measures have tended to rely on utilitarian arguments, despite the fact that the most prominent of these arguments—the relationship between women’s presence on boards and firm financial performance—is equivocal. Conversely, this article argues that rationales for increasing women on boards should be based on both equality and economics grounds. An equality rationale is n...

  5. Environmental Agents Service (EAS) Registry System of Records

    Data.gov (United States)

    Department of Veterans Affairs — The Environmental Agent Service (EAS) Registries is the information system encompassing the Ionizing Radiation Registry (IRR), the Agent Orange Registry (AOR), and...

  6. International Consortium of Vascular Registries Consensus Recommendations for Peripheral Revascularisation Registry Data Collection

    DEFF Research Database (Denmark)

    Behrendt, Christian-Alexander; Bertges, Daniel; Eldrup, Nikolaj

    2018-01-01

    intervention; (ix) complications; and (x) follow up. CONCLUSION: A modified Delphi study allowed 25 international vascular registry experts to achieve a consensus recommendation for a minimum core data set and an optimum data set for peripheral arterial revascularisation registries. Continued global...... via internet exchange and face to face discussions. In total, 187 different items from the various registry data forms were identified for potential inclusion in the recommended data set. Ultimately, 79 items were recommended for inclusion in minimum core data sets, including 65 items in the level 1...... data set, and an additional 14 items in the more specific level 2 and 3 recommended data sets. Data elements were broadly divided into (i) patient characteristics; (ii) comorbidities; (iii) current medications; (iv) lesion treated; (v) procedure; (vi) bypass; (vii) endarterectomy (viii) catheter based...

  7. Rationales for the Lightning Launch Commit Criteria

    Science.gov (United States)

    Willett, John C. (Editor); Merceret, Francis J. (Editor); Krider, E. Philip; O'Brien, T. Paul; Dye, James E.; Walterscheid, Richard L.; Stolzenburg, Maribeth; Cummins, Kenneth; Christian, Hugh J.; Madura, John T.

    2016-01-01

    Since natural and triggered lightning are demonstrated hazards to launch vehicles, payloads, and spacecraft, NASA and the Department of Defense (DoD) follow the Lightning Launch Commit Criteria (LLCC) for launches from Federal Ranges. The LLCC were developed to prevent future instances of a rocket intercepting natural lightning or triggering a lightning flash during launch from a Federal Range. NASA and DoD utilize the Lightning Advisory Panel (LAP) to establish and develop robust rationale from which the criteria originate. The rationale document also contains appendices that provide additional scientific background, including detailed descriptions of the theory and observations behind the rationales. The LLCC in whole or part are used across the globe due to the rigor of the documented criteria and associated rationale. The Federal Aviation Administration (FAA) adopted the LLCC in 2006 for commercial space transportation and the criteria were codified in the FAA's Code of Federal Regulations (CFR) for Safety of an Expendable Launch Vehicle (Appendix G to 14 CFR Part 417, (G417)) and renamed Lightning Flight Commit Criteria in G417.

  8. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  9. 14 CFR 47.19 - FAA Aircraft Registry.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false FAA Aircraft Registry. 47.19 Section 47.19... REGISTRATION General § 47.19 FAA Aircraft Registry. Each application, request, notification, or other communication sent to the FAA under this Part must be mailed to the FAA Aircraft Registry, Department of...

  10. 14 CFR 49.11 - FAA Aircraft Registry.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false FAA Aircraft Registry. 49.11 Section 49.11... AIRCRAFT TITLES AND SECURITY DOCUMENTS General § 49.11 FAA Aircraft Registry. To be eligible for recording, a conveyance must be mailed to the FAA Aircraft Registry, Department of Transportation, Post Office...

  11. Artificial Nutritional Support Registries: systematic review.

    Science.gov (United States)

    Castelló-Botía, I; Wanden-Berghe, C; Sanz-Valero, J

    2009-01-01

    The nutritional registries are data bases through which we obtain the information to understand the nutrition of populations. Several main nutrition societies of the world have these types of registries, outstanding the NADYA (Home artificial and Ambulatory nutrition) group in Spain. The object of this study is to determine by means of a systematic review, the existent scientific production in the international data bases referred to nutritional support registries. Descriptive transversal study of the results of a critical bibliographic research done in the bioscience data bases: MEDLINE, EMBASE, The Cochrane Library, ISI (Web of Sciences), LILACS, CINHAL. A total of 20 original articles related to nutritional registries were found and recovered. Eleven registries of eight countries were identified: Australia, Germany, Italy, Japan, Spain, Sweden, United Status and United Kingdom. The Price Index was of 65% and all the articles were published in the last 20 years. The Price Index highlights the innovativeness of this practice. The articles related to nutritional support are heterogeneous with respect to data and population, which exposes this as a limitation for a combined analysis.

  12. The National Mental Health Registry (NMHR).

    Science.gov (United States)

    Aziz, A A; Salina, A A; Abdul Kadir, A B; Badiah, Y; Cheah, Y C; Nor Hayati, A; Ruzanna, Z Z; Sharifah Suziah, S M; Chee, K Y

    2008-09-01

    The National Mental Health Registry (NMHR) collects information about patients with mental disorder in Malaysia. This information allows us to estimate the incidence of selected mental disorders, and to evaluate risk factors and treatment in the country. The National Mental Health Registry (NMHR) presented its first report in 2004, a year after its establishment. The report focused on schizophrenia as a pioneer project for the National Mental Health Registry. The development of the registry has progressed with data collected from government-based facilities, the academia and the private sector. The 2003-2005 report was recently published and distributed. Since then the registry has progressed to include suicides and other mental illnesses such as depression. The NMHR Report 2003-2005 provides detailed information about the profile of persons with Schizophrenia who presented for the first time to various psychiatry and mental health providers throughout Malaysia. More detailed description regarding pharmacotherapy is reported and few cross tabulations done in an effort to provide better understanding and more clinically meaningful reports.

  13. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  14. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  15. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  16. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  17. Occupational Disease Registries-Characteristics and Experiences.

    Science.gov (United States)

    Davoodi, Somayeh; Haghighi, Khosro Sadeghniat; Kalhori, Sharareh Rostam Niakan; Hosseini, Narges Shams; Mohammadzadeh, Zeinab; Safdari, Reza

    2017-06-01

    Due to growth of occupational diseases and also increase of public awareness about their consequences, attention to various aspects of diseases and improve occupational health and safety has found great importance. Therefore, there is the need for appropriate information management tools such as registries in order to recognitions of diseases patterns and then making decision about prevention, early detection and treatment of them. These registries have different characteristics in various countries according to their occupational health priorities. Aim of this study is evaluate dimensions of occupational diseases registries including objectives, data sources, responsible institutions, minimum data set, classification systems and process of registration in different countries. In this study, the papers were searched using the MEDLINE (PubMed) Google scholar, Scopus, ProQuest and Google. The search was done based on keyword in English for all motor engines including "occupational disease", "work related disease", "surveillance", "reporting", "registration system" and "registry" combined with name of the countries including all subheadings. After categorizing search findings in tables, results were compared with each other. Important aspects of the registries studied in ten countries including Finland, France, United Kingdom, Australia, Czech Republic, Malaysia, United States, Singapore, Russia and Turkey. The results show that surveyed countries have statistical, treatment and prevention objectives. Data sources in almost the rest of registries were physicians and employers. The minimum data sets in most of them consist of information about patient, disease, occupation and employer. Some of countries have special occupational related classification systems for themselves and some of them apply international classification systems such as ICD-10. Finally, the process of registration system was different in countries. Because occupational diseases are often

  18. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. Assessing Ontario's Personal Support Worker Registry

    Directory of Open Access Journals (Sweden)

    Audrey Laporte

    2013-08-01

    Full Text Available In response to the growing role of personal support workers (PSWs in the delivery of health care services to Ontarians, the Ontario government has moved forward with the creation of a PSW registry. This registry will be mandatory for all PSWs employed by publicly funded health care employers, and has the stated objectives of better highlighting the work that PSWs do in Ontario, providing a platform for PSWs and employers to more easily access the labour market, and to provide government with information for human resources planning. In this paper we consider the factors that brought the creation of a PSW registry onto the Ontario government’s policy agenda, discuss how the registry is being implemented, and provide an analysis of the strengths and weaknesses of this policy change.

  20. The Pediatric Emergency Care Applied Research Network Registry: A Multicenter Electronic Health Record Registry of Pediatric Emergency Care.

    Science.gov (United States)

    Deakyne Davies, Sara J; Grundmeier, Robert W; Campos, Diego A; Hayes, Katie L; Bell, Jamie; Alessandrini, Evaline A; Bajaj, Lalit; Chamberlain, James M; Gorelick, Marc H; Enriquez, Rene; Casper, T Charles; Scheid, Beth; Kittick, Marlena; Dean, J Michael; Alpern, Elizabeth R

    2018-04-01

     Electronic health record (EHR)-based registries allow for robust data to be derived directly from the patient clinical record and can provide important information about processes of care delivery and patient health outcomes.  A data dictionary, and subsequent data model, were developed describing EHR data sources to include all processes of care within the emergency department (ED). ED visit data were deidentified and XML files were created and submitted to a central data coordinating center for inclusion in the registry. Automated data quality control occurred prior to submission through an application created for this project. Data quality reports were created for manual data quality review.  The Pediatric Emergency Care Applied Research Network (PECARN) Registry, representing four hospital systems and seven EDs, demonstrates that ED data from disparate health systems and EHR vendors can be harmonized for use in a single registry with a common data model. The current PECARN Registry represents data from 2,019,461 pediatric ED visits, 894,503 distinct patients, more than 12.5 million narrative reports, and 12,469,754 laboratory tests and continues to accrue data monthly.  The Registry is a robust harmonized clinical registry that includes data from diverse patients, sites, and EHR vendors derived via data extraction, deidentification, and secure submission to a central data coordinating center. The data provided may be used for benchmarking, clinical quality improvement, and comparative effectiveness research. Schattauer.

  1. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  2. Registries Help Moms Measure Medication Risks

    Science.gov (United States)

    ... in the case of the North American Antiepileptic Drug Pregnancy Registry, which studies the effects of drugs for ... is taking. For example, the North American Antiepileptic Drug Pregnancy Registry website lists more than 30 medications being ...

  3. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  4. ISHKS joint registry: A preliminary report.

    Science.gov (United States)

    Pachore, Jawahir A; Vaidya, Shrinand V; Thakkar, Chandrasekhar J; Bhalodia, Haresh Kumar P; Wakankar, Hemant M

    2013-09-01

    Total knee arthroplasty (TKA) and total hip arthroplasty (THA) are the most widely practiced surgical options for arthritis all over the world and its application is rising in India. Indian Society of Hip and Knee Surgeons (ISHKS) has established a joints registry and has been collecting data for last 6 years. All members of ISHKS are encouraged to actively participate in the registry. A simple two page knee and hip form can be downloaded from the website www.ishks.com. The information collected includes patient demographics, indication for surgery, implant details and in case of revision arthroplasty: the details of implants removed and the cause of failure of primary arthroplasty. These forms are mailed to the central registry office and the data is fed in computerized registry. Data collection started in October 2006. Joint registry is a very important initiative of ISHKS and till date, have data of 34,478 TKAs and 3604 THAs, contributed by 42 surgeons across India. Some important observations have emerged. Data of 34,478 TKAs was assessed: These included 8612 males (25%) and 25,866 females (75%). Average age was 64.4 years (Osteoarthritis range: 45 to 88 years; Rheumatoid arthritis range: 22 to 74 years). Average body mass index was 29.1 (Range: 18.1 to 42.9). The indication for TKA was osteoarthritis in 33,444 (97%) and rheumatoid arthritis in 759 (2.2%). Total of 3604 THA procedures were recorded. These included 2162 (60%) male patients and 1442 (40%) female patients. Average age was 52 years (Range 17 to 85 years) and average BMI was 25.8 (Range: 17.3 to 38.5). The indications for THA was AVN in 49%. The registry will become more meaningful in years to come. Active participation of all arthroplasty surgeons across India is vital for the success of the joints registry.

  5. Definition, epidemiology and registries of pulmonary hypertension.

    Science.gov (United States)

    Awdish, R; Cajigas, H

    2016-05-01

    Pulmonary arterial hypertension (PAH) is a subcategory of pulmonary hypertension (PH) that comprises a group of disorders with similar pulmonary vascular pathology. Though PH is common, the estimated incidence of IPAH is 1-3 cases per million, making it a rare disease. The hemodynamic definition of PAH is a mean pulmonary artery pressure at rest >OR = 25 mm Hg in the presence of a pulmonary capillary wedge pressure registries. These registries have been indispensable in the characterization and mapping of the natural history of the disease. Equations and risk calculators derived from registries have given clinicians a basis for risk stratification and prognostication. The sequential accumulation of data since the registries began in the 1980s allows for comparisons to be made. Patients who are differentiated by treatment eras and environments can be contrasted. Variability among inclusion criteria similarly allows for comparisons of these subpopulations. This article provides an overview of available registries, highlights insights provided by each and discusses key issues around the interpretation and extrapolation of data from PAH registries. Registries have allowed us to appreciate the improvement in survival afforded by modern therapy and enhanced detection of this disease. Moving forward, a more global approach to registries is needed, as is enhanced collaboration and centralization.

  6. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  7. Adolescent behavior and PTSD 6–7 years after the World Trade Center terrorist attacks of September 11, 2001

    Science.gov (United States)

    Mann, Mana; Li, Jiehui; Farfel, Mark R; Maslow, Carey B; Osahan, Sukhminder; Stellman, Steven D

    2014-01-01

    Behavioral problems and psychopathologies were reported in children exposed to the World Trade Center (WTC) attacks in New York City within 2–3 y post-disaster. Little is known of subsequent 9/11 related behavioral and emotional problems. We assessed risk factors for behavioral difficulties and probable posttraumatic stress disorder (PTSD) in 489 adolescent enrollees ages 11–18 y of age in the World Trade Center Health Registry cohort using the Strengths and Difficulties Questionnaire (SDQ) and DISC Predictive Scales (DPS), respectively, as reported by the adolescents. Associations between parental PTSD and adolescent PTSD and behavioral problems were studied in a subset of 166 adolescent-parent pairs in which the parent was also a Registry enrollee. Nearly one-fifth (17.4%) of the adolescents, all of whom were 5–12 y old at the time of the attacks, scored in the abnormal (5.7%) or borderline (11.7%) range of total SDQ. Problems were more frequent in minority, low-income, and single-parent adolescents. Abnormal and borderline SDQ scores were significantly associated with direct WTC exposures and with WTC-related injury or death of a family member. Adolescent PTSD was significantly associated with WTC exposure and with fear of one's own injury or death, and with PTSD in the parent (OR = 5.6; 95% CI 1.1–28.4). This adolescent population should be monitored for persistence or worsening of these problems. Co-occurrence of parent and child mental health symptoms following a disaster may have implications for healthcare practitioners and for disaster response planners. PMID:28229007

  8. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  9. Towards a national trauma registry for the United Arab Emirates

    Directory of Open Access Journals (Sweden)

    Barka Ezedin

    2010-07-01

    Full Text Available Abstract Background Trauma is a major health problem in the United Arab Emirates (UAE as well as worldwide. Trauma registries provide large longitudinal databases for analysis and policy improvement. We aim in this paper to report on the development and evolution of a national trauma registry using a staged approach by developing a single-center registry, a two-center registry, and then a multi-center registry. The three registries were established by developing suitable data collection forms, databases, and interfaces to these databases. The first two registries collected data for a finite period of time and the third is underway. The steps taken to establish these registries depend on whether the registry is intended as a single-center or multi-center registry. Findings Several issues arose and were resolved during the development of these registries such as the relational design of the database, whether to use a standalone database management system or a web-based system, and the usability and security of the system. The inclusion of preventive medicine data elements is important in a trauma registry and the focus on road traffic collision data elements is essential in a country such as the UAE. The first two registries provided valuable data which has been analyzed and published. Conclusions The main factors leading to the successful establishment of a multi-center trauma registry are the development of a concise data entry form, development of a user-friendly secure web-based database system, the availability of a computer and Internet connection in each data collection center, funded data entry personnel well trained in extracting medical data from the medical record and entering it into the computer, and experienced personnel in trauma injuries and data analysis to continuously maintain and analyze the registry.

  10. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  11. Readmissions after stroke: linked data from the Australian Stroke Clinical Registry and hospital databases.

    Science.gov (United States)

    Kilkenny, Monique F; Dewey, Helen M; Sundararajan, Vijaya; Andrew, Nadine E; Lannin, Natasha; Anderson, Craig S; Donnan, Geoffrey A; Cadilhac, Dominique A

    2015-07-20

    To assess the feasibility of linking a national clinical stroke registry with hospital admissions and emergency department data; and to determine factors associated with hospital readmission after stroke or transient ischaemic attack (TIA) in Australia. Data from the Australian Stroke Clinical Registry (AuSCR) at a single Victorian hospital were linked to coded, routinely collected hospital datasets for admissions (Victorian Admitted Episodes Dataset) and emergency presentations (Victorian Emergency Minimum Dataset) in Victoria from 15 June 2009 to 31 December 2010, using stepwise deterministic data linkage techniques. Association of patient characteristics, social circumstances, processes of care and discharge outcomes with all-cause readmissions within 1 year from time of hospital discharge after an index admission for stroke or TIA. Of 788 patients registered in the AuSCR, 46% (359/781) were female, 83% (658/788) had a stroke, and the median age was 76 years. Data were successfully linked for 782 of these patients (99%). Within 1 year of their index stroke or TIA event, 42% of patients (291/685) were readmitted, with 12% (35/286) readmitted due to a stroke or TIA. Factors significantly associated with 1-year hospital readmission were two or more presentations to an emergency department before the index event (adjusted odds ratio [aOR], 1.57; 95% CI, 1.02-2.43), higher Charlson comorbidity index score (aOR, 1.19; 95% CI, 1.07-1.32) and diagnosis of TIA on the index admission (aOR, 2.15; 95% CI, 1.30-3.56). Linking clinical registry data with routinely collected hospital data for stroke and TIA is feasible in Victoria. Using these linked data, we found that readmission to hospital is common in this patient group and is related to their comorbid conditions.

  12. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  13. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  14. Functional requirements regarding medical registries--preliminary results.

    Science.gov (United States)

    Oberbichler, Stefan; Hörbst, Alexander

    2013-01-01

    The term medical registry is used to reference tools and processes to support clinical or epidemiologic research or provide a data basis for decisions regarding health care policies. In spite of this wide range of applications the term registry and the functional requirements which a registry should support are not clearly defined. This work presents preliminary results of a literature review to discover functional requirements which form a registry. To extract these requirements a set of peer reviewed articles was collected. These set of articles was screened by using methods from qualitative research. Up to now most discovered functional requirements focus on data quality (e. g. prevent transcription error by conducting automatic domain checks).

  15. Description and Rationale for the Planning, Monitoring, and Implementation (PMI) Model: Rationale.

    Science.gov (United States)

    Cort, H. Russell

    The rationale for the Planning, Monitoring, and Implementation Model (PMI) is the subject of this paper. The Superintendent of the District of Columbia Public Schools requested a model for systematic evaluation of educational programs to determine their effectiveness. The school system's emphasis on objective-referenced instruction and testing,…

  16. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  17. The Danish Heart Registry

    DEFF Research Database (Denmark)

    Özcan, Cengiz; Juel, Knud; Lassen, Jens Flensted

    2016-01-01

    AIM: The Danish Heart Registry (DHR) seeks to monitor nationwide activity and quality of invasive diagnostic and treatment strategies in patients with ischemic heart disease as well as valvular heart disease and to provide data for research. STUDY POPULATION: All adult (≥15 years) patients...... undergoing coronary angiography (CAG), percutaneous coronary intervention (PCI), coronary artery bypass grafting, and heart valve surgery performed across all Danish hospitals were included. MAIN VARIABLES: The DHR contains a subset of the data stored in the Eastern and Western Denmark Heart Registries (EDHR...

  18. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  19. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  20. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  3. The role of registries in rare genetic lipid disorders: Review and introduction of the first global registry in lipoprotein lipase deficiency.

    Science.gov (United States)

    Steinhagen-Thiessen, Elisabeth; Stroes, Erik; Soran, Handrean; Johnson, Colin; Moulin, Philippe; Iotti, Giorgio; Zibellini, Marco; Ossenkoppele, Bas; Dippel, Michaela; Averna, Maurizio R

    2017-07-01

    A good understanding of the natural history of rare genetic lipid disorders is a pre-requisite for successful patient management. Disease registries have been helpful in this regard. Lipoprotein Lipase Deficiency (LPLD) is a rare, autosomal-recessive lipid disorder characterized by severe hypertriglyceridemia and a very high risk for recurrent acute pancreatitis, however, only limited data are available on its natural course. Alipogene tiparvovec (Glybera ® ) is the first gene therapy to receive Marketing Authorization in the European Union; GENIALL (GENetherapy In the MAnagement of Lipoprotein Lipase Deficiency), a 15-year registry focusing on LPLD was launched in 2014 as part of its Risk Management Plan. The aim of this publication is to introduce the GENIALL Registry within a structured literature review of registries in rare genetic lipid disorders. A total of 11 relevant initiatives/registries were identified (homozygous Familial Hypercholesterolemia (hoFH) [n = 5]; LPLD [n = 1]; Lysosomal Acid Lipase Deficiency [LALD, n = 1], detection of mutations in genetic lipid disorders [n = 4]). Besides one product registry in hoFH and the LALD registry, all other initiatives are local or country-specific. GENIALL is the first global prospective registry in LPLD that will collect physician and patient generated data on the natural course of LPLD, as well as long-term outcomes of gene therapy. There is a limited number of international initiatives focusing on the natural course of specific rare genetic lipid disorders. The GENIALL LPLD Registry could be the first step towards a future broader global initiative that collects data related to familial chylomicronemia syndrome and their underlying genetic causes. Copyright © 2016. Published by Elsevier B.V.

  4. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  5. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  6. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  7. Danish Hip Arthroscopy Registry (DHAR)

    DEFF Research Database (Denmark)

    Lund, Bent; Mygind-Klavsen, Bjarne; Grønbech Nielsen, Torsten

    2017-01-01

    The Danish Hip Arthroscopy Registry (DHAR) was initiated in January 2012 as a web-based prospective registry. The purpose of this study was to evaluate and report the first registry based outcome data of a national population with radiological and clinical femoroacetabular impingement (FAI......) undergoing hip arthroscopic treatment. Our primary hypothesis was that patients undergoing hip arthroscopy would improve significantly in pain, quality of life and sports related outcome measurements in Patient Related Outcome Measures (PROM). Peri-operative data and Patient Reported Outcome Measures (PROM......-5 D demonstrated improvement after 1 and 2 years from 0.66 pre-op to 0.78 at 2 years. HSAS improved significantly from 2.5 to 3.3. Pain score data demonstrated improvement in NRS-rest 39 to 17 and NRS Walk 49 to 22 at follow-up. We conclude that patients with FAI undergoing hip arthroscopy...

  8. A description and comparison of selected forest carbon registries: a guide for States considering the development of a forest carbon registry

    Science.gov (United States)

    Jessica Call; Jennifer Hayes

    2007-01-01

    There is increasing interest in tools for measuring and reducing emissions of carbon dioxide, a major greenhouse gas. Two tools that have been receiving a lot of attention include carbon markets and carbon registries. Carbon registries are established to record and track net carbon emission levels over time. These registries provide quantifiable and verifiable carbon...

  9. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  10. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  11. Agency for Toxic Substances and Disease Registry

    Science.gov (United States)

    ... Z # Search Form Controls Search The CDC submit Agency for Toxic Substances and Disease Registry Note: Javascript ... gov . Recommend on Facebook Tweet Share Compartir The Agency for Toxic Substances and Disease Registry (ATSDR) , based ...

  12. Dementia registries around the globe and their applications: A systematic review.

    Science.gov (United States)

    Krysinska, Karolina; Sachdev, Perminder S; Breitner, John; Kivipelto, Miia; Kukull, Walter; Brodaty, Henry

    2017-09-01

    Patient registries are valuable tools helping to address significant challenges in research, care, and policy. Registries, well embedded in many fields of medicine and public health, are relatively new in dementia. This systematic review presents the current situation in regards to dementia registries worldwide. We identified 31 dementia registries operating on an international, national, or local level between 1986 and 2016. More than half of the registries aimed to conduct or facilitate research, including preclinical research registries and registries recruiting research volunteers. Other dementia registries collected epidemiological or quality of care data. We present evidence of practical and economic outcomes of registries for research, clinical practice and policy, and recommendations for future development. Global harmonization of recruitment methods and minimum data would facilitate international comparisons. Registries provide a positive return on investment; their establishment and maintenance require ongoing support by government, policy makers, research funding bodies, clinicians, and individuals with dementia and their caregivers. Copyright © 2017 the Alzheimer's Association. All rights reserved.

  13. An anthology: Rationale for a US ballistic missile defense (1969 - 1984)

    Science.gov (United States)

    Tircuit, E. C.

    1985-04-01

    This anthology is a selection and short synopsis of representative articles on the rationale for a US ballistic missile defense (BMD). Unclassified articles and documents were reviewed and analyzed to identify and include nine representative articles in the anthology. The anthology reduces the search for quality material on the subject and documents the fundamental rationale for a BMD. The author concluded that the fundamental rationale for a US BMD is to deter nuclear war. In addition, specific rationale for a US BMD is provided in the anthology. Finally, an extensive bibliography is included in the anthology to enhance further research on the subject.

  14. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  15. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  16. Novel features of 3q29 deletion syndrome: Results from the 3q29 registry

    Science.gov (United States)

    Glassford, Megan R.; Rosenfeld, Jill A.; Freedman, Alexa A.; Zwick, Michael E.

    2016-01-01

    3q29 deletion syndrome is caused by a recurrent, typically de novo heterozygous 1.6 Mb deletion, but because incidence of the deletion is rare (1 in 30,000 births) the phenotype is not well described. To characterize the range of phenotypic manifestations associated with 3q29 deletion syndrome, we have developed an online registry (3q29deletion.org) for ascertainment of study subjects and phenotypic data collection via Internet‐based survey instruments. We report here on data collected during the first 18 months of registry operation, from 44 patients. This is the largest cohort of 3q29 deletion carriers ever assembled and surveyed in a systematic way. Our data reveal that 28% of registry participants report neuropsychiatric phenotypes, including anxiety disorder, panic attacks, depression, bipolar disorder, and schizophrenia. Other novel findings include a high prevalence (64%) of feeding problems in infancy and reduced weight at birth for 3q29 deletion carriers (average reduction 13.9 oz (394 g), adjusted for gestational age and sex, P = 6.5e‐07). We further report on the frequency of heart defects, autism, recurrent ear infections, gastrointestinal phenotypes, and dental phenotypes, among others. We also report on the expected timing of delayed developmental milestones. This is the most comprehensive description of the 3q29 deletion phenotype to date. These results are clinically actionable toward improving patient care for 3q29 deletion carriers, and can guide the expectations of physicians and parents. These data also demonstrate the value of patient‐reported outcomes to reveal the full phenotypic spectrum of rare genomic disorders. © 2016 The Authors. American Journal of Medical Genetics Part A Published by Wiley Periodicals, Inc. PMID:26738761

  17. The Western Denmark Cardiac Computed Tomography Registry

    DEFF Research Database (Denmark)

    Nielsen, Lene Hüche; Nørgaard, Bjarne Linde; Tilsted, Hans-Henrik

    2014-01-01

    BACKGROUND: As a subregistry to the Western Denmark Heart Registry (WDHR), the Western Denmark Cardiac Computed Tomography Registry (WDHR-CCTR) is a clinical database established in 2008 to monitor and improve the quality of cardiac computed tomography (CT) in Western Denmark. OBJECTIVE: We...... examined the content, data quality, and research potential of the WDHR-CCTR. METHODS: We retrieved 2008-2012 data to examine the 1) content; 2) completeness of procedure registration using the Danish National Patient Registry as reference; 3) completeness of variable registration comparing observed vs...

  18. Correlating Orphaned Windows Registry Data Structures

    Directory of Open Access Journals (Sweden)

    Damir Kahved

    2009-06-01

    Full Text Available Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We define registry orphans and elaborate on how they can be created inadvertently during software uninstallation and other system processes. We analyse the orphans and attempt to reconstruct them automatically. We adopt a data mining approach and introduce a set of attributes that can be applied by the forensic investigator to match values to their parents. The heuristics are encoded in a Decision Tree that can discriminate between keys and select those which most likely owned a particular orphan value.

  19. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  20. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  1. Assessing the feasibility of a web-based registry for multiple orphan lung diseases: the Australasian Registry Network for Orphan Lung Disease (ARNOLD) experience

    OpenAIRE

    Casamento, K.; Laverty, A.; Wilsher, M.; Twiss, J.; Gabbay, E.; Glaspole, I.; Jaffe, A.

    2016-01-01

    Background We investigated the feasibility of using an online registry to provide prevalence data for multiple orphan lung diseases in Australia and New Zealand. Methods A web-based registry, The Australasian Registry Network of Orphan Lung Diseases (ARNOLD) was developed based on the existing British Paediatric Orphan Lung Disease Registry. All adult and paediatric respiratory physicians who were members of the Thoracic Society of Australia and New Zealand in Australia and New Zealand were s...

  2. United States Transuranium and Uranium Registries

    International Nuclear Information System (INIS)

    Kathren, R.L.; Filipy, R.E.; Dietert, S.E.

    1991-06-01

    This report summarizes the primary scientific activities of the United States Transuranium and Uranium Registries for the period October 1, 1989 through September 30, 1990. The Registries are parallel human tissue research programs devoted to the study of the actinide elements in humans. To date there have been 261 autopsy or surgical specimen donations, which include 11 whole bodies. The emphasis of the Registry was directed towards quality improvement and the development of a fully computerized data base that would incorporate not only the results of postmortem radiochemical analysis, but also medical and monitoring information obtained during life. Human subjects reviews were also completed. A three compartment biokinetic model for plutonium distribution is proposed. 2 tabs

  3. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  4. Designing exposure registries for improved tracking of occupational exposure and disease.

    Science.gov (United States)

    Arrandale, Victoria H; Bornstein, Stephen; King, Andrew; Takaro, Timothy K; Demers, Paul A

    2016-06-27

    Registries are one strategy for collecting information on occupational exposure and disease in populations. Recently leaders in the Canadian occupational health and safety community have shown an interest in the use of occupational exposure registries. The primary goal of this study was to review a series of Canadian exposure registries to identify their strengths and weaknesses as a tool for tracking occupational exposure and disease in Canada. A secondary goal was to identify the features of an exposure registry needed to specifically contribute to prevention, including the identification of new exposure-disease relationships. A documentary review of five exposure registries from Canada was completed. Strengths and limitations of the registries were compared and key considerations for designing new registries were identified. The goals and structure of the exposure registries varied considerably. Most of the reviewed registries had voluntary registration, which presents challenges for the use of the data for either surveillance or epidemiology. It is recommended that eight key issues be addressed when planning new registries: clear registry goal(s), a definition of exposure, data to be collected (and how it will be used), whether enrolment will be mandatory, as well as ethical, privacy and logistical considerations. When well constructed, an exposure registry can be a valuable tool for surveillance, epidemiology and ultimately the prevention of occupational disease. However, exposure registries also have a number of actual and potential limitations that need to be considered.

  5. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  6. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  7. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  8. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  9. Registry Assessment of Peripheral Interventional Devices (RAPID): Registry assessment of peripheral interventional devices core data elements.

    Science.gov (United States)

    Jones, W Schuyler; Krucoff, Mitchell W; Morales, Pablo; Wilgus, Rebecca W; Heath, Anne H; Williams, Mary F; Tcheng, James E; Marinac-Dabic, J Danica; Malone, Misti L; Reed, Terrie L; Fukaya, Rie; Lookstein, Robert A; Handa, Nobuhiro; Aronow, Herbert D; Bertges, Daniel J; Jaff, Michael R; Tsai, Thomas T; Smale, Joshua A; Zaugg, Margo J; Thatcher, Robert J; Cronenwett, Jack L

    2018-02-01

    The current state of evaluating patients with peripheral artery disease and more specifically of evaluating medical devices used for peripheral vascular intervention (PVI) remains challenging because of the heterogeneity of the disease process, the multiple physician specialties that perform PVI, the multitude of devices available to treat peripheral artery disease, and the lack of consensus about the best treatment approaches. Because PVI core data elements are not standardized across clinical care, clinical trials, and registries, aggregation of data across different data sources and physician specialties is currently not feasible. Under the auspices of the U.S. Food and Drug Administration's Medical Device Epidemiology Network initiative-and its PASSION (Predictable and Sustainable Implementation of the National Registries) program, in conjunction with other efforts to align clinical data standards-the Registry Assessment of Peripheral Interventional Devices (RAPID) workgroup was convened. RAPID is a collaborative, multidisciplinary effort to develop a consensus lexicon and to promote interoperability across clinical care, clinical trials, and national and international registries of PVI. The current manuscript presents the initial work from RAPID to standardize clinical data elements and definitions, to establish a framework within electronic health records and health information technology procedural reporting systems, and to implement an informatics-based approach to promote the conduct of pragmatic clinical trials and registry efforts in PVI. Ultimately, we hope this work will facilitate and improve device evaluation and surveillance for patients, clinicians, health outcomes researchers, industry, policymakers, and regulators. Copyright © 2017 Society for Vascular Surgery. All rights reserved.

  10. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  11. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  12. Cost of Operating Central Cancer Registries and Factors That Affect Cost: Findings From an Economic Evaluation of Centers for Disease Control and Prevention National Program of Cancer Registries.

    Science.gov (United States)

    Tangka, Florence K L; Subramanian, Sujha; Beebe, Maggie Cole; Weir, Hannah K; Trebino, Diana; Babcock, Frances; Ewing, Jean

    2016-01-01

    The Centers for Disease Control and Prevention (CDC) evaluated the economics of the National Program of Cancer Registries to provide the CDC, the registries, and policy makers with the economics evidence-base to make optimal decisions about resource allocation. Cancer registry budgets are under increasing threat, and, therefore, systematic assessment of the cost will identify approaches to improve the efficiencies of this vital data collection operation and also justify the funding required to sustain registry operations. To estimate the cost of cancer registry operations and to assess the factors affecting the cost per case reported by National Program of Cancer Registries-funded central cancer registries. We developed a Web-based cost assessment tool to collect 3 years of data (2009-2011) from each National Program of Cancer Registries-funded registry for all actual expenditures for registry activities (including those funded by other sources) and factors affecting registry operations. We used a random-effects regression model to estimate the impact of various factors on cost per cancer case reported. The cost of reporting a cancer case varied across the registries. Central cancer registries that receive high-quality data from reporting sources (as measured by the percentage of records passing automatic edits) and electronic data submissions, and those that collect and report on a large volume of cases had significantly lower cost per case. The volume of cases reported had a large effect, with low-volume registries experiencing much higher cost per case than medium- or high-volume registries. Our results suggest that registries operate with substantial fixed or semivariable costs. Therefore, sharing fixed costs among low-volume contiguous state registries, whenever possible, and centralization of certain processes can result in economies of scale. Approaches to improve quality of data submitted and increasing electronic reporting can also reduce cost.

  13. ISHKS joint registry: A preliminary report

    Directory of Open Access Journals (Sweden)

    Jawahir A Pachore

    2013-01-01

    form can be downloaded from the website www.ishks.com. The information collected includes patient demographics, indication for surgery, implant details and in case of revision arthroplasty: the details of implants removed and the cause of failure of primary arthroplasty. These forms are mailed to the central registry office and the data is fed in computerized registry. Data collection started in October 2006. Results: Joint registry is a very important initiative of ISHKS and till date, have data of 34,478 TKAs and 3604 THAs, contributed by 42 surgeons across India. Some important observations have emerged. Data of 34,478 TKAs was assessed: These included 8612 males (25% and 25,866 females (75%. Average age was 64.4 years (Osteoarthritis range: 45 to 88 years; Rheumatoid arthritis range: 22 to 74 years. Average body mass index was 29.1 (Range: 18.1 to 42.9. The indication for TKA was osteoarthritis in 33,444 (97% and rheumatoid arthritis in 759 (2.2%. Total of 3604 THA procedures were recorded. These included 2162 (60% male patients and 1442 (40% female patients. Average age was 52 years (Range 17 to 85 years and average BMI was 25.8 (Range: 17.3 to 38.5. The indications for THA was AVN in 49%. Conclusion: The registry will become more meaningful in years to come. Active participation of all arthroplasty surgeons across India is vital for the success of the joints registry.

  14. Evaluating the completeness of the national ALS registry, United States.

    Science.gov (United States)

    Kaye, Wendy E; Wagner, Laurie; Wu, Ruoming; Mehta, Paul

    2018-02-01

    Our objective was to evaluate the completeness of the United States National ALS Registry (Registry). We compared persons with ALS who were passively identified by the Registry with those actively identified in the State and Metropolitan Area ALS Surveillance project. Cases in the two projects were matched using a combination of identifiers, including, partial social security number, name, date of birth, and sex. The distributions of cases from the two projects that matched/did not match were compared and Chi-square tests conducted to determine statistical significance. There were 5883 ALS cases identified by the surveillance project. Of these, 1116 died before the Registry started, leaving 4767 cases. We matched 2720 cases from the surveillance project to those in the Registry. The cases identified by the surveillance project that did not match cases in the Registry were more likely to be non-white, Hispanic, less than 65 years of age, and from western states. The methods used by the Registry to identify ALS cases, i.e. national administrative data and self-registration, worked well but missed cases. These findings suggest that developing strategies to identify and promote the Registry to those who were more likely to be missing, e.g. non-white and Hispanic, could be beneficial to improving the completeness of the Registry.

  15. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  16. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  17. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  18. Registry Assessment of Peripheral Interventional Devices (RAPID) - Registry Assessment of Peripheral Interventional Devices Core Data Elements.

    Science.gov (United States)

    Jones, W Schuyler; Krucoff, Mitchell W; Morales, Pablo; Wilgus, Rebecca W; Heath, Anne H; Williams, Mary F; Tcheng, James E; Marinac-Dabic, J Danica; Malone, Misti L; Reed, Terrie L; Fukaya, Rie; Lookstein, Robert; Handa, Nobuhiro; Aronow, Herbert D; Bertges, Daniel J; Jaff, Michael R; Tsai, Thomas T; Smale, Joshua A; Zaugg, Margo J; Thatcher, Robert J; Cronenwett, Jack L; Nc, Durham; Md, Silver Spring; Japan, Tokyo; Ny, New York; Ri, Providence; Vt, Burlington; Mass, Newton; Colo, Denver; Ariz, Tempe; Calif, Santa Clara; Minn, Minneapolis; Nh, Lebanon

    2018-01-25

    The current state of evaluating patients with peripheral artery disease and more specifically of evaluating medical devices used for peripheral vascular intervention (PVI) remains challenging because of the heterogeneity of the disease process, the multiple physician specialties that perform PVI, the multitude of devices available to treat peripheral artery disease, and the lack of consensus about the best treatment approaches. Because PVI core data elements are not standardized across clinical care, clinical trials, and registries, aggregation of data across different data sources and physician specialties is currently not feasible.Methods and Results:Under the auspices of the U.S. Food and Drug Administration's Medical Device Epidemiology Network initiative-and its PASSION (Predictable and Sustainable Implementation of the National Registries) program, in conjunction with other efforts to align clinical data standards-the Registry Assessment of Peripheral Interventional Devices (RAPID) workgroup was convened. RAPID is a collaborative, multidisciplinary effort to develop a consensus lexicon and to promote interoperability across clinical care, clinical trials, and national and international registries of PVI. The current manuscript presents the initial work from RAPID to standardize clinical data elements and definitions, to establish a framework within electronic health records and health information technology procedural reporting systems, and to implement an informatics-based approach to promote the conduct of pragmatic clinical trials and registry efforts in PVI. Ultimately, we hope this work will facilitate and improve device evaluation and surveillance for patients, clinicians, health outcomes researchers, industry, policymakers, and regulators.

  19. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  20. The Danish National Chronic Lymphocytic Leukemia Registry

    DEFF Research Database (Denmark)

    da Cunha-Bang, Caspar; Geisler, Christian Hartmann; Enggaard, Lisbeth

    2016-01-01

    AIM: In 2008, the Danish National Chronic Lymphocytic Leukemia Registry was founded within the Danish National Hematology Database. The primary aim of the registry is to assure quality of diagnosis and care of patients with chronic lymphocytic leukemia (CLL) in Denmark. Secondarily, to evaluate...

  1. Service registry design: an information service approach

    NARCIS (Netherlands)

    Ferreira Pires, Luis; Wang, J.; van Oostrum, Arjen; Wijnhoven, Alphonsus B.J.M.

    2010-01-01

    A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues,

  2. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  3. [History of the cancer registry in Mexico].

    Science.gov (United States)

    Allende-López, Aldo; Fajardo-Gutiérrez, Arturo

    2011-01-01

    A cancer registry is to record the data which let us to know the epidemiology of neoplasm, but led us take a decision in medical policy about this health problem that benefit patients. In this paper we did a brief historical review about models and attempts for having a cancer registry in Mexico. However, since 1940 "the fight against cancer" was declared, we have not had a confident cancer registry today validated and built with data from whole the country. In 1982, the Registro Nacional del Cancer was created. The design and validation of a registration card in four hospitals were the main results. In 1988, the Registro Nacional del Cancer was reinforced with a computerized system for facilitation the data capture. In 1994, it was signed the first interinstitutional agreement that led to Registro Histopatol6gico de Neoplasias Malignas. In 1996, the Instituto Mexicano del Seguro Social established a cancer registry in children in Mexico with the intention to have data from this population.

  4. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  5. Facility Registry Service (FRS)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) provides an integrated source of comprehensive (air, water, and waste) environmental information about facilities across EPA,...

  6. The Danish Neuro-Oncology Registry

    DEFF Research Database (Denmark)

    Hansen, Steinbjørn; Nielsen, Jan; Laursen, René J

    2016-01-01

    BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database completen......BACKGROUND: The Danish Neuro-Oncology Registry (DNOR) is a nationwide clinical cancer database that has prospectively registered data on patients with gliomas since January 2009. The purpose of this study was to describe the establishment of the DNOR and further to evaluate the database...

  7. 37 CFR 201.25 - Visual Arts Registry.

    Science.gov (United States)

    2010-07-01

    ... the copyright law. Visual Arts Registry Statements which are illegible or fall outside of the scope of... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Visual Arts Registry. 201.25 Section 201.25 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE...

  8. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  9. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  10. National nephrectomy registries: Reviewing the need for population-based data.

    Science.gov (United States)

    Pearson, John; Williamson, Timothy; Ischia, Joseph; Bolton, Damien M; Frydenberg, Mark; Lawrentschuk, Nathan

    2015-09-01

    Nephrectomy is the cornerstone therapy for renal cell carcinoma (RCC) and continued refinement of the procedure through research may enhance patient outcomes. A national nephrectomy registry may provide the key information needed to assess the procedure at a national level. The aim of this study was to review nephrectomy data available at a population-based level in Australia and to benchmark these data against data from the rest of the world as an examination of the national nephrectomy registry model. A PubMed search identified records pertaining to RCC nephrectomy in Australia. A similar search identified records relating to established nephrectomy registries internationally and other surgical registries of clinical importance. These records were reviewed to address the stated aims of this article. Population-based data within Australia for nephrectomy were lacking. Key issues identified were the difficulty in benchmarking outcomes and no ongoing monitoring of trends. The care centralization debate, which questions whether small-volume centers provide comparable outcomes to high-volume centers, is ongoing. Patterns of adherence and the effectiveness of existing protocols are uncertain. A review of established international registries demonstrated that the registry model can effectively address issues comparable to those identified in the Australian literature. A national nephrectomy registry could address deficiencies identified in a given nation's nephrectomy field. The model is supported by evidence from international examples and will provide the population-based data needed for studies. Scope exists for possible integration with other registries to develop a more encompassing urological or surgical registry. Need remains for further exploration of the feasibility and practicalities of initiating such a registry including a minimum data set, outcome indicators, and auditing of data.

  11. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  12. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  13. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  14. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  15. REAC/TS Radiation Accident Registry: An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Doran M. Christensen, DO, REAC/TS Associate Director and Staff Physician Becky Murdock, REAC/TS Registry and Health Physics Technician

    2012-12-12

    Over the past four years, REAC/TS has presented a number of case reports from its Radiation Accident Registry. Victims of radiological or nuclear incidents must meet certain dose criteria for an incident to be categorized as an “accident” and be included in the registry. Although the greatest numbers of “accidents” in the United States that have been entered into the registry involve radiation devices, the greater percentage of serious accidents have involved sealed sources of one kind or another. But if one looks at the kinds of accident scenarios that have resulted in extreme consequence, i.e., death, the greater share of deaths has occurred in medical settings.

  16. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  17. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  18. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  19. Bioethics: A Rationale and a Model

    Science.gov (United States)

    Barman, Charles R.; Rusch, John J.

    1978-01-01

    Discusses the rationale for and development of an undergraduate bioethics course. Based on experiences with the course, general suggestions are offered to instructors planning to add bioethics to existing curricula. (MA)

  20. A review of national shoulder and elbow joint replacement registries

    DEFF Research Database (Denmark)

    Rasmussen, Jeppe V; Olsen, Bo S; Fevang, Bjørg-Tilde S

    2012-01-01

    The aim was to review the funding, organization, data handling, outcome measurements, and findings from existing national shoulder and elbow joint replacement registries; to consider the possibility of pooling data between registries; and to consider wether a pan european registry might be feasible....

  1. The Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Østgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Raaschou-Jensen, Klas Kræsten

    2016-01-01

    AIM OF DATABASE: The main aim of the Danish National Acute Leukemia Registry (DNLR) was to obtain information about the epidemiology of the hematologic cancers acute myeloid leukemia (AML), acute lymphoblastic leukemia (ALL), and myelodysplastic syndrome (MDS). STUDY POPULATION: The registry...... was established in January 2000 by the Danish Acute Leukemia Group and has been expanded over the years. It includes adult AML patients diagnosed in Denmark since 2000, ALL patients diagnosed since 2005, and MDS patients diagnosed since 2010. The coverage of leukemia patients exceeds 99%, and the coverage of MDS...... years. To ensure this high coverage, completeness, and quality of data, linkage to the Danish Civil Registration System and the Danish National Registry of Patients, and several programmed data entry checks are used. CONCLUSION: The completeness and positive predictive values of the leukemia data have...

  2. Presenting an evaluation model of the trauma registry software.

    Science.gov (United States)

    Asadi, Farkhondeh; Paydar, Somayeh

    2018-04-01

    Trauma is a major cause of 10% death in the worldwide and is considered as a global concern. This problem has made healthcare policy makers and managers to adopt a basic strategy in this context. Trauma registry has an important and basic role in decreasing the mortality and the disabilities due to injuries resulted from trauma. Today, different software are designed for trauma registry. Evaluation of this software improves management, increases efficiency and effectiveness of these systems. Therefore, the aim of this study is to present an evaluation model for trauma registry software. The present study is an applied research. In this study, general and specific criteria of trauma registry software were identified by reviewing literature including books, articles, scientific documents, valid websites and related software in this domain. According to general and specific criteria and related software, a model for evaluating trauma registry software was proposed. Based on the proposed model, a checklist designed and its validity and reliability evaluated. Mentioned model by using of the Delphi technique presented to 12 experts and specialists. To analyze the results, an agreed coefficient of %75 was determined in order to apply changes. Finally, when the model was approved by the experts and professionals, the final version of the evaluation model for the trauma registry software was presented. For evaluating of criteria of trauma registry software, two groups were presented: 1- General criteria, 2- Specific criteria. General criteria of trauma registry software were classified into four main categories including: 1- usability, 2- security, 3- maintainability, and 4-interoperability. Specific criteria were divided into four main categories including: 1- data submission and entry, 2- reporting, 3- quality control, 4- decision and research support. The presented model in this research has introduced important general and specific criteria of trauma registry software

  3. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  4. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  5. "Socialized Music": Historical Formations of Community Music through Social Rationales

    Science.gov (United States)

    Yerichuk, Deanna

    2014-01-01

    This article traces the formation of community music through professional and scholarly articles over the last century in North America, and argues that community music has been discursively formed through social rationales, although the specific rationales have shifted. The author employs an archaeological framework inspired by Michel Foucault to…

  6. Implementation of a population-based epidemiological rare disease registry: study protocol of the amyotrophic lateral sclerosis (ALS)--registry Swabia.

    Science.gov (United States)

    Nagel, Gabriele; Unal, Hatice; Rosenbohm, Angela; Ludolph, Albert C; Rothenbacher, Dietrich

    2013-02-17

    The social and medical impact of rare diseases is increasingly recognized. Amyotrophic lateral sclerosis (ALS) is the most prevalent of the motor neuron diseases. It is characterized by rapidly progressive damage to the motor neurons with a survival of 2-5 years for the majority of patients. The objective of this work is to describe the study protocol and the implementation steps of the amyotrophic lateral sclerosis (ALS) registry Swabia, located in the South of Germany. The ALS registry Swabia started in October 2010 with both, the retrospective (01.10.2008-30.09.2010) and prospective (from 01.10.2010) collection of ALS cases, in a target population of 8.6 million persons in Southern Germany. In addition, a population based case-control study was implemented based on the registry that also included the collection of various biological materials.Retrospectively, 420 patients (222 men and 198 women) were identified. Prospectively data of ALS patients were collected, of which about 70% agreed to participate in the population-based case-control study. All participants in the case-control study provided also a blood sample. The prospective part of the study is ongoing. The ALS registry Swabia has been implemented successfully. In rare diseases such as ALS, the collaboration of registries, the comparison with external samples and biorepositories will facilitate to identify risk factors and to further explore the potential underlying pathophysiological mechanisms.

  7. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  8. Data Element Registry Services

    Data.gov (United States)

    U.S. Environmental Protection Agency — Data Element Registry Services (DERS) is a resource for information about value lists (aka code sets / pick lists), data dictionaries, data elements, and EPA data...

  9. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  10. The Savant Syndrome Registry: A Preliminary Report.

    Science.gov (United States)

    Treffert, Darold A; Rebedew, David L

    2015-08-01

    A registry has been established to document certain characteristics on a sizeable worldwide sample of individuals with savant syndrome, a rare but remarkable condition in which persons with developmental disabilities, brain injury, or brain disease have some spectacular "islands" of skill or ability that stand in jarring, marked contrast to overall handicap. Of the 319 savants included in the registry, 90% are congenital savants, while 10% are acquired savants. The registry includes individuals from 33 countries, with 70% from the United States or Canada. Sex distribution was 79% male vs. 21% female (4:1). This report summarizes the findings in the congenital savant syndrome category of the registry. Among the individuals with congenital savant syndrome, the most common underlying disability was Autistic Spectrum Disorder (75%); various other central nervous system (CNS) disorders were present in the other 25%. Fifty-five percent possessed a single special skill, while 45% had multiple skills. Music was the most frequent principal skill followed by art, memory, mathematics, calendar calculating, language, visual-spatial/mechanical, athletic, computer, extrasensory perception, and other skills.

  11. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  12. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  13. 911 Master PSAP Registry

    Data.gov (United States)

    Federal Communications Commission — Updated as of 5Oct2017. The Registry lists PSAPs by an FCC assigned identification number, PSAP Name, State, County, City, and provides information on any type of...

  14. [Registry of patients with stroke stated in a public hospital of Peru, 2000-2009].

    Science.gov (United States)

    Castañeda-Guarderas, Ana; Beltrán-Ale, Guillermo; Casma-Bustamante, Renzo; Ruiz-Grosso, Paulo; Málaga, Germán

    2011-12-01

    We performed a descriptive study taking on account the characteristics of the registries of the patients hospitalized at the Hospital Nacional Cayetano Heredia between the years 2000 and 2009 with stroke as hospitalization diagnosis. 2225 records were obtained from patients older than 18, with stroke. According to ICD-10, 1071 had diagnosis of ischemic stroke, 554 were hemorrhagic, 183 were subarachnoid hemorrhage, 49 were ischemic plus hemorrhagic, 10 were transient ischemic attack (TIA) and in 358 we were unable to specify the type of stroke. 352 deaths were recorded (19.6 %), most of them during the first 3 days. The male / female ratio was 1.09, the mean age 64.1 ± 17.2 years and the median length of hospital stay was 9 days. The most common associated conditions were high blood pressure, atrial fibrillation and type 2 diabetes mellitus. The mortality found is the highest reported in our country, constant in all age groups and higher in women.

  15. When Regional Innovation Policies Meet Policy Rationales and Evidence:

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s there has been an important development......In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognise their distinctive patterns across...... of innovation policy rationales, advocating for more specialisation; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic...

  16. When Regional Innovation Policies Meet Policy Rationales and Evidence

    DEFF Research Database (Denmark)

    Borrás, Susana; Jordana, Jacint

    2016-01-01

    regions, and to understand how rationales and evidence can be translated into policy-making. To this purpose, this paper develops a framework to study the extent to which regional innovation policies have changed during the past few years. Since the mid-2000s, there has been an important development......In spite of recent advancements regarding regional innovation policy rationales and evidence, there are few analyses about the actual features of existing regional innovation policies. Nevertheless, a policy analysis perspective is important in order to recognize their distinctive patterns across...... of innovation policy rationales, advocating for more specialization; likewise, greater data availability at the regional level has allowed more sophisticated assessment of innovation performance. Finally, the crisis since 2008 has had ravaging effects in some regions, with job losses and severe economic...

  17. The Brazilian Twin Registry.

    Science.gov (United States)

    Ferreira, Paulo H; Oliveira, Vinicius C; Junqueira, Daniela R; Cisneros, Lígia C; Ferreira, Lucas C; Murphy, Kate; Ordoñana, Juan R; Hopper, John L; Teixeira-Salmela, Luci F

    2016-12-01

    The Brazilian Twin Registry (BTR) was established in 2013 and has impelled twin research in South America. The main aim of the initiative was to create a resource that would be accessible to the Brazilian scientific community as well as international researchers interested in the investigation of the contribution of genetic and environmental factors in the development of common diseases, phenotypes, and human behavior traits. The BTR is a joint effort between academic and governmental institutions from Brazil and Australia. The collaboration includes the Federal University of Minas Gerais (UFMG) in Brazil, the University of Sydney and University of Melbourne in Australia, the Australian Twin Registry, as well as the research foundations CNPq and CAPES in Brazil. The BTR is a member of the International Network of Twin Registries. Recruitment strategies used to register twins have been through participation in a longitudinal study investigating genetic and environmental factors for low back pain occurrence, and from a variety of sources including media campaigns and social networking. Currently, 291 twins are registered in the BTR, with data on demographics, zygosity, anthropometrics, and health history having been collected from 151 twins using a standardized self-reported questionnaire. Future BTR plans include the registration of thousands of Brazilian twins identified from different sources and collaborate nationally and internationally with other research groups interested on twin studies.

  18. Paper 6: EUROCAT member registries: organization and activities

    DEFF Research Database (Denmark)

    Greenlees, Ruth; Neville, Amanda; Addor, Marie-Claude

    2011-01-01

    EUROCAT is a network of population-based congenital anomaly registries providing standardized epidemiologic information on congenital anomalies in Europe. There are three types of EUROCAT membership: full, associate, or affiliate. Full member registries send individual records of all congenital a...

  19. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  20. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  1. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  2. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  3. [Registries for rare diseases : OSSE - An open-source framework for technical implementation].

    Science.gov (United States)

    Storf, Holger; Schaaf, Jannik; Kadioglu, Dennis; Göbel, Jens; Wagner, Thomas O F; Ückert, Frank

    2017-05-01

    Meager amounts of data stored locally, a small number of experts, and a broad spectrum of technological solutions incompatible with each other characterize the landscape of registries for rare diseases in Germany. Hence, the free software Open Source Registry for Rare Diseases (OSSE) was created to unify and streamline the process of establishing specific rare disease patient registries. The data to be collected is specified based on metadata descriptions within the registry framework's so-called metadata repository (MDR), which was developed according to the ISO/IEC 11179 standard. The use of a central MDR allows for sharing the same data elements across any number of registries, thus providing a technical prerequisite for making data comparable and mergeable between registries and promoting interoperability.With OSSE, the foundation is laid to operate linked patient registries while respecting strong data protection regulations. Using the federated search feature, data for clinical studies can be identified across registries. Data integrity, however, remains intact since no actual data leaves the premises without the owner's consent. Additionally, registry solutions other than OSSE can participate via the OSSE bridgehead, which acts as a translator between OSSE registry networks and non-OSSE registries. The pseudonymization service Mainzelliste adds further data protection.Currently, more than 10 installations are under construction in clinical environments (including university hospitals in Frankfurt, Hamburg, Freiburg and Münster). The feedback given by the users will influence further development of OSSE. As an example, the installation process of the registry for undiagnosed patients at University Hospital Frankfurt is described in more detail.

  4. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  5. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  7. Mexican registry of pulmonary hypertension: REMEHIP.

    Science.gov (United States)

    Sandoval Zarate, Julio; Jerjes-Sanchez, Carlos; Ramirez-Rivera, Alicia; Zamudio, Tomas Pulido; Gutierrez-Fajardo, Pedro; Elizalde Gonzalez, Jose; Leon, Mario Seoane Garcia De; Gamez, Miguel Beltran; Abril, Francisco Moreno Hoyos; Michel, Rodolfo Parra; Aguilar, Humberto Garcia

    REMEHIP is a prospective, multicentre registry on pulmonary hypertension. The main objective will be to identify the clinical profile, medical care, therapeutic trends and outcomes in adult and pediatric Mexican patients with well-characterized pulmonary hypertension. REMEHIP a multicenter registry began in 2015 with a planned recruitment time of 12 months and a 4-year follow-up. The study population will comprise a longitudinal cohort study, collecting data on patients with prevalent and incident pulmonary hypertension. Will be included patients of age >2 years and diagnosis of pulmonary hypertension by right heart catheterization within Group 1 and Group 4 of the World Health Organization classification. The structure, data collection and data analysis will be based on quality current recommendations for registries. The protocol has been approved by institutional ethics committees in all participant centers. All patients will sign an informed consent form. Currently in Mexico, there is a need of observational registries that include patients with treatment in the everyday clinical practice so the data could be validated and additional information could be obtained versus the one from the clinical trials. In this way, REMEHIP emerges as a link among randomized clinical trials developed by experts and previous Mexican experience. Copyright © 2016 Instituto Nacional de Cardiología Ignacio Chávez. Publicado por Masson Doyma México S.A. All rights reserved.

  8. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  9. Implementation of a population-based epidemiological rare disease registry: study protocol of the amyotrophic lateral sclerosis (ALS - registry Swabia

    Directory of Open Access Journals (Sweden)

    Nagel Gabriele

    2013-02-01

    Full Text Available Abstract Background The social and medical impact of rare diseases is increasingly recognized. Amyotrophic lateral sclerosis (ALS is the most prevalent of the motor neuron diseases. It is characterized by rapidly progressive damage to the motor neurons with a survival of 2–5 years for the majority of patients. The objective of this work is to describe the study protocol and the implementation steps of the amyotrophic lateral sclerosis (ALS registry Swabia, located in the South of Germany. Methods/Design The ALS registry Swabia started in October 2010 with both, the retrospective (01.10.2008-30.09.2010 and prospective (from 01.10.2010 collection of ALS cases, in a target population of 8.6 million persons in Southern Germany. In addition, a population based case–control study was implemented based on the registry that also included the collection of various biological materials. Retrospectively, 420 patients (222 men and 198 women were identified. Prospectively data of ALS patients were collected, of which about 70% agreed to participate in the population-based case–control study. All participants in the case–control study provided also a blood sample. The prospective part of the study is ongoing. Discussion The ALS registry Swabia has been implemented successfully. In rare diseases such as ALS, the collaboration of registries, the comparison with external samples and biorepositories will facilitate to identify risk factors and to further explore the potential underlying pathophysiological mechanisms.

  10. [The role of drug registries in the post-marketing surveillance].

    Science.gov (United States)

    Traversa, Giuseppe; Sagliocca, Luciano; Magrini, Nicola; Venegoni, Mauro

    2013-06-01

    The aim of this article is to provide an introduction to issue of Recenti Progressi in Medicina, devoted to the role of drug registries in the post-marketing surveillance. We first motivate the need to implement registries as a tool in promoting the appropriateness of drug use and acquiring additional information on the risk-benefit profile of drugs. Then, the different role that can be played by registries in comparison with prescription monitoring systems and observational studies is clarified. The presentation of some of the most relevant registries established in Italy since the end of the '90s, with the analysis of their strengths and weaknesses, helps to understand some of the crucial issues that should be taken into account before a new registry is adopted. Specifically, we deal with the relationship between objectives - of appropriateness, effectiveness and safety - and methods; the overlapping between drug-based registries and disease-based ones; the duration and extension of data collection, which may be either exhaustive or based on a sampling frame; the importance of ensuring the quality of the data and to minimize the number of subjects who are lost to follow-up; the importance of infrastructures, and of ad hoc funding, for the functioning of a registry; the independence in data analysis and publication of findings.

  11. Ethical aspects of registry-based research in the Nordic countries.

    Science.gov (United States)

    Ludvigsson, Jonas F; Håberg, Siri E; Knudsen, Gun Peggy; Lafolie, Pierre; Zoega, Helga; Sarkkola, Catharina; von Kraemer, Stephanie; Weiderpass, Elisabete; Nørgaard, Mette

    2015-01-01

    National health care registries in the Nordic countries share many attributes, but different legal and ethical frameworks represent a challenge to promoting effective joint research. Internationally, there is a lack of knowledge about how ethical matters are considered in Nordic registry-based research, and a lack of knowledge about how Nordic ethics committees operate and what is needed to obtain an approval. In this paper, we review ethical aspects of registry-based research, the legal framework, the role of ethics review boards in the Nordic countries, and the structure of the ethics application. We discuss the role of informed consent in registry-based research and how to safeguard the integrity of study participants, including vulnerable subjects and children. Our review also provides information on the different government agencies that contribute registry-based data, and a list of the major health registries in Denmark, Finland, Iceland, Norway, and Sweden. Both ethical values and conditions for registry-based research are similar in the Nordic countries. While Denmark, Finland, Iceland, Norway, and Sweden have chosen different legal frameworks, these differences can be resolved through mutual recognition of ethical applications and by harmonizing the different systems, likely leading to increased collaboration and enlarged studies.

  12. Appendix C: safety design rationale

    International Nuclear Information System (INIS)

    Ghose, S.

    1985-01-01

    A brief discussion of the rationale for safety design of fusion plants is presented in the main text. Further detail safety considerations are presented in this appendix in the form of charts and tables. The author present some of the major safety criteria and other criteria used in blanket selection here

  13. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  14. Development of an International Prostate Cancer Outcomes Registry.

    Science.gov (United States)

    Evans, Sue M; Nag, Nupur; Roder, David; Brooks, Andrew; Millar, Jeremy L; Moretti, Kim L; Pryor, David; Skala, Marketa; McNeil, John J

    2016-04-01

    To establish a Prostate Cancer Outcomes Registry-Australia and New Zealand (PCOR-ANZ) for monitoring outcomes of prostate cancer treatment and care, in a cost-effective manner. Stakeholders were recruited based on their interest, importance in achieving the monitoring and reporting of clinical practice and patient outcomes, and in amalgamation of existing registries. Each participating jurisdiction is responsible for local governance, site recruitment, data collection, and data transfer into the PCOR-ANZ. To establish each local registry, hospitals and clinicians within a jurisdiction were approached to voluntarily contribute to the registry following relevant ethical approval. Patient contact occurs following notification of prostate cancer through a hospital or pathology report, or from a cancer registry. Patient registration is based on an opt-out model. The PCOR-ANZ is a secure web-based registry adhering to ISO 27001 standards. Based on a standardised minimum data set, information on demographics, diagnosis, treatment, outcomes, and patient reported quality of life, are collected. Eight of nine jurisdictions have agreed to contribute to the PCOR-ANZ. Each jurisdiction has commenced implementation of necessary infrastructure to support rapid rollout. PCOR-ANZ has defined a minimum data set for collection, to enable analysis of key quality indicators that will aid in assessing clinical practice and patient focused outcomes. PCOR-ANZ will provide a useful resource of risk-adjusted evidence-based data to clinicians, hospitals, and decision makers on prostate cancer clinical practice. © 2016 The Authors BJU International © 2016 BJU International Published by John Wiley & Sons Ltd.

  15. CIRSE Vascular Closure Device Registry

    International Nuclear Information System (INIS)

    Reekers, Jim A.; Müller-Hülsbeck, Stefan; Libicher, Martin; Atar, Eli; Trentmann, Jens; Goffette, Pierre; Borggrefe, Jan; Zeleňák, Kamil; Hooijboer, Pieter; Belli, Anna-Maria

    2011-01-01

    Purpose: Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. Methods: The CIRSE registry of closure devices with an anchor and a plug started in January 2009 and ended in August 2009. A total of 1,107 patients were included in the registry. Results: Deployment success was 97.2%. Deployment failure specified to access type was 8.8% [95% confidence interval (95% CI) 5.0–14.5] for antegrade access and 1.8% (95% CI 1.1–2.9) for retrograde access (P = 0.001). There was no difference in deployment failure related to local PVD at the access site. Calcification was a reason for deployment failure in only 5.9 cm, and two vessel occlusions. Conclusion: The conclusion of this registry of closure devices with an anchor and a plug is that the use of this device in interventional radiology procedures is safe, with a low incidence of serious access site complications. There seems to be no difference in complications between antegrade and retrograde access and other parameters.

  16. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  17. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  18. Statistical aspects of tumor registries, Hiroshima and Nagasaki

    Energy Technology Data Exchange (ETDEWEB)

    Ishida, M

    1961-02-24

    Statistical considerations are presented on the tumor registries established for purpose of studying radiation induced carcinoma in Hiroshima and Nagasaki by observing tumors developing in the survivors of these cities. In addition to describing the background and purpose of the tumor registries the report consists of two parts: (1) accuracy of reported tumor cases and (2) statistical aspects of the incidence of tumors based both on a current population and on a fixed sample. Under the heading background, discussion includes the difficulties in attaining complete registration; the various problems associated with the tumor registries; and the special characteristics of tumor registries in Hiroshima and Nagasaki. Beye's a posteriori probability formula was applied to the Type I and Type II errors in the autopsy data of Hiroshima ABCC. (Type I, diagnosis of what is not cancer as cancer; Type II, diagnosis of what is cancer as noncancer.) Finally, the report discussed the difficulties in estimating a current population of survivors; the advantages and disadvantages of analyses based on a fixed sample and on an estimated current population; the comparison of incidence rates based on these populations using the 20 months' data of the tumor registry in Hiroshima; and the sample size required for studying radiation induced carcinoma. 10 references, 1 figure, 8 tables.

  19. Patient registries: useful tools for clinical research in myasthenia gravis.

    Science.gov (United States)

    Baggi, Fulvio; Mantegazza, Renato; Antozzi, Carlo; Sanders, Donald

    2012-12-01

    Clinical registries may facilitate research on myasthenia gravis (MG) in several ways: as a source of demographic, clinical, biological, and immunological data on large numbers of patients with this rare disease; as a source of referrals for clinical trials; and by allowing rapid identification of MG patients with specific features. Physician-derived registries have the added advantage of incorporating diagnostic and treatment data that may allow comparison of outcomes from different therapeutic approaches, which can be supplemented with patient self-reported data. We report the demographic analysis of MG patients in two large physician-derived registries, the Duke MG Patient Registry, at the Duke University Medical Center, and the INNCB MG Registry, at the Istituto Neurologico Carlo Besta, as a preliminary study to assess the consistency of the two data sets. These registries share a common structure, with an inner core of common data elements (CDE) that facilitate data analysis. The CDEs are concordant with the MG-specific CDEs developed under the National Institute of Neurological Disorders and Stroke Common Data Elements Project. © 2012 New York Academy of Sciences.

  20. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  1. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  2. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  3. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  4. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  5. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  6. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. Uses and limitations of registry and academic databases.

    Science.gov (United States)

    Williams, William G

    2010-01-01

    A database is simply a structured collection of information. A clinical database may be a Registry (a limited amount of data for every patient undergoing heart surgery) or Academic (an organized and extensive dataset of an inception cohort of carefully selected subset of patients). A registry and an academic database have different purposes and cost. The data to be collected for a database is defined by its purpose and the output reports required for achieving that purpose. A Registry's purpose is to ensure quality care, an Academic Database, to discover new knowledge through research. A database is only as good as the data it contains. Database personnel must be exceptionally committed and supported by clinical faculty. A system to routinely validate and verify data integrity is essential to ensure database utility. Frequent use of the database improves its accuracy. For congenital heart surgeons, routine use of a Registry Database is an essential component of clinical practice. Copyright (c) 2010 Elsevier Inc. All rights reserved.

  8. Cancer Registry Data

    Centers for Disease Control (CDC) Podcasts

    2017-05-24

    Dr. Loria Pollack, a Senior Medical Epidemiologist, talks about the importance of cancer registry data to understanding how cancer affects the United States–now and in the future.  Created: 5/24/2017 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 5/24/2017.

  9. The EpiCom Survey-Registries Across Europe, Epidemiological Research and Beyond

    DEFF Research Database (Denmark)

    Gordon, Hannah; Langholz, Ebbe

    2017-01-01

    The 2015 EpiCom survey evaluated population, patient, and research registries across Europe. Information was collected from 38 countries. The registries included those falling within the remit of national statistics, hospital databases, twin and multiplex registries, inflammatory bowel disease [IBD...

  10. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  11. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  12. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  13. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  14. Patient-reported outcome measures in arthroplasty registries

    DEFF Research Database (Denmark)

    Rolfson, Ola; Bohm, Eric; Franklin, Patricia

    2016-01-01

    The International Society of Arthroplasty Registries (ISAR) Patient-Reported Outcome Measures (PROMs) Working Group have evaluated and recommended best practices in the selection, administration, and interpretation of PROMs for hip and knee arthroplasty registries. The 2 generic PROMs in common use...... are the Short Form health surveys (SF-36 or SF-12) and EuroQol 5-dimension (EQ-5D). The Working Group recommends that registries should choose specific PROMs that have been appropriately developed with good measurement properties for arthroplasty patients. The Working Group recommend the use of a 1-item pain...... should consider the absolute level of pain, function, and general health status as well as improvement, missing data, approaches to analysis and case-mix adjustment, minimal clinically important difference, and minimal detectable change. The Working Group recommends data collection immediately before...

  15. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  16. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  17. Assessing the feasibility of a web-based registry for multiple orphan lung diseases: the Australasian Registry Network for Orphan Lung Disease (ARNOLD) experience.

    Science.gov (United States)

    Casamento, K; Laverty, A; Wilsher, M; Twiss, J; Gabbay, E; Glaspole, I; Jaffe, A

    2016-04-18

    We investigated the feasibility of using an online registry to provide prevalence data for multiple orphan lung diseases in Australia and New Zealand. A web-based registry, The Australasian Registry Network of Orphan Lung Diseases (ARNOLD) was developed based on the existing British Paediatric Orphan Lung Disease Registry. All adult and paediatric respiratory physicians who were members of the Thoracic Society of Australia and New Zealand in Australia and New Zealand were sent regular emails between July 2009 and June 2014 requesting information on patients they had seen with any of 30 rare lung diseases. Prevalence rates were calculated using population statistics. Emails were sent to 649 Australian respiratory physicians and 65 in New Zealand. 231 (32.4%) physicians responded to emails a total of 1554 times (average 7.6 responses per physician). Prevalence rates of 30 rare lung diseases are reported. A multi-disease rare lung disease registry was implemented in the Australian and New Zealand health care settings that provided prevalence data on orphan lung diseases in this region but was limited by under reporting.

  18. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  1. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  2. Cohort profile: the TrueNTH Global Registry - an international registry to monitor and improve localised prostate cancer health outcomes.

    Science.gov (United States)

    Evans, Sue M; Millar, Jeremy L; Moore, Caroline M; Lewis, John D; Huland, Hartwig; Sampurno, Fanny; Connor, Sarah E; Villanti, Paul; Litwin, Mark S

    2017-11-28

    Globally, prostate cancer treatment and outcomes for men vary according to where they live, their race and the care they receive. The TrueNTH Global Registry project was established as an international registry monitoring care provided to men with localised prostate cancer (CaP). Sites with existing CaP databases in Movember fundraising countries were invited to participate in the international registry. In total, 25 Local Data Centres (LDCs) representing 113 participating sites across 13 countries have nominated to contribute to the project. It will collect a dataset based on the International Consortium for Health Outcome Measures (ICHOM) standardised dataset for localised CaP. A governance strategy has been developed to oversee registry operation, including transmission of reversibly anonymised data. LDCs are represented on the Project Steering Committee, reporting to an Executive Committee. A Project Coordination Centre and Data Coordination Centre (DCC) have been established. A project was undertaken to compare existing datasets, understand capacity at project commencement (baseline) to collect the ICHOM dataset and assist in determining the final data dictionary. 21/25 LDCs provided data dictionaries for review. Some ICHOM data fields were well collected (diagnosis, treatment start dates) and others poorly collected (complications, comorbidities). 17/94 (18%) ICHOM data fields were relegated to non-mandatory fields due to poor capture by most existing registries. Participating sites will transmit data through a web interface biannually to the DCC. Recruitment to the TrueNTH Global Registry-PCOR project will commence in late 2017 with sites progressively contributing reversibly anonymised data following ethical review in local regions. Researchers will have capacity to source deidentified data after the establishment phase. Quality indicators are to be established through a modified Delphi approach in later 2017, and it is anticipated that reports on

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  4. The German Aortic Valve Registry (GARY): a nationwide registry for patients undergoing invasive therapy for severe aortic valve stenosis.

    Science.gov (United States)

    Beckmann, A; Hamm, C; Figulla, H R; Cremer, J; Kuck, K H; Lange, R; Zahn, R; Sack, S; Schuler, G C; Walther, T; Beyersdorf, F; Böhm, M; Heusch, G; Funkat, A K; Meinertz, T; Neumann, T; Papoutsis, K; Schneider, S; Welz, A; Mohr, F W

    2012-07-01

    Background The increasing prevalence of severe aortic valve defects correlates with the increase of life expectancy. For decades, surgical aortic valve replacement (AVR), under the use of extracorporeal circulation, has been the gold standard for treatment of severe aortic valve diseases. In Germany ~12,000 patients receive isolated aortic valve surgery per year. For some time, percutaneous balloon valvuloplasty has been used as a palliative therapeutic option for very few patients. Currently, alternatives for the established surgical procedures such as transcatheter aortic valve implantation (TAVI) have become available, but there are only limited data from randomized studies or low-volume registries concerning long-time outcome. In Germany, the implementation of this new technology into hospital care increased rapidly in the past few years. Therefore, the German Aortic Valve Registry (GARY) was founded in July 2010 including all available therapeutic options and providing data from a large quantity of patients.Methods The GARY is assembled as a complete survey for all invasive therapies in patients with relevant aortic valve diseases. It evaluates the new therapeutic options and compares them to surgical AVR. The model for data acquisition is based on three data sources: source I, the mandatory German database for external performance measurement; source II, a specific registry dataset; and source III, a follow-up data sheet (generated by phone interview). Various procedures will be compared concerning observed complications, mortality, and quality of life up to 5 years after the initial procedure. Furthermore, the registry will enable a compilation of evidence-based indication criteria and, in addition, also a comparison of all approved operative procedures, such as Ross or David procedures, and the use of different mechanical or biological aortic valve prostheses.Results Since the launch of data acquisition in July 2010, almost all institutions performing

  5. Next-generation registries: fusion of data for care, and research.

    Science.gov (United States)

    Mandl, Kenneth D; Edge, Stephen; Malone, Chad; Marsolo, Keith; Natter, Marc D

    2013-01-01

    Disease-based registries are a critical tool for electronic data capture of high-quality, gold standard data for clinical research as well as for population management in clinical care. Yet, a legacy of significant operational costs, resource requirements, and poor data liquidity have limited their use. Research registries have engendered more than $3 Billion in HHS investment over the past 17 years. Health delivery systems and Accountable Care Organizations are investing heavily in registries to track care quality and follow-up of patient panels. Despite the investment, regulatory and financial models have often enforced a "single purpose" limitation on each registry, restricting the use of data to a pre-defined set of protocols. The need for cost effective, multi-sourced, and widely shareable registry data sets has never been greater, and requires next-generation platforms to robustly support multi-center studies, comparative effectiveness research, post-marketing surveillance and disease management. This panel explores diverse registry efforts, both academic and commercial, that have been implemented in leading-edge clinical, research, and hybrid use cases. Panelists present their experience in these areas as well as lessons learned, challenges addressed, and near innovations and advances.

  6. Demographics of US pediatric contact dermatitis registry providers.

    Science.gov (United States)

    Goldenberg, Alina; Jacob, Sharon E

    2015-01-01

    Children are as likely as adults to be sensitized and reactive to contact allergens. However, the prevailing data on pediatric allergic contact dermatitis are quantitatively and qualitatively limited because of a narrow geographic localization of data-reporting providers. The aim of the study was to present the first quarter results from the Loma Linda Pediatric Contact Dermatitis Registry focused on registered providers who self-identified as providing care for pediatric allergic contact dermatitis (ACD) within the United States. The US providers were invited to join the registry via completion of an online, secure, 11-question registration survey addressing demographics and clinical practice essentials. The presented results reflect data gathered within the first quarter of registry recruitment; registration is ongoing. Of 169 responders from 48 states, the majority of providers were female (60.4%), academic (55.6%), and dermatologists (76.3%). Based on individual provider averages, the minimum cumulative number of pediatric patch-test evaluations performed each year ranged between 1372 and 3468 children. The Pediatric Contact Dermatitis Registry provides a description of the current leaders in the realm of pediatric ACD and gaps, which are in need of attention. The registry allows for a collaborative effort to exchange information, educate providers, and foster investigative research with the hope of legislation that can reduce the disease burden of ACD in US children.

  7. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  8. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  9. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  10. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  11. The Italian Registry of Antiphospholipid Antibodies.

    Science.gov (United States)

    Finazzi, G

    1997-01-01

    The clinical importance of antiphospholipid antibodies (APA) derives from their association with a syndrome of venous and arterial thrombosis, recurrent fetal loss and thrombocytopenia known as the antiphospholipid syndrome (APS). The Italian Registry of Antiphospholipid Antibodies was set up in 1989 for the purpose of collecting a large number of patients with lupus anticoagulant (LA) or anticardiolipin antibodies (ACA) for clinical studies in order to obtain more information on the clinical features of APS. The Italian Registry has completed two clinical studies and proposed an international trial on the treatment of APS patients. These activities of the Registry are reviewed herein. Additional information has been obtained from pertinent articles and abstracts published in journals covered by the Science Citation Index and Medline. The first study of the Registry was a retrospective analysis of enrolled patients which showed that: a) the prevalence of thrombosis and thrombocytopenia was similar in cases with idiopathic APA or APA secondary to systemic lupus erythematosus, and b) the rate of thrombosis was significantly reduced in patients with severe thrombocytopenia but not in those with only a mild reduction of the platelet count. The second study was a prospective survey of the natural history of the disease, showing that a) previous thrombosis and ACA titer > 40 units were independent predictors of subsequent vascular complications; b) a history of miscarriage or thrombosis is significantly associated with adverse pregnancy outcome; c) hematological malignancies can develop during follow-up and patients with APA should be considered at increased risk of developing NHL. Thus the possibility of a hematologic neoplastic disease should be borne in mind in the initial evaluation and during the follow-up of these patients. The latest initiative of the Registry was the proposal of an international, randomized clinical trial (WAPS study) aimed at assessing the

  12. 42 CFR 483.156 - Registry of nurse aides.

    Science.gov (United States)

    2010-10-01

    ... the registry because they have performed no nursing or nursing-related services for a period of 24... individual was found not guilty in a court of law, or the State is notified of the individual's death. (2) The registry must remove entries for individuals who have performed no nursing or nursing-related...

  13. CIRSE Vascular Closure Device Registry

    Science.gov (United States)

    Müller-Hülsbeck, Stefan; Libicher, Martin; Atar, Eli; Trentmann, Jens; Goffette, Pierre; Borggrefe, Jan; Zeleňák, Kamil; Hooijboer, Pieter; Belli, Anna-Maria

    2010-01-01

    Purpose Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. Methods The CIRSE registry of closure devices with an anchor and a plug started in January 2009 and ended in August 2009. A total of 1,107 patients were included in the registry. Results Deployment success was 97.2%. Deployment failure specified to access type was 8.8% [95% confidence interval (95% CI) 5.0–14.5] for antegrade access and 1.8% (95% CI 1.1–2.9) for retrograde access (P = 0.001). There was no difference in deployment failure related to local PVD at the access site. Calcification was a reason for deployment failure in only 5.9 cm, and two vessel occlusions. Conclusion The conclusion of this registry of closure devices with an anchor and a plug is that the use of this device in interventional radiology procedures is safe, with a low incidence of serious access site complications. There seems to be no difference in complications between antegrade and retrograde access and other parameters. PMID:20981425

  14. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  15. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  16. Primary healthcare-based diabetes registry in Puducherry: Design and methods

    Directory of Open Access Journals (Sweden)

    Subitha Lakshminarayanan

    2017-01-01

    Full Text Available Background: Diabetes registries monitor the population prevalence and incidence of diabetes, monitor diabetes control program, provide information of quality of care to health service providers, and provide a sampling frame for interventional studies. This study documents the process of establishing a prospective diabetes registry in a primary health-care setting in Puducherry. Methods: This is a facility-based prospective registry conducted in six randomly selected urban health centers in Puducherry, with enrollment of all known patients with diabetes attending chronic disease clinics. Administrative approvals were obtained from Government Health Services. Manuals for training of medical officers, health-care workers, and case report forms were developed. Diabetes registry was prepared using Epi Info software. Results: In the first phase, demographic characteristics, risk factors, complications, coexisting chronic conditions, lifestyle and medical management, and clinical outcomes were recorded. Around 2177 patients with diabetes have been registered in six Primary Health Centres out of a total of 2948 participants seeking care from chronic disease clinic. Registration coverage ranges from 61% to 105% in these centers. Conclusion: This study has documented methodological details, and learning experiences gained while developing a diabetes registry at the primary health care level and the scope for upscaling to a Management Information System for Diabetes and a State-wide Registry. Improvement in patient care through needs assessment and quality assurance in service delivery is an important theme envisioned by this registry.

  17. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  18. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  19. The Toxicology Investigators Consortium Case Registry--the 2014 Experience.

    Science.gov (United States)

    Rhyee, Sean H; Farrugia, Lynn; Campleman, Sharan L; Wax, Paul M; Brent, Jeffrey

    2015-12-01

    The Toxicology Investigators Consortium (ToxIC) Case Registry was established in 2010 by the American College of Medical Toxicology. The Registry includes all medical toxicology consultations performed at participating sites. The Registry was queried for all cases entered between January 1 and December 31, 2014. Specific data reviewed for analysis included demographics (age, gender, ethnicity), source of consultation, reasons for consultation, agents involved in toxicological exposures, signs, symptoms, clinical findings, fatalities, and treatment. In 2014, 9172 cases were entered in the Registry across 47 active member sites. Females accounted for 51.1 % of cases. The majority (65.1 %) of cases were adults between the ages of 19 and 65. Caucasians made up the largest identified ethnic group (48.9 %). Most Registry cases originated from the inpatient setting (93.5 %), with a large majority of these consultations coming from the emergency department or inpatient admission services. Intentional and unintentional pharmaceutical exposures continued to be the most frequent reasons for consultation, accounting for 61.7 % of cases. Among cases of intentional pharmaceutical exposure, 62.4 % were associated with a self-harm attempt. Non-pharmaceutical exposures accounted for 14.1 % of Registry cases. Similar to the past years, non-opioid analgesics, sedative-hypnotics, and opioids were the most commonly encountered agents. Clinical signs or symptoms were noted in 81.9 % of cases. There were 89 recorded fatalities (0.97 %). Medical treatment (e.g., antidotes, antivenom, chelators, supportive care) was rendered in 62.3 % of cases. Patient demographics and exposure characteristics in 2014 Registry cases remain similar to prior years. The majority of consultations arose in the acute care setting (emergency department or inpatient) and involved exposures to pharmaceutical products. Among exposures, non-opioid analgesics, sedative/hypnotics, and opioids were the most frequently

  20. An international registry for primary ciliary dyskinesia

    DEFF Research Database (Denmark)

    Werner, Claudius; Lablans, Martin; Ataian, Maximilian

    2016-01-01

    Primary ciliary dyskinesia (PCD) is a rare autosomal recessive disorder leading to chronic upper and lower airway disease. Fundamental data on epidemiology, clinical presentation, course and treatment strategies are lacking in PCD. We have established an international PCD registry to realise...... an unmet need for an international platform to systematically collect data on incidence, clinical presentation, treatment and disease course.The registry was launched in January 2014. We used internet technology to ensure easy online access using a web browser under www.pcdregistry.eu. Data from 201...... methods in addition to classical clinical symptoms. Preliminary analysis of lung function data demonstrated a mean annual decline of percentage predicted forced expiratory volume in 1 s of 0.59% (95% CI 0.98-0.22).Here, we present the development of an international PCD registry as a new promising tool...

  1. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  2. Czech Registry of Monoclonal Gammopathies - Technical Solution, Data Collection and Visualisation.

    Science.gov (United States)

    Brozova, L; Schwarz, D; Snabl, I; Kalina, J; Pavlickova, B; Komenda, M; Jarkovský, J; Němec, P; Horinek, D; Stefanikova, Z; Pour, L; Hájek, R; Maisnar, V

    2017-01-01

    The Registry of Monoclonal Gammopathies (RMG) was established by the Czech Myeloma Group in 2007. RMG is a registry designed for the collection of clinical data concerning diagnosis, treatment, treatment results and survival of patients with monoclonal gammopathies. Data on patients with monoclonal gammopathy of undetermined significance (MGUS), Waldenström macroglobulinaemia (WM), multiple myeloma (MM) or primary AL ("amyloid light-chain") amyloidosis are collected in the registry. Nineteen Czech centres and four Slovak centres currently contribute to the registry. The registry currently contains records on more than 5,000 patients with MM, almost 3,000 patients with MGUS, 170 patients with WM and 26 patients with primary AL amyloidosis, i.e. more than 8,000 records on patients with monoclonal gammopathies altogether. This paper describes technology employed for the collection, storage and subsequent online visualisation of data. The CLADE-IS platform is introduced as a new system for the collection and storage of data from the registry. The form structure and functions of the new system are described for all diagnoses in general; these functions facilitate data entry to the registry and minimise the error rate in data. Publicly available online visualisations of data on patients with MGUS, WM, MM or primary AL amyloidosis from all Czech or Slovak centres are introduced, together with authenticated visualisations of data on patients with MM from selected centres. The RMG represents a data basis that makes it possible to monitor the disease course in patients with monoclonal gammopathies on the population level.Key words: Registry of Monoclonal Gammopathies - RMG - registries - monoclonal gammopathies - CLADE-IS - data visualisation - database.

  3. Achieving Both Creativity And Rationale: Reuse In Design With Images And Claims

    Directory of Open Access Journals (Sweden)

    D. Scott McCrickard

    2011-01-01

    Full Text Available Although designers often try to create novel designs, many designs are based on previous work. In this paper we argue for the reuse of rationale, in the form of claims, as a central activity in design, and explore how this can be used to inspire creativity. We present a design activity in which images and claims are reused to create a storyboard and illustrate how creativity and rationale complement each other. Our work serves to demonstrate that an appropriate design activity can be used to leverage creativity with the use of rationale.

  4. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  5. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  6. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  7. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  8. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  9. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  10. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  11. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  12. Predictors for Stroke and Death in Non-Anticoagulated Asian Patients with Atrial Fibrillation: The Fushimi AF Registry.

    Science.gov (United States)

    Hamatani, Yasuhiro; Yamashita, Yugo; Esato, Masahiro; Chun, Yeong-Hwa; Tsuji, Hikari; Wada, Hiromichi; Hasegawa, Koji; Abe, Mitsuru; Lip, Gregory Y H; Akao, Masaharu

    2015-01-01

    Atrial fibrillation (AF) increases the risk of stroke and death. Data on the predictors for stroke and death in 'real-world' AF patients are limited, especially from large prospective Asian cohorts. The Fushimi AF Registry is a community-based prospective survey designed to enroll all AF patients who visited the participating medical institutions in Fushimi-ku, Kyoto, Japan. Follow-up data were available for 3,304 patients (median follow-up period 741 days). We explored the predictors for 'death, stroke, and systemic embolism (SE)' during follow-up in 1,541 patients not receiving oral anticoagulants (OAC) at baseline. The mean age was 73.1 ± 12.5 years, and 673 (44%) patients were female. The mean CHADS2 and CHA2DS2-VASc scores were 1.76 and 3.08, respectively. Cumulative events were as follows: stroke/SE in 61 (4%) and death in 230 (15%), respectively. On multivariate analysis, advanced age (hazard ratio (HR): 1.68, 95% confidence interval (CI): 1.24-2.29), underweight (body mass index death/stroke/SE. Cumulative numbers of these 6 risk predictors could stratify the incidence of death/stroke/SE in patients without OAC, as well as those with OAC in our registry. Advanced age, underweight, previous stroke/SE/transient ischemic attack, heart failure, chronic kidney disease, and anemia were independently associated with the risk of death/stroke/SE in non-anticoagulated Japanese AF patients.

  13. Nordic Cancer Registries - an overview of their procedures and data comparability.

    Science.gov (United States)

    Pukkala, Eero; Engholm, Gerda; Højsgaard Schmidt, Lise Kristine; Storm, Hans; Khan, Staffan; Lambe, Mats; Pettersson, David; Ólafsdóttir, Elínborg; Tryggvadóttir, Laufey; Hakanen, Tiina; Malila, Nea; Virtanen, Anni; Johannesen, Tom Børge; Larønningen, Siri; Ursin, Giske

    2018-04-01

    The Nordic Cancer Registries are among the oldest population-based registries in the world, with more than 60 years of complete coverage of what is now a combined population of 26 million. However, despite being the source of a substantial number of studies, there is no published paper comparing the different registries. Therefore, we did a systematic review to identify similarities and dissimilarities of the Nordic Cancer Registries, which could possibly explain some of the differences in cancer incidence rates across these countries. We describe and compare here the core characteristics of each of the Nordic Cancer Registries: (i) data sources; (ii) registered disease entities and deviations from IARC multiple cancer coding rules; (iii) variables and related coding systems. Major changes over time are described and discussed. All Nordic Cancer Registries represent a high quality standard in terms of completeness and accuracy of the registered data. Even though the information in the Nordic Cancer Registries in general can be considered more similar than any other collection of data from five different countries, there are numerous differences in registration routines, classification systems and inclusion of some tumors. These differences are important to be aware of when comparing time trends in the Nordic countries.

  14. Utility of an Australasian registry for children undergoing radiation treatment

    International Nuclear Information System (INIS)

    Ahern, Verity

    2014-01-01

    The aim of this study was to evaluate the utility of an Australasian registry ('the Registry') for children undergoing radiation treatment (RT). Children under the age of 16years who received a course of radiation between January 1997 and December 2010 and were enrolled on the Registry form the subjects of this study. A total of 2232 courses of RT were delivered, predominantly with radical intent (87%). Registrations fluctuated over time, but around one-half of children diagnosed with cancer undergo a course of RT. The most prevalent age range at time of RT was 10–15years, and the most common diagnoses were central nervous system tumours (34%) and acute lymphoblastic leukaemia (20%). The Registry provides a reflection of the patterns of care of children undergoing RT in Australia and a mechanism for determining the resources necessary to manage children by RT (human, facilities and emerging technologies, such as proton therapy). It lacks the detail to provide information on radiotherapy quality and disease outcomes which should be the subject of separate audit studies. The utility of the Registry has been hampered by its voluntary nature and varying needs for consent. Completion of registry forms is a logical requirement for inclusion in the definition of a subspecialist in paediatric radiation oncology.

  15. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  17. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  18. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  19. The Toxicology Investigators Consortium Case Registry-the 2015 Experience.

    Science.gov (United States)

    Farrugia, Lynn A; Rhyee, Sean H; Campleman, Sharan L; Ruha, Anne-Michelle; Weigand, Timothy; Wax, Paul M; Brent, Jeffrey

    2016-09-01

    The American College of Medical Toxicology established the Toxicology Investigators Consortium (ToxIC) Case Registry in 2010. The Registry contains all medical toxicology consultations performed at participating sites. The Registry has continued to grow since its inception, and as of December 31, 2015, contains 43,099 cases. This is the sixth annual report of the ToxIC Registry, summarizing the additional 8115 cases entered in 2015. Cases were identified by a query of the Registry for all cases entered between January 1 and December 31, 2015. Specific data reviewed for analysis included demographics (age, race, gender), source of consultation, reason for consultation, agents and agent classes involved in exposures, signs, symptoms, clinical findings, fatalities, and treatment. By the end of 2015, there were 50 active sites, consisting of 101 separate health-care facilities; 51.2 % of cases involved females. Adults between the ages of 19 and 65 made up the majority (64.2 %) of Registry cases. Caucasian race was the most commonly reported (55.6 %); 9.6 % of cases were identified as Hispanic ethnicity. Inpatient and emergency department referrals were by far the most common referral sources (92.9 %). Intentional pharmaceutical exposures remained the most frequent reason for consultation, making up 52.3 % of cases. Of these intentional pharmaceutical exposures, 69 % represented an attempt at self-harm, and 85.6 % of these were a suicide attempt. Nonopioid analgesics, sedative-hypnotics, and antidepressant agents were the most commonly reported agent classes in 2015. Almost one-third of Registry cases involved a diagnosed toxidrome (32.8 %), with a sedative-hypnotic toxidrome being the most frequently described. Significant vital sign abnormalities were recorded in 25.3 % of cases. There were 98 fatalities reported in the Registry (1.2 %). Adverse drug reactions were reported in 4.3 % of cases. Toxicological treatment was given in 65.3 % of cases, with 33.0

  20. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  1. The Mataró Stroke Registry: a 10-year registry in a community hospital.

    Science.gov (United States)

    Palomeras Soler, E; Fossas Felip, P; Casado Ruiz, V; Cano Orgaz, A; Sanz Cartagena, P; Muriana Batiste, D

    2015-06-01

    A prospective stroke registry leads to improved knowledge of the disease. We present data on the Mataró Hospital Registry. In February-2002 a prospective stroke registry was initiated in our hospital. It includes sociodemographic data, previous diseases, clinical, topographic, etiological and prognostic data. We have analyzed the results of the first 10 years. A total of 2,165 patients have been included, 54.1% male, mean age 73 years. The most frequent vascular risk factor was hypertension (65.4%). Median NIHSS on admission: 3 (interquartile range, 1-8). Stroke subtype: 79.7% ischemic strokes, 10.9% hemorrhagic, and 9.4% TIA. Among ischemic strokes, the etiology was cardioembolic in 26.5%, large-vessel disease in 23.7%, and small-vessel in 22.9%. The most frequent topography of hemorrhages was lobar (47.4%), and 54.8% were attributed to hypertension. The median hospital stay was 8 days. At discharge, 60.7% of patients were able to return directly to their own home, and 52.7% were independent for their daily life activities. After 3 months these percentages were 76.9% and 62.9%, respectively. Hospital mortality was 6.5%, and after 3 months 10.9%. Our patient's profile is similar to those of other series, although the severity of strokes was slightly lower. Length of hospital stay, short-term and medium term disability, and mortality rates are good, if we compare them with other series. Copyright © 2013 Sociedad Española de Neurología. Published by Elsevier España, S.L.U. All rights reserved.

  2. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  3. Real-world heart failure management in 10,910 patients with chronic heart failure in the Netherlands : Design and rationale of the Chronic Heart failure ESC guideline-based Cardiology practice Quality project (CHECK-HF) registry.

    Science.gov (United States)

    Brugts, J J; Linssen, G C M; Hoes, A W; Brunner-La Rocca, H P

    2018-05-01

    Data from patient registries give insight into the management of patients with heart failure (HF), but actual data from unselected real-world HF patients are scarce. Therefore, we performed a cross sectional study of current HF care in the period 2013-2016 among more than 10,000 unselected HF patients at HF outpatient clinics in the Netherlands. In 34 participating centres, all 10,910 patients with chronic HF treated at cardiology centres were included in the CHECK-HF registry. Of these, most (96%) were managed at a specific HF outpatient clinic. Heart failure was typically diagnosed according to the ESC guidelines 2012, based on signs, symptoms and structural and/or functional cardiac abnormalities. Information on diagnostics, treatment and co-morbidities were recorded, with specific focus on drug therapy and devices. In our cohort, the mean age was 73 years (SD 12) and 60% were male. Frequent co-morbidities reported in the patient records were diabetes mellitus 30%, hypertension 43%, COPD 19%, and renal insufficiency 58%. In 47% of the patients, ischaemia was the origin of HF. In our registry, the prevalence of HF with preserved ejection fraction was 21%. The CHECK-HF registry will provide insight into the current, real world management of patient with chronic HF, including HF with reduced ejection fraction, preserved ejection fraction and mid-range ejection fraction, that will help define ways to improve quality of care. Drug and device therapy and guideline adherence as well as interactions with age, gender and co-morbidities will receive specific attention.

  4. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  5. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  6. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  7. Patient-reported outcome measures in arthroplasty registries

    DEFF Research Database (Denmark)

    Rolfson, Ola; Eresian Chenok, Kate; Bohm, Eric

    2016-01-01

    survey (SF-12) or the similar Veterans RAND 12-item health survey (VR-12). The most common specific PROMs were the Hip disability and Osteoarthritis Outcome Score (HOOS), the Knee injury and Osteoarthritis Outcome Score (KOOS), the Oxford Hip Score (OHS), the Oxford Knee Score (OKS), the Western Ontario...... of PROMs for hip and knee arthroplasty in registries worldwide. The 2 main types of PROMs include generic (general health) PROMs, which provide a measure of general health for any health state, and specific PROMs, which focus on specific symptoms, diseases, organs, body regions, or body functions...... all elective hip or knee arthroplasty patients and 6 registries collected PROMs for sample populations; 1 other registry had planned but had not started collection of PROMs. The most common generic instruments used were the EuroQol 5 dimension health outcome survey (EQ-5D) and the Short Form 12 health...

  8. Danish Hip Arthroscopy Registry

    DEFF Research Database (Denmark)

    Mygind-Klavsen, Bjarne; Lund, Bent; Nielsen, Torsten Grønbech

    2018-01-01

    PURPOSE: Predictors of outcome after femoroacetabular impingement (FAI) surgery are not well-documented. This study presents data from the Danish Hip Arthroscopy Registry (DHAR) for such analyses. The purpose of this study was to identify predictors of poor outcome after FAI surgery in a Danish FAI...

  9. The Danish Twin Registry

    DEFF Research Database (Denmark)

    Skytthe, Axel; Ohm Kyvik, Kirsten; Vilstrup Holm, Niels

    2011-01-01

    Introduction: The Danish Twin Registry is a unique source for studies of genetic, familial and environmental factors on life events, health conditions and diseases. Content: More than 85,000 twin pairs born 1870-2008 in Denmark. Validity and coverage: Four main ascertainment methods have been emp...

  10. Presenting an Evaluation Model for the Cancer Registry Software.

    Science.gov (United States)

    Moghaddasi, Hamid; Asadi, Farkhondeh; Rabiei, Reza; Rahimi, Farough; Shahbodaghi, Reihaneh

    2017-12-01

    As cancer is increasingly growing, cancer registry is of great importance as the main core of cancer control programs, and many different software has been designed for this purpose. Therefore, establishing a comprehensive evaluation model is essential to evaluate and compare a wide range of such software. In this study, the criteria of the cancer registry software have been determined by studying the documents and two functional software of this field. The evaluation tool was a checklist and in order to validate the model, this checklist was presented to experts in the form of a questionnaire. To analyze the results of validation, an agreed coefficient of %75 was determined in order to apply changes. Finally, when the model was approved, the final version of the evaluation model for the cancer registry software was presented. The evaluation model of this study contains tool and method of evaluation. The evaluation tool is a checklist including the general and specific criteria of the cancer registry software along with their sub-criteria. The evaluation method of this study was chosen as a criteria-based evaluation method based on the findings. The model of this study encompasses various dimensions of cancer registry software and a proper method for evaluating it. The strong point of this evaluation model is the separation between general criteria and the specific ones, while trying to fulfill the comprehensiveness of the criteria. Since this model has been validated, it can be used as a standard to evaluate the cancer registry software.

  11. Safety and efficacy of intensive vs. guideline antiplatelet therapy in high-risk patients with recent ischemic stroke or transient ischemic attack

    DEFF Research Database (Denmark)

    Christensen, Hanne Krarup

    2015-01-01

    RATIONALE: The risk of recurrence following a stroke or transient ischemic attack is high, especially immediately after the event. HYPOTHESIS: Because two antiplatelet agents are superior to one in patients with non-cardioembolic events, more intensive treatment might be even more effective. SAMPLE...... SIZE ESTIMATES: The sample size of 4100 patients will allow a shift to less recurrence, and less severe recurrence, to be detected (odds ratio 0·68) with 90% power at 5% significance. METHODS AND DESIGN: Triple Antiplatelets for Reducing Dependency after Ischaemic Stroke (ISRCTN47823388) is comparing...... the safety and efficacy of intensive (combined aspirin, clopidogrel, and dipyridamole) vs. guideline antiplatelet therapy, both given for one-month. This international collaborative parallel-group prospective randomized open-label blinded-end-point phase III trial plans to recruit 4100 patients with acute...

  12. The long term effects of early analysis of a trauma registry

    Directory of Open Access Journals (Sweden)

    Ashour Mazen

    2009-01-01

    Full Text Available Abstract Background We established a trauma registry in 2003 to collect data on trauma patients, which is a major cause of death in the United Arab Emirates (UAE. The aim of this paper is to report on the long term effects of our early analysis of this registry. Methods Data in the early stages of this trauma registry were collected for 503 patients during a period of 6 months in 2003. Data was collected on a paper form and then entered into the trauma registry using a self-developed Access database. Descriptive analysis was performed. Results Most were males (87%, the mean age (SD was 30.5 (14.9. UAE citizens formed 18.5%. Road traffic collisions caused an overwhelming 34.2% of injuries with 29.7% of those involving UAE citizens while work-related injuries were 26.2%. The early analysis of this registry had two major impacts. Firstly, the alarmingly high rate of UAE nationals in road traffic collisions standardized to the population led to major concerns and to the development of a specialized road traffic collision registry three years later. Second, the equally alarming high rate of work-related injuries led to collaboration with a Preventive Medicine team who helped with refining data elements of the trauma registry to include data important for research in trauma prevention. Conclusion Analysis of a trauma registry as early as six months can lead to useful information which has long term effects on the progress of trauma research and prevention.

  13. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  14. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  15. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  16. Ethical aspects of registry-based research in the Nordic countries

    Directory of Open Access Journals (Sweden)

    Ludvigsson JF

    2015-11-01

    Full Text Available Jonas F Ludvigsson,1,2 Siri E Håberg,3 Gun Peggy Knudsen,3 Pierre Lafolie,4,5 Helga Zoega,6 Catharina Sarkkola,7 Stephanie von Kraemer,7 Elisabete Weiderpass,1,7–10 Mette Nørgaard11 1Department of Medical Epidemiology and Biostatistics, Karolinska Institutet, Stockholm, 2Department of Pediatrics, Örebro University Hospital, Örebro, Sweden; 3Norwegian Institute of Public Health, Oslo, Norway; 4Department of Medicine, Clinical Pharmacology Unit, 5The Stockholm Regional Ethical Review Board, Karolinska Institutet, Stockholm, Sweden; 6Center of Public Health Sciences, Faculty of Medicine, University of Iceland, Reykjavík, Iceland; 7Genetic Epidemiology Group, Folkhälsan Research Center, Helsinki, Finland; 8Department of Community Medicine, Faculty of Health Sciences, University of Tromsø, 9The Arctic University of Norway, Tromsø, 10Department of Research, Cancer Registry of Norway, Oslo, Norway; 11Department of Clinical Epidemiology, Aarhus University Hospital, Aarhus, Denmark Abstract: National health care registries in the Nordic countries share many attributes, but different legal and ethical frameworks represent a challenge to promoting effective joint research. Internationally, there is a lack of knowledge about how ethical matters are considered in Nordic registry-based research, and a lack of knowledge about how Nordic ethics committees operate and what is needed to obtain an approval. In this paper, we review ethical aspects of registry-based research, the legal framework, the role of ethics review boards in the Nordic countries, and the structure of the ethics application. We discuss the role of informed consent in registry-based research and how to safeguard the integrity of study participants, including vulnerable subjects and children. Our review also provides information on the different government agencies that contribute registry-based data, and a list of the major health registries in Denmark, Finland, Iceland, Norway, and

  17. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  18. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  19. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  20. The Danish Multiple Sclerosis Registry. History, data collection and validity

    DEFF Research Database (Denmark)

    Koch-Henriksen, N; Rasmussen, S; Stenager, E

    2001-01-01

    The Danish Multiple Sclerosis Registry was formally established in 1956 but started operating in 1949 with a nationwide prevalence survey. Since then, the Registry has continued collecting data on new and old cases of multiple sclerosis (MS) or suspected MS from multiple sources. The Registry...... instrument for monitoring incidence and prevalence, analysing survival, performing genetic analysis, providing unselected patient samples for clinical analyses, performing case-control studies and prospective studies and estimating the need for treatment and care....

  1. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  2. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  3. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  4. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  5. BioSWR--semantic web services registry for bioinformatics.

    Directory of Open Access Journals (Sweden)

    Dmitry Repchevsky

    Full Text Available Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL. Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL. BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  6. BioSWR--semantic web services registry for bioinformatics.

    Science.gov (United States)

    Repchevsky, Dmitry; Gelpi, Josep Ll

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license.

  7. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  8. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  9. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  10. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  11. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  12. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  13. Data quality in the Danish National Acute Leukemia Registry

    DEFF Research Database (Denmark)

    Ostgård, Lene Sofie Granfeldt; Nørgaard, Jan Maxwell; Severinsen, Marianne Tang

    2013-01-01

    The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data.......The Danish National Acute Leukemia Registry (DNLR) has documented coverage of above 98.5%. Less is known about the quality of the recorded data....

  14. Cardiac arrest risk standardization using administrative data compared to registry data.

    Directory of Open Access Journals (Sweden)

    Anne V Grossestreuer

    Full Text Available Methods for comparing hospitals regarding cardiac arrest (CA outcomes, vital for improving resuscitation performance, rely on data collected by cardiac arrest registries. However, most CA patients are treated at hospitals that do not participate in such registries. This study aimed to determine whether CA risk standardization modeling based on administrative data could perform as well as that based on registry data.Two risk standardization logistic regression models were developed using 2453 patients treated from 2000-2015 at three hospitals in an academic health system. Registry and administrative data were accessed for all patients. The outcome was death at hospital discharge. The registry model was considered the "gold standard" with which to compare the administrative model, using metrics including comparing areas under the curve, calibration curves, and Bland-Altman plots. The administrative risk standardization model had a c-statistic of 0.891 (95% CI: 0.876-0.905 compared to a registry c-statistic of 0.907 (95% CI: 0.895-0.919. When limited to only non-modifiable factors, the administrative model had a c-statistic of 0.818 (95% CI: 0.799-0.838 compared to a registry c-statistic of 0.810 (95% CI: 0.788-0.831. All models were well-calibrated. There was no significant difference between c-statistics of the models, providing evidence that valid risk standardization can be performed using administrative data.Risk standardization using administrative data performs comparably to standardization using registry data. This methodology represents a new tool that can enable opportunities to compare hospital performance in specific hospital systems or across the entire US in terms of survival after CA.

  15. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  16. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  17. Quality Registries in Sweden, Healthcare Improvements and Elderly Persons with Cognitive Impairments.

    Science.gov (United States)

    Mattsson, Titti

    2016-12-01

    Policy-makers, the medical industry and researchers are demonstrating a keen interest in the potential of large registries of patient data, both nationally and internationally. The registries offer promising ways to measure and develop operational quality within health and medical care services. As a result of certain favourable patient data regulations and government funding, the development of quality registries is advanced in Sweden. The combination of increasing demand for more cost-efficient healthcare that can accommodate the demographic development of a rapidly ageing population, and the emergence of eHealth with an increasing digitalisation of patient data, calls attention to quality registries as a possible way for healthcare improvements. However, even if the use of registries has many advantages, there are some drawbacks from a patient privacy point of view. This article aims to analyse this growing interdependence of quality registries for the healthcare sector. It discusses some lessons from the Swedish case, with particular focus on the collection of data from elderly persons with cognitive impairments.

  18. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  1. Marrow donor registry and cord blood bank in Taiwan.

    Science.gov (United States)

    Lee, Tsung Dao

    2002-08-01

    Unrelated Bone marrow transplant was initiated thirty years ago. Though there are over millions of donors registered with the bone marrow registries worldwide, Asian patients rarely find a match with all these donors. Tzu Chi Marrow Donor Registry was established to meet this need. It has become the largest Asian marrow donor registry in the world. With the introduction of high technology to test the HLA of the donors and recipients, the success rate of bone marrow transplant is greatly improved among Asian countries. 50% of blood disease Asian patients who cannot find a bone marrow matched donor will be complemented by the establishment of cord blood banks in Taiwan.

  2. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  3. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  4. Constructing a Local Potential Participant Registry to Improve Alzheimer's Disease Clinical Research Recruitment.

    Science.gov (United States)

    Grill, Joshua D; Hoang, Dan; Gillen, Daniel L; Cox, Chelsea G; Gombosev, Adrijana; Klein, Kirsten; O'Leary, Steve; Witbracht, Megan; Pierce, Aimee

    2018-01-01

    Potential participant registries are tools to address the challenge of slow recruitment to clinical research. In particular, registries may aid recruitment to secondary prevention clinical trials for Alzheimer's disease (AD), which enroll cognitively normal older individuals meeting specific genetic or biomarker criteria. Evidence of registry effectiveness is sparse, as is guidance on optimal designs or methods of conduct. We report our experiences of developing a novel local potential participant registry that implemented online enrollment and data collection. In the first year of operation, 957 individuals submitted email addresses to the registry, of whom 592 self-reported demographic, family history, and medical data. In addition, registrants provided information related to their interest and willingness to be contacted about studies. Local earned media and community education were the most effective methods of recruitment into the registry. Seventy-six (26%) of 298 registrants contacted about studies in the first year enrolled in those studies. One hundred twenty-nine registrants were invited to enroll in a preclinical AD trial, of whom 25 (18%) screened and 6 were randomized. These results indicate that registries can aid recruitment and provide needed guidance for investigators initiating new local registries.

  5. Cancer incidence in Morocco: report from Casablanca registry 2005 ...

    African Journals Online (AJOL)

    Introduction: Few population-based cancer registries are in place in developing countries. In order to know the burden of cancer in Moroccan population, cancer registry initiative was put in place in the Casablanca district, the biggest city of Morocco. Methods: The data collected covers 3.6 millions inhabitant and included ...

  6. Ethical implications of co-benefits rationale within climate change mitigation strategy

    Directory of Open Access Journals (Sweden)

    Rita Vasconcellos Oliveira

    2016-10-01

    Full Text Available Climate change mitigation effort is being translated into several actions and discourses that make collateral benefits and their rationale increasingly relevant for sustainability, in such a way that they are now a constant part of the political agenda. Taking a border and consensual perspective, co-benefits are considered here to be emerging advantages of the implementation of measures regarding the lowering of greenhouse gases.Departing from the analysis of policy documents referring to two European urban transportation strategies, the emergent co-benefits are problematized and discussed to better understand their moral aspect. Further ethical reflection is conducted after an analysis of some unintended consequences of co-benefits rationale coming from the mentioned examples. The focus is primarily on the challenges of an integrative moral justification for co-benefits and also for their role in the climate change mitigation effort. We also discuss the limitations of the current normative models that frame co-benefits rationale, from a moral viewpoint and in relation to the overall climate change mitigation strategy.In this article, we propose the concepts of well-being and freedom, as portrayed by Capabilities Approach, as possible guiding notions for the moral and social evaluation of goodness of these emergent benefits and their rationale too. Additionally, some preliminary conclusions are drawn regarding the potential of the presented concepts to favour the climate change mitigation action. Finally, a scenario is drawn where Capabilities Approach is the moral guideline for co-benefits rationale showing this way its potential in terms of enhancing climate change mitigation strategy.

  7. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  8. Construction and management of ARDS/sepsis registry with REDCap.

    Science.gov (United States)

    Pang, Xiaoqing; Kozlowski, Natascha; Wu, Sulong; Jiang, Mei; Huang, Yongbo; Mao, Pu; Liu, Xiaoqing; He, Weiqun; Huang, Chaoyi; Li, Yimin; Zhang, Haibo

    2014-09-01

    The study aimed to construct and manage an acute respiratory distress syndrome (ARDS)/sepsis registry that can be used for data warehousing and clinical research. The workflow methodology and software solution of research electronic data capture (REDCap) was used to construct the ARDS/sepsis registry. Clinical data from ARDS and sepsis patients registered to the intensive care unit (ICU) of our hospital formed the registry. These data were converted to the electronic case report form (eCRF) format used in REDCap by trained medical staff. Data validation, quality control, and database management were conducted to ensure data integrity. The clinical data of 67 patients registered to the ICU between June 2013 and December 2013 were analyzed. Of the 67 patients, 45 (67.2%) were classified as sepsis, 14 (20.9%) as ARDS, and eight (11.9%) as sepsis-associated ARDS. The patients' information, comprising demographic characteristics, medical history, clinical interventions, daily assessment, clinical outcome, and follow-up data, was properly managed and safely stored in the ARDS/sepsis registry. Data efficiency was guaranteed by performing data collection and data entry twice weekly and every two weeks, respectively. The ARDS/sepsis database that we constructed and manage with REDCap in the ICU can provide a solid foundation for translational research on the clinical data of interest, and a model for development of other medical registries in the future.

  9. The rationale for energy efficiency policy: Assessing the recognition of the multiple benefits of energy efficiency retrofit policy

    International Nuclear Information System (INIS)

    Kerr, Niall; Gouldson, Andy; Barrett, John

    2017-01-01

    The rationale for energy efficiency policy can be framed in terms of a variety of different benefits. This paper considers how different benefits have been used within the overall rationale for energy efficient retrofit policy in different contexts. We posit that different rationales may be used for the same policy response, and that the form of rationale used may affect the design, delivery or the level of policy support, with different rationales making it easier to account for different results. Considering retrofit policy in the contexts of the UK, Germany, New Zealand and Ireland, we characterise policy rationale in each case, assessing what the key perceived benefits have been, and whether they have changed over time. The analysis identifies some marked differences between cases with the recognition of benefits and the ensuing policy rationale resulting from a complex mix of political, social and economic influences. We find that recognition of multiple benefits may not equate with multiplied policy support, and instead it is more likely that different rationales will have relevance at different times, for different audiences. The findings highlight that, alongside evidence for policy, it is important to also consider how the overall rationale for policy is eventually framed. - Highlights: • Energy efficiency as a policy issue with perceived multiple benefits. • Assessment of the influence of different benefits on rationale for energy efficient retrofit policy. • How does the rationale for retrofit policy differ in different national policy contexts. • To what extent are the perceived multiple benefits of policy recognised. • What influence does eventual rationale for policy have on the policy implemented.

  10. Using design rationale to improve SPL traceability

    NARCIS (Netherlands)

    Galvao, I.; Aksit, Mehmet; van den Broek, P.M.; Hendriks, M.F.H.; Rashid, Awais; Royer, Jean-Claude; Rummler, Andreas

    In order to improve SPL traceability by using design rationale, this chapter introduces the traceability analysis framework (TAF), which, when combined with the AMPLE Traceability Framework, provides extra traceability capabilities for variability management. The TAF is a programmable and extensible

  11. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  12. Childhood vesicoureteral reflux studies: registries and repositories sources and nosology.

    Science.gov (United States)

    Chesney, Russell W; Patters, Andrea B

    2013-12-01

    Despite several recent studies, the advisability of antimicrobial prophylaxis and certain imaging studies for urinary tract infections (UTIs) remains controversial. The role of vesicoureteral reflux (VUR) on the severity and re-infection rates for UTIs is also difficult to assess. Registries and repositories of data and biomaterials from clinical studies in children with VUR are valuable. Disease registries are collections of secondary data related to patients with a specific diagnosis, condition or procedure. Registries differ from indices in that they contain more extensive data. A research repository is an entity that receives, stores, processes and/or disseminates specimens (or other materials) as needed. It encompasses the physical location as well as the full range of activities associated with its operation. It may also be referred to as a biorepository. This report provides information about some current registries and repositories that include data and samples from children with VUR. It also describes the heterogeneous nature of the subjects, as some registries and repositories include only data or samples from patients with primary reflux while others also include those from patients with syndromic or secondary reflux. Copyright © 2012 Journal of Pediatric Urology Company. All rights reserved.

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  14. Common variables in European pancreatic cancer registries

    DEFF Research Database (Denmark)

    De Leede, E. M.; Sibinga Mulder, B. G.; Bastiaannet, E.

    2016-01-01

    Background Quality assurance of cancer care is of utmost importance to detect and avoid under and over treatment. Most cancer data are collected by different procedures in different countries, and are poorly comparable at an international level. EURECCA, acronym for European Registration of Cancer...... registries, as well as specific pancreatic cancer audits/registries, were invited to participate in EURECCA Pancreas. Participating countries were requested to share an overview of their collected data items. Of the received datasets, a shared items list was made which creates insight in similarities between...

  15. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  16. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  17. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  18. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  19. The Danish Lung Cancer Registry

    DEFF Research Database (Denmark)

    Jakobsen, Erik; Rasmussen, Torben Riis

    2016-01-01

    AIM OF DATABASE: The Danish Lung Cancer Registry (DLCR) was established by the Danish Lung Cancer Group. The primary and first goal of the DLCR was to improve survival and the overall clinical management of Danish lung cancer patients. STUDY POPULATION: All Danish primary lung cancer patients since...... 2000 are included into the registry and the database today contains information on more than 50,000 cases of lung cancer. MAIN VARIABLES: The database contains information on patient characteristics such as age, sex, diagnostic procedures, histology, tumor stage, lung function, performance...... the results are commented for local, regional, and national audits. Indicator results are supported by descriptive reports with details on diagnostics and treatment. CONCLUSION: DLCR has since its creation been used to improve the quality of treatment of lung cancer in Denmark and it is increasingly used...

  20. Tumor registry data, Hiroshima and Nagasaki 1957-1959: malignant neoplasms

    Energy Technology Data Exchange (ETDEWEB)

    Harada, Tomin; Ide, Masao; Ishida, Morihiro; Troup, G M

    1963-10-03

    The report concerns three aspects of the Hiroshima and Nagasaki Tumor Registry data, 1957-1959: comparability, reliability and validity of incidence rates of malignant neoplasms obtained from the Tumor Registries and various statistical problems of registered data related to the Life Span Study sample and Adult Health Study sample; incidence rates of main site of malignant neoplasms obtained from the Tumor Registries are compared with those of the United States and Denmark; and incidence of malignant neoplasm among Hiroshima and Nagasaki A-bomb survivors. 15 references, 7 figures, 30 tables.

  1. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  2. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  3. Pilot for the Australian Breast Device Registry (ABDR): a national opt-out clinical quality registry for breast device surgery.

    Science.gov (United States)

    Hopper, Ingrid; Best, Renee L; McNeil, John J; Mulvany, Catherine M; Moore, Colin C M; Elder, Elisabeth; Pase, Marie; Cooter, Rodney D; Evans, Sue M

    2017-12-28

    To establish a pilot clinical quality registry (CQR) to monitor the quality of care and device performance for breast device surgery in Australia. All patients having breast device surgery from contributing hospitals in Australia. A literature review was performed which identified quality indicators for breast device surgery. A pilot CQR was established in 2011 to capture prospective data on breast device surgery. An interim Steering Committee and Management Committee were established to provide clinical governance, and guide quality indicator selection. The registry's minimum dataset was formulated in consultation with stakeholder groups; potential quality indicators were assessed in terms of (1) importance and relevance, (2) usability, (3) feasibility to collect and (4) scientific validity. Data collection was by a two-sided paper-based form with manual data entry. Seven sites were recruited, including one public hospital, four private hospitals and two day surgeries. Patients were recruited and opt-out consent used. The pilot breast device registry provides high-quality population-based data. It provides a model for developing a national CQR for breast devices; its minimum dataset and quality indicators reflect the opinions of the broad range of stakeholders. It is easily scalable, and has formed the basis for other international surgical groups establishing similar registries. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  5. Protecting buildings from a biological or chemical attack: Actions to take before or during a release

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Sohn, Michael D.; Gadgil, Ashok J.; Delp, William W.; Lorenzetti, David M.; Finlayson, Elizabeth U.; Thatcher, Tracy L.; Sextro, Richard G.; Derby, Elisabeth A.; Jarvis, Sondra A.

    2003-01-29

    This report presents advice on how to operate a building to reduce casualties from a biological or chemical attack, as well as potential changes to the building (e.g. the design of the ventilation system) that could make it more secure. It also documents the assumptions and reasoning behind the advice. The particular circumstances of any attack, such as the ventilation system design, building occupancy, agent type, source strength and location, and so on, may differ from the assumptions made here, in which case actions other than our recommendations may be required; we hope that by understanding the rationale behind the advice, building operators can modify it as required for their circumstances. The advice was prepared by members of the Airflow and Pollutant Transport Group, which is part of the Indoor Environment Department at the Lawrence Berkeley National Laboratory. The group's expertise in this area includes: tracer-gas measurements of airflows in buildings (Sextro, Thatcher); design and operation of commercial building ventilation systems (Delp); modeling and analysis of airflow and tracer gas transport in large indoor spaces (Finlayson, Gadgil, Price); modeling of gas releases in multi-zone buildings (Sohn, Lorenzetti, Finlayson, Sextro); and occupational health and safety experience related to building design and operation (Sextro, Delp). This report is concerned only with building design and operation; it is not a how-to manual for emergency response. Many important emergency response topics are not covered here, including crowd control, medical treatment, evidence gathering, decontamination methods, and rescue gear.

  6. The Ped-APS Registry: the antiphospholipid syndrome in childhood.

    Science.gov (United States)

    Avcin, T; Cimaz, R; Rozman, B

    2009-09-01

    In recent years, antiphospholipid syndrome (APS) has been increasingly recognised in various paediatric autoimmune and nonautoimmune diseases, but the relatively low prevalence and heterogeneity of APS in childhood made it very difficult to study in a systematic way. The project of an international registry of paediatric patients with APS (the Ped-APS Registry) was initiated in 2004 to foster and conduct multicentre, controlled studies with large number of paediatric APS patients. The Ped-APS Registry is organised as a collaborative project of the European Forum on Antiphospholipid Antibodies and Juvenile Systemic Lupus Erythematosus Working Group of the Paediatric Rheumatology European Society. Currently, it documents a standardised clinical, laboratory and therapeutic data of 133 children with antiphospholipid antibodies (aPL)-related thrombosis from 14 countries. The priority projects for future research of the Ped-APS Registry include prospective enrollment of new patients with aPL-related thrombosis, assessment of differences between the paediatric and adult APS, evaluation of proinflammatory genotype as a risk factor for APS manifestations in childhood and evaluation of patients with isolated nonthrombotic aPL-related manifestations.

  7. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  8. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  9. BioShaDock: a community driven bioinformatics shared Docker-based tools registry.

    Science.gov (United States)

    Moreews, François; Sallou, Olivier; Ménager, Hervé; Le Bras, Yvan; Monjeaud, Cyril; Blanchet, Christophe; Collin, Olivier

    2015-01-01

    Linux container technologies, as represented by Docker, provide an alternative to complex and time-consuming installation processes needed for scientific software. The ease of deployment and the process isolation they enable, as well as the reproducibility they permit across environments and versions, are among the qualities that make them interesting candidates for the construction of bioinformatic infrastructures, at any scale from single workstations to high throughput computing architectures. The Docker Hub is a public registry which can be used to distribute bioinformatic software as Docker images. However, its lack of curation and its genericity make it difficult for a bioinformatics user to find the most appropriate images needed. BioShaDock is a bioinformatics-focused Docker registry, which provides a local and fully controlled environment to build and publish bioinformatic software as portable Docker images. It provides a number of improvements over the base Docker registry on authentication and permissions management, that enable its integration in existing bioinformatic infrastructures such as computing platforms. The metadata associated with the registered images are domain-centric, including for instance concepts defined in the EDAM ontology, a shared and structured vocabulary of commonly used terms in bioinformatics. The registry also includes user defined tags to facilitate its discovery, as well as a link to the tool description in the ELIXIR registry if it already exists. If it does not, the BioShaDock registry will synchronize with the registry to create a new description in the Elixir registry, based on the BioShaDock entry metadata. This link will help users get more information on the tool such as its EDAM operations, input and output types. This allows integration with the ELIXIR Tools and Data Services Registry, thus providing the appropriate visibility of such images to the bioinformatics community.

  10. Advantages and limitations of national arthroplasty registries. The need for multicenter registries: the Rempro-SBQ

    Directory of Open Access Journals (Sweden)

    Luiz Sérgio Marcelino Gomes

    Full Text Available Abstract While the value of national arthroplasty registries (NAR for quality improvement in total hip arthroplasty (THA has already been widely reported, some methodological limitations associated with observational epidemiological studies that may interfere with the assessment of safety and efficacy of prosthetic implants have recently been described in the literature. Among the main limitations of NAR, the need for at least 80% compliance of all health institutions covered by the registry is emphasized; completeness equal or greater than 90% of all THA performed; restricted data collection; use of revision surgery as the sole criterion for outcome; and the inability of establishing a definite causal link with prosthetic dysfunction. The present article evaluates the advantages and limitations of NAR, in the light of current knowledge, which point to the need for a broader data collection and the use of more structured criteria for defining outcomes. In this scenario, the authors describe of idealization, conceptual and operational structure, and the project of implantation and implementation of a multicenter registry model, called Rempro-SBQ, which includes healthcare institutions already linked to the Brazilian Hip Society (Sociedade Brasileira de Quadril [SBQ]. This partnership enables the collection of more reliable and comprehensive data at a higher hierarchical level, with a significant reduction in maintenance and financing costs. The quality improvement actions supported by SBQ may enhance its effectiveness and stimulate greater adherence for collecting, storing, interpreting, and disseminating information (feedback.

  11. Advantages and limitations of national arthroplasty registries. The need for multicenter registries: the Rempro-SBQ.

    Science.gov (United States)

    Gomes, Luiz Sérgio Marcelino; Roos, Milton Valdomiro; Takata, Edmilson Takehiro; Schuroff, Ademir Antônio; Alves, Sérgio Delmonte; Camisa Júnior, Antero; Miranda, Ricardo Horta

    2017-01-01

    While the value of national arthroplasty registries (NAR) for quality improvement in total hip arthroplasty (THA) has already been widely reported, some methodological limitations associated with observational epidemiological studies that may interfere with the assessment of safety and efficacy of prosthetic implants have recently been described in the literature. Among the main limitations of NAR, the need for at least 80% compliance of all health institutions covered by the registry is emphasized; completeness equal or greater than 90% of all THA performed; restricted data collection; use of revision surgery as the sole criterion for outcome; and the inability of establishing a definite causal link with prosthetic dysfunction. The present article evaluates the advantages and limitations of NAR, in the light of current knowledge, which point to the need for a broader data collection and the use of more structured criteria for defining outcomes. In this scenario, the authors describe of idealization, conceptual and operational structure, and the project of implantation and implementation of a multicenter registry model, called Rempro-SBQ, which includes healthcare institutions already linked to the Brazilian Hip Society (Sociedade Brasileira de Quadril [SBQ]). This partnership enables the collection of more reliable and comprehensive data at a higher hierarchical level, with a significant reduction in maintenance and financing costs. The quality improvement actions supported by SBQ may enhance its effectiveness and stimulate greater adherence for collecting, storing, interpreting, and disseminating information (feedback).

  12. The Corrona US registry of rheumatic and autoimmune diseases.

    Science.gov (United States)

    Kremer, Joel M

    2016-01-01

    The Corrona US national registry collects data concerning patient status from both the rheumatologist and patient at routine clinical encounters. Corrona has functioning disease registries in rheumatoid arthritis, psoriatic arthritis, spondyloarthropathies, psoriasis and inflammatory bowel disease. Corrona merges data concerning long-term effectiveness and safety, as well as comparative and cost effectiveness of agents to treat these autoimmune diseases.

  13. Blood irradiation: Rationale and technique

    International Nuclear Information System (INIS)

    Lewis, M.C.

    1990-01-01

    Upon request by the local American Red Cross, the Savannah Regional Center for Cancer Care irradiates whole blood or blood components to prevent post-transfusion graft-versus-host reaction in patients who have severely depressed immune systems. The rationale for blood irradiation, the total absorbed dose, the type of patients who require irradiated blood, and the regulations that apply to irradiated blood are presented. A method of irradiating blood using a linear accelerator is described

  14. An innovative and collaborative partnership between patients with rare disease and industry-supported registries: the Global aHUS Registry

    Directory of Open Access Journals (Sweden)

    Len Woodward

    2016-11-01

    Full Text Available Abstract Background Patients are becoming increasingly involved in research which can promote innovation through novel ideas, support patient-centred actions, and facilitate drug development. For rare diseases, registries that collect data from patients can increase knowledge of the disease’s natural history, evaluate clinical therapies, monitor drug safety, and measure quality of care. The active participation of patients is expected to optimise rare-disease management and improve patient outcomes. However, few reports address the type and frequency of interactions involving patients, and what research input patient groups have. Here, we describe a collaboration between an international group of patient organisations advocating for patients with atypical haemolytic uraemic syndrome (aHUS, the aHUS Alliance, and an international aHUS patient registry (ClinicalTrials.gov NCT01522183. Results The aHUS Registry Scientific Advisory Board (SAB invited the aHUS Alliance to submit research ideas important to patients with aHUS. This resulted in 24 research suggestions from patients and patient organisations being presented to the SAB. The proposals were classified under seven categories, the most popular of which were understanding factors that cause disease manifestations and learning more about the clinical and psychological/social impact of living with the disease. Subsequently, aHUS Alliance members voted for up to five research priorities. The top priority was: “What are the outcomes of a transplant without eculizumab and what non-kidney damage is likely in patients with aHUS?”. This led directly to the initiation of an ongoing analysis of the data collected in the Registry on patients with kidney transplants. Conclusion This collaboration resulted in several topics proposed by the aHUS Alliance being selected as priority activities for the aHUS Registry, with one new analysis already underway. A clear pathway was established for engagement

  15. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  16. Economic evaluation of Mumbai and its satellite cancer registries: Implications for expansion of data collection.

    Science.gov (United States)

    Koyande, Shravani; Subramanian, Sujha; Edwards, Patrick; Hoover, Sonja; Deshmane, Vinay; Tankga, Florence; Dikshit, Rajesh; Saraiya, Mona

    2016-12-01

    The Mumbai Cancer Registry is a population-based cancer registry that has been in operation for more than five decades and has successfully initiated and integrated three satellite registries in Pune, Nagpur, and Aurangabad, each covering specific urban populations of the Indian state Maharashtra. Data collectors at the satellites perform data abstraction, but Mumbai carries out all other core registration activities such as data analysis and quality assurance. Each of the three satellite registries follows the same data collection methodology as the main Mumbai Cancer Registry. This study examines the cost of operating the Mumbai and its satellite cancer registries. We modified and used the Centers for Disease Control and Prevention's (CDC's) International Registry Costing Tool (IntRegCosting Tool) to collect cost and resource use data for the Mumbai Cancer Registry and three satellites. Almost 60% of the registration expenditure was borne by the Indian Cancer Society, which hosts the Mumbai Cancer Registry, and more than half of the registry expenditure was related to data collection activities. Across the combined registries, 93% of the expenditure was spent on labor. Overall, registration activities had a low cost per case of 226.10 Indian rupees (or a little less than 4.00 US dollars in 2014 [used average exchange rate in 2014: 1 US $=60 Indian rupees]). The centralization of fixed-cost activities in Mumbai likely resulted in economies of scale in operating the Mumbai and satellite registries, which, together, report on almost 20,000 cancer cases annually. In middle-income countries like India, where financial resources are limited, the operational framework provided by the Mumbai and satellite registries can serve as a model for other registries looking to expand data collection. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Economic evaluation of Mumbai and its satellite cancer registries: Implications for expansion of data collection☆

    Science.gov (United States)

    Koyande, Shravani; Subramanian, Sujha; Edwards, Patrick; Hoover, Sonja; Deshmane, Vinay; Tankga, Florence; Dikshit, Rajesh; Saraiya, Mona

    2018-01-01

    Background The Mumbai Cancer Registry is a population-based cancer registry that has been in operation for more than five decades and has successfully initiated and integrated three satellite registries in Pune, Nagpur, and Aurangabad, each covering specific urban populations of the Indian state Maharashtra. Data collectors at the satellites perform data abstraction, but Mumbai carries out all other core registration activities such as data analysis and quality assurance. Each of the three satellite registries follows the same data collection methodology as the main Mumbai Cancer Registry. This study examines the cost of operating the Mumbai and its satellite cancer registries. Methods We modified and used the Centers for Disease Control and Prevention’s (CDC’s) International Registry Costing Tool (IntRegCosting Tool) to collect cost and resource use data for the Mumbai Cancer Registry and three satellites. Results Almost 60% of the registration expenditure was borne by the Indian Cancer Society, which hosts the Mumbai Cancer Registry, and more than half of the registry expenditure was related to data collection activities. Across the combined registries, 93% of the expenditure was spent on labor. Overall, registration activities had a low cost per case of 226.10 Indian rupees (or a little less than 4.00 US dollars in 2014 [used average exchange rate in 2014: 1 US $ = 60 Indian rupees]). Conclusion The centralization of fixed-cost activities in Mumbai likely resulted in economies of scale in operating the Mumbai and satellite registries, which, together, report on almost 20,000 cancer cases annually. In middle-income countries like India, where financial resources are limited, the operational framework provided by the Mumbai and satellite registries can serve as a model for other registries looking to expand data collection. PMID:27726981

  18. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  19. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  20. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  1. EPA Facility Registry Service (FRS): RCRA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  2. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  3. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  4. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  5. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  6. CIRSE Vascular Closure Device Registry

    NARCIS (Netherlands)

    Reekers, Jim A.; Müller-Hülsbeck, Stefan; Libicher, Martin; Atar, Eli; Trentmann, Jens; Goffette, Pierre; Borggrefe, Jan; Zeleňák, Kamil; Hooijboer, Pieter; Belli, Anna-Maria

    2011-01-01

    Vascular closure devices are routinely used after many vascular interventional radiology procedures. However, there have been no major multicenter studies to assess the safety and effectiveness of the routine use of closure devices in interventional radiology. The CIRSE registry of closure devices

  7. Establishment and use of national registries for actinide elements in humans

    International Nuclear Information System (INIS)

    1996-05-01

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab

  8. Establishment and use of national registries for actinide elements in humans

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-05-01

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab.

  9. EPA Facility Registry Service (FRS): NCDB

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  10. EPA Facility Registry Service (FRS): BRAC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  11. EPA Facility Registry Service (FRS): BIA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  12. EPA Facility Registry Service (FRS): RADINFO

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  13. Veterans Affairs Central Cancer Registry (VACCR)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Affairs Central Cancer Registry (VACCR) receives and stores information on cancer diagnosis and treatment constraints compiled and sent in by the local...

  14. EPA Facility Registry Service (FRS): TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  15. EPA Facility Registry Service (FRS): ICIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  16. EPA Facility Registry Service (FRS): RBLC

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  17. EPA Facility Registry System (FRS): NCES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): LANDFILL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of non-hazardous waste...

  19. EPA Facility Registry Service (FRS): NEI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. EPA Facility Registry Service (FRS): CAMDBS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  1. EPA Facility Registry System (FRS): NEPT

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  2. EPA Facility Registry Service (FRS): SDWIS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  3. EPA Facility Registry Service (FRS): RMP

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  4. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  5. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  6. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  7. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  8. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  9. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  10. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  11. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  12. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  13. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  14. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  15. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  16. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  17. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  18. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  19. EPA Facility Registry Service (FRS): OIL

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link to the Oil...

  20. Reducing selection bias in case-control studies from rare disease registries.

    Science.gov (United States)

    Cole, J Alexander; Taylor, John S; Hangartner, Thomas N; Weinreb, Neal J; Mistry, Pramod K; Khan, Aneal

    2011-09-12

    In clinical research of rare diseases, where small patient numbers and disease heterogeneity limit study design options, registries are a valuable resource for demographic and outcome information. However, in contrast to prospective, randomized clinical trials, the observational design of registries is prone to introduce selection bias and negatively impact the validity of data analyses. The objective of the study was to demonstrate the utility of case-control matching and the risk-set method in order to control bias in data from a rare disease registry. Data from the International Collaborative Gaucher Group (ICGG) Gaucher Registry were used as an example. A case-control matching analysis using the risk-set method was conducted to identify two groups of patients with type 1 Gaucher disease in the ICGG Gaucher Registry: patients with avascular osteonecrosis (AVN) and those without AVN. The frequency distributions of gender, decade of birth, treatment status, and splenectomy status were presented for cases and controls before and after matching. Odds ratios (and 95% confidence intervals) were calculated for each variable before and after matching. The application of case-control matching methodology results in cohorts of cases (i.e., patients with AVN) and controls (i.e., patients without AVN) who have comparable distributions for four common parameters used in subject selection: gender, year of birth (age), treatment status, and splenectomy status. Matching resulted in odds ratios of approximately 1.00, indicating no bias. We demonstrated bias in case-control selection in subjects from a prototype rare disease registry and used case-control matching to minimize this bias. Therefore, this approach appears useful to study cohorts of heterogeneous patients in rare disease registries.

  1. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  2. The trauma registry compared to All Patient Refined Diagnosis Groups (APR-DRG).

    Science.gov (United States)

    Hackworth, Jodi; Askegard-Giesmann, Johanna; Rouse, Thomas; Benneyworth, Brian

    2017-05-01

    Literature has shown there are significant differences between administrative databases and clinical registry data. Our objective was to compare the identification of trauma patients using All Patient Refined Diagnosis Related Groups (APR-DRG) as compared to the Trauma Registry and estimate the effects of those discrepancies on utilization. Admitted pediatric patients from 1/2012-12/2013 were abstracted from the trauma registry. The patients were linked to corresponding administrative data using the Pediatric Health Information System database at a single children's hospital. APR-DRGs referencing trauma were used to identify trauma patients. We compared variables related to utilization and diagnosis to determine the level of agreement between the two datasets. There were 1942 trauma registry patients and 980 administrative records identified with trauma-specific APR-DRG during the study period. Forty-two percent (816/1942) of registry records had an associated trauma-specific APR-DRG; 69% of registry patients requiring ICU care had trauma APR-DRGs; 73% of registry patients with head injuries had trauma APR-DRGs. Only 21% of registry patients requiring surgical management had associated trauma APR-DRGs, and 12.5% of simple fractures had associated trauma APR-DRGs. APR-DRGs appeared to only capture a fraction of the entire trauma population and it tends to be the more severely ill patients. As a result, the administrative data was not able to accurately answer hospital or operating room utilization as well as specific information on diagnosis categories regarding trauma patients. APR-DRG administrative data should not be used as the only data source for evaluating the needs of a trauma program. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  4. EPA Facility Registry Service (FRS): ACRES

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service consists of location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of sites that link to...

  5. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  6. BioSWR – Semantic Web Services Registry for Bioinformatics

    Science.gov (United States)

    Repchevsky, Dmitry; Gelpi, Josep Ll.

    2014-01-01

    Despite of the variety of available Web services registries specially aimed at Life Sciences, their scope is usually restricted to a limited set of well-defined types of services. While dedicated registries are generally tied to a particular format, general-purpose ones are more adherent to standards and usually rely on Web Service Definition Language (WSDL). Although WSDL is quite flexible to support common Web services types, its lack of semantic expressiveness led to various initiatives to describe Web services via ontology languages. Nevertheless, WSDL 2.0 descriptions gained a standard representation based on Web Ontology Language (OWL). BioSWR is a novel Web services registry that provides standard Resource Description Framework (RDF) based Web services descriptions along with the traditional WSDL based ones. The registry provides Web-based interface for Web services registration, querying and annotation, and is also accessible programmatically via Representational State Transfer (REST) API or using a SPARQL Protocol and RDF Query Language. BioSWR server is located at http://inb.bsc.es/BioSWR/and its code is available at https://sourceforge.net/projects/bioswr/under the LGPL license. PMID:25233118

  7. The Global Registry of Biodiversity Repositories: A Call for Community Curation

    Science.gov (United States)

    Miller, Scott E.; Trizna, Michael G.; Graham, Eileen; Crane, Adele E.

    2016-01-01

    Abstract The Global Registry of Biodiversity Repositories is an online metadata resource for biodiversity collections, the institutions that contain them, and associated staff members. The registry provides contact and address information, characteristics of the institutions and collections using controlled vocabularies and free-text descripitons, links to related websites, unique identifiers for each institution and collection record, text fields for loan and use policies, and a variety of other descriptors. Each institution record includes an institutionCode that must be unique, and each collection record must have a collectionCode that is unique within that institution. The registry is populated with records imported from the largest similar registries and more can be harmonized and added. Doing so will require community input and curation and would produce a truly comprehensive and unifying information resource. PMID:27660523

  8. The Global Registry of Biodiversity Repositories: A Call for Community Curation.

    Science.gov (United States)

    Schindel, David E; Miller, Scott E; Trizna, Michael G; Graham, Eileen; Crane, Adele E

    2016-01-01

    The Global Registry of Biodiversity Repositories is an online metadata resource for biodiversity collections, the institutions that contain them, and associated staff members. The registry provides contact and address information, characteristics of the institutions and collections using controlled vocabularies and free-text descripitons, links to related websites, unique identifiers for each institution and collection record, text fields for loan and use policies, and a variety of other descriptors. Each institution record includes an institutionCode that must be unique, and each collection record must have a collectionCode that is unique within that institution. The registry is populated with records imported from the largest similar registries and more can be harmonized and added. Doing so will require community input and curation and would produce a truly comprehensive and unifying information resource.

  9. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  11. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  12. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  14. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  15. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  16. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  17. Rationale and design of the worldwide prospective multicenter registry on radiation dose estimates of cardiac CT angiography in daily practice in 2017 (PROTECTION VI)

    DEFF Research Database (Denmark)

    Stocker, Thomas J; Deseive, Simon; Chen, Marcus

    2018-01-01

    -randomized and randomized studies have been performed to reduce the associated radiation exposure. Currently, it is unclear if the advances in technology and knowledge about radiation reduction translated into reduced levels of cardiac CTA radiation dose in daily clinical practice as well as a wide utilization of dose......-saving strategies. METHODS: The PROTECTION VI study is a multicenter, prospective, worldwide registry designed to evaluate radiation dose exposure, utilization of dose-saving strategies and diagnostic image quality during cardiac CTA in current daily practice. Assessment of image quality will be addressed...... median radiation dose levels, image quality, frequency of use and efficacy of algorithms for dose reduction, and patient and study-related predictors associated with radiation dose. CONCLUSIONS: The PROTECTION VI study is designed to provide a reliable estimate of current radiation dose for cardiac CTA...

  18. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  19. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  20. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  1. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  2. Exercise Aboard Attack Submarines: Rationale and New Options

    National Research Council Canada - National Science Library

    Watenpaugh, Donald

    2004-01-01

    .... However, most submariners do not exercise during deployment for a variety of reasons, including lack of space, time limitations, equipment limitations, lack of entertainment or recreational value...

  3. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  4. The danish multiple sclerosis registry

    DEFF Research Database (Denmark)

    Brønnum-Hansen, Henrik; Koch-Henriksen, Nils; Stenager, Egon

    2011-01-01

    Introduction: The Danish Multiple Sclerosis (MS) Registry was established in 1956. Content: The register comprises data on all Danes who had MS in 1949 or who have been diagnosed since. Data on new cases and updated information on persons with an MS diagnosis already notified are continuously...

  5. Myositis registries and biorepositories: powerful tools to advance clinical, epidemiologic and pathogenic research.

    Science.gov (United States)

    Rider, Lisa G; Dankó, Katalin; Miller, Frederick W

    2014-11-01

    Clinical registries and biorepositories have proven extremely useful in many studies of diseases, especially rare diseases. Given their rarity and diversity, the idiopathic inflammatory myopathies, or myositis syndromes, have benefited from individual researchers' collections of cohorts of patients. Major efforts are being made to establish large registries and biorepositories that will allow many additional studies to be performed that were not possible before. Here, we describe the registries developed by investigators and patient support groups that are currently available for collaborative research purposes. We have identified 46 myositis research registries, including many with biorepositories, which have been developed for a wide variety of purposes and have resulted in great advances in understanding the range of phenotypes, clinical presentations, risk factors, pathogenic mechanisms, outcome assessment, therapeutic responses, and prognoses. These are now available for collaborative use to undertake additional studies. Two myositis patient registries have been developed for research, and myositis patient support groups maintain demographic registries with large numbers of patients available to be contacted for potential research participation. Investigator-initiated myositis research registries and biorepositories have proven extremely useful in understanding many aspects of these rare and diverse autoimmune diseases. These registries and biorepositories, in addition to those developed by myositis patient support groups, deserve continued support to maintain the momentum in this field as they offer major opportunities to improve understanding of the pathogenesis and treatment of these diseases in cost-effective ways.

  6. Development of the SIOPE DIPG network, registry and imaging repository

    DEFF Research Database (Denmark)

    Veldhuijzen van Zanten, Sophie E M; Baugh, Joshua; Chaney, Brooklyn

    2017-01-01

    was developed, The SIOPE DIPG Registry and Imaging Repository, to centrally collect data of DIPG patients. As for April 2016, clinical data as well as MR-scans of 694 patients have been entered into the SIOPE DIPG Registry/Imaging Repository. The median progression free survival is 6.0 months (95% Confidence...

  7. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  8. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  9. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  10. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  11. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  12. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  13. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  14. Enhancing requirements engineering for patient registry software systems with evidence-based components.

    Science.gov (United States)

    Lindoerfer, Doris; Mansmann, Ulrich

    2017-07-01

    Patient registries are instrumental for medical research. Often their structures are complex and their implementations use composite software systems to meet the wide spectrum of challenges. Commercial and open-source systems are available for registry implementation, but many research groups develop their own systems. Methodological approaches in the selection of software as well as the construction of proprietary systems are needed. We propose an evidence-based checklist, summarizing essential items for patient registry software systems (CIPROS), to accelerate the requirements engineering process. Requirements engineering activities for software systems follow traditional software requirements elicitation methods, general software requirements specification (SRS) templates, and standards. We performed a multistep procedure to develop a specific evidence-based CIPROS checklist: (1) A systematic literature review to build a comprehensive collection of technical concepts, (2) a qualitative content analysis to define a catalogue of relevant criteria, and (3) a checklist to construct a minimal appraisal standard. CIPROS is based on 64 publications and covers twelve sections with a total of 72 items. CIPROS also defines software requirements. Comparing CIPROS with traditional software requirements elicitation methods, SRS templates and standards show a broad consensus but differences in issues regarding registry-specific aspects. Using an evidence-based approach to requirements engineering for registry software adds aspects to the traditional methods and accelerates the software engineering process for registry software. The method we used to construct CIPROS serves as a potential template for creating evidence-based checklists in other fields. The CIPROS list supports developers in assessing requirements for existing systems and formulating requirements for their own systems, while strengthening the reporting of patient registry software system descriptions. It may be

  15. Reducing selection bias in case-control studies from rare disease registries

    Directory of Open Access Journals (Sweden)

    Mistry Pramod K

    2011-09-01

    Full Text Available Abstract Background In clinical research of rare diseases, where small patient numbers and disease heterogeneity limit study design options, registries are a valuable resource for demographic and outcome information. However, in contrast to prospective, randomized clinical trials, the observational design of registries is prone to introduce selection bias and negatively impact the validity of data analyses. The objective of the study was to demonstrate the utility of case-control matching and the risk-set method in order to control bias in data from a rare disease registry. Data from the International Collaborative Gaucher Group (ICGG Gaucher Registry were used as an example. Methods A case-control matching analysis using the risk-set method was conducted to identify two groups of patients with type 1 Gaucher disease in the ICGG Gaucher Registry: patients with avascular osteonecrosis (AVN and those without AVN. The frequency distributions of gender, decade of birth, treatment status, and splenectomy status were presented for cases and controls before and after matching. Odds ratios (and 95% confidence intervals were calculated for each variable before and after matching. Results The application of case-control matching methodology results in cohorts of cases (i.e., patients with AVN and controls (i.e., patients without AVN who have comparable distributions for four common parameters used in subject selection: gender, year of birth (age, treatment status, and splenectomy status. Matching resulted in odds ratios of approximately 1.00, indicating no bias. Conclusions We demonstrated bias in case-control selection in subjects from a prototype rare disease registry and used case-control matching to minimize this bias. Therefore, this approach appears useful to study cohorts of heterogeneous patients in rare disease registries.

  16. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  17. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  18. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  19. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  20. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  1. Analysis of Existing Guidelines for the Systematic Planning Process of Clinical Registries.

    Science.gov (United States)

    Löpprich, Martin; Knaup, Petra

    2016-01-01

    Clinical registries are a powerful method to observe the clinical practice and natural disease history. In contrast to clinical trials, where guidelines and standardized methods exist and are mandatory, only a few initiatives have published methodological guidelines for clinical registries. The objective of this paper was to review these guidelines and systematically assess their completeness, usability and feasibility according to a SWOT analysis. The results show that each guideline has its own strengths and weaknesses. While one supports the systematic planning process, the other discusses clinical registries in great detail. However, the feasibility was mostly limited and the special requirements of clinical registries, their flexible, expandable and adaptable technological structure was not addressed consistently.

  2. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  3. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  4. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  5. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  6. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  7. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  8. Placebo versus "standard" hypnosis rationale: attitudes, expectancies, hypnotic responses, and experiences.

    Science.gov (United States)

    Accardi, Michelle; Cleere, Colleen; Lynn, Steven Jay; Kirsch, Irving

    2013-10-01

    In this study participants were provided with either the standard rationale that accompanies the Harvard Group Scale of Hypnotic Susceptibility: A (Shor & Orne, 1962) or a rationale that presented hypnosis as a nondeceptive placebo, consistent with Kirsch's (1994) sociocognitive perspective of hypnosis. The effects of the placebo and standard rationales were highly comparable with respect to hypnotic attitudes; prehypnotic expectancies; objective, subjective, and involuntariness measures of hypnotic responding; as well as a variety of subjective experiences during hypnosis, as measured by the Phenomenology of Consciousness Inventory (Pekala, 1982). Differences among correlations were not evident when measures were compared across groups. However, indices of hypnotic responding were correlated with attitudes in the hypnosis but not the placebo condition, and, generally speaking, the link between subjective experiences during hypnosis and measures of hypnotic responding were more reliable in the placebo than the hypnosis group. Researcher findings are neutral with respect to providing support for altered state versus sociocognitive models of hypnosis.

  9. Rapid Development of Specialty Population Registries and Quality Measures from Electronic Health Record Data.

    Science.gov (United States)

    Kannan, Vaishnavi; Fish, Jason S; Mutz, Jacqueline M; Carrington, Angela R; Lai, Ki; Davis, Lisa S; Youngblood, Josh E; Rauschuber, Mark R; Flores, Kathryn A; Sara, Evan J; Bhat, Deepa G; Willett, DuWayne L

    2017-01-01

    Creation of a new electronic health record (EHR)-based registry often can be a "one-off" complex endeavor: first developing new EHR data collection and clinical decision support tools, followed by developing registry-specific data extractions from the EHR for analysis. Each development phase typically has its own long development and testing time, leading to a prolonged overall cycle time for delivering one functioning registry with companion reporting into production. The next registry request then starts from scratch. Such an approach will not scale to meet the emerging demand for specialty registries to support population health and value-based care. To determine if the creation of EHR-based specialty registries could be markedly accelerated by employing (a) a finite core set of EHR data collection principles and methods, (b) concurrent engineering of data extraction and data warehouse design using a common dimensional data model for all registries, and (c) agile development methods commonly employed in new product development. We adopted as guiding principles to (a) capture data as a byproduct of care of the patient, (b) reinforce optimal EHR use by clinicians, (c) employ a finite but robust set of EHR data capture tool types, and (d) leverage our existing technology toolkit. Registries were defined by a shared condition (recorded on the Problem List) or a shared exposure to a procedure (recorded on the Surgical History) or to a medication (recorded on the Medication List). Any EHR fields needed - either to determine registry membership or to calculate a registry-associated clinical quality measure (CQM) - were included in the enterprise data warehouse (EDW) shared dimensional data model. Extract-transform-load (ETL) code was written to pull data at defined "grains" from the EHR into the EDW model. All calculated CQM values were stored in a single Fact table in the EDW crossing all registries. Registry-specific dashboards were created in the EHR to display both

  10. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  11. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  12. Prophylaxis in congenital factor VII deficiency: indications, efficacy and safety. Results from the Seven Treatment Evaluation Registry (STER).

    Science.gov (United States)

    Napolitano, Mariasanta; Giansily-Blaizot, Muriel; Dolce, Alberto; Schved, Jean F; Auerswald, Guenter; Ingerslev, Jørgen; Bjerre, Jens; Altisent, Carmen; Charoenkwan, Pimlak; Michaels, Lisa; Chuansumrit, Ampaiwan; Di Minno, Giovanni; Caliskan, Umran; Mariani, Guglielmo

    2013-04-01

    Because of the very short half-life of factor VII, prophylaxis in factor VII deficiency is considered a difficult endeavor. The clinical efficacy and safety of prophylactic regimens, and indications for their use, were evaluated in factor VII-deficient patients in the Seven Treatment Evaluation Registry. Prophylaxis data (38 courses) were analyzed from 34 patients with severe factor VII deficiency (factor VII (24 courses), four received plasma-derived factor VII, and ten received fresh frozen plasma. Prophylactic schedules clustered into "frequent" courses (three times weekly, n=23) and "infrequent" courses (≤ 2 times weekly, n=15). Excluding courses for menorrhagia, "frequent" and "infrequent" courses produced 18/23 (78%) and 5/12 (41%) "excellent" outcomes, respectively; relative risk, 1.88; 95% confidence interval, 0.93-3.79; P=0.079. Long term prophylaxis lasted from 1 to >10 years. No thrombosis or new inhibitors occurred. In conclusion, a subset of patients with factor VII deficiency needed prophylaxis because of severe bleeding. Recombinant activated factor VII schedules based on "frequent" administrations (three times weekly) and a 90 μg/kg total weekly dose were effective. These data provide a rationale for long-term, safe prophylaxis in factor VII deficiency.

  13. The PROgnostic Value of unrequested Information in Diagnostic Imaging (PROVIDI) Study: rationale and design

    International Nuclear Information System (INIS)

    Gondrie, M. J. A.; Mali, W. P. Th. M.; Buckens, C. F. M.; Jacobs, P. C. A.; Grobbee, D. E.; Graaf, Y van der

    2010-01-01

    We describe the rationale for a new study examining the prognostic value of unrequested findings in diagnostic imaging. The deployment of more advanced imaging modalities in routine care means that such findings are being detected with increasing frequency. However, as the prognostic significance of many types of unrequested findings is unknown, the optimal response to such findings remains uncertain and in many cases an overly defensive approach is adopted, to the detriment of patient-care. Additionally, novel and promising image findings that are newly available on many routine scans cannot be used to improve patient care until their prognostic value is properly determined. The PROVIDI study seeks to address these issues using an innovative multi-center case-cohort study design. PROVIDI is to consist of a series of studies investigating specific, selected disease entities and clusters. Computed Tomography images from the participating hospitals are reviewed for unrequested findings. Subsequently, this data is pooled with outcome data from a central population registry. Study populations consist of patients with endpoints relevant to the (group of) disease(s) under study along with a random control sample from the cohort. This innovative design allows PROVIDI to evaluate selected unrequested image findings for their true prognostic value in a series of manageable studies. By incorporating unrequested image findings and outcomes data relevant to patients, truly meaningful conclusions about the prognostic value of unrequested and emerging image findings can be reached and used to improve patient-care.

  14. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    Science.gov (United States)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  15. Describing the first 2000 registrations to the Research Registry®: A study protocol

    Directory of Open Access Journals (Sweden)

    Alexander J. Fowler

    Full Text Available Background: In 2013, the Declaration of Helsinki was updated and required the registration of all research studies involving human participants. Prior registries focussed on the registration of clinical trials and systematic reviews, and we estimate that only 10% of observational research is registered in a publically accessible registry. The Research Registry® was established to provide a venue of registration for any study, prospectively or retrospectively, involving human participants. This protocol describes the analysis for the first 2000 registrations received to the Research Registry®. Methods and analysis: Data for each registration to the Research Registry® (www.researchregistry.com, adapted from the World Health Organisation minimum data set, has been collected since the launch of the registry in 2015. A weekly curation process ensures that inappropriate registrations, such as duplicate studies or those not involving human participants, are removed from the registry. We will present the characteristics of the first 2000 registrations and how they have changed overtime. A quality score will be calculated for each registration by two independent teams, and inter-rater reliability will be calculated. Funding sources of work registered will also be presented. This process will also be performed for the systematic review portion of the registry (‘The Review Registry’, which will be considered separately. Ethics and dissemination: Ethical approval is not required for this study as it involves no human participants. The findings will be presented at international conferences and published in a peer reviewed journal.

  16. [The user´s reporting from the national registry of catheter aortic valve implantations (Czech TAVI Registry): the possibilities of the analytical reports based on the database system TrialDB2].

    Science.gov (United States)

    Bláha, Milan; Kala, Petr; Klimeš, Daniel; Bernat, Ivo; Branny, Marian; Cervinka, Pavel; Horák, Jan; Kočka, Viktor; Mates, Martin; Němec, Petr; Pešl, Ladislav; Stípal, Roman; Sťásek, Josef; Zelízko, Michael

    2014-10-01

    Assessment of the treatment procedures and their results is increasingly important in current medicine. The emphasis is put on an effective use of the health technologies (HTA). Unlike randomised studies, which involve strictly selected groups of patients who meet inclusion and exclusion criterias, the multicentre clinical registries provide a real-life picture of the treatment safety and effectiveness. Well prepared registries involve both research database and a friendly user interface enabling collection of parametric and easily analyzable data. Although there are some technological aspects aiming to ensure a maximum quality of entered data, cooperation with the users and data managers is essential. Such a registry, otherwise meaningful, must provide answers to previously defined medical hypotheses. Regular feedback to users (so called benchmarking or reporting) is considered to be of key importance. The Czech TAVI Registry (CTR) is a good example of reaching all of the above defined criterias. This registry contains data of approximately 95 % of all transcatheter aortic valve implantations (TAVI) performed in the Czech Republic. It is based on a general system aimed at the design of clinical trials, namely the TrialDB2 (a database system for clinical registries developed by the Institute of Biostatistics and Analyses at the Masaryk University (IBA MU). CTR has been run as an English-language version under the auspices of the Czech Society of Cardiology and represents one of the top-quality registries maintained by IBA MU. This paper presents the currently available database systems and some reports from this particular registry.

  17. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  18. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  19. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  20. Missing data in trauma registries: A systematic review.

    Science.gov (United States)

    Shivasabesan, Gowri; Mitra, Biswadev; O'Reilly, Gerard M

    2018-03-30

    Trauma registries play an integral role in trauma systems but their valid use hinges on data quality. The aim of this study was to determine, among contemporary publications using trauma registry data, the level of reporting of data completeness and the methods used to deal with missing data. A systematic review was conducted of all trauma registry-based manuscripts published from 01 January 2015 to current date (17 March 2017). Studies were identified by searching MEDLINE, EMBASE, and CINAHL using relevant subject headings and keywords. Included manuscripts were evaluated based on previously published recommendations regarding the reporting and discussion of missing data. Manuscripts were graded on their degree of characterization of such observations. In addition, the methods used to manage missing data were examined. There were 539 manuscripts that met inclusion criteria. Among these, 208 (38.6%) manuscripts did not mention data completeness and 88 (16.3%) mentioned missing data but did not quantify the extent. Only a handful (n = 26; 4.8%) quantified the 'missingness' of all variables. Most articles (n = 477; 88.5%) contained no details such as a comparison between patient characteristics in cohorts with and without missing data. Of the 331 articles which made at least some mention of data completeness, the method of managing missing data was unknown in 34 (10.3%). When method(s) to handle missing data were identified, 234 (78.8%) manuscripts used complete case analysis only, 18 (6.1%) used multiple imputation only and 34 (11.4%) used a combination of these. Most manuscripts using trauma registry data did not quantify the extent of missing data for any variables and contained minimal discussion regarding missingness. Out of the studies which identified a method of managing missing data, most used complete case analysis, a method that may bias results. The lack of standardization in the reporting and management of missing data questions the validity of

  1. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  2. Enhancing cancer registry data for comparative effectiveness research (CER) project: overview and methodology.

    Science.gov (United States)

    Chen, Vivien W; Eheman, Christie R; Johnson, Christopher J; Hernandez, Monique N; Rousseau, David; Styles, Timothy S; West, Dee W; Hsieh, Meichin; Hakenewerth, Anne M; Celaya, Maria O; Rycroft, Randi K; Wike, Jennifer M; Pearson, Melissa; Brockhouse, Judy; Mulvihill, Linda G; Zhang, Kevin B

    2014-01-01

    Following the Institute of Medicine's 2009 report on the national priorities for comparative effectiveness research (CER), funding for support of CER became available in 2009 through the American Recovery and Re-investment Act. The Centers for Disease Control and Prevention (CDC) received funding to enhance the infrastructure of population-based cancer registries and to expand registry data collection to support CER. The CDC established 10 specialized registries within the National Program of Cancer Registries (NPCR) to enhance data collection for all cancers and to address targeted CER questions, including the clinical use and prognostic value of specific biomarkers. The project also included a special focus on detailed first course of treatment for cancers of the breast, colon, and rectum, as well as chronic myeloid leukemia (CML) diagnosed in 2011. This paper describes the methodology and the work conducted by the CDC and the NPCR specialized registries in collecting data for the 4 special focused cancers, including the selection of additional data variables, development of data collection tools and software modifications, institutional review board approvals, training, collection of detailed first course of treatment, and quality assurance. It also presents the characteristics of the study population and discusses the strengths and limitations of using population-based cancer registries to support CER as well as the potential future role of population-based cancer registries in assessing the quality of patient care and cancer control.

  3. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  4. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  5. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  6. Support for immunization registries among parents of vaccinated and unvaccinated school-aged children: a case control study

    Directory of Open Access Journals (Sweden)

    Pan William KY

    2006-09-01

    Full Text Available Abstract Background Immunizations have reduced childhood vaccine preventable disease incidence by 98–100%. Continued vaccine preventable disease control depends on high immunization coverage. Immunization registries help ensure high coverage by recording childhood immunizations administered, generating reminders when immunizations are due, calculating immunization coverage and identifying pockets needing immunization services, and improving vaccine safety by reducing over-immunization and providing data for post-licensure vaccine safety studies. Despite substantial resources directed towards registry development in the U.S., only 48% of children were enrolled in a registry in 2004. Parental attitudes likely impact child participation. Consequently, the purpose of this study was to assess the attitudes of parents of vaccinated and unvaccinated school-aged children regarding: support for immunization registries; laws authorizing registries and mandating provider reporting; opt-in versus opt-out registry participation; and financial worth and responsibility of registry development and implementation. Methods A case control study of parents of 815 children exempt from school vaccination requirements and 1630 fully vaccinated children was conducted. Children were recruited from 112 elementary schools in Colorado, Massachusetts, Missouri, and Washington. Surveys administered to the parents, asked about views on registries and perceived utility and safety of vaccines. Parental views were summarized and logistic regression models compared differences between parents of exempt and vaccinated children. Results Surveys were completed by 56.1% of respondents. Fewer than 10% of parents were aware of immunization registries in their communities. Among parents aware of registries, exempt children were more likely to be enrolled (65.0% than vaccinated children (26.5% (p value = 0.01. A substantial proportion of parents of exempt children support immunization

  7. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  8. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  9. The day Norway cried: Proximity and distress in Norwegian citizens following the 22nd July 2011 terrorist attacks in Oslo and on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Aakvaag, Helene Flood; Wentzel-Larsen, Tore; Dyb, Grete; Hjemdal, Ole Kristian

    2012-01-01

    Terrorism may create fear and stress reactions not only in the direct victims, but also in the general population. This study investigated emotional responses in the Norwegian population following the 22nd July 2011 terrorist attacks. We hypothesized that Oslo residents would report a higher level of fear responses compared with people living outside Oslo and that proximity would be associated with early distress and later post-traumatic stress reactions. Representative samples were drawn from the Norwegian Population Registry. Telephone interviews were conducted 4-5 months after the attacks. The response rate for the Oslo sample (N=465) was 24% of the total sample, and 43% of those who were actually reached by phone and asked to participate. Corresponding figures for the sample living outside Oslo (N=716) were 19% and 30%. Our results show strong immediate emotional responses, particularly sadness and a feeling of unreality, in both samples. Jumpiness and other fear responses were significantly higher among Oslo residents. Current level of risk perception was low 4-5 months after the attacks; however, a significant minority reported to feel less safe than before. Geographical and psychological proximity were associated with early emotional responses. Psychological proximity was significantly associated with post-traumatic stress reactions, while measures of geographical proximity were not. Immediate emotional responses, first-week reactions, and first-week jumpiness were uniquely and significantly associated with post-traumatic stress reactions. Post-traumatic stress reactions were elevated in ethnic minorities. The terrorist attacks seem to have had a significant effect on the Norwegian population, creating sadness and insecurity, at least in the short term. Proximity to the terrorist attacks was strongly associated with distress in the population, and early distress was strongly related to later post-traumatic stress reactions. Our results indicate that

  10. Registry of Mineral and Petroleum Titles

    Energy Technology Data Exchange (ETDEWEB)

    Maclellan, I. M.; Kaizer, J. L.; McCulloch, P. D.; Ratcliffe, R.; Wenning, A. S. [Nova Scotia Dept. of Natural Resources, Halifax, NS (Canada)

    2000-07-01

    Activities of the Nova Scotia Registry of Mineral and Petroleum Titles are described, including statistical information about staking and mining activity in the province during 1999. In terms of activities, the Registry receives applications and issues licenses and leases for mineral and petroleum rights, receives statements of exploration expenditures and assessment reports that pertain to renewal of licenses and leases, maintains maps showing the disposition of lands under license or lease, and maintains a system of prospector registration. In addition, the Registry processes applications for underground gas storage rights and treasure trove rights and maintains a database of information concerning production and employment in Nova Scotia mines and quarries. At the end 1999 there were 230,660 hectares under exploration licence. Exploration expenditures, including engineering, economic and feasibility studies during 1999 totalled $4.2 million, mostly by junior mining companies searching for industrial mineral commodities. Mining activity during 1999 generated revenues of $340 million. Coal production dropped by 25 per cent, due mainly to the closure of the Phalen Mine. Gypsum production was up to 7.9 million tonnes; shipments of cement, barite and clay products also increased during 1999; salt production remained unchanged from 1998 with 842,000 tonnes. Production of construction aggregates totalled 10.6 million tonnes, down slightly from the year before. Mineral industry employment was roughly 2,500 persons, down by 24 per cent from 1998 levels, due primarily to the closure of the Phalen Mine.

  11. Teacher Grading Decisions: Influences, Rationale, and Practices

    Science.gov (United States)

    Kunnath, Joshua P.

    2017-01-01

    This mixed-methods study applied a decision-making theoretical framework to an investigation of teacher grading in a large urban school district in California. A sample of 251 high school teachers of core subjects were surveyed, and 15 teachers participated in four focus group interviews in order provide data on the influences, rationale, and…

  12. Learning Rationales and Virtual Reality Technology in Education.

    Science.gov (United States)

    Chiou, Guey-Fa

    1995-01-01

    Defines and describes virtual reality technology and differentiates between virtual learning environment, learning material, and learning tools. Links learning rationales to virtual reality technology to pave conceptual foundations for application of virtual reality technology education. Constructivism, case-based learning, problem-based learning,…

  13. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  14. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    Science.gov (United States)

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  15. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  16. Mineralized Collagen: Rationale, Current Status, and Clinical Applications

    Directory of Open Access Journals (Sweden)

    Zhi-Ye Qiu

    2015-07-01

    Full Text Available This paper presents a review of the rationale for the in vitro mineralization process, preparation methods, and clinical applications of mineralized collagen. The rationale for natural mineralized collagen and the related mineralization process has been investigated for decades. Based on the understanding of natural mineralized collagen and its formation process, many attempts have been made to prepare biomimetic materials that resemble natural mineralized collagen in both composition and structure. To date, a number of bone substitute materials have been developed based on the principles of mineralized collagen, and some of them have been commercialized and approved by regulatory agencies. The clinical outcomes of mineralized collagen are of significance to advance the evaluation and improvement of related medical device products. Some representative clinical cases have been reported, and there are more clinical applications and long-term follow-ups that currently being performed by many research groups.

  17. REAC/TS radiation accident registry. Update of accidents in the United States

    International Nuclear Information System (INIS)

    Ricks, R.C.; Berger, M.E.; Holloway, E.C.; Goans, R.E.

    2000-01-01

    Serious injury due to ionizing radiation is a rare occurrence. From 1944 to the present, 243 US accidents meeting dose criteria for classification as serious are documented in the REAC/TS Registry. Thirty individuals have lost their lives in radiation accidents in the United States. The Registry is part of the overall REAC/TS program providing 24-hour direct or consultative assistance regarding medical and heath physics problems associated with radiation accidents in local, national, and international incidents. The REAC/TS Registry serves as a repository of medically important information documenting the consequences of these accidents. Registry data are gathered from various sources. These include reports from the World Heath Organization (WHO), International Atomic Energy Agency (IAEA), US Nuclear Regulatory Commission (US NRC), state radiological health departments, medical/health physics literature, personal communication, the Internet, and most frequently, from calls for medical assistance to REAC/TS, as part of our 24-hour medical assistance program. The REAC/TS Registry for documentation of radiation accidents serves several useful purposes: 1) weaknesses in design, safety practices, training or control can be identified, and trends noted; 2) information regarding the medical consequences of injuries and the efficacy of treatment protocols is available to the treating physician; and 3) Registry case studies serve as valuable teaching tools. This presentation will review and summarize data on the US radiation accidents including their classification by device, accident circumstances, and frequency by respective states. Data regarding accidents with fatal outcomes will be reviewed. The inclusion of Registry data in the IAEA's International Reporting System of Radiation Events (RADEV) will also be discussed. (author)

  18. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  19. Analysis and visualization of disease courses in a semantically-enabled cancer registry.

    Science.gov (United States)

    Esteban-Gil, Angel; Fernández-Breis, Jesualdo Tomás; Boeker, Martin

    2017-09-29

    Regional and epidemiological cancer registries are important for cancer research and the quality management of cancer treatment. Many technological solutions are available to collect and analyse data for cancer registries nowadays. However, the lack of a well-defined common semantic model is a problem when user-defined analyses and data linking to external resources are required. The objectives of this study are: (1) design of a semantic model for local cancer registries; (2) development of a semantically-enabled cancer registry based on this model; and (3) semantic exploitation of the cancer registry for analysing and visualising disease courses. Our proposal is based on our previous results and experience working with semantic technologies. Data stored in a cancer registry database were transformed into RDF employing a process driven by OWL ontologies. The semantic representation of the data was then processed to extract semantic patient profiles, which were exploited by means of SPARQL queries to identify groups of similar patients and to analyse the disease timelines of patients. Based on the requirements analysis, we have produced a draft of an ontology that models the semantics of a local cancer registry in a pragmatic extensible way. We have implemented a Semantic Web platform that allows transforming and storing data from cancer registries in RDF. This platform also permits users to formulate incremental user-defined queries through a graphical user interface. The query results can be displayed in several customisable ways. The complex disease timelines of individual patients can be clearly represented. Different events, e.g. different therapies and disease courses, are presented according to their temporal and causal relations. The presented platform is an example of the parallel development of ontologies and applications that take advantage of semantic web technologies in the medical field. The semantic structure of the representation renders it easy to

  20. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  1. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  2. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  3. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  4. EPA Facility Registry Service (FRS): RCRA_INACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of hazardous waste...

  5. EPA Facility Registry Service (FRS): RCRA_ACTIVE

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of active hazardous...

  6. EPA Linked Open Data: Facility Registry Service

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Facility Registry Service (FRS) identifies facilities, sites, or places subject to environmental regulation or of environmental interest to EPA programs or...

  7. EPA Facility Registry Service (FRS): RCRA_TSD

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of Hazardous Waste...

  8. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  9. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  10. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  11. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  12. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  13. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  14. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  15. CKD.QLD: establishment of a chronic kidney disease [CKD] registry in Queensland, Australia.

    Science.gov (United States)

    Venuthurupalli, Sree K; Hoy, Wendy E; Healy, Helen G; Cameron, Anne; Fassett, Robert G

    2017-06-07

    Chronic kidney disease [CKD] is recognised as a global public health problem. Until recently, the majority of information informing on CKD has been generated from renal registries reporting on patients with end-stage kidney disease [ESKD] and on renal replacement therapy [RRT]. There has been a paucity of information on pre-dialysis CKD cohorts, and many issues related to these poorly described populations are unresolved. To this end, international organizations have called for CKD surveillance systems across all countries. In Australia, we have responded by developing the Chronic Kidney Disease in Queensland [CKD.QLD] with three main platforms consisting of CKD Registry, clinical trials and development of biobank. This registry which is the core component of CKD surveillance was conceptualized specifically for the pre-dialysis population in the public health system in Queensland, Australia. Recruitment started in May 2011, and to date the Registry has evolved as one of the largest CKD cohorts in the world with recruitment close to 7000 patients. The Registry has had many outcomes, including being the nidus for Australia's first National Health and Medical Research Council [NHMRC] CKD Centre of Research Excellence [CKD.CRE]. The Registry, with its linkage to Queensland Health datasets, is reporting, and is expected to continue generating, significant information on multiple aspects of CKD, its trajectory, management and patient outcomes. Intent of the CKD.CRE is to facilitate an expanded Registry network that has representation from health services, both public and private, across Australia.

  16. A need for national registry of radiation workers

    International Nuclear Information System (INIS)

    Marathe, P.K.; Krishnan, D.; Massand, O.P.; Dhond, R.V.

    1988-01-01

    In India about 33000 radiation workers are monitored regularly from a centralised Personnel Monitoring Service conducted by the Division of Radiological Protection, B.A.R.C. In view of the large dose data accumulated over the past thirty years it is only logical to investigate for biological effects if any. The need to initiate National Registry of Radiation Workers (NRRW) is pointed out. Such a registry is in force in U.K., Canada, France and Japan etc. Even in case of negative findings, such an exercise would help in allaying fears among radiation workers in particular and the public in general. (author)

  17. EPA Facility Registry Service (FRS): ER_TRI

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  18. EPA Facility Registry Service (FRS): ER_TSCA

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry System (FRS) for the subset of facilities that link...

  19. EPA Facility Registry Service (FRS): RCRA_LQG

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...

  20. EPA Facility Registry Service (FRS): AIRS_AFS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web feature service contains location and facility identification information from EPA's Facility Registry Service (FRS) for the subset of facilities that link...