WorldWideScience

Sample records for black sigatoka attack

  1. Biological control of banana black Sigatoka disease with Trichoderma

    OpenAIRE

    Poholl Adan Sagratzki Cavero; Rogério Eiji Hanada; Luadir Gasparotto; Rosalee Albuquerque Coelho Neto; Jorge Teodoro de Souza

    2015-01-01

    Black Sigatoka disease caused by Mycosphaerella fijiensis is the most severe banana disease worldwide. The pathogen is in an invasive phase in Brazil and is already present in most States of the country. The potential of 29 isolates of Trichoderma spp. was studied for the control of black Sigatoka disease under field conditions. Four isolates were able to significantly reduce disease severity and were further tested in a second field experiment. Isolate 2.047 showed the best results in both f...

  2. Biological control of banana black Sigatoka disease with Trichoderma

    Directory of Open Access Journals (Sweden)

    Poholl Adan Sagratzki Cavero

    2015-06-01

    Full Text Available Black Sigatoka disease caused by Mycosphaerella fijiensis is the most severe banana disease worldwide. The pathogen is in an invasive phase in Brazil and is already present in most States of the country. The potential of 29 isolates of Trichoderma spp. was studied for the control of black Sigatoka disease under field conditions. Four isolates were able to significantly reduce disease severity and were further tested in a second field experiment. Isolate 2.047 showed the best results in both field experiments and was selected for fungicide sensitivity tests and mass production. This isolate was identified as Trichoderma atroviride by sequencing fragments of the ITS region of the rDNA and tef-1α of the RNA polymerase. Trichoderma atroviride was as effective as the fungicide Azoxystrobin, which is recommended for controlling black Sigatoka. This biocontrol agent has potential to control the disease and may be scaled-up for field applications on rice-based solid fermentation

  3. efficient screening procedure for black sigatoka disease of banana ...

    African Journals Online (AJOL)

    ACSS

    2015, African Crop Science Society. EFFICIENT SCREENING PROCEDURE FOR BLACK SIGATOKA DISEASE OF BANANA. A. KUMAKECH1, 2, H.J. LYNGS JØRGENSEN3, R. EDEMA2 and P. OKORI 2. 1 National Agricultural Research Organization (NARO), Ngetta Zonal Agricultural Research and Development. Institute ...

  4. Improvement of bananas for black sigatoka and panama disease ...

    African Journals Online (AJOL)

    Improvement of bananas for black sigatoka and panama disease resistance through genetic manipulation. K De Smet, B Panis, L Sagi, BPA Cammue, R Swennen. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  5. Economic Impact and Trade Implications of the Introduction of Black Sigatoka (Mycosphaerella figiensis) into Puerto Rico

    OpenAIRE

    Alamo, Carmen I.; Evans, Edward A.; Brugueras, Alba; Nalampang, Sikavas

    2007-01-01

    This article addresses the issues of the potential impacts of the introduction of black sigatoka into Puerto Rico under situations in which the government assists growers in managing the spread of the disease, with and without prohibitions on imports of plantains and bananas. An equilibrium displacement model is used to quantify the impact of black sigatoka. The results indicate that under both scenarios the net economic benefits to society were negative. Over the long term, the government wo...

  6. The Draft Genome Sequence of Mycosphaerella fijiensis, the Black Sigatoka Pathogen of Banana

    Science.gov (United States)

    Mycosphaerella fijiensis is a fungal pathogen of banana and the causal agent of the devastating Black Sigatoka or black leaf streak disease. Its control requires weekly fungicide applications when bananas are grown under disease-conducive conditions, which mostly represent precarious tropical enviro...

  7. Influence of soil fertility status on host response to black Sigatoka ...

    African Journals Online (AJOL)

    The severity of black Sigatoka disease on the first and second cycle plantains managed under varying soil fertility status was assessed using Zero fertilizer and mulch as control, Sawdust mulch (SDM) applied at 20 t/ ha, and 50,100, and 150 kg NPK 20-10-10 /ha, applied sole and in combination with each fertilizer rate in a ...

  8. Same Disease—different research strategies: Bananas and Black Sigatoka in Brazil

    NARCIS (Netherlands)

    Cordoba, D.M.; Jansen, K.

    2014-01-01

    Fungal disease epidemics have the potential to bring about drastic innovations. However, in the case of the Black Sigatoka (Mycosphaerella fijiensis) fungus in bananas, producers and international traders are still awaiting a breakthrough in crop protection research. Using the cases of Brazil and

  9. Evaluation of Musa spp. hybrids for resistance to black Sigatoka, caused by Mycosphaerella fijiensis Morelet

    Science.gov (United States)

    In Puerto Rico, bananas and plantains are important agricultural commodities; their combined production totaled 133,500 tons in 2008. Black and yellow Sigatoka leaf spot diseases, caused by Mycosphaerella fijiensis and M. musicola respectively, are responsible for significant losses of these crops ...

  10. A new mechanism for reduced sensitivity to demethylation-inhibitor fungicides in the fungal banana black Sigatoka pathogen Pseudocercospora fijiensis

    NARCIS (Netherlands)

    Díaz-Trujillo, C.; Chong, P.; Stergiopoulos, I.; Meijer, H.J.G.; Wit, de P.J.G.M.; Kema, G.H.J.

    2017-01-01

    The Dothideomycete Pseudocercospora fijiensis, previously Mycosphaerella fijiensis, is the causal agent of black Sigatoka, one of the most destructive diseases of bananas and plantains. Disease management depends on fungicide applications with a major share for sterol demethylation-inhibitors

  11. Field Plot Techniques for Black Sigatoka Evaluation in East African Highland Bananas

    Directory of Open Access Journals (Sweden)

    Okoro, JU.

    1997-01-01

    Full Text Available Number of plants per experimental unit and number of replications for the efficient and precise assessment of black sigatoka leaf spot disease caused by Mycosphaerella fijiensis in East African Highland bananas were determined. Two representative cultivars were used. Host response to black sigatoka infection was measured by recording the youngest leaf with necrotic spots. The number of plants per experimental unit was determined, using the methods of maximum curvature and comparison of variances, while the number of replications was estimated by Hatheway's method. The optimum experimental plot size was 3 plants (18 m2 for the beer banana cultivar 'Igitsiri', and 30 plants (180 m2 for the cooking banana cultivar 'Igisahira Gisanzwe', using the comparison of variances method. However, the optimum plot size was 15 plants (90 m2 for both cultivars using the method of maximum curvature. The latter statistical method was preferred because of the low precision of the estimates in the former method. Unreplicated trials with plots of 15 plants could be adequate to assess black sigatoka response in East African bananas if uniform disease pressure exists.

  12. Inheritance of black sigatoka disease resistance in plantain-banana (Musa spp.) hybrids.

    Science.gov (United States)

    Ortiz, R; Vuylsteke, D

    1994-10-01

    Black sigatoka (Mycosphaerella fijiensis Morelet), an airborne fungal leaf-spot disease, is a major constraint to plantain and banana (Musa spp.) production world-wide. Gaining further knowledge of the genetics of host-plant resistance will enhance the development of resistant cultivars, which is considered to be the most appropriate means to achieve stable production. Genetic analysis was conducted on 101 euploid (2x, 3x and 4x) progenies, obtained from crossing two susceptible triploid plantain cultivars with the resistant wild diploid banana 'Calcutta 4'. Segregating progenies, and a susceptible reference plantain cultivar, were evaluated over 2 consecutive years. Three distinct levels of host response to black sigatoka were defined as follows: susceptible ( 10). Segregation ratios for resistance at the 2x level fitted a genetic model having one major recessive resistance allele (bs 1) and two independent alleles with additive effects (bsr 2 and bsr 3). A similar model explains the results at the 4x level assuming that the favourable resistance alleles have a dosage effect when four copies of them are present in their respective loci (bs i (4) ). The proposed model was further validated by segregation data of S 1 progenies. Mechanisms of black sigatoka resistance are discussed in relation to the genetic model.

  13. Azadirachta indica reduces black sigatoka in east african highland banana by direct antimicrobial effects against Mycosphaerella fijiensis without inducing resistance

    DEFF Research Database (Denmark)

    Kumakech, Alfred; Jørgensen, Hans Jørgen Lyngs; Collinge, David B.

    2017-01-01

    Black Sigatoka is a major disease of East African highland cooking bananas in Uganda. Aqueous extracts of Azadirachta indica, Cinnamomum zeylanicum and Capsicum annuum have shown the potential to reduce Black Sigatoka in banana plantlets. The mechanisms by which plant extracts confer protection...... expression was compared in susceptible (cv. Musakala, genomic group AAA-EA) and resistant (cv. Kayinja, genomic group ABB) banana cultivars. Additionally, Musakala treated with A indica extract at 1 day before inoculation (DBI) was tested for induction of defence-related genes at 0, 10 and 20 days after...

  14. Combating a Global Threat to a Clonal Crop : Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis) Genomes Reveal Clues for Disease Control

    NARCIS (Netherlands)

    Arango Isaza, Rafael E.; Diaz-Trujillo, Caucasella; Dhillon, Braham; Aerts, Andrea; Carlier, Jean; Crane, Charles F.; de Jong, Tristan V.; de Vries, Ineke; Dietrich, Robert; Farmer, Andrew D.; Fereira, Claudia Fortes; Garcia, Suzana; Guzman, Mauricio; Hamelin, Richard C.; Lindquist, Erika A.; Mehrabi, Rahim; Quiros, Olman; Schmutz, Jeremy; Shapiro, Harris; Reynolds, Elizabeth; Scalliet, Gabriel; Souza, Manoel; Stergiopoulos, Ioannis; Van der Lee, Theo A. J.; De Wit, Pierre J. G. M.; Zapater, Marie-Francoise; Zwiers, Lute-Harm; Grigoriev, Igor V.; Goodwin, Stephen B.; Kema, Gert H. J.

    2016-01-01

    Black Sigatoka or black leaf streak disease, caused by the Dothideomycete fungus Pseudocercospora fijiensis (previously: Mycosphaerella fijiensis), is the most significant foliar disease of banana worldwide. Due to the lack of effective host resistance, management of this disease requires frequent

  15. Climatic Forcing on Black Sigatoka Disease of Banana Crops in Urabá, Colombia

    Science.gov (United States)

    Ochoa, A.; Álvarez, P.; Poveda, G.; Buriticá, P.; Mira, J.

    2012-12-01

    Bananas are widely the most consumed fruit in the world and Colombia is one of the major producers and exporters of bananas worldwide. We analyzed the climatic forcing agents on banana crops in the Urabá region, the largest banana producer in Colombia. Although this crop is harvested continuously throughout the entire year, it exhibits climate driven seasonality. Black Sigatoka Disease (BSD) has been the most important threat for banana production worldwide. BSD attacks plant leaves producing small spots of dead material. When BSD is not treated, it can grow enough to damage the entire leaf, reducing both growth and developmental rates which may result in the loss of the plant. BSD is caused by Mycosphaerella fijiensis. This fungus is dispersed by wind with its inoculation occurring when there is water on the leaf. Thus, climatic variables such as wind, relative humidity of air (RH) and leaf wetness duration (LWD) all affect phenological phases of the banana crop (suckering, growing, flowering and harvesting). This study was carried out at the Cenibanano Experimental Plot located in Carepa (Urabá, Colombia) during 2007-2012. We used phytopathologic and weather data from the Cenibanano database along with climatic data from the North American Regional Reanalysis (NARR). BSD was diagnosed using the Biological Forecasting method. Results show that rainfall drives both plant and disease development rate. During wet periods the Foliar Emission Rate exceeds rates measured during dry periods. Although wetness is a positive factor for fungal reproduction (and BSD), it also heightens the chance for the plant to create more foliar tissue to fight against BSD. Hence, during wet periods the Severity Index of BSD is reduced in relation to dry periods. This effect was also observed at the inter-annual scale of the El Niño - South Oscillation (ENSO) phenomenon. During the ENSO warm/cold phase (El Niño/La Niña) rainfall anomalies in Colombia were observed as negative

  16. The origin, versatility and distribution of azole fungicide resistance in the banana black Sigatoka pathogen Pseudocercospora fijiensis

    NARCIS (Netherlands)

    Chong Aguirre, Pablo A.

    2016-01-01

    Pseudocercospora fijiensis causes black Sigatoka disease of banana. It is one of the most damaging threats of the crop requiring excessive fungicide applications for disease control as the major export “Cavendish” clones are highly susceptible. The consequence of this practice is the

  17. The origin, versatility and distribution of azole fungicide resistance in the banana black Sigatoka pathogen Pseudocercospora fijiensis

    NARCIS (Netherlands)

    Chong Aguirre, Pablo A.

    2016-01-01

    Pseudocercospora fijiensis causes black Sigatoka disease of banana. It is one of the most damaging threats of the crop requiring excessive fungicide applications for disease control as the major export “Cavendish” clones are highly susceptible. The consequence of this practice is the

  18. Plantio adensado não controla a sigatoka-negra da bananeira Dense plantation do not control banana black-sigatoka

    Directory of Open Access Journals (Sweden)

    Luadir Gasparotto

    2008-01-01

    Full Text Available Algumas publicações relatam que o adensamento populacional dos bananais reduz a severidade da sigatoka-negra (Mycosphaerella fijiensis. Instalou-se um ensaio com cinco tratamentos e quatro repetições. Os tratamentos 1.600, 2.000, 2.400, 2.800 e 3.200 plantas.ha-1 da cultivar D'Angola foram instalados em parcelas agrupadas de 2.000 m² cada. O tamanho das parcelas foi fixo e o número de plantas por parcela variou conforme o espaçamento adotado para cada população. A área de 2.000 m² foi dividida em quatro subáreas de 500 m², considerando-as como parcelas. Em cada subárea selecionaram-se 15 plantas centrais para serem avaliadas. Na época do florescimento registraram-se a severidade da doença na folha n.°10 e o número de folhas viáveis. Na colheita, a altura e o diâmetro do pseudocaule e o peso dos cachos, das pencas e dos frutos. A análise conjunta dos dados indica que todos os tratamentos foram semelhantes entre si e que o adensamento das plantas não controlou a sigatoka-negra.Many publications show that plantations of high density of bananas decrease the severity of black-sigatoka (Mycosphaerella fijiensis. To test this hypothesis it was instaled an experiment with five treatments and four repetitions. The treatments were density plant of 1.600, 2.000, 2.400, 2.800 e 3.200 plant.ha-1. The cultivar planted was D'Angola and each plot had fixed 2.000 m², the number of plants in each plot changed in accordance with the treatment tested. The plots were divided in four subplots of 500 m² where 15 plants located in the center were measured. The evaluation of severity was carried out in the leaf number ten during the flowering period. It was also evaluated the numbers of viable leaves, height, diameter and weight of production (banch, bunches and fruits. The analyses did not show effect of high density in the parameter measured and it was conclued that the treatments tested had not control black-sigatoka.

  19. Sensitivity of Mycosphaerella fijiensis, Causal Agent of Black Sigatoka of Banana, to Propiconazole.

    Science.gov (United States)

    Romero, R A; Sutton, T B

    1997-01-01

    ABSTRACT One hundred monoascosporic isolates of Mycosphaerella fijiensis were collected in February and November 1994 from each of two banana (Musa spp.) plantations in Costa Rica. Locations at San Pablo and Coopecariari had been sprayed with propiconazole for the past 7 years to control black Sigatoka. One hundred monoascosporic isolates from a third location, San Carlos, with no history of fungicide use, also were tested for sensitivity to propiconazole. Fifty percent effective concentration (EC(50)) values were calculated for individual isolates by regressing the relative inhibition of colony growth against the natural logarithm of the fungicide concentration. In the February sample, the mean EC(50) values for San Pablo and Coopecariari populations were 0.06 and 0.05 mug a.i. ml(-1), respectively, which were not statistically different (P = 0.05). The mean EC(50) value of the population at San Carlos was 0.008 mug a.i. ml(-1), which was significantly lower (P = 0.001) than the mean EC(50) values obtained at San Pablo and Coopecariari. Frequency distributions of EC(50) values of isolates from the three populations collected in February showed that 80% of isolates from San Pablo and Coopecariari had EC(50) values greater than the highest EC(50) value from San Carlos, indicating a significant shift in reduced sensitivity to propiconazole. Isolates collected in November 1994, after eight treatments of propiconazole at San Pablo and Coopecariari, showed a significant increase in mean EC(50) values compared with the means observed in February. The high proportion of isolates with reduced sensitivity to propiconazole may account for the unsatisfactory control of black Sigatoka between 1992 and 1993 in the two banana plantations at San Pablo and Coopecariari.

  20. Evaluation of indicators to determine black sigatoka susceptibility in five banana hybrid cultivars ( Mycosphaerella fijiensis Morelet

    Directory of Open Access Journals (Sweden)

    Reinaldo Pérez Armas

    2014-10-01

    Full Text Available This work had the objective of determining the variation of growth, development and yields indicators of five banana hybrid cultivars. The research was carried in the Agroindustrial Farm Marta Abreu, Cienfuegos, in a carbonated Brown soil. It was made a characterization of the soil and the climatic variables. A field experiment was developed with a design in blocks at random with four repetitions with five banana cultivars as treatments (‘FHIA-18’, ‘FHIA-02’, ‘FHIA-01’, ‘SH-3436 L-9’ and ‘FHIA-23’ . The plots had an area of 56 m2 with 16 plants, been evaluated eight for a total 32 plants for cultivar. The variable evaluated were the spotty youngest leaf, number of leaf by plant, incubation time (PI, evolution time of symptoms (TES and developing time of symptoms (TED, severity index (IS, active photosynthetic index (INHE and infection relative index. The cultivars FHIA-23 and SH 3436 L9 presented a hither time of development of the disease. In a general the more susceptible cultivar to the black Sigatoka under of the farm condition was FHIA-23. The clones FHIA-18, FHIA-01 and FHIA-02 presented the best behavior in the spotted youngest leaf and the number of leaf up to the flowering and the harvest time. The clones FHIA-01 and FHIA-18 have the better response to Black Sigatoka attending to the incubation period, the evolution time of the symptom and develo pment time of the disease

  1. Modified atmosphere together with refrigeration in the conservation of bananas resistant to black Sigatoka

    Directory of Open Access Journals (Sweden)

    Célia Lúcia Siqueira

    Full Text Available ABSTRACT The aim of this work was to evaluate the chemical, physical and sensory characteristics of the Caipira and Pakovan Ken cultivars of the banana (Musa spp., resistant to black Sigatoka (Mycosphaerella fijiensis Morelet, both with and without low-density polyethylene wrapping and together with refrigeration during the period of post-harvest storage. The experiment was carried out in 2012, in a randomised block design and an arrangement of lots split over time. A 3 x 2 factorial scheme was used for the lots, consisting of fruit with no wrapping and fruit wrapped in 10 and 16 µm polyethylene film, and two cultivars, Caipira and Pakovan Ken. The sub-lots consisted of evaluations made at intervals of six days (0, 6, 12, 18 and 24 and of two days (0, 2, 4, 6 and 8, for fruit stored at temperatures of 12, 15 and 25 ºC respectively. The following variables were evaluated: soluble solids, titratable acidity, ratio of soluble solids to titratable acidity, hydrogen potential, total soluble sugars, fruit colouration and sensory analysis. The polyethylene film together with the refrigeration enabled the fruit to be stored for 24 days, maintaining post-harvest characteristics suitable for consumption. The Pakovan Ken cultivar stood out when compared to the Caipira, with higher values for the fruit attributes under evaluation.

  2. Simulation of defoliation caused by Black Sigatoka in the yield and quality of banana 'Nanica ' fruits

    Directory of Open Access Journals (Sweden)

    Juliana Domingues Lima

    Full Text Available ABSTRACT: Defoliation caused by Black Sigatoka in yield and quality of banana 'Nanica' was stimulated in this study. A completely randomized 2x8 factorial design with six repetitions was used, in which period of bunch formation and number of leaves at flowering were established as factors. Plants for defoliation were selected on 04/05/2013 (Period 1, and on 07/01/2014 (Period 2. Six to to 13 leaves remained per plant by removing those with more than 50% of blade with injury or senescence. More appropriate climatic conditions before and after flowering, promoted greater mass accumulation in the bunch in Period 2. The increased number of leaves at flowering increased the length of the fruit and the mass of 4th hand, as well as the bunch mass and postharvest period. Defoliation is suggested only for non-functional leaves as well as the maintenance of at least 10 leaves per plant, independent of the period of bunch formation.

  3. Influence Of Crop Management And Soil On Plantain [Musa spp. z AAB Group Response To Black Sigatoka Infection In Southeastern Nigeria

    Directory of Open Access Journals (Sweden)

    Mobambo, KN.

    1994-01-01

    Full Text Available An on-farm survey was carried out to assess the severity of black sigatoka caused by Mycosphaerella fijiensis Morelet on plantain in southeastern Nigeria. Two different geomor-phological zones (Meander belts and Coastal plain sands were surveyed. Four locations were selected for each zone and two traditional farming systems (backyard and field were studied in each location. Based on geomorphological zones, less black sigatoka infection was observed in the Meander belts than in the Coastal plain sands. On farming systems basis, plantain grown in the backyard gardens had lower disease severity than that planted in the field plots. This difference in black sigatoka severity is attributable to the higher soil fertility in the Meander belts than in the Coastal plain sands and in the backyards than in the fields.

  4. Combating a Global Threat to a Clonal Crop: Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis) Genomes Reveal Clues for Disease Control

    NARCIS (Netherlands)

    Arango Isaza, Rafael E.; Diaz-Trujillo, Caucasella; Dhillon, Braham; Aerts, Andrea; Carlier, Jean; Crane, Charles F.; V. de Jong, Tristan; de Vries, Ineke; Dietrich, Robert; Farmer, Andrew D.; Fortes Fereira, Claudia; Garcia, Suzana; Guzman, Mauricio; Hamelin, Richard C.; Lindquist, Erika A.; Mehrabi, Rahim; Quiros, Olman; Schmutz, Jeremy; Shapiro, Harris; Reynolds, Elizabeth; Scalliet, Gabriel; Souza Manoel, Jr.; Stergiopoulos, Ioannis; Van der Lee, Theo A. J.; De Wit, Pierre J. G. M.; Zapater, Marie-Françoise; Zwiers, Lute-Harm; Grigoriev, Igor V.; Goodwin, Stephen B.; Kema, Gert H. J.

    2016-01-01

    Black Sigatoka or black leaf streak disease, caused by the ascomycete fungus Pseudocercospora fijiensis, inflicts huge costs on banana producers, due to crop losses and expenses for disease control. The global banana export trade relies on Cavendish clones that are highly susceptible to P.

  5. Agrobacterium-mediated transformation of Mycosphaerella fijiensis, the devastating Black Sigatoka pathogen of bananas

    NARCIS (Netherlands)

    Díaz-Trujillo, C.; Adibon, H.; Kobayashi, K.; Zwiers, L.H.; Souza, M.T.; Kema, G.H.J.

    2010-01-01

    Mycosphaerella fijiensis, M. musicola en M. eumusae veroorzaken de Sigatoka-ziekte in banaan. Op dit moment is de toepassing van fungiciden de enige optie om deze ziekte te bestrijden. Het PRPB (Pesticide Reduction Program for Banana) investeert in de ontwikkeling van technieken voor de genotype- en

  6. Plantio irrigado de bananeiras resistentes à Sigatoka-negra consorciado com culturas anuais Irrigated banana resistant to black Sigatoka, with annual intercrops

    Directory of Open Access Journals (Sweden)

    Ildeu de Souza

    2010-03-01

    Full Text Available Com o objetivo de avaliar o plantio irrigado de bananeiras resistentes à Sigatoka-negra consorciado com cultura anuais, na região norte de Minas Gerais, um experimento foi instalado na Fazenda Experimental do Departamento de Ciências Agrárias da Universidade Estadual de Montes Claros, Câmpus de Janaúba-MG. O experimento foi conduzido no período de abril de 2006 a julho de 2007, delineado em blocos casualizados, segundo um esquema de parcelas subdivididas 3 x 5, tendo na parcela as três variedades de bananeiras: Pacovan Ken, Caipira e Thap Maeo, e na subparcela quatro culturas intercalares: Feijão-Pérola, Quiabo-Dardo, Melancia-Crimson-Sweet e Feijão-Caupi, e a testemunha (sem cultura intercalar, com três repetições. Ao todo, foram 756 bananeiras, em 45 parcelas, com 6 plantas úteis cada, constituindo a cultura principal. As culturas intercalares ocuparam as entrelinhas da bananeira, tanto aquelas com as linhas de irrigação como sem linha de irrigação. O plantio da bananeira e das culturas intercalares foi feito no mesmo período, utilizando-se do espaçamento de 3,0 m entre as linhas e 2,0 m entre as covas de bananeira, com microaspersores espaçados de 6 m. Avaliaram-se as características vegetativas e reprodutivas das variedades de bananeiras, no primeiro ciclo. Não foi observado efeito significativo dos cultivos intercalares sobre as variedades de bananeiras, com exceção do número de dias do plantio ao florescimento e do número de dias do plantio à colheita das variedades de bananeiras. O uso do feijão-caupi promoveu atraso no ciclo de produção das três variedades de bananeiras Pacovan Ken, Caipira e Thap Maeo.To assess the irrigated cultivation of banana resistant to black Sigatoka, intercropped with annual crops in the northern region of Minas Gerais, a trial was conducted on an experimental farm of the Universidade Estadual de Montes Claros, in Janaúba-MG. The experiment was carried out from April 2006 to

  7. Combating a global threat to a clonal crop: banana black sigatoka pathogen pseudocercospora fijiensis (synonym mycosphaerella fijiensis) genomes reveal clues for disease control

    Science.gov (United States)

    Mycosphaerella fijiensis is the fungal pathogen that causes black Sigatoka or leaf streak disease of banana. Control of this disease requires weekly applications of fungicides in most cultivation areas. Major problems for disease management are fungicide resistance and the lack of effective genes fo...

  8. The influence of exposure to ultraviolet radiation in simulated sunlight on ascospores causing Black Sigatoka disease of banana and plantain

    Science.gov (United States)

    Parnell, Mark; Burt, P. J. A.; Wilson, Kate

    The influence of ultraviolet (UV) radiation in simulated natural sunlight on the viability of ascospores of Mycosphaerella fijiensis, the cause of Black Sigatoka disease in banana and plantain, has been investigated as part of a study to assess the windborne spread of this pathogen from mainland Central and South America into the Caribbean. Spores were killed following continuous exposure to UV radiation for periods of 6 h or over. This relatively short exposure time suggests that the distances over which viable spores can be transported will be determined not only by the speed of the wind but also the amount of cloud cover and the time off day that spore release occurs. On this basis, wind dispersal of viable spores over distances greater than a few hundred kilometres is unlikely. These conclusions are reinforced by an examination of historical reports of the arrival of the disease in previously uninfected areas of the Americas and Africa.

  9. A new mechanism for reduced sensitivity to demethylation-inhibitor fungicides in the fungal banana black Sigatoka pathogen Pseudocercospora fijiensis.

    Science.gov (United States)

    Diaz-Trujillo, Caucasella; Chong, Pablo; Stergiopoulos, Ioannis; Cordovez, Viviane; Guzman, Mauricio; De Wit, Pierre J G M; Meijer, Harold J G; Scalliet, Gabriel; Sierotzki, Helge; Lilia Peralta, Esther; Arango Isaza, Rafael E; Kema, Gerrit H J

    2017-11-04

    The Dothideomycete Pseudocercospora fijiensis, previously Mycosphaerella fijiensis, is the causal agent of black Sigatoka, one of the most destructive diseases of bananas and plantains. Disease management depends on fungicide applications, with a major contribution from sterol demethylation-inhibitors (DMIs). The continued use of DMIs places considerable selection pressure on natural P. fijiensis populations, enabling the selection of novel genotypes with reduced sensitivity. The hitherto explanatory mechanism for this reduced sensitivity was the presence of non-synonymous point mutations in the target gene Pfcyp51, encoding the sterol 14α-demethylase enzyme. Here, we demonstrate a second mechanism involved in DMI sensitivity of P. fijiensis. We identified a 19-bp element in the wild-type (wt) Pfcyp51 promoter that concatenates in strains with reduced DMI sensitivity. A polymerase chain reaction (PCR) assay identified up to six Pfcyp51 promoter repeats in four field populations of P. fijiensis in Costa Rica. We used transformation experiments to swap the wt promoter of a sensitive field isolate with a promoter from a strain with reduced DMI sensitivity that comprised multiple insertions. Comparative in vivo phenotyping showed a functional and proportional up-regulation of Pfcyp51, which consequently decreased DMI sensitivity. Our data demonstrate that point mutations in the Pfcyp51 coding domain, as well as promoter inserts, contribute to the reduced DMI sensitivity of P. fijiensis. These results provide new insights into the importance of the appropriate use of DMIs and the need for the discovery of new molecules for black Sigatoka management. © 2017 The Authors. Molecular Plant Pathology published by British Society for Plant Pathology and John Wiley & Sons Ltd.

  10. Risk analysis of Black Sigatoka occurrence based on polynomial models: a case study

    OpenAIRE

    Bendini, Hugo do Nascimento; Moraes, Wilson da S.; Silva, Silvia H.M.G. da; Tezuka, Erika S.; Cruvinel, Paulo Estevão

    2013-01-01

    A Sigatoka-negra (Mycosphaerella fijiensis) ameaça os bananais comerciais em todas as áreas produtoras do mundo e provoca danos quantitativos e qualitativos na produção, acarretando sérios prejuízos financeiros. Faz-se necessário o estudo da vulnerabilidade das plantas em diversos estádios de desenvolvimento e das condições climáticas favoráveis à ocorrência da doença. Objetivou-se com este trabalho desenvolver um modelo probabilístico baseado em funções polinomiais que represente o risco de ...

  11. Relationship between soil and edaphoclimatic properties and the Black Sigatoka incidence (Mycosphaerella fijiensis Morelet) in the Banana Region of Magdalena - Colombia

    OpenAIRE

    Sonia Esperanza Aguirre Forero; Nelson Virgilio Piraneque Gambasica; Juan Carlos Menjivar Flores

    2012-01-01

    Black Sigatoka (Mycosphaerella fijiensis Morelet) disease is the greatest limiting factor affecting banana crop production across the world. The pathogen´s severity has reached epidemic levels and is exacerbated by the cultivation of monocultures and genetically uniform clones. In Colombia, losses occur in the exporting regions of Uraba and Magdalena, where its management depends on the use of agrochemicals, without achieving eradication. In the search for methods to reduce the pathogen’s eff...

  12. Analysis of some components of resistance in the hybrids of banana FHIA-23 and plantain FHIA-21 to black (Mycosphaerella fijiensis Morelet) and yellow (M. musicola Leach) sigatokas

    International Nuclear Information System (INIS)

    Guzman Piedrahita, Oscar Adrian; Castano Zapata, Jairo

    2009-01-01

    It was determined the performance of FHIA-20 and FHIA-23 to both Mycosphaerella fijiensis and M. musicola. The study was conducted in a screen house at the Montelindos farm of the University of Caldas, at 1010 most, average temperature 22.8 Celsius degrade, annual precipitation 2200 mm, and relative humidity 76%. Conidia of Paracercospora fijiensis and Pseudocercospora musae, and mixture of both, were inoculated to seedlings having between 4 and 6 leaves. It was evaluated incubation period (IP) of both pathogens, times of evolution of symptoms (TES) and disease development (TDD), also, lesions per leaf (NLL). In FHIA-20, P. musae, P. fijiensis and P. musae+P. fijiensis, had a longer IP than in Dominico Harton, being 3, 20 and 10 days longer, respectively; in addition, the TES of yellow and black sigatokas and the combination of both diseases, was more prolonged in FHIA-20, in 5, 49 and 26 days, respectively, than in local material. In FHIA-23, P. musae, P. fijiensis and P. musae + P. fijiensis, had 2, 6 and 3 more days of IP, respectively, than in Gros Michel; furthermore, FHIA-23 had a TES of yellow and black sigatokas and the combination of both, higher than in Gros Michel, in 9, 16 and 11 days, respectively. In general, FHIA-23 behaved as highly resistant and tolerant to black and yellow sigatokas, respectively, and FHIA-23, resistant.

  13. Aceitação de cultivares de bananas resistentes à Sigatoka Negra junto ao consumidor da região Nordeste do Brasil Acceptance of banana cultivars resistant to Black Sigatoka by the consumer market of Northeast Brazilian region

    Directory of Open Access Journals (Sweden)

    Deborah dos Santos Garruti

    2012-05-01

    Full Text Available O Mal da Sigatoka Negra é devastador para as cultivares tradicionais de banana. No Brasil, cultivares resistentes estão sendo desenvolvidas, mas se a preferência do consumidor não for considerada, o programa de melhoramento pode falhar. Neste trabalho, a aceitabilidade de quatro cultivares resistentes foi acessada no Nordeste brasileiro e comparada a quatro variedades comerciais. Dois grupos de consumidores participaram: adultos jovens e donas de casa. Escala hedônica foi aplicada para aparência externa dos cachos, aceitação global e aceitação por atributos dos frutos (aparência sem a casca, aroma, sabor e textura, além de testes de preferência e intenção de compra. Os dados foram submetidos à ANOVA e Mapa de Preferência Interno. Mulheres e jovens mostraram opiniões semelhantes. As cultivares 'Preciosa' e 'Pacovan Ken' mostraram ser as mais promissoras, sendo que a primeira já pode substituir as cultivares comerciais 'Prata' e 'Pacovan' sem prejudicar a sua aceitabilidade, mas a 'Pacovan Ken' ainda precisa ser melhorada quanto à aparência.The Black Sigatoka Disease is devastating to traditional banana cultivars. In Brazil, resistant cultivars are being developed but if the consumer's preference is not taken into account, the breeding program may not succeed. In this research the acceptability of four resistant cultivars was accessed in the Northeastern Brazilian region and compared to four commercial varieties. Two groups of consumers participated: young adults and housewives. Hedonic scale was applied to external appearance of bunches, global acceptance and acceptance of fruits' attributes (appearance without peel, aroma, flavor and texture. Preference and purchase intent were also evaluated. Data were submitted to ANOVA and Preference Mapping. Women and young adults showed similar opinions. 'Preciosa' and 'Pacovan Ken' cultivars showed to be the most promising ones. 'Preciosa' can already substitute the commercial 'Prata

  14. Construction and characterization of a bacterial artificial chromosome library of the causal agent of Black Sigatoka fungal leaf spot disease of banana and plantain, Mycosphaerella fijiensis.

    Science.gov (United States)

    Canto-Canché, Blondy; Guillén-Maldonado, Diana Karina; Peraza-Echeverría, Leticia; Conde-Ferráez, Laura; James-Kay, Andrew

    2007-05-01

    A bacterial artificial chromosome library of the causal agent of the Black Sigatoka leaf spot disease of banana and plantain, Mycosphaerella fijiensis, has been constructed using a non-sphaeroplasting technique and characterized using both homologous and heterologous probes. After first and a second size selection of PFGE-fractionated DNA, a ligation was obtained using a 1:4 molar ratio (insert:vector). One hundred random clones were analyzed, and the mean insert size was estimated to be 90 kb. The range of the insert sizes was between 40 and 160 kb. The highest percentage of inserts belonged to the range between 80 and 100 kb; 32% of the inserts had 2 or 3 internal NotI sites. This library consists of 1920 clones, if the genomic size is at least 35 Mb, then this represents 4.9 x genome equivalents, which was supported by hybridization results with homologous and heterologous probes.

  15. Combating a Global Threat to a Clonal Crop: Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis Genomes Reveal Clues for Disease Control.

    Directory of Open Access Journals (Sweden)

    Rafael E Arango Isaza

    2016-08-01

    Full Text Available Black Sigatoka or black leaf streak disease, caused by the Dothideomycete fungus Pseudocercospora fijiensis (previously: Mycosphaerella fijiensis, is the most significant foliar disease of banana worldwide. Due to the lack of effective host resistance, management of this disease requires frequent fungicide applications, which greatly increase the economic and environmental costs to produce banana. Weekly applications in most banana plantations lead to rapid evolution of fungicide-resistant strains within populations causing disease-control failures throughout the world. Given its extremely high economic importance, two strains of P. fijiensis were sequenced and assembled with the aid of a new genetic linkage map. The 74-Mb genome of P. fijiensis is massively expanded by LTR retrotransposons, making it the largest genome within the Dothideomycetes. Melting-curve assays suggest that the genomes of two closely related members of the Sigatoka disease complex, P. eumusae and P. musae, also are expanded. Electrophoretic karyotyping and analyses of molecular markers in P. fijiensis field populations showed chromosome-length polymorphisms and high genetic diversity. Genetic differentiation was also detected using neutral markers, suggesting strong selection with limited gene flow at the studied geographic scale. Frequencies of fungicide resistance in fungicide-treated plantations were much higher than those in untreated wild-type P. fijiensis populations. A homologue of the Cladosporium fulvum Avr4 effector, PfAvr4, was identified in the P. fijiensis genome. Infiltration of the purified PfAVR4 protein into leaves of the resistant banana variety Calcutta 4 resulted in a hypersensitive-like response. This result suggests that Calcutta 4 could carry an unknown resistance gene recognizing PfAVR4. Besides adding to our understanding of the overall Dothideomycete genome structures, the P. fijiensis genome will aid in developing fungicide treatment schedules

  16. Combating a Global Threat to a Clonal Crop: Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis) Genomes Reveal Clues for Disease Control.

    Science.gov (United States)

    Arango Isaza, Rafael E; Diaz-Trujillo, Caucasella; Dhillon, Braham; Aerts, Andrea; Carlier, Jean; Crane, Charles F; V de Jong, Tristan; de Vries, Ineke; Dietrich, Robert; Farmer, Andrew D; Fortes Fereira, Claudia; Garcia, Suzana; Guzman, Mauricio; Hamelin, Richard C; Lindquist, Erika A; Mehrabi, Rahim; Quiros, Olman; Schmutz, Jeremy; Shapiro, Harris; Reynolds, Elizabeth; Scalliet, Gabriel; Souza, Manoel; Stergiopoulos, Ioannis; Van der Lee, Theo A J; De Wit, Pierre J G M; Zapater, Marie-Françoise; Zwiers, Lute-Harm; Grigoriev, Igor V; Goodwin, Stephen B; Kema, Gert H J

    2016-08-01

    Black Sigatoka or black leaf streak disease, caused by the Dothideomycete fungus Pseudocercospora fijiensis (previously: Mycosphaerella fijiensis), is the most significant foliar disease of banana worldwide. Due to the lack of effective host resistance, management of this disease requires frequent fungicide applications, which greatly increase the economic and environmental costs to produce banana. Weekly applications in most banana plantations lead to rapid evolution of fungicide-resistant strains within populations causing disease-control failures throughout the world. Given its extremely high economic importance, two strains of P. fijiensis were sequenced and assembled with the aid of a new genetic linkage map. The 74-Mb genome of P. fijiensis is massively expanded by LTR retrotransposons, making it the largest genome within the Dothideomycetes. Melting-curve assays suggest that the genomes of two closely related members of the Sigatoka disease complex, P. eumusae and P. musae, also are expanded. Electrophoretic karyotyping and analyses of molecular markers in P. fijiensis field populations showed chromosome-length polymorphisms and high genetic diversity. Genetic differentiation was also detected using neutral markers, suggesting strong selection with limited gene flow at the studied geographic scale. Frequencies of fungicide resistance in fungicide-treated plantations were much higher than those in untreated wild-type P. fijiensis populations. A homologue of the Cladosporium fulvum Avr4 effector, PfAvr4, was identified in the P. fijiensis genome. Infiltration of the purified PfAVR4 protein into leaves of the resistant banana variety Calcutta 4 resulted in a hypersensitive-like response. This result suggests that Calcutta 4 could carry an unknown resistance gene recognizing PfAVR4. Besides adding to our understanding of the overall Dothideomycete genome structures, the P. fijiensis genome will aid in developing fungicide treatment schedules to combat this

  17. Progresso da sigatoka-negra (Mycosphaerella fijiensis em bananeiras após a emissão do cacho no Município de Cáceres, Mato Grosso-Brasil Progress of black sigatoka (Mycosphaerella fijiensis in banana plants after the bunch emergence in the district of Cáceres, Mato-Grosso-Brazil

    Directory of Open Access Journals (Sweden)

    Márcia Benedita Martins

    2007-09-01

    Full Text Available A sigatoka-negra, causada pelo fungo Mycosphaerella fijiensis, pode causar 100% de perdas na produção das cultivares suscetíveis. O objetivo deste trabalho foi avaliar o progresso da sigatoka-negra em bananeiras após a emissão do cacho no Município de Cáceres, Mato Grosso. O experimento foi conduzido no período de fevereiro a dezembro de 2004 em plantios das cultivares Grande Naine, Maçã e Farta Velhaco, sendo esta última uma cultivar de plátano, do grupo Terra. As avaliações foram efetuadas a intervalos de 15 dias, quantificando-se, através de uma escala diagramática, a severidade da sigatoka-negra em todas as folhas de 5 plantas de cada cultivar, marcadas logo após a emissão das inflorescências. A partir dos dados coletados no campo, computaram-se: a severidade da doença na folha n.º 10 e o número de folhas viáveis. Considerou-se como folha viável as folhas sadias e aquelas com até 15% de área foliar lesionada. Os dados de temperatura e da umidade relativa foram registrados por um aparelho eletrônico instalado na área. A precipitação pluvial foi registrada na Estação meteorológica de Cáceres, distante 12 km do experimento. As condições climáticas foram favoráveis à sigatoka negra durante o ano todo e as plantas das cultivares Grande Naine, Maçã e Farta Velhaco após a emissão do cacho, perderam totalmente as folhas antes dos frutos atingirem o pleno desenvolvimento, cujos prejuízos no primeiro semestre atingiram 100% de perdas na produção comercializável.The black sigatoka, caused by Mycosphaerella fijiensis may cause 100% of yield losses in susceptible cultivars. The objective of this work was to evaluate the progress of the black sigatoka in banana plants after the bunch emergence, in the district of Cáceres, Mato Grosso State - Brazil. The experiment was carried out from February to December 2004, in banana cultivars "Grande Naine" and "Maçã", as well as plantain cultivar Farta Velhaco (Terra

  18. Black Sigatoka (Mycosphaerella fijiensis Morelet and food security. Bio-climate Scenarios in bananas under the effect of climate change in Ciego de Avila, Cuba

    Directory of Open Access Journals (Sweden)

    Hernández-Mansilla Alexis Augusto

    2016-11-01

    Full Text Available The negative evidence of climate change of high importance for the future agricultural production and the need of food sovereignty and security, impose to develop research to predict the phenology of plants and their pests, mainly those of economic importance. The aim of this work is to interpret the epidemiological behavior of the black Sigatoka disease (Mycosphaerella fijiensis Morelet in banana for the years 2020 and 2025 under the effects of climate change in Ciego de Avila. There were made bioclimatic scenarios using daily data of maximum temperature, minimum temperature and accumulated rainfall of 14 days generated by the Regional Climatic Model "PRECIS Caribbean" with boundary conditions of the global model ECHAM - 4 for future climate projections under scenarios of emission A2 and B2. The key indicators of this disease: "Sum of Speed ​​" and the "Evolution state" of 4 leaves were obtained. The results show Sums speeds above 11000 thermo-physiological units, as well as a continuous and progressive increase in the "Evolution State" with values above 500 units during the analyzed years. We infers will occur an increase in the number of treatments and the plant protection cost, which implies the need to draw integrated management measures that include agro-ecological principles, search for resistant varieties to replace those susceptible to the disease that are currently used and strengthen the climate change adaptation and the resilience in the agricultural ecosystem.

  19. Construction and characterization of a plant transformation-competent BIBAC library of the black Sigatoka-resistant banana Musa acuminata cv. Tuu Gia (AA).

    Science.gov (United States)

    Ortiz-Vázquez, E; Kaemmer, D; Zhang, H-B; Muth, J; Rodríguez-Mendiola, M; Arias-Castro, C; James, Andrew

    2005-02-01

    A plant transformation-competent binary bacterial artificial chromosome (BIBAC) library was constructed from Musa acuminata cv. Tuu Gia (AA), a black Sigatoka-resistant diploid banana. After digestion of high-molecular-weight banana DNA by HindIII, several methods of DNA size selection were tested, followed by ligation, using a vector/insert molar ratio of 4:1. The library consists of 30,700 clones stored in 80 384-well microtiter plates. The mean insert size was estimated to be 100 kb, and the frequency of inserts with internal NotI sites was 61%. The majority of insert sizes fell into the range of 100+/-20 kb, making them suitable for Agrobacterium-mediated transformation. Only 1% and 0.9% of the clones contain chloroplast and mitochondrial DNA, respectively. This is the first BIBAC library for banana, estimated to represent five times its haploid genome (600 Mbp). It was demonstrated by hybridization that the library contains typical members of resistance gene and defense gene families that can be used for transformation of disease susceptible banana cultivars for banana genetic improvement.

  20. Relationship between soil and edaphoclimatic properties and the Black Sigatoka incidence (Mycosphaerella fijiensis Morelet in the Banana Region of Magdalena - Colombia

    Directory of Open Access Journals (Sweden)

    Sonia Esperanza Aguirre Forero

    2012-10-01

    Full Text Available Black Sigatoka (Mycosphaerella fijiensis Morelet disease is the greatest limiting factor affecting banana crop production across the world. The pathogen´s severity has reached epidemic levels and is exacerbated by the cultivation of monocultures and genetically uniform clones. In Colombia, losses occur in the exporting regions of Uraba and Magdalena, where its management depends on the use of agrochemicals, without achieving eradication. In the search for methods to reduce the pathogen’s effect within the banana zone of the departamento del Magdalena, Colombia, the relationship between climate, soil properties, and the presence of the disease was determined. Were utilized data from geographic informational systems, digitalized the data from the soil variables reported in the soil study conducted by IGAC (2009, records from weather stations in the region, and data showing the incidence rate of the pathogen. As a result of the study were established three areas (high, medium and low incidence rate and discovered a positive correlation between the incidence rate of the disease with precipitation (r = 0.56, interchangeable magnesium, Mg+2 (r = 0.45, microporosity (r = 0.40, clay content (r = 0.54, and evaporation (r = 0.51. Were observed that there are soil conditions that influence the presence of the disease, variables that should be kept in mind in the management of banana cultivation.

  1. Singlet molecular oxygen generation by light-activated DHN-melanin of the fungal pathogen Mycosphaerella fijiensis in black Sigatoka disease of bananas.

    Directory of Open Access Journals (Sweden)

    Miguel J Beltrán-García

    Full Text Available In pathogenic fungi, melanin contributes to virulence, allowing tissue invasion and inactivation of the plant defence system, but has never been implicated as a factor for host cell death, or as a light-activated phytotoxin. Our research shows that melanin synthesized by the fungal banana pathogen Mycosphaerella fijiensis acts as a virulence factor through the photogeneration of singlet molecular oxygen O2 (1Δg. Using analytical tools, including elemental analysis, ultraviolet/infrared absorption spectrophometry and MALDI-TOF mass spectrometry analysis, we characterized both pigment content in mycelia and secreted to the culture media as 1,8-dihydroxynaphthalene (DHN-melanin type compound. This is sole melanin-type in M. fijiensis. Isolated melanins irradiated with a Nd:YAG laser at 532 nm produced monomol light emission at 1270 nm, confirming generation of O2 (1Δg, a highly reactive oxygen specie (ROS that causes cellular death by reacting with all cellular macromolecules. Intermediary polyketides accumulated in culture media by using tricyclazole and pyroquilon (two inhibitors of DHN-melanin synthesis were identified by ESI-HPLC-MS/MS. Additionally, irradiation at 532 nm of that mixture of compounds and whole melanized mycelium also generated O2 (1Δg. A pigmented-strain generated more O2 (1Δg than a strain with low melanin content. Banana leaves of cultivar Cavendish, naturally infected with different stages of black Sigatoka disease, were collected from field. Direct staining of the naturally infected leaf tissues showed the presence of melanin that was positively correlated to the disease stage. We also found hydrogen peroxide (H2O2 but we cannot distinguish the source. Our results suggest that O2 (1Δg photogenerated by DHN-melanin may be involved in the destructive effects of Mycosphaerella fijiensis on banana leaf tissues. Further studies are needed to fully evaluate contributions of melanin-mediated ROS to microbial pathogenesis.

  2. Singlet molecular oxygen generation by light-activated DHN-melanin of the fungal pathogen Mycosphaerella fijiensis in black Sigatoka disease of bananas.

    Science.gov (United States)

    Beltrán-García, Miguel J; Prado, Fernanda M; Oliveira, Marilene S; Ortiz-Mendoza, David; Scalfo, Alexsandra C; Pessoa, Adalberto; Medeiros, Marisa H G; White, James F; Di Mascio, Paolo

    2014-01-01

    In pathogenic fungi, melanin contributes to virulence, allowing tissue invasion and inactivation of the plant defence system, but has never been implicated as a factor for host cell death, or as a light-activated phytotoxin. Our research shows that melanin synthesized by the fungal banana pathogen Mycosphaerella fijiensis acts as a virulence factor through the photogeneration of singlet molecular oxygen O2 (1Δg). Using analytical tools, including elemental analysis, ultraviolet/infrared absorption spectrophometry and MALDI-TOF mass spectrometry analysis, we characterized both pigment content in mycelia and secreted to the culture media as 1,8-dihydroxynaphthalene (DHN)-melanin type compound. This is sole melanin-type in M. fijiensis. Isolated melanins irradiated with a Nd:YAG laser at 532 nm produced monomol light emission at 1270 nm, confirming generation of O2 (1Δg), a highly reactive oxygen specie (ROS) that causes cellular death by reacting with all cellular macromolecules. Intermediary polyketides accumulated in culture media by using tricyclazole and pyroquilon (two inhibitors of DHN-melanin synthesis) were identified by ESI-HPLC-MS/MS. Additionally, irradiation at 532 nm of that mixture of compounds and whole melanized mycelium also generated O2 (1Δg). A pigmented-strain generated more O2 (1Δg) than a strain with low melanin content. Banana leaves of cultivar Cavendish, naturally infected with different stages of black Sigatoka disease, were collected from field. Direct staining of the naturally infected leaf tissues showed the presence of melanin that was positively correlated to the disease stage. We also found hydrogen peroxide (H2O2) but we cannot distinguish the source. Our results suggest that O2 (1Δg) photogenerated by DHN-melanin may be involved in the destructive effects of Mycosphaerella fijiensis on banana leaf tissues. Further studies are needed to fully evaluate contributions of melanin-mediated ROS to microbial pathogenesis.

  3. Evaluation in greenhouse of the response of two Musa cultivar to Black Sigatoka by artificial inoculation of conidial suspension of Pseudocercospora fijiensis

    Directory of Open Access Journals (Sweden)

    Mayra Acosta Suárez

    2004-04-01

    Full Text Available For evaluating the resistance of Black sigatoka in genotypes from breeding programmes different methods have been used, the artificial inoculation of pathogens reproduction structures is one of them. Nevertheless, is necessary the standardization of condition for it in vitro production and to know the response of cultivars to the diseases in greenhouse. It will permit to establish methods for evaluating and selecting the new resistant genotypes. This work was carried out with the objectives to evaluate different culture media and incubation conditions for obtaining P. fijiensis conidia and for evaluating the response of two cultivars to the artificial inoculation with conidial suspensions of this fungus. Different culture media and incubation conditions for obtaining the conidia and the cultivars Grande naine (susceptible and FHIA-18 (partially resistant were used. The conidia of P. fijiensis could be obtained in vitro at 20ºC and constant light from 10 days of incubation in culture media Potato Carrot Agar, modified V-8 Agar and Potato Dextrose Agar. However, the greatest concentration was reached in Potato Dextrose Agar after 20 days of incubation at 20ºC under continuous white fluorescent light. The artificial inoculation of conidial suspensions of P. fijiensis allowed to evaluate the response of Grande Naine and FHIA-18 cultivars in greenhouse. By the use of qualitative scale of symptoms stages and the quantitative variables symptoms evolution time and disease development time was possible to differentiate both cultivars. They maintained in greenhouse similar response to the disease that in the field. Key words: conidia, culture medium, FHIA-18, Grande naine, sporulation

  4. Worldwide geographical distribution of Black Sigatoka for banana: predictions based on climate change models Distribuição geográfica da Sigatoka Negra da bananeira estimada por modelos de mudanças climáticas globais

    Directory of Open Access Journals (Sweden)

    Waldir Cintra de Jesus Júnior

    2008-12-01

    Full Text Available As mudanças climáticas poderão alterar as doenças de plantas e afetar a eficácia das medidas de manejo. Um dos prováveis impactos será na distribuição geográfica das doenças. A Sigatoka Negra é considerada a principal doença da cultura da banana em decorrência dos danos causados e aumento do custo de manejo. O impacto sócio-econômico da doença continua aumentando, uma vez que a doença tem atingido novas áreas de plantio, tornando o manejo mais difícil. Este trabalho tem por objetivos comparar a distribuição geográfica da doença por meio da elaboração de mapas nas seguintes situações: a clima atual e futuro (2020, 2050 e 2080, b cenários A2 e B2 do Painel Intergovernamental de Mudanças Climáticas, c predito por seis diferentes modelos de mudanças climáticas e pela média dos mesmos e, d entre meses. Haverá redução das áreas favoráveis à doença no futuro, sendo que tal redução será mais acentuada no cenário A2 do que no B2 e gradativa para as décadas de 2020, 2050 e 2080. Predições efetuadas com o uso da média dos dados estimados pelos modelos permitiram redução na variabilidade da simulação em comparação com a predição gerada por cada modelo individualmente. Alterações na distribuição geográfica da doença ocorrerão entre meses, de modo que áreas consideradas desfavoráveis tornar-se-ão favoráveis e vice-versa. Apesar disso, extensas áreas continuarão favoráveis ao desenvolvimento da Sigatoka Negra.Global climatic changes will potentially influence plant diseases and the efficacy of their management options. One of the most likely impacts of climate change will be felt by the geographical distribution of plant diseases. Black Sigatoka is considered the most damaging and costly disease of banana. The socio-economic impact of this disease has continued to increase as the pathogen reaches new areas and the disease becomes more difficult to be controled. The objectives of this

  5. Progress of black sigatoka (Mycosphaerella fijiensis) in banana plants after the bunch emergence in the district of Cáceres, Mato-Grosso-Brazil

    OpenAIRE

    Martins, Márcia Benedita; Valente, João Pedro; Kobayasti, Leimi; Gasparotto, Luadir

    2007-01-01

    A sigatoka-negra, causada pelo fungo Mycosphaerella fijiensis, pode causar 100% de perdas na produção das cultivares suscetíveis. O objetivo deste trabalho foi avaliar o progresso da sigatoka-negra em bananeiras após a emissão do cacho no Município de Cáceres, Mato Grosso. O experimento foi conduzido no período de fevereiro a dezembro de 2004 em plantios das cultivares Grande Naine, Maçã e Farta Velhaco, sendo esta última uma cultivar de plátano, do grupo Terra. As avaliações foram efetuadas ...

  6. Caracterização morfológica e avaliação de cultivares de bananeira resistentes a Sigatoka Negra (Mycosphaerella fijiensis Morelet no sudoeste goiano Morphologic characterization and evaluation of banana cultivars resistant to the Black Sigatoka disease (Mycosphaerella fijiensis Morelet in the Southwest of the State of Goiás, Brazil

    Directory of Open Access Journals (Sweden)

    Silvia Correa Santos

    2006-12-01

    Full Text Available Cinco cultivares de bananeira resistentes a Sigatoka Negra foram cultivadas na área experimental da Universidade Federal de Goiás, no município de Jataí, localizado na região Sudoeste do Estado. O objetivo foi introduzir genótipos resistentes a Sigatoka Negra no Estado, bem como fazer a caracterização morfológica desses materiais nessas condições climáticas. O trabalho foi realizado por meio da avaliação, em três ciclos produtivos, dos seguintes componentes de produção: intervalo em dias entre o plantio e o florescimento, número de folhas no florescimento e na colheita, número de pencas por cacho, frutos por cacho e frutos por penca, comprimento do cacho e dos frutos e peso do engaço, das pencas e do cacho. As cultivares falsa FHIA-18 e Caipira produziram em média aos 393 dias, apresentando maior precocidade em relação às demais cultivares. Como era esperado, a FHIA-21, que é uma bananeira tipo Terra, apresentou um ciclo maior (488 dias. O clima e a altitude de Jataí-GO podem ter contribuído para o aumento do ciclo das cinco cultivares quando comparado com outras regiões. Para as características de produção, a FHIA-01 e a falsa FHIA-18 se destacaram das demais. Para o número de pencas, a Thap Maeo se destacou nos três ciclos, mostrando a característica deste genótipo. As maiores alturas na floração foram observadas nas cultivares FHIA-21 e Thap Maeo, que também foram as que mais sofreram com os efeitos do vento.Five banana cultivars resistant to the Black Sigatoka Disease were grown at the experimental field of the Universidade Federal de Goiás (UFG, located in the Southwest region of the State of Goiás (Brazil. This work aimed the introduction of Black Sigatoka resistant cultivars as well as the characterization of the morphological aspects of such cultivars at that climatic region. The following characteristics were evaluated, in the first three cycles: days between planting and flowering, leaf number at

  7. INTEGRACIÓN DE INDUCCIÓN DE RESISTENCIA CON BACTERIAS QUITINOLÍTICAS EN EL CONTROL DE LA SIGATOKA NEGRA (Mycosphaerella fijiensis Morelet EN BANANO INTEGRATION OF INDUCED RESISTANCE WITH CHITINOLYTIC BACTERIA IN BLACK SIGATOKA CONTROL (Mycosphaerella fijiensis Morelet IN BANANA

    Directory of Open Access Journals (Sweden)

    Catalina María Zuluaga Amaya

    2007-12-01

    Full Text Available Se evaluó en condiciones de campo en la zona bananera de Urabá-Colombia, el efecto de inductores de resistencia y bacterias quitinolíticas sobre el desarrollo de la Sigatoka Negra en plantas de banano del cultivar Gran Enano. Como inductores de resistencia se utilizaron acibenzolar-s-metil (ASM (20 cm³ · ha-1 i.a. y ácido salicílico (AS (20 cm³ · ha-1 i.a cada uno en rotación y en mezcla con fungicidas utilizados en el control convencional de la enfermedad; se evaluó también la mezcla de estos inductores con bacterias quitinolíticas aisladas de la filosfera de banano; así como el efecto del fungicida biológico Biofun® ( 1,5 L · ha-1 de p.c. en rotación con fungicidas y en mezcla con ASM. La aplicación de ASM en rotación y en mezcla con fungicidas convencionales presentó un control de la enfermedad hasta un 50% mayor al obtenido con el control convencional, evidenciado esto en los valores más bajos del área bajo la curva del índice de severidad de la enfermedad (IS y más altos de hojas sanas (HS al momento de la floración. Los tratamientos, que incluyeron AS en rotación y mezcla con fungicidas convencionales, al igual que el producto Biofun® en rotación y en mezcla con ASM, mostraron un control de la enfermedad estadísticamente igual al obtenido con el control convencional, lo cual reveló una reducción de 46 - 100% de la cantidad de fungicidas convencionales usados en el control de la Sigatoka Negra.The effect of resistance elicitors and chitinolytic bacteria was evaluated on Black Sigatoka control in banana plants, in field conditions in Urabá-Colombia. Acibenzolar-s-metil (ASM (20 cm³ · ha- 1 a.i. and salicilyc acid (SA (20 cm³ a.i.ha-1 were used in rotation and mixture with conventional fungicides, and in mixture with chitinolytic bacteria isolated from banana phyllosphere. Biological fungicide Biofun® ( 1,5 L · ha-1 de p.c. was also tested in rotation and mixture with ASM. When fungicides were in rotation

  8. Variable Number of Tandem Repeat Markers in the Genome Sequence of Mycosphaerella Fijiensis, the Causal Agent of Black Leaf Streak Disease of Banana (Musa spp.)

    Science.gov (United States)

    Mycosphaerella fijiensis, the causal agent of banana leaf streak disease (commonly known as black Sigatoka), is the most devastating pathogen attacking bananas (Musa spp). Recently the whole genome sequence of M. fijiensis became available. This sequence was screened for the presence of Variable Num...

  9. Variable number of tandem repeat markers in the genome sequence of Mycosphaerella fijiensis, the causal agent of black leaf streak disease of banana (Musa spp)

    NARCIS (Netherlands)

    Garcia, S.A.L.; Lee, van der T.A.J.; Ferreira, C.F.; Lintel Hekkert, te B.; Zapater, M.F.; Goodwin, S.B.; Guzmán, M.; Kema, G.H.J.; Souza, M.T.

    2010-01-01

    ABSTRACT. We searched the genome of Mycosphaerella fijiensis for molecular markers that would allow population genetics analysis of this plant pathogen. M. fijiensis, the causal agent of banana leaf streak disease, also known as black Sigatoka, is the most devastating pathogen attacking bananas

  10. How to Distinguish Attacks by the Black Turpentine Beetle and Dioryctria Amatella on Southern Pines

    Science.gov (United States)

    Carl W. Fatzinger; Gary L. DeBarr

    1969-01-01

    Trunk attacks by the black turpentine beetle, Dendroctonus terebrans (Oh.), and the larvae of Dioryctria amatella (Hulst) on the southern pines results in a copious flow of pitch. This external pitch mass or pitch tube exhibits characteristics that can be used as symptoms to distinguish between attacks by these two insects.

  11. A Black Hole Attack Model for Reactive Ad-Hoc Protocols

    Science.gov (United States)

    2012-03-01

    metric value may be easily detected by more secure versions of the protocol. In 17 [DhS08], the authors used the fact that sequence numbers generally...analytical model is presented to calculate network throughput under denial of service attacks; specifically these attacks are Jellyfish and Black Hole...things of interest to point out using Table 1. First, it is easy to see the recursive relationship between n-cubes. Any element at row n and column

  12. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  13. Morning ambush attacks by black-footed ferrets on emerging prairie dogs

    Science.gov (United States)

    Eads, D.A.; Biggins, D.E.; Jachowski, D.S.; Livieri, T.M.; Millspaugh, J.J.; Forsberg, M.

    2010-01-01

    Black-footed ferrets (Mustela nigripes) often hunt at night, attacking normally diurnal prairie dogs (Cynomys spp.) in underground burrow systems. While monitoring black-footed ferrets in South Dakota during morning daylight hours, we observed an adult female ferret ambush a black-tailed prairie dog (C. ludovicianus) emerging from a burrow. On a neighboring colony, we observed a second adult female ferret engaging in similar ambush behaviors on 12 occasions, although prey was not visible. We retrospectively assessed radio-telemetry data on white-tailed prairie dogs (C. leucurus) and a male and a female ferret to evaluate ferret activity in relation to timing of prairie dog emergence. Activity of radio-collared ferrets was high during the hourly period when prairie dogs first emerged and the following 2 hr, relative to later daylight hours. Such behavior is consistent with behaviors observed in South Dakota. Nighttime movements by ferrets might involve hunting but also reconnaissance of prey preparatory to morning ambush attacks.

  14. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.

    Science.gov (United States)

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-19

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  15. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT

    Directory of Open Access Journals (Sweden)

    Avijit Mathur

    2016-01-01

    Full Text Available Wireless sensor networks (WSNs are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use: black hole and selective forwarding (SF attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  16. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    OpenAIRE

    Rosenberg, Ishai; Shabtai, Asaf; Rokach, Lior; Elovici, Yuval

    2017-01-01

    In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such...

  17. Ketahanan Kultivar Pisang Lokal Kalimantan Selatan terhadap Penyakit Bercak Sigatoka (Mycosphaerella sp.)

    OpenAIRE

    Mariana Mariana; Rodinah Rodinah; Ismed Setya Budi

    2017-01-01

    Sigatoka of banana caused by Mycospherella sp. is an important disease, since it causes yield losses. Resistant variety is considered a promising approach for sigatoka disease management. This study was aimed to evaluate the resistance of local banana cultivars from South Kalimantan against sigatoka disease. The fungus was isolated from leaves of Kapas cultivar showing severe symptoms of sigatoka disease, onto potato dextrose agar medium. The isolate was then confirmed as Mycosphaerella sp. f...

  18. Developing markers for Sigatoka leaf spot disease (Mycosphaerella ...

    African Journals Online (AJOL)

    Jane

    2011-07-06

    Jul 6, 2011 ... Sigatoka leaf spot (Mycosphaerella musicola Leach) disease is a limiting factor in banana production in. India and other places. Breeding for resistance is the most effective method to control Musa diseases. However, Musa improvement using conventional methods has been hampered due to lack of ...

  19. Molecular diagnostics for the Sigatoka disease complex of banana

    NARCIS (Netherlands)

    Arzanlou, M.; Abeln, E.C.A.; Kema, G.H.J.; Waalwijk, C.; Carlier, J.; Crous, P.W.

    2007-01-01

    The Sigatoka disease complex of banana involves three related ascomycetous fungi, Mycosphaerella fijiensis, M. musicola, and M. eumusae. The exact distribution of these three species and their disease epidemiology remain unclear, because their symptoms and life cycles are rather similar. Disease

  20. Evaluation of fruit and bunch traits in black Sigatoka resistant ...

    African Journals Online (AJOL)

    Studies involving the evaluation of fruit and bunch characteristics of twenty seven cultivars of plantain and banana were undertaken. Results showed that bunch weight of plantain hybrid, 25344-18, differed significantly (P<0.05) from all other genotypes except SH 3362, with an average of 20.8 kg plant. The number of hands ...

  1. Diagnostico por PCR del complejo Sigatoka en Colombia.

    OpenAIRE

    Romero Magally; Díaz Thais; Castañeda Darío; Arango Rafael

    1999-01-01

    Las Sigatokas negra y amarilla son enfermedades causadas por Mycosphaerella fijiensis y Mycosphaerella musicola respectivamente. Estas dos especies de hongos estrechamente relacionadas y morfológicamente similares, causan necrosis severa en las hojas de banano y plátano disminuyendo el área de tejido fotosintético y acelerando la maduración del fruto. Las enfermedades producidas por estos hongos afectan la mayoría de las áreas cultivada...

  2. Alternativas de manejo en el control de la Sigatoka negra (Mycosphaerella fijiensis Morelet./

    Directory of Open Access Journals (Sweden)

    Yurisandra Sierra Reyes

    2015-09-01

    Full Text Available Resumen Con el objetivo de evaluar alternativas en el control de la Sigatoka negra n se desarrolló esta investigación en la Unidad Empresarial de Base “Atención a Productores” en Siboney, municipio Sibanicú, provincia Camagüey. En el período comprendido entre junio del 2008 a octubre del 2009 a través de un experimento con diseño bloques al azar con el fin de establecer el efecto de varias prácticas de manejo en el control de la Sigatoka negra en el plátano Enano Guantanamero. Se estudiaron combinaciones de prácticas de manejo como el uso de fertilizaciones de fórmula completa y orgánica, el marco de plantación utilizado fue de 1 m ×2 m × 3m, la compra de las semillas se realizó en la Biofábrica de Camagüey, que fueron desinfectadas al momento de la plantación durante una hora con una solución de Mancozeb SC (5 g /1 de agua y se adicionó lixiviado de humus de lombriz (ácido fúlvico (5ml/l de agua. Se realizaron labores agrotécnicas de despunte, aplicación de fertilización óptima y de un químico protectante, en combinación hasta llegar a doce tratamientos. Se evaluaron las hojas más jóvenes enfermas, hojas más joven manchada y el índice de severidad. Las combinación de Fertilización + Despunte + Fungicida + lixiviado de humus de lombriz, mostró las mejores respuestas al reducir el Índice de Severidad de las dos enfermedades, con valores medios que oscilaron entre 39,5 y 43,3, así como una alta respuesta a los indicadores morfológicos y productivos del clon AAB Enano Guantanamero. ABSTRACT In order to evaluate alternatives in the control of black Sigatoka n this research was conducted at the Base Business Unit "Attention to Producers" in Siboney, Sibanicú municipality, Camagüey province. In the period from June 2008 to October 2009 by an experiment with randomized block design in order to establish the effect of various management practices on the control of Black Sigatoka in banana Dwarf Guantanamero

  3. Effect of black (stem rust (Puccinia Graminis F.SP. Tritici attack to the spike characteristics in Polish wheat (Triticum Polonicum L.

    Directory of Open Access Journals (Sweden)

    H. Stoyanov

    2015-03-01

    Full Text Available Abstract. The obtaining of high yields of crops is directly dependent on the cultivated varieties. In their creation it is essential the selected initial breeding material to possess certain qualities that lead to overcoming the effects of biotic and abiotic stress factors. Common winter wheat is characterized by great diversity of possibilities for combining initial breeding material due to phylogenetic similarity to many species of the genera Triticum, Aegilops, Secale. In creation of synthetic hexaploids (2n = 6x = 42, AABBDD, the choice of tetraploid component involved into the crosses is very important. The species Triticum polonicum (2n = 4x = 28, AABB possesses many valuable features related to its protein content, resistance to brown rust, powdery mildew and septoria leaf blight, but it is susceptible to varying levels of black rust attack. This is a prerequisite a correlation between the attack of the pathogen and some spike indicators that correlate with grain yield to be searched. To determine the relationship between the attack and the specific parameters, 52 accessions of the species Triticum polonicum have been studied in the financial 2012/2013 year, to the following indicators: length of spike, length of spike with awns, number of spikelets, weight of spike, weight of grains per spike, number of grains per spike, weight of 1000 grains, weight of spike after threshing. An evaluation of the infectious type of black rust attack on each accession is recorded according to 9-point scale, and correlation with the average values of each of the spike indicators is reported. To neutralize the influence of the factor 'accession' two specific indexes are calculated as a corrected value of the weight of 1000 grains. The highest and significant correlation was observed between the infectious type and both specific index (-43.2% and -44.6%, and less with the weight of 1000 grains (-41.9%. Insignificant or unreliable is the correlation of the

  4. Molecular diagnostics for the sigatoka disease complex of banana.

    Science.gov (United States)

    Arzanlou, Mahdi; Abeln, Edwin C A; Kema, Gert H J; Waalwijk, Cees; Carlier, Jean; Vries, Ineke de; Guzmán, Mauricio; Crous, Pedro W

    2007-09-01

    ABSTRACT The Sigatoka disease complex of banana involves three related ascomycetous fungi, Mycosphaerella fijiensis, M. musicola, and M. eumusae. The exact distribution of these three species and their disease epidemiology remain unclear, because their symptoms and life cycles are rather similar. Disease diagnosis in the Mycosphaerella complex of banana is based on the presence of host symptoms and fungal fruiting structures, which hamper preventive management strategies. In the present study, we have developed rapid and robust species-specific molecular-based diagnostic tools for detection and quantification of M. fijiensis, M. musicola, and M. eumusae. Conventional species-specific polymerase chain reaction (PCR) primers were developed based on the actin gene that detected DNA at as little as 100, 1, and 10 pg/mul from M. fijiensis, M. musicola, and M. eumusae, respectively. Furthermore, TaqMan real-time quantitative PCR assays were developed based on the beta-tubulin gene and detected quantities of DNA as low as 1 pg/mul for each Mycosphaerella sp. from pure cultures and DNA at 1.6 pg/mul per milligram of dry leaf tissue for M. fijiensis that was validated using naturally infected banana leaves.

  5. Diagnostico por PCR del complejo Sigatoka en Colombia.

    Directory of Open Access Journals (Sweden)

    Romero Magally

    1999-06-01

    Full Text Available Las Sigatokas negra y amarilla son enfermedades causadas por Mycosphaerella fijiensis y Mycosphaerella musicola respectivamente. Estas dos especies de hongos estrechamente relacionadas y morfológicamente similares, causan necrosis severa en las hojas de banano y plátano disminuyendo el área de tejido fotosintético y acelerando la maduración del fruto. Las enfermedades producidas por estos hongos afectan la mayoría de las áreas cultivadas de banano y plátano a nivel mundial, generando un gran problema económico y ambiental. Los síntomas que produce cada uno de estos patógenos en el cultivo son similares, por lo que su correcta identificación en campo se hace difícil. Con el fin de hacer una identificación precisa de cada uno de ellos decidimos estandarizar una prueba diagnóstica basada en la reacción en cadena de la polimerasa (PCR utilizando dos oligonucleótidos de 21 bases (MF 137 y MM 137 específicos para cada una de las especies M. fijiensis y M. musicola respectivamente. MF 137 y MM 137 codifican regiones variables identificadas en las secuencias interespaciadoras (ITS del DNA ribosomal.

  6. Kleptographic Attacks on ECDSA

    Directory of Open Access Journals (Sweden)

    Nadezhda Anatolievna Chepick

    2014-12-01

    Full Text Available This paper presents secretly trapdoor with universal protection (SETUP attacks on the elliptic curve digital signature algorithm ECDSA. It allows a malicious manufacturer of black-box cryptosystems to implement these attacks to get access to user’s private key. The attacker can obtain user’s private key. The way ECDSA can be used for encryption and key exchange is also described.

  7. Comparative Genomics of the Sigatoka Disease Complex on Banana Suggests a Link between Parallel Evolutionary Changes in Pseudocercospora fijiensis and Pseudocercospora eumusae and Increased Virulence on the Banana Host.

    Science.gov (United States)

    Chang, Ti-Cheng; Salvucci, Anthony; Crous, Pedro W; Stergiopoulos, Ioannis

    2016-08-01

    The Sigatoka disease complex, caused by the closely-related Dothideomycete fungi Pseudocercospora musae (yellow sigatoka), Pseudocercospora eumusae (eumusae leaf spot), and Pseudocercospora fijiensis (black sigatoka), is currently the most devastating disease on banana worldwide. The three species emerged on bananas from a recent common ancestor and show clear differences in virulence, with P. eumusae and P. fijiensis considered the most aggressive. In order to understand the genomic modifications associated with shifts in the species virulence spectra after speciation, and to identify their pathogenic core that can be exploited in disease management programs, we have sequenced and analyzed the genomes of P. eumusae and P. musae and compared them with the available genome sequence of P. fijiensis. Comparative analysis of genome architectures revealed significant differences in genome size, mainly due to different rates of LTR retrotransposon proliferation. Still, gene counts remained relatively equal and in the range of other Dothideomycetes. Phylogenetic reconstruction based on a set of 46 conserved single-copy genes strongly supported an earlier evolutionary radiation of P. fijiensis from P. musae and P. eumusae. However, pairwise analyses of gene content indicated that the more virulent P. eumusae and P. fijiensis share complementary patterns of expansions and contractions in core gene families related to metabolism and enzymatic degradation of plant cell walls, suggesting that the evolution of virulence in these two pathogens has, to some extent, been facilitated by convergent changes in metabolic pathways associated with nutrient acquisition and assimilation. In spite of their common ancestry and shared host-specificity, the three species retain fairly dissimilar repertoires of effector proteins, suggesting that they likely evolved different strategies for manipulating the host immune system. Finally, 234 gene families, including seven putative effectors, were

  8. Comparative Genomics of the Sigatoka Disease Complex on Banana Suggests a Link between Parallel Evolutionary Changes in Pseudocercospora fijiensis and Pseudocercospora eumusae and Increased Virulence on the Banana Host.

    Directory of Open Access Journals (Sweden)

    Ti-Cheng Chang

    2016-08-01

    Full Text Available The Sigatoka disease complex, caused by the closely-related Dothideomycete fungi Pseudocercospora musae (yellow sigatoka, Pseudocercospora eumusae (eumusae leaf spot, and Pseudocercospora fijiensis (black sigatoka, is currently the most devastating disease on banana worldwide. The three species emerged on bananas from a recent common ancestor and show clear differences in virulence, with P. eumusae and P. fijiensis considered the most aggressive. In order to understand the genomic modifications associated with shifts in the species virulence spectra after speciation, and to identify their pathogenic core that can be exploited in disease management programs, we have sequenced and analyzed the genomes of P. eumusae and P. musae and compared them with the available genome sequence of P. fijiensis. Comparative analysis of genome architectures revealed significant differences in genome size, mainly due to different rates of LTR retrotransposon proliferation. Still, gene counts remained relatively equal and in the range of other Dothideomycetes. Phylogenetic reconstruction based on a set of 46 conserved single-copy genes strongly supported an earlier evolutionary radiation of P. fijiensis from P. musae and P. eumusae. However, pairwise analyses of gene content indicated that the more virulent P. eumusae and P. fijiensis share complementary patterns of expansions and contractions in core gene families related to metabolism and enzymatic degradation of plant cell walls, suggesting that the evolution of virulence in these two pathogens has, to some extent, been facilitated by convergent changes in metabolic pathways associated with nutrient acquisition and assimilation. In spite of their common ancestry and shared host-specificity, the three species retain fairly dissimilar repertoires of effector proteins, suggesting that they likely evolved different strategies for manipulating the host immune system. Finally, 234 gene families, including seven

  9. MANEJO FITOTÉCNICO DA BANANEIRA, CULTIVAR D' ANGOLA (AAB, VISANDO AO CONTROLE DA SIGATOKA-NEGRA

    Directory of Open Access Journals (Sweden)

    MARIA DE JESUS BARBOSA CAVALCANTE

    2014-01-01

    Full Text Available The objective of this work was to evaluate management systems for the control of Black Siga- toka in the cultivation of banana D'Angola cultivar. The experiment was installed and carried out at Embrapa Acre, Rio Branco - AC with the treatments distributed in randomized complete blocks with six replications consisting of different planting densities, corresponding to T1 - (1.111 plants ha-1; T2 - 1.666 plants ha-1; T3 - 2.000 plants ha-1; T4 - 1.333 plants ha-1; T5 - 2.500 plants ha-1 and; T6 - 1.111 plants ha-1 under rubber trees. The evaluations were carried out during two cycles of production. Plants of cv. D'Angola (AAB cultivated in 3.0 x 3.0 m, shaded by the rubber trees, presented higher plant height, higher number of functional leaves at flowering and harvest, higher average bunch weight, greater weight of the bunches, longer cycle production and reduced severity of black sigatoka. Highest yields were obtained when we adopted higher densities. The banana intercropping with rubber trees proved to be a good alternative to permit cultivation of cv. D'Angola (long banana.

  10. Ketahanan Kultivar Pisang Lokal Kalimantan Selatan terhadap Penyakit Bercak Sigatoka (Mycosphaerella sp.

    Directory of Open Access Journals (Sweden)

    Mariana Mariana

    2017-07-01

    Full Text Available Sigatoka of banana caused by Mycospherella sp. is an important disease, since it causes yield losses. Resistant variety is considered a promising approach for sigatoka disease management. This study was aimed to evaluate the resistance of local banana cultivars from South Kalimantan against sigatoka disease. The fungus was isolated from leaves of Kapas cultivar showing severe symptoms of sigatoka disease, onto potato dextrose agar medium. The isolate was then confirmed as Mycosphaerella sp. following Koch’s postulate. Level of resistance is determined based on symptoms development. Resistance of local banana cultivars can be differentiated into susceptible (‘Awak’, ‘Jaranang’, ‘Kapas’, ‘Mas’, and ‘Paikat’, medium resistant (‘Ambon’, ‘Kepok’, ‘Mas Bantan’, ‘Mauli’, and ‘Talas’, and resistant (‘Tarati’.  In general, the symptom was visible 2 to 8 days after inoculation. The longer incubation period the more resistant response of banana varieties.  Incubation period was negatively correlated to the disease intensity, but it is not correlated with stomatal density.

  11. Perception of Recurrent Stroke Risk among Black, White and Hispanic Ischemic Stroke and Transient Ischemic Attack Survivors: The SWIFT Study

    Science.gov (United States)

    Boden-Albala, Bernadette; Carman, Heather; Moran, Megan; Doyle, Margaret; Paik, Myunghee C.

    2011-01-01

    Objectives Risk modification through behavior change is critical for primary and secondary stroke prevention. Theories of health behavior identify perceived risk as an important component to facilitate behavior change; however, little is known about perceived risk of vascular events among stroke survivors. Methods The SWIFT (Stroke Warning Information and Faster Treatment) study includes a prospective population-based ethnically diverse cohort of ischemic stroke and transient ischemic attack survivors. We investigate the baseline relationship between demographics, health beliefs, and knowledge on risk perception. Regression models examined predictors of inaccurate perception. Results Only 20% accurately estimated risk, 10% of the participants underestimated risk, and 70% of the 817 study participants significantly overestimated their risk for a recurrent stroke. The mean perceived likelihood of recurrent ischemic stroke in the next 10 years was 51 ± 7%. We found no significant differences by race-ethnicity with regard to accurate estimation of risk. Inaccurate estimation of risk was associated with attitudes and beliefs [worry (p risk factors. Conclusion This paper provides a unique perspective on how factors such as belief systems influence risk perception in a diverse population at high stroke risk. There is a need for future research on how risk perception can inform primary and secondary stroke prevention. Copyright © 2011 S. Karger AG, Basel PMID:21894045

  12. BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    HUSAIN SHAHNAWAZ

    2012-10-01

    Full Text Available Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS. Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system.

  13. Heart Attack

    Science.gov (United States)

    Each year almost 800,000 Americans have a heart attack. A heart attack happens when blood flow to the heart suddenly ... it's important to know the symptoms of a heart attack and call 9-1-1 if you or ...

  14. Evaluation of banana hybrids for tolerance to black leaf streak (Mycosphaerella fijiensis Morelet) in Puerto Rico

    Science.gov (United States)

    In Puerto Rico, bananas (including plantains) are important agricultural commodities; their combined production totaled 133,500 tons in 2008. Black leaf streak (BLS) and Sigatoka leaf spot diseases, caused by Mycosphaerella fijiensis and M. musicola, respectively, are responsible for significant los...

  15. Distribuição e impacto da sigatoka-negra na bananicultura do estado do Acre

    OpenAIRE

    Cavalcante, Maria de Jesus B.; Sá, Claudenor P. de; Gomes, Francisco C. da Rocha; Gondim, Tarcísio M. de Souza; Cordeiro, Zilton J. M.; Hessel, Jorge L.

    2004-01-01

    A sigatoka-negra (Mycosphaerella fijiensis) é a doença de maior severidade que afeta as cultivares de banana (Musa spp.) de importância econômica no mundo. Foi constatada no Brasil em 1998, no Estado do Amazonas, e tem se disseminado pelo Estado do Acre, atacando severamente as cultivares do Subgrupo Terra (AAB). Realizou-se um diagnóstico da sigatoka-negra e dos impactos econômicos causados por esta doença nos municípios do Estado do Acre. Foram visitados plantios em 16 municípios e amostras...

  16. Heliconia psittacorum: hospedeira de Mycosphaerella fijiensis, agente causal da sigatoka-negra da bananeira

    OpenAIRE

    Gasparotto, Luadir; Pereira, J. Clério R.; Urben, Arailde F.; Hanada, Rogério E.; Pereira, Mirza C. N.

    2005-01-01

    Em setembro de 2003, em Manaus, Amazonas, foram observadas manchas foliares, muito semelhantes àquelas de sigatoka-negra causada por Mycosphaerella fijiensis em folhas de Heliconia psittacorum. Efetuou-se o isolamento do patógeno e, para o teste de patogenicidade, foi utilizada a técnica de inoculação cruzada com os isolados de H. psittacorum e de bananeira (Musa spp.) da cv. Prata Anã. Em ambas as espécies o teste foi positivo. Com o auxílio do microscópio óptico, da literatura disponível e ...

  17. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks...

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  19. Forewarning system for controlling Yellow Sigatoka in Northern Minas Gerais, Brazil

    Directory of Open Access Journals (Sweden)

    Sara de Almeida Rios

    2013-09-01

    Full Text Available This trial aimed to evaluate the Biological Forewarning System (BFS for controlling Yellow Sigatoka in Northern Minas Gerais, Brazil. It was carried out in the town of Nova Porteirinha. One tested 7 treatments, using 6 gross sum (GS values (1,000; 1,300; 1,600; 1,900; 2,200, and 2,500 and the systematic disease control every 15 days. The treatments were distributed into 7 plots (120 plants/plot with ‘Prata-Anã’ and 10 plants from each plot were weekly evaluated with regard to leaf emission rate and disease incidence on the leaves 2, 3 and 4. The more advanced lesion stages and their intensity were used to calculate the gross sum, which aided in decision-making for chemical control. One collected data on production and firmness, pH, and acidity analysis of fruits. For the GS 2,500 treatment, taking into account 2-year evaluation, there was a reduction from 12 to 3 applications, i.e. 75% less fungicide was applied, without loss in productivity. Therefore, one suggests, taking into account the conditions of Nova Porteirinha, the application of BFS for chemical control of Yellow Sigatoka, using the GS value of 2,500 as an indicator of the correct time to perform pulverization.

  20. Heart Attack

    Science.gov (United States)

    ... pain Fatigue Heart attack Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  1. Variable number of tandem repeat markers in the genome sequence of Mycosphaerella fijiensis, the causal agent of black leaf streak disease of banana (Musa spp).

    Science.gov (United States)

    Garcia, S A L; Van der Lee, T A J; Ferreira, C F; Te Lintel Hekkert, B; Zapater, M-F; Goodwin, S B; Guzmán, M; Kema, G H J; Souza, M T

    2010-11-09

    We searched the genome of Mycosphaerella fijiensis for molecular markers that would allow population genetics analysis of this plant pathogen. M. fijiensis, the causal agent of banana leaf streak disease, also known as black Sigatoka, is the most devastating pathogen attacking bananas (Musa spp). Recently, the entire genome sequence of M. fijiensis became available. We screened this database for VNTR markers. Forty-two primer pairs were selected for validation, based on repeat type and length and the number of repeat units. Five VNTR markers showing multiple alleles were validated with a reference set of isolates from different parts of the world and a population from a banana plantation in Costa Rica. Polymorphism information content values varied from 0.6414 to 0.7544 for the reference set and from 0.0400 and 0.7373 for the population set. Eighty percent of the polymorphism information content values were above 0.60, indicating that the markers are highly informative. These markers allowed robust scoring of agarose gels and proved to be useful for variability and population genetics studies. In conclusion, the strategy we developed to identify and validate VNTR markers is an efficient means to incorporate markers that can be used for fungicide resistance management and to develop breeding strategies to control banana black leaf streak disease. This is the first report of VNTR-minisatellites from the M. fijiensis genome sequence.

  2. About Heart Attacks

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More About Heart Attacks Updated:Jan 11,2018 A heart attack is ... coronary artery damage leads to a heart attack . Heart Attack Questions and Answers What is a heart attack? ...

  3. Heart Attack

    Science.gov (United States)

    ... Pressure, tightness, pain, or a squeezing or aching sensation in your chest or arms that may spread to your neck, jaw or back Nausea, indigestion, heartburn or abdominal pain Shortness of breath Cold sweat Fatigue Lightheadedness or sudden dizziness Heart attack ...

  4. Heart attack

    Science.gov (United States)

    ... part in support groups for people with heart disease . Outlook (Prognosis) After a heart attack, you have a higher ... P, Bonow RO, Braunwald E, eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  5. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  6. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  7. Physico-chemical characterization of banana varieties resistant to black leaf streak disease for industrial purposes

    Directory of Open Access Journals (Sweden)

    Rossana Catie Bueno de Godoy

    2016-01-01

    Full Text Available ABSTRACT: Cultivated bananas have very low genetic diversity making them vulnerable to diseases such as black-Sigatoka leaf spot. However, the decision to adopt a new banana variety needs to be based on a robust evaluation of agronomical and physical-chemical characteristics. Here, we characterize new banana varieties resistant to black-Sigatoka leaf spot and compare them to the most widely used traditional variety (Grand Naine. Each variety was evaluated for a range of physic-chemical attributes associated with industrial processing and flavor: pH, TTA, TSS/TTA, total sugars, reducing sugars and non-reducing sugars, humidity, total solids and yield. The Thap Maeo variety had the highest potential as a substitute for the Grand Naine variety, having higher levels of total soluble solids, reducing sugars, total sugars and humidity. The Caipira and FHIA 2 varieties also performed well in comparison with the Grand Naine variety. Cluster analysis indicated that the Grand Naine variety was closely associated with varieties from the Gross Michel subgroup (Bucaneiro, Ambrosia and Calipso and the Caipira variety, all of which come from the same AAA genomic group. It was concluded that several of the new resistant varieties could potentially substitute the traditional variety in areas affected by black-Sigatoka leaf spot disease.

  8. Controle biológico de Mycosphaerella fijiensis Morelet agente causal da sigatoka-negra da bananeira (Musa spp.) com Trichoderma spp.

    OpenAIRE

    Cavero, Poholl Adan Sagratzki

    2011-01-01

    O principal problema fitossanitário da cultura da bananeira no Brasil e também em outros países é a sigatoka-negra, causada pelo fungo Micosphaerella fijiensis Morelet, que pode ocasionar perdas de até 100% da produção. A medida mundialmente mais utilizada no controle deste problema em bananais comerciais têm sido pulverizações com fungicidas. Na Amazônia, o uso de fungicidas para o controle da sigatoka-negra torna-se econômica e ecologicamente inviável, face aos custos e aos impactos ambient...

  9. Sistema de pré-aviso para o controle da sigatoka-amarela da bananeira no Recôncavo Baiano Forecasting for the control of banana 'yellow sigatoka' in the Recôncavo Baiano region, Brazil

    Directory of Open Access Journals (Sweden)

    Danúzia Maria Vieira Ferreira

    2003-12-01

    Full Text Available Entre os problemas que afetam a bananicultura brasileira, a Sigatoka-amarela (Mycosphaerella musicola Leach destaca-se como um dos mais graves, podendo causar perdas superiores a 50% na produção. O controle químico continua sendo uma das principais alternativas disponíveis. Por isto a utilização de um sistema de monitoramento que possa indicar o momento correto da aplicação dos fungicidas é uma alternativa importante para racionalizar seu uso. O objetivo deste trabalho foi definir o valor de soma bruta no sistema de pré-aviso biológico, que permita reduzir o número de aplicações anuais de defensivos capaz de controlar eficientemente a Sigatoka-amarela na região do Recôncavo Baiano. O ensaio foi conduzido na área experimental do Centro Nacional de Pesquisa de Mandioca e Fruticultura Tropical - Embrapa Mandioca e Fruticultura, da Empresa Brasileira de Pesquisa Agropecuária - EMBRAPA, no município de Cruz das Almas, BA. Testaram-se oito tratamentos, seis utilizando a soma bruta ( 1000; 1300; 1600; 1900; 2200 e 2500, o controle sistemático da doença a cada 21 dias e a testemunha controle. Esses tratamentos foram distribuídos em oito quadras de 48 plantas da cultivar Grande Naine, avaliando-se semanalmente dez plantas por tratamento, quanto à taxa de emissão foliar e incidência da doença nas folhas 2, 3 e 4, indicando a intensidade do estádio mais avançado da lesão presente nas mesmas. Os dados semanais foram usados para o cálculo das respectivas somas brutas, recomendando ou não a aplicação do fungicida (propiconazole 3mL mais 1L de óleo mineral . Na colheita coletaram-se os dados de produção e severidade da doença. Apenas os tratamentos controle sistemático, soma bruta 1300 e soma bruta 1600 apresentaram produções estatisticamente diferentes da testemunha sem controle. Considerando a produtividade obtida e o número de aplicações de fungicidas, requeridas durante o ciclo, foi concluído que, para as condi

  10. Pericarditis - after heart attack

    Science.gov (United States)

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  11. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle becomes ...

  12. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  13. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  14. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  15. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  16. Relação entre a temperatura e o molhamento foliar no monocíclo da Sigatoka-negra

    Directory of Open Access Journals (Sweden)

    Cleilson do Nascimento Uchôa

    2012-06-01

    Full Text Available A influência da temperatura (21, 24, 27 e 30 °C e da duração do tempo de molhamento foliar (0, 12, 24, 48 e 72 horas na penetração do agente causal da Sigatoka-negra (Mycosphaerella fijiensis foi quantificada em ambiente controlado. A área abaixo da curva do progresso da doença (AACPD e a incidência foram influenciadas pela temperatura e pela duração do tempo de molhamento foliar. Foram constatadas diferenças significativas (P=0,05 nos valores da AACPD para as diferentes temperaturas, bem como verificada a interação significativa (P=0,05 entre temperaturas e o molhamento foliar. Em todas as temperaturas foi possível a observação de sintomas, entretanto, a maior AACPD foi observada em folhas inoculadas que permaneceram na temperatura de 24 e 27°C, a partir de 48 horas de molhamento foliar. Nas temperaturas de 21ºC e 30°C a incidência de Sigatoka-negra foi menor. O período de molhamento foliar mínimo para o progresso da doença foi de 24 horas. Não foram observados sintomas de Sigatoka-negra em folhas inoculados com o molhamento foliar de 0 hora e 12 horas em todas as temperaturas. As folhas assintomáticas, após 5 dias em câmara úmida apresentavam sintomas característicos de Sigatoka-negra, demonstrando que os conídios inoculados nas folhas permaneceram viáveis por um período na ausência de água livre na folha.

  17. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  18. What Is a Heart Attack?

    Science.gov (United States)

    ... Research Home / Heart Attack Heart Attack Also known as Myocardial infarction Leer en español ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  19. Sistema de pré-aviso para controle de Sigatoka-amarela no norte de Minas Gerais

    Directory of Open Access Journals (Sweden)

    Sara de Almeida Rios

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/2175-7925.2013v26n3p109 O objetivo do presente trabalho foi avaliar o Sistema de Pré-Aviso Biológico (SPB para o controle da Sigatoka-amarela no Norte de Minas. O ensaio foi conduzido no município de Nova Porteirinha, MG. Foram testados sete tratamentos, utilizando seis valores de soma bruta (SB (1.000; 1.300; 1.600; 1.900; 2.200 e 2.500 e o controle sistemático da doença a cada 15 dias. Os tratamentos foram distribuídos em sete talhões (120 plantas/talhão com ‘Prata-Anã’ e 10 plantas de cada talhão foram avaliadas semanalmente quanto à taxa de emissão foliar e incidência da doença nas folhas dois, três e quatro. Os estádios mais avançados das lesões e a sua intensidade serviram para cálculo da soma bruta, que auxiliou na tomada de decisão para o controle químico. Foram coletados os dados de produção e análises de firmeza, pH e acidez dos frutos. Para o tratamento SB 2.500, considerando os dois anos de avaliação, houve uma redução de doze para três aplicações, ou seja, 75% menos defensivos aplicados, sem perda na produtividade. Logo, sugere-se, considerando as condições de Nova Porteirinha, a aplicação do SPB para o controle químico da Sigatoka-amarela, utilizando-se o valor de SB de 2.500 como indicador da época correta para a realização da pulverização.

  20. An assessment of the benefits of yellow Sigatoka (Mycosphaerella musicola control in the Queensland Northern Banana Pest Quarantine Area

    Directory of Open Access Journals (Sweden)

    David Cook

    2013-09-01

    Full Text Available The banana leaf spotting disease yellow Sigatoka is established and actively controlled in Australia through intensive chemical treatments and diseased leaf removal. In the State of Queensland, the State government imposes standards for de-leafing to minimise the risk of the disease spreading in 6 banana pest quarantine areas. Of these, the Northern Banana Pest Quarantine Area is the most significant in terms of banana production. Previous regulations imposed obligations on owners of banana plants within this area to remove leaves from plants with visible spotting on more than 15 per cent of any leaf during the wet season. Recently, this leaf disease threshold has been lowered to 5 per cent. In this paper we examine the likely impact this more-costly regulation will have on the spread of the disease. We estimate that the average net benefit of reducing the diseased leaf threshold is only likely to be $1.4million per year over the next 30 years, expressed as the annualised present value of tightened regulation. This result varies substantially when the timeframe of the analysis is changed, with shorter time frames indicating poorer net returns from the change in protocols. Overall, the benefit of the regulation change is likely to be minor.

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  2. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  3. EVALUACIÓN DE RESISTENCIA DE GENOTIPOS DE PLÁTANO Y BANANO A LA SIGATOKA NEGRA (MYCOSPHAERELLA FIJIENSIS MORELET. EVALUATION OF RESISTANCE OF PLANTAIN AND BANANA GENOTYPES TO BLACK SIGATOKA (MYSCOSPHAERELLA FIJIENSIS MORELET.

    Directory of Open Access Journals (Sweden)

    Alejandra Cuéllar Quintero

    2011-06-01

    Full Text Available Con el objetivo de evaluar bajo condiciones de invernadero genotipos de plátano y banano frente a poblaciones de Mycosphaerella fijiensis Morelet de diferente virulencia y origen, se estableció una colección de 125 aislamientos monospóricos obtenidos en 10 departamentos de Colombia. Se seleccionaron 50 aislamientos por área geográfica y genotipo hospedante, para la caracterización morfológica y patogénica del hongo en Dominico Hartón. En las pruebas de patogenicidad y resistencia se realizaron inoculaciones de una suspensión acuosa de 5.000 conidias mL-1, la respuesta de las plántulas a la enfermedad se determinó mediante las variables periodo de incubación (PI, tiempo de evolución de los síntomas (TES, área bajo la curva del desarrollo de la enfermedad (ABCDE y tasa de desarrollo de la enfermedad (r. La inoculación de los 50 aislamientos en plántulas de Dominico Hartón, permitió establecer cinco niveles de virulencia (muy alta, alta, media, baja y muy baja. La virulencia de los aislamientos no se relacionó con su origen geográfico ni con el genotipo del cual se obtuvieron; encontrándose en una misma zona y en un mismo genotipo, aislamientos de diferente virulencia. Los genotipos de plátano y banano mostraron un comportamiento diferencial frente a cinco aislamientos de diferente virulencia y origen, resultados que permitieron establecer tres niveles de reacción de los genotipos frente a los aislamientos (resistente, intermedio y susceptible, destacándose los genotipos Topocho, Maqueño, FHIA 20, FHIA 21 de plátano y los genotipos Sedita y FHIA 23 de banano por presentar un mayor nivel de resistencia, expresada como un progreso lento y menos severo de la enfermedad.A study was conducted to evaluate plantain and banana genotypes with Mycosphaerella fijiensis Morelet isolates of different virulence and geographic origin. The pathogenicity test and morphological characterization of the M. fijiensis populations were performed with a group of fifty monosporic isolates representative of the geographic growing areas in Colombia. For the pathogenicity and resistance assays an aqueous spore suspension of 5.000 conidias mL-1 was used to inoculate seedlings of plantain and banana genotypes, disease response of genotypes was rated by measuring the variables incubation period (IP, time of evolution of symptoms (TES, area under disease progress curve (AUDPC and rate of disease development (r.The inoculation of fifty isolates on Dominico Harton cultivar allowed to establish five levels of virulence (very high, high, medium, low and very low, which were not related to their geographic origin nor to genotype of the isolates. Isolates with different virulence level were present in the same zone and in the same genotype. The resistance assay showed that plantain and banana genotypes can present a differential behavior to the M. fijiensis isolates. The disease severity measured in the genotypes allowed to classify the in three disease reactions levels, resistance, intermediate and susceptible genotypes The plantain genotypes Topocho, Maqueno, FHIA 20 and FHIA 21, and the banana genotype Sedita and FHIA 23 were characterized for having a higher level of resistance, that was expressed as a lower disease severity and slower disease progress as compared with the other genotypes.

  4. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses such

  5. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  6. Manejo de Sigatoka negra (Mycosphaerella Fijiensis var. Difformis Morelet en plátano cv. “Curraré” en San Carlos, Zona Norte

    Directory of Open Access Journals (Sweden)

    Carlos Muñoz Ruiz

    2006-05-01

    Full Text Available Se evaluaron los diferentes productos químicos, utilizados en el control de Sigatoka negra en banano, en el cultivo de plátano, en la zona de Santa Clara de San Carlos. Uno de los principales objetivos fue generar un programa de manejo químico de la enfermedad para la zona de San Carlos, posible de ser transferido a otras zonas plataneras del país; el otro objetivo fue establecer las bases para automatizar las actividades culturales de manejo de plantaciones de musáceas, mediante la creación de un Software para computadora y asequible por internet.

  7. Efecto biofungicida del gel de Aloe vera sobre Mycosphaerella fijiensis, agente causal de la Sigatoka negra en Musa (AAA

    Directory of Open Access Journals (Sweden)

    Edwin Jaramillo Aguilar

    2017-01-01

    Full Text Available El objetivo de este trabajo fue evaluar a nivel in vitro la actividad antifúngica del gel de Aloe vera sobre el crecimiento micelial de Mycosphaerella fijiensis. Se utilizó la técnica de envenenamiento en el medio de cultivo PDA para determinar la actividad antifúngica del gel. El diseño utilizado fue completamente al azar, con siete tratamientos y tres repeticiones. En los tratamientos se utilizó un fungicida químico comercial (propiconazol, a 250 ppm y 500 ppm; un biofungicida comercial (Trichoderma sp. a 500 ppm y 1000 ppm; ambos productos se usaron como testigo químico y biológico, respectivamente; el gel de Aloe vera a 500 ppm y 1000 ppm; y un testigo absoluto. Se determinó diferencias significativas entre los tratamientos (ANOVA, El test de Tukey demostró que todos los tratamientos registraron diferencia significativa (p ≤ 0,05 con respecto al testigo absoluto. El propiconazol presentó el mayor porcentaje de inhibición del micelio (73,10%; el test de Tukey y el porcentaje de inhibición del micelio presentaron valores similares en el control del crecimiento del hongo a los 30 días de inoculación, en los tratamientos gel de Aloe vera y el T6 de Trichoderma sp. Los resultados sugieren que el Aloe vera podría ser un adecuado biofungicida para el control de Mycosphaerella fijiensis, agente causal de la Sigatoka negra.

  8. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  9. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  10. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  11. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  13. Facial Dog Attack Injuries

    OpenAIRE

    Lin, Wei; Patil, Pavan Manohar

    2013-01-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to succe...

  14. White or Black Hat? An Economic Analysis of Computer Hacking

    OpenAIRE

    Caitlin Brown

    2015-01-01

    Cyber attacks have increased sharply in recent years. This paper investigates the decision a profit-motivated hacker makes between working as a malicious hacker, called a black hat, and in cybersecurity as a white hat hacker. A key component of the model is the contest between white and black hats for some part of firm output that is vulnerable to attack. White and black hat earnings are increasing, nonlinear functions of the proportion of black hats. Multiple equilibria exist. Increasing the...

  15. Susceptibility of ponderosa pine, Pinus ponderosa (Dougl. Ex Laws.), to mountain pine beetle, Dendroctonus ponderosae Hopkins, attack in uneven-aged stands in the Black Hills of South Dakota and Wyoming USA

    Science.gov (United States)

    Jose F. Negron; Kurt Allen; Blaine Cook; John R. Withrow

    2008-01-01

    Mountain pine beetle, Dendroctonus ponderosae Hopkins can cause extensive tree mortality in ponderosa pine, Pinus ponderosa Dougl. ex Laws., forests in the Black Hills of South Dakota and Wyoming. Most studies that have examined stand susceptibility to mountain pine beetle have been conducted in even-aged stands. Land managers...

  16. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  17. Collaborative Attack vs. Collaborative Defense

    Science.gov (United States)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  18. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  19. Black to Black

    DEFF Research Database (Denmark)

    Langkjær, Michael Alexander

    2012-01-01

    Pop musicians performing in black stage costume take advantage of cultural traditions relating to matters black. Stylistically, black is a paradoxical color: although a symbol of melancholy, pessimism, and renunciation, black also expresses minimalist modernity and signifies exclusivity (as is hi...... suggested that appreciation of the highly personal motives of both Siouxsie Sioux and Janelle Monáe in wearing black may be achieved via analogies with the minimalist sublime of American artists Frank Stella’s and Ad Reinhardt’s black canvasses.......Pop musicians performing in black stage costume take advantage of cultural traditions relating to matters black. Stylistically, black is a paradoxical color: although a symbol of melancholy, pessimism, and renunciation, black also expresses minimalist modernity and signifies exclusivity (as...... is hinted by Rudyard Kipling’s illustration of ‘The [Black] Cat That Walked by Himself’ in his classic children’s tale). It was well understood by uniformed Anarchists, Fascists and the SS that there is an assertive presence connected with the black-clad figure. The paradox of black’s abstract elegance...

  20. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  1. Depression After Heart Attack

    Science.gov (United States)

    ... Heart Attack? Redford B. Williams Download PDF https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Circulation. 2011; 123: ... e639-e640 , originally published June 27, 2011 https://doi.org/10.1161/CIRCULATIONAHA.110.017285 Citation Manager Formats ...

  2. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  3. Fatal crocodile attack.

    Science.gov (United States)

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  4. BIRD ATTACK OCULAR INJURIES.

    Science.gov (United States)

    Tabatabaei, Seyed Ali; Soleimani, Mohammad; Behrouz, Mahmoud Jabbarvand

    2017-03-29

    To report 30 patients with bird attack-related eye injuries. This study was performed among patients coming to Farabi Eye Hospital, Tehran, Iran, from 2010 to 2015 with a history of bird attack causing eye injury. The inclusion criteria were a history of bird attack by pecking causing eye injury and having treatment and follow-up record for at least 6 months after treatment. The primary eye examinations included a full ophthalmic examination including evaluation of uncorrected visual acuity and best-corrected visual acuity (BCVA), anterior segment slit lamp biomicroscopy, and photography. For all patients with penetrating injury, primary repair was undertaken. Thirty patients (10 females and 20 males) with a mean age of 23.3 ± 18.5 years entered the study. The most common zone of injury was zone 1 (P < 0.001), and lensectomy was not needed in majority of patients (P < 0.001). The most common bird causing the injury was mynah (P < 0.001). Those patients with baseline BCVA of less than 20/200 or those with endophthalmitis had statistically worse final BCVA after treatment. Patients attacked by mynah bird had significantly better pretreatment uncorrected visual acuity and BCVA. The most common bird causing the eye injury among the sample of patients from Iran was mynah, which differs with previous studies indicating the rooster attack as the most common cause of eye injury. The authors also found that the most common zone of injury was zone 1, and the presence of endophthalmitis and lower baseline BCVA were significant risk factors for worse visual outcomes.

  5. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  6. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  7. Air Mobility and the Development of Attack Aviation During the Vietnam War from 1965-1967

    Science.gov (United States)

    2014-06-13

    the Ka-50 Black Shark to maintain helicopter parity with the U.S. The AAFSS project became the Advanced Attack Helicopter that later produced the...AIR MOBILITY AND THE DEVELOPMENT OF ATTACK AVIATION DURING THE VIETNAM WAR FROM 1965-1967 A thesis presented to the Faculty...AUG 2013 – JUNE 2014 4. TITLE AND SUBTITLE Air Mobilty and the Development of Attack Aviation during the Vietnam War from 1965-1967 5a. CONTRACT

  8. Heart Attack Coronary Artery Disease

    Science.gov (United States)

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  9. Thrombolytic drugs for heart attack

    Science.gov (United States)

    ... gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... supply blood and oxygen to the heart. A heart attack can occur if a blood clot stops the ...

  10. What Is a Heart Attack?

    Science.gov (United States)

    ... to help prevent your first heart attack. Heart-Healthy Lifestyle Changes A heart-healthy lifestyle can help prevent ... blood to flow to the heart muscle. Heart-Healthy Lifestyle Changes Treatment for a heart attack usually includes ...

  11. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  12. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  13. Suscetibilidade de oito cultivares de bananeira à sigatoka-amarela na região de Marília (SP Susceptibility to sigatoka of eight banana cultivars in the region of Marília, State of São Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Luiz Antonio Junqueira Teixeira

    1996-01-01

    Full Text Available A suscetibilidade de oito cultivares de bananeira à sigatoka-amarela (Mycosphaerella musicola foi avaliada em um experimento de campo, na região de Marília (SP. Três cultivares pertenciam ao Grupo AAA ('Nanicão', 'Nanicão Jangada' e 'Grande Naine' e cinco, ao AAB ('Prata', 'Enxerto', 'Maçã', 'Mysore' e 'Prata Zulu'. O experimento foi implantado em fevereiro de 1992 e, durante os três primeiros anos, não foi feito controle de sigatoka. A suscetibilidade dos materiais foi estimada mediante avaliações em três épocas: março de 93, abril e julho de 94. Na primeira avaliação, foi contado o número de manchas na segunda folha e, nas outras, foram atribuídas notas de acordo com a intensidade dos sintomas. Os cultivares foram agrupados em três classes: altamente suscetível (AS, suscetível (S ou parcialmente resistente (PR. Nenhum dos cultivares pôde ser considerado imune, pois todos apresentaram lesões foliares. Os cultivares mais suscetíveis foram os do Grupo AAA, Subgrupo Cavendish ('Nanicão', 'Grande Naine' e 'Nanicão Jangada' e 'Enxerto' (AAB. 'Mysore' (AAB e 'Prata Zulu' (AAB foram classificados como parcialmente resistentes. 'Prata' (AAB e 'Maçã' (AAB mostraram-se medianamente suscetíveis.Susceptibility of eight banana cultivars to sigatoka caused by Mycosphaerella musicola was assessed in a field experiment in the region of Marília, State of São Paulo. Three cultivars were members of AAA Group ('Nanicão', 'Nanicão Jangada' and 'Grande Naine' and five belonged to AAB Group ('Prata', 'Enxerto', 'Maçã', 'Mysore' and 'Prata Zulu'. The experiment was established in February, 1992, and during the first three years, sigatoka disease was not controlled. Susceptibility was assessed in three occasions: March, 1993, April and July, 1994. In the first, it was counted the number of spots on the second leaf, and in the others, the plants were graded according to the amount of leaf scorch due to sigatoka. The cultivars were

  14. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  15. Transient ischemic attack

    Science.gov (United States)

    ... a report of the American College of Cardiology/American Heart Association Task Force on practice guidelines and the Heart Rhythm Society. Circulation . 2014;130(23):2071-2104. PMID: 24682348 www.ncbi.nlm.nih.gov/pubmed/24682348 . Keman WN, Ovbiagele B, Black HR, et al. Guidelines for the prevention of ...

  16. Black America: Looking Inward or Outward?

    Science.gov (United States)

    Jordan, Vernon E.

    1996-01-01

    Presents some observations on what the recent attacks on affirmative action, the O. J. Simpson trial, and the Million Man March say about racism in America. In particular, the author assesses the Million Man March in terms of black leadership and its influence in helping black men to become more involved in constructive community service. (GR)

  17. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  18. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    Energy Technology Data Exchange (ETDEWEB)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  19. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  20. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  1. Mitigating Drive-By Download Attacks: Challenges and Open Problems

    Science.gov (United States)

    Egele, Manuel; Kirda, Engin; Kruegel, Christopher

    Malicious web sites perform drive-by download attacks to infect their visitors with malware. Current protection approaches rely on black- or white-listing techniques that are difficult to keep up-to-date. As todays drive-by attacks already employ encryption to evade network level detection we propose a series of techniques that can be implemented in web browsers to protect the user from such threats. In addition, we discuss challenges and open problems that these mechanisms face in order to be effective and efficient.

  2. Impact of Poultry Manure on Growth Behaviour, Black Sigatoka Disease Response and Yield Attributes of Two Plantain (Musa spp. AAB Genotypes

    Directory of Open Access Journals (Sweden)

    Aba, SC.

    2011-01-01

    Full Text Available La baisse de rendement en culture de plantain est un phénomène fréquent après quelques cycles de production; elle est due à de faibles niveaux de matière organique du sol et à une sensibilité accrue à des stress biotiques. L'utilisation de variétés améliorées est une option bon marché et respectueuse de l'environnement pour lutter contre les maladies des plantes, mais le maintien du rendement d'un nouveau cultivar en bananeraie nécessite une bonne gestion de la fertilité des sols qui pourrait être obtenue par une utilisation judicieuse de fumier de volaille. Les effets des trois doses [(0, 10 et 20 t.ha-1] de fumier de volaille décomposé sur la croissance, la réponse à la cercosporiose noire et le rendement de PITA 24' (un hybride de plantain et de son grand-parent maternel 'Mbi-Egome' (une banane plantain locale ont été évalués à Onne (Nigeria dans une station à fortes précipitations de l'IITA. L'expérience a été menée selon un dispositif split plot en blocs aléatoires complets. Les résultats ont montré que les deux clones étudiés avaient des variables de croissance similaires, sauf pour la surface foliaire et la teneur en chlorophylle. Malgré la sensibilité du génotype hybride à la cercosporiose foliaire d'origine atmosphérique, les données sur les composantes du rendement ont montré que 'PITA 24' produisait significativement plus de mains et de doigts par régime, un meilleur rendement du régime et un meilleur rendement végétatif global, toutefois, les deux génotypes ont présenté un schéma similaire pour la répartition de la biomasse. Les plants fumés ont eu un rendement significativement amélioré par rapport aux plants témoins, mais il y a eu un rendement moindre pour la dose de 20 t.ha-1. L'augmentation des doses d'engrais a réduit de plus de 30 jours le temps de récolte; de même, la taille des plants, le drageonnage, la teneur en chlorophylle des feuilles, l'indice des feuilles non contaminées, le cycle de production et la biomasse totale ont augmenté avec la dose de fumier appliquée. Notre étude a montré que l'application de 10 t.ha-1 de fumier de volaille par hectare et par an permettait d'obtenir les meilleures caractéristiques de rendement.

  3. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  4. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  5. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  6. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  7. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  8. Black holes

    International Nuclear Information System (INIS)

    Feast, M.W.

    1981-01-01

    This article deals with two questions, namely whether it is possible for black holes to exist, and if the answer is yes, whether we have found any yet. In deciding whether black holes can exist or not the central role in the shaping of our universe played by the forse of gravity is discussed, and in deciding whether we are likely to find black holes in the universe the author looks at the way stars evolve, as well as white dwarfs and neutron stars. He also discusses the problem how to detect a black hole, possible black holes, a southern black hole, massive black holes, as well as why black holes are studied

  9. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  10. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    Identifying factors behind countries weakness to cyber - attacks is an important step towards addressing these weaknesses at the root level. For...the lowest rates of cyber - attacks . This is surprising given the bad cyber reputation of some African countries such as Nigeria. Our research has many policy implications.

  11. [Heart-attack in pregnancy].

    Science.gov (United States)

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  12. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  13. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...

  15. Black Alcoholism.

    Science.gov (United States)

    Watts, Thomas D.; Wright, Roosevelt

    1988-01-01

    Examines some aspects of the problem of alcoholism among Blacks, asserting that Black alcoholism can best be considered in an ecological, environmental, sociocultural, and public health context. Notes need for further research on alcoholism among Blacks and for action to reduce the problem of Black alcoholism. (NB)

  16. Black Culture

    Science.gov (United States)

    Brown, Angela Khristin

    2013-01-01

    The migration of blacks in North America through slavery became united. The population of blacks passed down a tradition of artist through art to native born citizens. The art tradition involved telling stories to each generation in black families. The black culture elevated by tradition created hope to determine their personal freedom to escape…

  17. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  18. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security......The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...

  20. Gas in Attack and Gas in Defense

    National Research Council Canada - National Science Library

    Fries, Amos A

    1919-01-01

    Carrying out a gas attack is the most technical and dangerous of war's attacks, not only to those on board the airplane that is initiating the attack, but also to those friendly troops on the ground for miles around...

  1. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available and is only able to cater for social engineering attacks that use bidirectional communication. Previous research discovered that social engineering attacks can be classified into three different categories, namely attacks that utilise bidirectional...

  2. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  3. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  5. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... in panic attacks. For example, if a grizzly bear came after you, your body would react instinctively. ... panic disorder Major life stress, such as the death or serious illness of a loved one A ...

  6. Caracterización de los genes mat 1-1 y mat 1-2 del hongo mycosphaerella fijiensis, agente causal de la sigatoka negra, en la provincia del Guayas

    OpenAIRE

    Bonilla Jaime, Julio Andres; Chong, Pablo

    2009-01-01

    El hongo Mycosphaerella fijiensis Morelet es el causante de la enfermedad foliar llamada Sigatoka Negra y ataca a las plantas de banano. La reproducción sexual de M. fijiensis se da por compatibilidad genética o tipo de “sexo o mating types”. Esto quiere decir que sólo las líneas de “mating” genéticamente opuestas, son capaces de cruzarse y producir ascosporas. En estos hongos la compatibilidad sexual entre individuos haploides depende de los genes que se encuentran en el locus MAT que existe...

  7. Manejo de Sigatoka negra (Mycosphaerella Fijiensis var. Difformis Morelet en plátano cv. “Curraré” en San Carlos, Zona Norte

    Directory of Open Access Journals (Sweden)

    Carlos Muñoz Ruiz

    2005-05-01

    Full Text Available Se evaluaron los diferentes productos químicos, utilizados en el control de Sigatoka negra en banano, en el cultivo de plátano, en la zona de Santa Clara de San Carlos. Uno de los principales objetivos fue generar un programa de manejo químico de la enfermedad para la zona de San Carlos, posible de ser transferido a otras zonas plataneras del país; el otro objetivo fue establecer las bases para automatizar las actividades culturales de manejo de plantaciones de musáceas, mediante la creación de un Software para computadora y asequible por internet. Para el primer objetivo, se logró establecer que genéticamente el plátano es más resistente a la enfermedad y, por ser un cultivo donde hasta el momento, no se ha sobrepasado el uso de funguicidas como sucede en el banano, se pueden utilizar sin problema los productos protectantes mas comunes, como el Vondozeb y el Ridodur, tanto en aceite como en agua, así como el aceite puro a 7 litros/ha, presentando un efecto aceptable en el control de la infección de Mycospharella. Los productos sistémicos utilizados mostraron su eficiencia aunque, por su costo, no se sugiere su uso en plátano, solo para casos de emergencia. La mezcla de protectantes con sistémicos y aceite (cocteles, se consideran muy efectivos pero innecesarios para ser utilizados en plátano en forma comercial. Para esta evaluación se hicieron 35 aplicaciones o semanas de evaluación, en dos periodos climatológicos (verano e invierno de enero a septiembre del 2001, combinadas con las prácticas culturales tradicionales de deshoja, deshija, fertilización, y el monitoreo, utilizando la escala de signos visuales de 6 puntos de Stover y el método francés. Se evaluaron las variables: Hojas por planta (H/P, Hoja mas joven enferma (HMJE y Porcentaje ponderado de infecci��n (PPI, para cada tipo de grupo químico evaluado. La variable H/P, en la mayoría de los grupos se inició con un mínimo de 3 hojas hasta un máximo de 14

  8. Black leaf streak disease affects starch metabolism in banana fruit.

    Science.gov (United States)

    Saraiva, Lorenzo de Amorim; Castelan, Florence Polegato; Shitakubo, Renata; Hassimotto, Neuza Mariko Aymoto; Purgatto, Eduardo; Chillet, Marc; Cordenunsi, Beatriz Rosana

    2013-06-12

    Black leaf streak disease (BLSD), also known as black sigatoka, represents the main foliar disease in Brazilian banana plantations. In addition to photosynthetic leaf area losses and yield losses, this disease causes an alteration in the pre- and postharvest behavior of the fruit. The aim of this work was to investigate the starch metabolism of fruits during fruit ripening from plants infected with BLSD by evaluating carbohydrate content (i.e., starch, soluble sugars, oligosaccharides, amylose), phenolic compound content, phytohormones, enzymatic activities (i.e., starch phosphorylases, α- and β-amylase), and starch granules. The results indicated that the starch metabolism in banana fruit ripening is affected by BLSD infection. Fruit from infested plots contained unusual amounts of soluble sugars in the green stage and smaller starch granules and showed a different pattern of superficial degradation. Enzymatic activities linked to starch degradation were also altered by the disease. Moreover, the levels of indole-acetic acid and phenolic compounds indicated an advanced fruit physiological age for fruits from infested plots.

  9. Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

    Directory of Open Access Journals (Sweden)

    R. Villalpando-Hernández

    2011-08-01

    Full Text Available We present a network coding security method capable of detecting several routing attacks in wireless reconfigurablenetworks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed methodperforms linear network coding over intermediate nodes composing a given route, not only to distribute content, butalso to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust,accurate and fast response under security attacks for varying network conditions, such as interference and outagedue to channel fading. It also provides a gain in network throughput by increasing the number of successfully receivedpackets without a significant increase of the bandwidth usage.

  10. A Lovelock black hole bestiary

    International Nuclear Information System (INIS)

    Camanho, Xián O; Edelstein, José D

    2013-01-01

    We revisit the study of (A)dS black holes in Lovelock theories. We present a new tool that allows to attack this problem in full generality. In analyzing maximally symmetric Lovelock black holes with non-planar horizon topologies, many distinctive and interesting features are observed. Among them, the existence of maximally symmetric vacua does not support black holes in vast regions of the space of gravitational couplings, multi-horizon black holes and branches of solutions that suggest the existence of a rich diagram of phase transitions. The appearance of naked singularities seems unavoidable in some cases, raising the question about the fate of the cosmic censorship conjecture in these theories. There is a preferred branch of solutions for planar black holes, as well as for non-planar black holes with high enough mass or temperature. Our study clarifies the role of all branches of solutions, including asymptotically dS black holes, and whether they should be considered when studying these theories in the context of AdS/CFT. (paper)

  11. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  12. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  13. Black Holes and the Large Hadron Collider

    Science.gov (United States)

    Roy, Arunava

    2011-01-01

    The European Center for Nuclear Research or CERN's Large Hadron Collider (LHC) has caught our attention partly due to the film "Angels and Demons." In the movie, an antimatter bomb attack on the Vatican is foiled by the protagonist. Perhaps just as controversial is the formation of mini black holes (BHs). Recently, the American Physical Society…

  14. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  15. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  16. Efecto de la sigatoka negra (Mycosphaerella fijiensis sobre la fotosíntesis y transpiración foliar del banano (Musa sp. AAA, cv. Valery

    Directory of Open Access Journals (Sweden)

    Martín Hidalgo

    2006-01-01

    Full Text Available Con el propósito de relacionar el ataque de la Sigatoka negra (Mycosphaerella fijiensis con las tasas fotosintética y de transpiración foliares, se sembraron rebrotes del tercer ciclo de producción de una plantación del cv. Valery en potes plásticos de 4 litros. Las plantas se mantuvieron dentro de un invernadero a humedad relativa y temperatura del 90% y 27°C, respectivamente. Al emitir 6 hojas, las 4 más jóvenes fueron inoculadas con conidios de M. fijiensis a partir de cultivos monospóricos de aislamientos silvestres. Dos riegos diarios por aspersión mantuvieron una película de agua sobre las hojas. Se aplicó una suspensión de 150000 conidios ml-1 sobre el envés de las hojas utilizando un aerógrafo, en 2 fechas con un intervalo de 30 días entre ellas, para obtener diferentes grados de severidad y estadios de la enfermedad en hojas de diferentes edades. Tanto la determinación visual del porcentaje de severidad como la del estadio de desarrollo de la enfermedad, fueron llevadas a cabo en los 6,25 cm2 del área foliar cubierta por la cubeta del medidor infrarrojo de gases, utilizado para determinar las tasas fotosintéticas y transpiratorias foliares. La tasa fotosintética neta foliar (Fn; μmoles de CO2 reducidos por m2 s-1 decayó con el incremento del porcentaje de severidad (Fn=-0,1517 x+6,845; R2=0,72 y el estadio de la enfermedad (Fn=-1,62 x+8,36; R2=0,60. El impacto del patógeno sobre la tasa transpiratoria foliar (E; mmoles de agua m-2 s-1 fue relativamente menor, como lo mostró la regresión de E contra el porcentaje de severidad (E=-0,0122 x+2,429; R2=0,11

  17. Black Culture

    Directory of Open Access Journals (Sweden)

    Angela Khristin Brown

    2013-07-01

    Full Text Available The migration of blacks in North America through slavery became united.  The population of blacks past downs a tradition of artist through art to native born citizens. The art tradition involved telling stories to each generation in black families. The black culture elevated by tradition created hope to determine their personal freedom to escape from poverty of enslavement and to establish a way of life through tradition. A way of personal freedoms was through getting a good education that lead to a better foundation and a better way of life.

  18. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  19. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available taxonomy and ontology RP van Heerden1,2, B Irwin2, ID Burke1, L Leenen1 1CSIR, Pretoria, South Africa 2Rhodes University, Grahamstown, South Africa Keywords/ Key Phrases: Network Attack, Network Attack Classification, Taxonomy, Ontology, Attack... Scenario rvheerden@csir.co.za b.irwin@ru.ac.za iburke@csir.co.za lleenen@csir.co.za Abstract: Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has a...

  20. Black Cohosh

    Science.gov (United States)

    ... who have had hormone-sensitive conditions such as breast cancer or for pregnant women or nursing mothers. Black cohosh should not be confused with blue cohosh (Caulophyllum thalictroides) , which has different effects and may not be safe. Black cohosh has ...

  1. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  2. Being active after a heart attack (image)

    Science.gov (United States)

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  3. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  4. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  5. Understand Your Risk of Heart Attack

    Science.gov (United States)

    ... Heart-Health Basics Reducing your risk starts with smart choices. If you smoke, stop. The American Heart ... a Second Heart Attack | Spanish Cardiac Rehab Referral Card | Spanish Heart Attack Warning Signs: Patient sheet | Infographic | ...

  6. Can Vitamins Help Prevent a Heart Attack?

    Science.gov (United States)

    ... vitamins help prevent a heart attack? Can taking vitamins help prevent heart disease or a heart attack? Answers ... M.D. It's not yet clear if taking vitamins can reduce your risk of developing heart disease ...

  7. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  8. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on

  9. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  10. Network Attack Reference Data Set

    Science.gov (United States)

    2004-12-01

    fingerprinting tools include QueSO [10] (literally translates to “what OS”) and nmap [11], however there are a number of additional tools available for...Network Attack Reference Data Set J. McKenna and J. Treurniet Defence R&D Canada √ Ottawa TECHNICAL...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  11. Biometrics Evaluation under Spoofing Attacks

    OpenAIRE

    Chingovska, Ivana; Anjos, André; Marcel, Sébastien

    2014-01-01

    While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evalu...

  12. Survey of Sybil Attacks in Social Networks

    OpenAIRE

    Gunturu, Rupesh

    2015-01-01

    This paper reviews the Sybil attack in social networks, which has the potential to compromise the whole distributed network. In the Sybil attack, the malicious user claims multiple identities to compromise the network. Sybil attacks can be used to change the overall ranking in voting applications, bad-mouth an opinion, access resources or to break the trust mechanism behind a P2P network. In this paper, different defense mechanisms used to mitigate Sybil attacks are also reviewed.

  13. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  14. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  15. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  16. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore...

  17. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  18. The Value of Attack-Defence Diagrams

    NARCIS (Netherlands)

    Hermanns, H.; Krämer, Julia; Krčál, Jan; Stoelinga, Mariëlle Ida Antoinette; Piessens, Frank; Viganò, Luca

    Success or failure of attacks on high-security systems, such as hacker attacks on sensitive data, depend on various situational conditions, including the timing and success chances of single attack steps, and concurrent countermeasures of the defender. With the existing state-of-the-art modelling

  19. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  20. Polar bear attacks on humans: Implications of a changing climate

    Science.gov (United States)

    Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa

    2017-01-01

    Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing

  1. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  2. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  3. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  4. Stochastic Model of TCP SYN Attacks

    OpenAIRE

    Simona Ramanauskaitė; Antanas Čenys

    2011-01-01

    A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both...

  5. DESENVOLVIMENTO E PRODUÇÃO DE BANANEIRA ‘GRANDE NAINE’ EM DIFERENTES SISTEMAS DE MANEJO PARA A CONVIVÊNCIA COM A SIGATOKA-NEGRA NO VALE DO RIBEIRA-SP

    Directory of Open Access Journals (Sweden)

    EDSON SHIGUEAKI NOMURA

    2015-09-01

    Full Text Available RESUMO Objetivou-se avaliar o desenvolvimento e a produção de bananeira da cultivar Grande Naine submetidos a diferentes sistemas de manejo para a convivência com a Sigatoka-negra no Vale do Ribeira-SP (Brasil. Utilizou-se de mudas de ‘Grande Naine’ micropropagadas e conduzidas em delineamento inteiramente casualizado, com cinco tratamentos (sistemas de manejo: plantio intercalado; fungicida; desfolha+plantio intercalado; desfolha+fungicida; testemunha e subdividida no tempo (dois ciclos de produção, com oito repetições, considerando uma planta por repetição. Foram avaliados os seguintes parâmetros: altura da planta, diâmetro do pseudocaule, número de folhas ativas no florescimento e na colheita, massa fresca dos frutos comercializáveis, produtividade, número de pencas, número total de frutos, massa fresca total e por frutos da 2ª penca, comprimento e diâmetro de frutos da 2ª penca. Os dados foram submetidos a análises de variâncias, pelo teste F; e as médias, quando significativas, foram submetidas ao teste de Tukey (5 % de probabilidade. Conclui-se que as aplicações de fungicidas foram eficientes para o controle da Sigatoka-negra, com melhores resultados no desenvolvimento, na produção e na qualidade dos frutos da cultivar Grande Naine, porém sem apresentar diferenças quando associados com a desfolha. O plantio intercalado afetou negativamente em todos os parâmetro de desenvolvimento e produção da cultivar Grande Naine.

  6. Black Tea

    Science.gov (United States)

    ... leaves of the same plant, has some different properties. Black tea is used for improving mental alertness ... that slow blood clotting include aspirin, clopidogrel (Plavix), diclofenac (Voltaren, Cataflam, others), ibuprofen (Advil, Motrin, others), naproxen ( ...

  7. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  8. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  9. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  12. Coronary Artery Dissection: Not Just a Heart Attack

    Science.gov (United States)

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Mar 15,2018 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  13. Black layers on historical architecture.

    Science.gov (United States)

    Toniolo, Lucia; Zerbi, Carlotta M; Bugini, Roberto

    2009-03-01

    separation is particularly evident in 'recent' crust, where the sulphation process is more active. Black compact deposits show a higher porosity than black crusts because gypsum is not coming from the chemical corrosion of the substrate but from outside; actually, in the former case, the substrate is sound. Encrustations show a highly regular crystal organisation of gypsum (close packed tabular crystals) that cannot be traced back to casual atmospheric deposit or to corrosion of the substrate but rather to the crystallisation of a solution coming from an external source. Also in this case, the marble is sound; evidence of the effect of some protection treatment is pointed out. In spite of the apparent similarity of the examined samples, analytical results have evidenced three main types of black crusts: black crust with decayed substrate, compact deposit and black encrustation showing a sound substrate underneath. Experimental evidence of calcite grains sulphation in progress, taking place according to a model recently proposed, has been observed. Sulphation process is prevented where particular conservation treatments had been applied in the past. New experimental studies can be focussed to understand the specific conditions (measurements of micro-climatic and thermodynamic parameters) and mechanisms for black crusts formation in situ. The problem of the kinetic of the sulphation process of marble, the assessment of black layers formation in the case of different carbonate stone materials and the study of acid attack in presence of surface protecting layers deserve further investigation.

  14. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    . However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute......Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  15. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  16. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  17. Incidencia y severidad de las sigatokas negra (Mycosphaerella fijiensis Morelet y amarilla (Mycosphaerella musicola Leach et Mulder del plátano según los estados fenológicos

    Directory of Open Access Journals (Sweden)

    Torrado-Jaime Mayary

    2008-12-01

    Full Text Available

    En Colombia las sigatokas negra y amarilla, causadas por Mycosphaerella fijiensisy M. musicola, respectivamente, están entre las principales enfermedades que atacan al plátano. Aunque hay registros de su presencia, se desconoce la época en que aparecen de acuerdo con los estados fenológicos y condiciones ambientales. Esta investigación se realizó en la granja Montelindo (Universidad de Caldas, a 1.050 msnm, temperatura media anual 22,8 °C, precipitación anual 2.200 mm y humedad relativa 76%. Se sembraron cormos de Dominico Hartón, África, FHIA-20 y FHIA-21, en diseño de bloques al azar con cuatro repeticiones y 10 plantas por repetición. Desde siembra hasta cosecha se registraron incidencia, severidad, número de esporas y elementos climáticos. Se definieron cinco estados fenológicos: brotación y emergencia, plántula, prefloración, floración, y llenado del racimo y madurez fisiológica. Las sigatokas se presentaron desde la etapa de plántula hasta madurez fisiológica; fue más agresiva la sigatoka negra en el área de estudio. La mayor población de conidias en D. Hartón y África se presentó en etapas de prefloración y llenado del racimo; en los híbridos FHIA-20 y FHIA-21 coincidió con la etapa de floración. Incrementos graduales de temperatura, precipitación intensa intercalada con periodos secos y aumento en la humedad foliar favorecieron la incidencia y severidad de las sigatokas.

  18. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  19. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  20. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    Directory of Open Access Journals (Sweden)

    Frédéric Moisan

    2017-06-01

    Full Text Available Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies.

  1. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... engineered as part of this work. This is the first time CSSAs for the Skylake architecture are reported. Our attacks demonstrate that cryptographic applications in cloud computing environments using key-dependent tables for acceleration are still vulnerable even on recent architectures, including Skylake...

  2. Religion and support for suicide attacks.

    Science.gov (United States)

    Ginges, Jeremy; Hansen, Ian; Norenzayan, Ara

    2009-02-01

    In four studies carried out across different cultural, religious, and political contexts, we investigated the association between religion and popular support for suicide attacks. In two surveys of Palestinians and one cognitive priming experiment with Israeli settlers, prayer to God, an index of religious devotion, was unrelated to support for suicide attacks. Instead, attendance at religious services, thought to enhance coalitional commitment, positively predicted support for suicide attacks. In a survey of six religions in six nations, regular attendance at religious services positively predicted a combination of willing martyrdom and out-group hostility, but regular prayer did not. Implications for understanding the role of religion in suicide attacks are discussed.

  3. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  4. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  5. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout...

  6. Black Willow

    Science.gov (United States)

    R. M. Krinard

    1980-01-01

    Black willow and other species of Salix together comprise a majority of the stocking. Cottonwood is the chief associate, particularly in the early stages, but green ash, sycamore, pecan, persimmon, waterlocust, American elm, baldcypress, red maple, sugarberry, box-elder, and in some areas, silver maple are invaders preceding the next successional stage.

  7. Counseling Blacks

    Science.gov (United States)

    Vontress, Clemmont E.

    1970-01-01

    Blacks have developed unique environmental perceptions, values, and attitudes, making it difficult for counselors to establish and maintain positive rapport. This article examines attitudinal ingredients posited by Carl Rogers for relevance to this problem, and suggests in-service training to help counselors and other professionals relate…

  8. Black Psyllium

    Science.gov (United States)

    ... by mouth for up to 6 weeks reduces blood sugar in people with type 2 diabetes. Cancer. Diarrhea. Irritable bowel syndrome (IBS). Other conditions. ... with the dose. Diabetes: Black psyllium can lower blood sugar levels ... with type 2 diabetes by slowing down absorption of carbohydrates. Monitor blood ...

  9. Cued Panic Attacks in Body Dysmorphic Disorder

    Science.gov (United States)

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  10. Automated Alerting for Black Hole Routing

    Science.gov (United States)

    2007-09-01

    researcher: It has a module for detecting SYN flooding , and another that performs general analysis of large bursts of traffic (but which hasn’t been...Although ACLs are effective, they are costlier than BHR in terms of processing. During a D/DoS attack, when thousands of packets are flooded towards the...black hole routing. This is due to BGP updates being sent via TCP packets and the communication links between the bases and border routers not

  11. Black hole astrophysics

    International Nuclear Information System (INIS)

    Blandford, R.D.; Thorne, K.S.

    1979-01-01

    Following an introductory section, the subject is discussed under the headings: on the character of research in black hole astrophysics; isolated holes produced by collapse of normal stars; black holes in binary systems; black holes in globular clusters; black holes in quasars and active galactic nuclei; primordial black holes; concluding remarks on the present state of research in black hole astrophysics. (U.K.)

  12. Quantum black holes

    CERN Document Server

    Calmet, Xavier; Winstanley, Elizabeth

    2014-01-01

    Written by foremost experts, this short book gives a clear description of the physics of quantum black holes. The reader will learn about quantum black holes in four and higher dimensions, primordial black holes, the production of black holes in high energy particle collisions, Hawking radiation, black holes in models of low scale quantum gravity and quantum gravitational aspects of black holes.

  13. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.

    Science.gov (United States)

    Saleh, Mohammed A; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  14. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  15. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  16. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  18. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  19. RESPONSE OF SEVERAL APPLE VARIETIES TO POWDERY MILDEW (PODOSPHAERA LEUCOTRICHA ATTACK IN CENTRAL TRANSYLVANIA CONDITIONS

    Directory of Open Access Journals (Sweden)

    R SESTRAS

    2004-04-01

    Full Text Available The response of apple cultivars to powdery mildew attack – Podosphaera leucotricha (Ell. et Everh. Salm. – on leaves and shoots, for seven years (1990-1996, emphasised a large variability for this character existing within 75 apple varieties tested in an experimental field at the Fruit Research Station in Cluj-Napoca, Central Transylvania, Romania. The experimental results confirmed that the cultivars of the Jonathan group are highly susceptible to powdery mildew (e.g. Jonathan, Jonne Spur, Jonathan Smith, Black John, Jonathan Watson, Nüred Jonathan, Delia, Aromat de vară, Roşu de Cluj. Cultivars Gloster, Starkrimson and Prima were registered with a low attack degree. None of the tested cultivars were included in the category “No attack”. Out of all varieties, 21 of them representing 28.0% were registered with a very high attack, both on leaves and shoots.

  20. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  1. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  2. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  3. Two Improved Multiple-Differential Collision Attacks

    Directory of Open Access Journals (Sweden)

    An Wang

    2014-01-01

    Full Text Available In CHES 2008, Bogdanov proposed multiple-differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points. In this paper, keypoints voting test is proposed for solving these problems, which can increase the success ratio from 35% to 95% on the example of one implementation. Furthermore, we improve the ternary voting test of Bogdanov, which can improve the experiment efficiency markedly. Our experiments show that the number of power traces required in our attack is only a quarter of the requirement of traditional attack. Finally, some alternative countermeasures against our attacks are discussed.

  4. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  5. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    Science.gov (United States)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  6. VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2014-10-01

    Full Text Available Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic evidence in courts. However, the data from black boxes can be forged or modified by man-in-the-middle (MITM attacks and message hijacking. In this paper, we propose a vehicle cloud computing-based black box service model that can provide integrity for black box data through digital signatures in vehicle cloud computing (VCC environments. Our proposed model protects against MITM attacks and message hijacking using only a hash value and digital signature. Moreover, a mirroring technique (RAID 1 provides backup and recovery to protect the data from a traffic accident.

  7. Protecting complex infrastructures against multiple strategic attackers

    Science.gov (United States)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  8. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  10. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  11. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  12. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    Directory of Open Access Journals (Sweden)

    Kelly Torralvo

    Full Text Available On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger eggs are jaguars (Panthera onca, tegu lizards (Tupinambis teguixim, capuchin monkeys (Sapajus macrocephalus and humans (Homo sapiens. In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  13. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    Science.gov (United States)

    Torralvo, Kelly; Botero-Arias, Robinson; Magnusson, William E

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  14. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... for heart attack? I've read that calcium supplements may increase the risk of heart attack. Is ... Some doctors think it's possible that taking calcium supplements may increase your risk of a heart attack. ...

  15. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  16. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Science.gov (United States)

    Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.

    2009-12-01

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).

  17. Black holes

    International Nuclear Information System (INIS)

    Carter, B.

    1980-01-01

    In years 1920 as a result of quantum mechanics principles governing the structure of ordinary matter, a sudden importance for a problem raised a long time ago by Laplace: what happens when a massive body becomes so dense that even light cannot escape from its gravitational field. It is difficult to conceive how could be avoided in the actual universe the accumulation of important masses of cold matter having been submitted to gravitational breaking down followed by the formation of what is called to day a black hole [fr

  18. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  1. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  2. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  3. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  4. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  5. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  6. Joint Warfighting: Attacking Time-Critical Targets

    National Research Council Canada - National Science Library

    Lewis, Jerry

    2001-01-01

    .... While DOD has developed and fielded considerable capability to detect, assess, and attack most fixed enemy targets, experiences in the Persian Gulf and more recently in Kosovo revealed that DOD...

  7. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  8. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  9. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  10. Panic Attack History and Smoking Topography

    Science.gov (United States)

    Farris, Samantha G.; Brown, Lily A.; Goodwin, Renee D.; Zvolensky, Michael J.

    2016-01-01

    Background Little is known about panic attacks and puffing topography, a behavioral index of the value of smoking reinforcement. This study examined smoking style during the course of smoking of a single cigarette among adult daily smokers with and without a history of panic attacks. Method Participants (n = 124, Mage = 43.9, SD = 9.7; 44.4% female) were non-treatment seeking daily smokers. Lifetime panic attack history was assessed via diagnostic assessment; 28.2% (n = 35) of the sample had a panic attack history. Participants smoked one cigarette during an ad libitum smoking trial. Puff volume, duration, and inter-puff interval were measured using the Clinical Research Support System (CReSS) pocket device. Results Regression analyses revealed that panic attack status was not associated with significant differences in average puff volume, duration, or inter-puff interval. Multi-level modeling was used to examine puffing trajectories. Puff-level data revealed that there was a significant quadratic time x panic effect for puff volume and duration. Those with a panic attack history demonstrated relatively sustained levels of both puff volume and duration over time, whereas those without a history of panic attacks demonstrated an increase followed by a decrease in volume and duration over time. These effects were not accounted for by the presence of general psychopathology. Discussion Smokers with a panic attack history demonstrate more persistent efforts to self-regulate the delivery of nicotine, and thus may be at risk for continued smoking and dependence. Tailored treatment may be needed to address unique vulnerabilities among this group. PMID:28033542

  11. Attack by Pyemotes johnmoseri (Acari: Pyemotidae)

    Science.gov (United States)

    Tulin Askit; Ibrahim Cakmak; John Moser

    2007-01-01

    The Aegean Region of Turkey is one of the largest dried fig producers in the world. A Turkish cultivar sarilop (Ficus carica cv. Calimyrna L.) possesses good qualities for drying process, and has been grown extensively for many years in Turkey. Hypoborus ficus is the most common xylophagous insect attacking fig trees in Aydin (Aks¸it et al. 2003). This pest attacks...

  12. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  13. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  14. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    OpenAIRE

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineer...

  15. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  16. Making Blackness, Making Policy

    OpenAIRE

    Geller, Peter

    2012-01-01

    Too often the acknowledgment that race is a social construction ignores exactly how this construction occurs. By illuminating the way in which the category of blackness and black individuals are made, we can better see how race matters in America. Antidiscrimination policy, social science research, and the state's support of its citizens can all be improved by an accurate and concrete definition of blackness. Making Blackness, Making Policy argues that blackness and black people are literally...

  17. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  18. Black hole critical phenomena without black holes

    Indian Academy of Sciences (India)

    Black holes; numerical relativity; nonlinear sigma. Abstract. Studying the threshold of black hole formation via numerical evolution has led to the discovery of fascinating nonlinear phenomena. ... Theoretical and Computational Studies Group, Southampton College, Long Island University, Southampton, NY 11968, USA ...

  19. Black Urine

    Directory of Open Access Journals (Sweden)

    Rahim Vakili

    2016-06-01

    Full Text Available A 2-year-old boy was born at term of healthy, non-consanguineous Iranian parents. His mother attended in the clinic with the history of sometimes discoloration of diapers after passing urine. She noticed that first at the age of one month with intensified in recent months. His Physical examination and growth parameters were normal. His mother denied taking any medication (sorbitol, nitrofurantoin, metronidazole, methocarbamol, sena and methyldopa (5. Qualitative urine examination showed dark black discoloration. By this history, alkaptonuria was the most clinical suspicious. A 24-hour-urine sample was collected and sent for quantitative measurements. The urine sample was highly positive for homogentisic acid and negative for porphyrin metabolites.

  20. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  1. Know the Warning Signs of a Heart Attack

    Science.gov (United States)

    ... No. 22 Know the Warning Signs of a Heart Attack What is a heart attack? Aheart attack happens when the blood vessels that ... hurting your heart muscle. Another name for a heart attack is myocardial infarction, or MI. If you have ...

  2. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  3. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  4. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  5. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  6. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  7. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullée, Jan Willem Hendrik; Montoya, Lorena; Pieters, W.; Junger, M.; Hartel, P.H.

    2018-01-01

    The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps,

  8. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  9. La medición y vigilancias de la enfermedad de la mancha foliar producida por la sigatoka negra (Mycospharella fijiensis var diformis Morelet en la producción de musáceas: un enfoque para lograr la sostenibilidad del desarrollo

    Directory of Open Access Journals (Sweden)

    Edgardo Vargas Jarquín

    2013-05-01

    Full Text Available En el presente trabajo se discute la necesidad de utilizar tecnología, como el procesamiento digital de imágenes para mejorar los procesos de medición y vigilancia de la enfermedad de la mancha de la hoja causada por SIGATOKA NEGRA (Mycospharella fijiensis var diformis Morelet, pero partiendo de un análisis epistemológico que fundamenta al desarrollo sostenible, que es el marco dentro del cual se encuentra sentido a la aplicación de esta tecnología. Así se define que es la gobernabilidad benéfica del ambiente lo que dirige la gestión de los diferentes actores y esta se da en virtud de comprender, mantener, proteger y administrar la complejidad ambiental.  Se señala como uno de los principales inconvenientes de la producción de musáceas la enfermedad de la sigatoka negra, pues produce costos de producción de aproximadamente 1.300 dólares al año costo en uso y aplicación de pesticidas.  Se discute sobre el enfoque de los trabajos de investigación para el desarrollo sostenible en el cultivo de las musáceas.  Se presentan dos experiencias para medir y vigilar la sigatoka negra. En un caso se desarrolla un sistema convencional denominado SiMu, que permite utilizar medios computacionales asistidos para, sobre todo, medir y vigilar la incidencia de la sigatoka. En el otro caso se utiliza tecnología de procesamiento digital de imágenes para realizar ese mismo trabajo pero con un mayor nivel de automatización.  Queda planteada la interrogante de si esta tecnología se puede usar para pequeños y medianos productores, tanto de banano como de plátano, puesto que en ese tipo de unidades no se podría tener una forma económicamente viable para obtener imágenes digitales aéreas.

  10. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  11. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  12. Black Silicon Solar Cells with Black Ribbons

    DEFF Research Database (Denmark)

    Davidsen, Rasmus Schmidt; Tang, Peter Torben; Mizushima, Io

    2016-01-01

    We present the combination of mask-less reactive ion etch (RIE) texturing and blackened interconnecting ribbons as a method for obtaining all-black solar panels, while using conventional, front-contacted solar cells. Black silicon made by mask-less reactive ion etching has total, average...... reflectance below 0.5% across a 156x156 mm2 silicon (Si) wafer. Black interconnecting ribbons were realized by oxidizing copper resulting in reflectance below 3% in the visible wavelength range. Screen-printed Si solar cells were realized on 156x156 mm2 black Si substrates with resulting efficiencies...... in the range 15.7-16.3%. The KOH-textured reference cell had an efficiency of 17.9%. The combination of black Si and black interconnecting ribbons may result in aesthetic, all-black panels based on conventional, front-contacted silicon solar cells....

  13. Black Silicon Solar Cells with Black Ribbons

    DEFF Research Database (Denmark)

    Davidsen, Rasmus Schmidt; Tang, Peter Torben; Mizushima, Io

    2016-01-01

    We present the combination of mask-less reactive ion etch (RIE) texturing and blackened interconnecting ribbons as a method for obtaining all-black solar panels, while using conventional, front-contacted solar cells. Black silicon made by mask-less reactive ion etching has total, average...... in the range 15.7-16.3%. The KOH-textured reference cell had an efficiency of 17.9%. The combination of black Si and black interconnecting ribbons may result in aesthetic, all-black panels based on conventional, front-contacted silicon solar cells....... reflectance below 0.5% across a 156x156 mm2 silicon (Si) wafer. Black interconnecting ribbons were realized by oxidizing copper resulting in reflectance below 3% in the visible wavelength range. Screen-printed Si solar cells were realized on 156x156 mm2 black Si substrates with resulting efficiencies...

  14. Black holes. Chapter 6

    International Nuclear Information System (INIS)

    Penrose, R.

    1980-01-01

    Conditions for the formation of a black hole are considered, and the properties of black holes. The possibility of Cygnus X-1 as a black hole is discussed. Einstein's theory of general relativity in relation to the formation of black holes is discussed. (U.K.)

  15. Black Eye: First Aid

    Science.gov (United States)

    First aid Black eye Black eye: First aid By Mayo Clinic Staff A black eye is caused by bleeding under the skin around the eye. Most injuries that cause a ... 13, 2018 Original article: http://www.mayoclinic.org/first-aid/first-aid-black-eye/basics/ART-20056675 . Mayo ...

  16. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  17. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    Heller, W.

    2004-01-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  18. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  19. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    Science.gov (United States)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  20. Search for black holes

    International Nuclear Information System (INIS)

    Cherepashchuk, Anatolii M

    2003-01-01

    Methods and results of searching for stellar mass black holes in binary systems and for supermassive black holes in galactic nuclei of different types are described. As of now (June 2002), a total of 100 black hole candidates are known. All the necessary conditions Einstein's General Relativity imposes on the observational properties of black holes are satisfied for candidate objects available, thus further assuring the existence of black holes in the Universe. Prospects for obtaining sufficient criteria for reliably distinguishing candidate black holes from real black holes are discussed. (reviews of topical problems)

  1. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  2. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  3. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  4. Women at risk for cardiovascular disease lack knowledge of heart attack symptoms.

    Science.gov (United States)

    Flink, Laura E; Sciacca, Robert R; Bier, Michael L; Rodriguez, Juviza; Giardina, Elsa-Grace V

    2013-03-01

    It is not known whether cardiovascular disease (CVD) risk level is related to knowledge of the leading cause of death of women or heart attack symptoms. Women with higher CVD risk estimated by Framingham Risk Score (FRS) or metabolic syndrome (MS) have lower CVD knowledge. Women visiting primary care clinics completed a standardized behavioral risk questionnaire. Blood pressure, weight, height, waist size, fasting glucose, and lipid profile were assessed. Women were queried regarding CVD knowledge. Participants (N = 823) were Hispanic women (46%), non-Hispanic white (37%), and non-Hispanic black (8%). FRS was determined in 278: low (63%), moderate (29%), and high (8%); 24% had ≥3 components of MS. The leading cause of death was answered correctly by 54%, heart attack symptoms by 67%. Knowledge was lowest among racial/ethnic minorities and those with less education (both Pheart attack symptoms (P = 0.018), but not after multivariable adjustment. Women with higher FRS were less likely to know heart attack symptoms. Efforts to target those at higher CVD risk must persist, or the most vulnerable may suffer disproportionately, not only because of risk factors but also inadequate knowledge. © 2013 Wiley Periodicals, Inc.

  5. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  6. Awareness of heart attack symptoms among US adults in 2007, and changes in awareness from 2001 to 2007.

    Science.gov (United States)

    Fang, Jing; Gillespie, Cathleen; Keenan, Nora L; Greenlund, Kurt J

    2011-05-01

    Timely access to emergency care, prompt receipt of advanced treatment and survival from heart attack is dependent on both the early recognition of heart attack symptoms, by both victims and bystanders, and by immediately calling the emergency services. The objective of this study is to measure the awareness of heart attack symptoms and the emergency response among US adults. We analyzed data from the Behavioral Risk Factor Surveillance System's module on heart attack and stroke, which was conducted in 17 states/territories in 2001 and 12 states/territories in 2007. The module included five questions related to heart attack symptoms, one decoy question and one question regarding the first action to take if someone is having a heart attack. Age-adjusted prevalence of awareness was estimated, and odds ratios were calculated. Differences between 2001 and 2007 were assessed for five states that used the module in both years. In 2007, among 76,864 adults, awareness of individual heart attack symptoms ranged from 49% (pain in jaw, neck or back) to 92% (chest pain). Although 97% of adults recognized at least one symptom, only 10.7% recognized all five symptoms, knew that 'sudden trouble seeing in one or both eyes' was not a symptom of heart attack and recognized the need to call the emergency services. This estimate varied significantly by age, sex, race/ethnicity and level of education. The estimate was significantly higher for women (12.2%) than men (7.7%), White (11.6%) than Black (5.7%) or Hispanic people (4.5%), those with a higher level of education (13.5%) than lower educational level (4.5%) and for those with coronary heart disease (16.2%) than without the disease (9.5%). Comparison of awareness between 2001 (the referent) and 2007, in five states, revealed that awareness of all symptoms and calling the emergency services, were 9.7 and 10.3% for 2001 and 2007, respectively (p heart attack symptoms among adults in 12 states was low and little improvement was

  7. Situation de la cercosporiose noire des bananiers et plantains Musa spp. sous différents systèmes de culture à Yangambi, Haut-Zaïre

    Directory of Open Access Journals (Sweden)

    Mobambo, KN.

    1993-01-01

    Full Text Available Black sigatoka situation of bananas and plantains Musa spp. under different farming systems at Yangambi, Upper-Zaire. Black sigatoka, a leaf spot disease, caused by Mycosphaerella fijiensis Morelet seems to be one of the major constraints in the banana and plantain production in Upper-Zaire. Indeed, a survey study undertaken at Yangambi on 12 plantain and 4 banana cultivars revealed that all the observed cultivars were attacked with an exception of banana "Yangambikm 5" which was tolerant. In otherhand, significant differences were observed between bananas and plantains cultivated in fields and those planted in backyards. The regular application of organic matter in backyard farms seems to be one of the major reasons of those differences.

  8. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  9. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    killing infidels in their land. In order to mitigate attacks within the ANSF embedded Afghan intelligence agents to watch for any ANA soldier or ANP...said, “Americans use the word f--k all the time.” 37 Many Afghan troops take the meaning sexually , not as a meaningless expletive, the understanding

  10. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  11. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  12. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  14. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  15. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  16. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  17. Shark attack: review of 86 consecutive cases.

    Science.gov (United States)

    Woolgar, J D; Cliff, G; Nair, R; Hafez, H; Robbs, J V

    2001-05-01

    On average there are approximately 50 confirmed shark attacks worldwide annually. Despite their rarity, such incidents often generate much public and media attention. The injuries of 86 consecutive victims of shark attack were reviewed from 1980 to 1999. Clinical data retrieved from the South African Shark Attack Files, maintained by the Natal Sharks Board, were retrospectively analyzed to determine the nature, treatment, and outcome of injuries. The majority of victims (n = 68 [81%]) had relatively minor injuries that required simple primary suture. Those patients (n = 16 [19%]) with more extensive limb lacerations longer than 20 cm or with soft-tissue loss of more than one myofascial compartment were associated with higher morbidity and limb loss. In 8 of the 10 fatalities, death occurred as a result of exsanguinating hemorrhage from a limb vascular injury. Victims of shark attack usually sustain only minor injuries. In more serious cases, particularly if associated with a major vascular injury, hemorrhage control and early resuscitation are of utmost importance during the initial management if these patients are to survive.

  18. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  19. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  20. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  1. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    Infiltrating GATES ............................................................................................................ 19 SCADA Vulnerability...not adequately protected; there isn’t sufficient guidance, or funding allocated to the security of our Supervisory Control and Data Acquisition ( SCADA ...attack against a vital system such as GATES, and instead focus her efforts on a less secure more conspicuous system 6 such as the SCADA systems

  2. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  3. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  4. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  5. Modeling of Aggregate Attacks on Complex Networks

    Directory of Open Access Journals (Sweden)

    F. Galindo

    2010-09-01

    Full Text Available An order factor in combinations of random and targeted attacks on modern scale free network model has been explored. Protection concepts based on timely restructuring of topologies have been discussed. Vulnerability parameter defined by investment value has been introduced, and protection financing strategies depending on node connectivity has been analyzed.

  6. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks ... Single registrant; Most of the domains kept unresolved; Mostly being used for spamming and malware distribution; Many domains are listed as malicious; Poor process control by Domain Registrars.

  7. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  8. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... that helps in structuring attack identification and can integrate physical, virtual, and social components. These models form a solid basis for guiding the manual identification of attack scenarios. Their main benefit, however, is in the analytic generation of attacks. In this work we present a systematic...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  9. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  10. Brane world black rings

    International Nuclear Information System (INIS)

    Sahay, Anurag; Sengupta, Gautam

    2007-01-01

    Five dimensional neutral rotating black rings are described from a Randall-Sundrum brane world perspective in the bulk black string framework. To this end we consider a rotating black string extension of a five dimensional black ring into the bulk of a six dimensional Randall-Sundrum brane world with a single four brane. The bulk solution intercepts the four brane in a five dimensional black ring with the usual curvature singularity on the brane. The bulk geodesics restricted to the plane of rotation of the black ring are constructed and their projections on the four brane match with the usual black ring geodesics restricted to the same plane. The asymptotic nature of the bulk geodesics are elucidated with reference to a bulk singularity at the AdS horizon. We further discuss the description of a brane world black ring as a limit of a boosted bulk black 2 brane with periodic identification

  11. Error and attack vulnerability of temporal networks

    Science.gov (United States)

    Trajanovski, S.; Scellato, S.; Leontiadis, I.

    2012-06-01

    The study of real-world communication systems via complex network models has greatly expanded our understanding on how information flows, even in completely decentralized architectures such as mobile wireless networks. Nonetheless, static network models cannot capture the time-varying aspects and, therefore, various temporal metrics have been introduced. In this paper, we investigate the robustness of time-varying networks under various failures and intelligent attacks. We adopt a methodology to evaluate the impact of such events on the network connectivity by employing temporal metrics in order to select and remove nodes based on how critical they are considered for the network. We also define the temporal robustness range, a new metric that quantifies the disruption caused by an attack strategy to a given temporal network. Our results show that in real-world networks, where some nodes are more dominant than others, temporal connectivity is significantly more affected by intelligent attacks than by random failures. Moreover, different intelligent attack strategies have a similar effect on the robustness: even small subsets of highly connected nodes act as a bottleneck in the temporal information flow, becoming critical weak points of the entire system. Additionally, the same nodes are the most important across a range of different importance metrics, expressing the correlation between highly connected nodes and those that trigger most of the changes in the optimal information spreading. Contrarily, we show that in randomly generated networks, where all the nodes have similar properties, random errors and intelligent attacks exhibit similar behavior. These conclusions may help us in design of more robust systems and fault-tolerant network architectures.

  12. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  13. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  14. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  15. Cyber Attacks: A New Threat to the Energy Industry

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2016-01-01

    The Network and Information Security (NIS) Directive has been adopted on July 6, 2016 by the European Parliament, three years after the initial proposal by the European Commission. It paves the way for a much needed common cyber security strategy within the EU. This Edito explains the reasons why the energy industry is particularly vulnerable to cyber- attacks, and what tools this new directive brings about to protect European critical infrastructures. In about two decades, the energy industry has been deeply transformed by the digital revolution, which penetrated companies' commercial, administrative and financial branches, but also their industrial systems. From the optimization of electric grids to the precision of oil drilling, information and communication technologies (ICT) are now essential to every stage of energy production, transport and distribution processes. Data mining and analysis are increasingly considered as the energy sector's new 'black gold', and generate new activities just like the platform Predix, designed by General Electric to help energy companies (among others) collect and analyze industrial data. This silent revolution offers countless economic opportunities and paves the way for a better resource distribution and use. But it also puts physical energy infrastructures at risk

  16. Black hole hair removal

    International Nuclear Information System (INIS)

    Banerjee, Nabamita; Mandal, Ipsita; Sen, Ashoke

    2009-01-01

    Macroscopic entropy of an extremal black hole is expected to be determined completely by its near horizon geometry. Thus two black holes with identical near horizon geometries should have identical macroscopic entropy, and the expected equality between macroscopic and microscopic entropies will then imply that they have identical degeneracies of microstates. An apparent counterexample is provided by the 4D-5D lift relating BMPV black hole to a four dimensional black hole. The two black holes have identical near horizon geometries but different microscopic spectrum. We suggest that this discrepancy can be accounted for by black hole hair - degrees of freedom living outside the horizon and contributing to the degeneracies. We identify these degrees of freedom for both the four and the five dimensional black holes and show that after their contributions are removed from the microscopic degeneracies of the respective systems, the result for the four and five dimensional black holes match exactly.

  17. The Black Studies Boondoggle

    Science.gov (United States)

    Long, Richard A.

    1970-01-01

    Indicates tendencies dangerous to the basic purpose of Black Studies, and identifies four external challeges--imperialism, paternalism, nihilism, and materialism. An internal challenge is considered to be the use of European and Establishment constructs to analyze black reality. (DM)

  18. Black-Body Radiation

    Indian Academy of Sciences (India)

    Keywords. Black-body radiation; thermal radiation; heat; electromagnetic radiation; Stefan's Law; Stefan–Boltzmann Law; Wien's Law; Rayleigh–Jeans Law; black-body spectrum; ultraviolet catastrophe; zero point energy; photon.

  19. Diverticulitis Diet: Can Certain Foods Trigger an Attack?

    Science.gov (United States)

    ... there trigger foods I should avoid to prevent diverticulitis attacks? Answers from Katherine Zeratsky, R.D., L. ... Actually, no specific foods are known to trigger diverticulitis attacks. And no special diet has been proved ...

  20. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    Science.gov (United States)

    ... Attack or Sudden Cardiac Arrest: How Are They Different? Updated:Mar 15,2018 People often use these ... The heart attack symptoms in women can be different than men. What is cardiac arrest? Sudden cardiac ...

  1. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    ... responsible for the attack. This paper examines case studies of political conflicts that have led to attacks on cyber systems, such as the recent clashes between India and Pakistan, Israel and the Palestinians, and NATO...

  2. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  3. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  4. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  5. Satellite Threat Warning and Attack Reporting

    Energy Technology Data Exchange (ETDEWEB)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  7. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  8. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  9. Dynamics of black holes

    OpenAIRE

    Hayward, Sean A.

    2008-01-01

    This is a review of current theory of black-hole dynamics, concentrating on the framework in terms of trapping horizons. Summaries are given of the history, the classical theory of black holes, the defining ideas of dynamical black holes, the basic laws, conservation laws for energy and angular momentum, other physical quantities and the limit of local equilibrium. Some new material concerns how processes such as black-hole evaporation and coalescence might be described by a single trapping h...

  10. Black holes are hot

    International Nuclear Information System (INIS)

    Gibbons, G.

    1976-01-01

    Recent work, which has been investigating the use of the concept of entropy with respect to gravitating systems, black holes and the universe as a whole, is discussed. The resulting theory of black holes assigns a finite temperature to them -about 10 -7 K for ordinary black holes of stellar mass -which is in complete agreement with thermodynamical concepts. It is also shown that black holes must continuously emit particles just like ordinary bodies which have a certain temperature. (U.K.)

  11. Presentation attack detection in voice biometrics

    OpenAIRE

    Korshunov, Pavel; Marcel, Sébastien; Vielhauer, Claus

    2017-01-01

    Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, however, exposed their major flaw --- high vulnerability to spoofing attacks. A fingerprint sensor can be ...

  12. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    necessarily reflect the views of the Department of Defense. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with...and identify cyber attacks reflects the “arms race” na- ture of the cyber domain. While defenders develop new and improved techniques to detect known...Trost. Digging into ShellShock Exploitation attempts using ShockPot Data. https://www.threatstream.com/ blog /shockpot-exploitation-analysis, September

  13. Collision attack against Tav-128 hash function

    Science.gov (United States)

    Hariyanto, Fajar; Hayat Susanti, Bety

    2017-10-01

    Tav-128 is a hash function which is designed for Radio Frequency Identification (RFID) authentication protocol. Tav-128 is expected to be a cryptographically secure hash function which meets collision resistance properties. In this research, a collision attack is done to prove whether Tav-128 is a collision resistant hash function. The results show that collisions can be obtained in Tav-128 hash function which means in other word, Tav-128 is not a collision resistant hash function.

  14. Attacking Paper-Based E2E Voting Systems

    Science.gov (United States)

    Kelsey, John; Regenscheid, Andrew; Moran, Tal; Chaum, David

    In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prêt-à-voter, and ThreeBallot. We also demonstrate a different attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we consider some generic attacks on end-to-end voting systems.

  15. Monopole black hole skyrmions

    OpenAIRE

    Moss, I.G.; Shiiki, N.; Winstanley, E.

    2000-01-01

    Charged black hole solutions with pion hair are discussed. These can be\\ud used to study monopole black hole catalysis of proton decay.\\ud There also exist\\ud multi-black hole skyrmion solutions with BPS monopole behaviour.

  16. Alcoholism and Blacks.

    Science.gov (United States)

    Mosley, Bertha; And Others

    1988-01-01

    Notes that in America, knowledge base concerning alcoholism is concentrated on drinking patterns of Whites, and that Black Americans often differ in their drinking behavior, resulting in a need to clarify issues regarding alcoholism and Blacks. Provides theoretical information useful in better discerning drinking behavior of Blacks. (Author/NB)

  17. What is black hole?

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. What is black hole? Possible end phase of a star: A star is a massive, luminous ball of plasma having continuous nuclear burning. Star exhausts nuclear fuel →. White Dwarf, Neutron Star, Black Hole. Black hole's gravitational field is so powerful that even ...

  18. Genocide and Black Ecology

    Science.gov (United States)

    Sinnette, Calvin H.

    1972-01-01

    Contends that the survival of black people is in serious jeopardy as is evidenced in contemporary discussions on the worldwide plight of black people, and that an exhaustive study of the problem in its many dimensions is seriously lacking; the moral and ethical issues of genocide require examination from a black perspective. (JW)

  19. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  20. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  1. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  2. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  3. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  4. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    Science.gov (United States)

    2017-03-01

    STAR Performance with SPEAR ( Signal Processing Electronic Attack RFIC) Luciano Boglione, Clayton Davis, Joel Goodman, Matthew McKeon, David...Parrett, Sanghoon Shin and Naomi Walker Naval Research Laboratory Washington, DC, 20375 Figure 1: The Signal Processing Electronic Attack RFIC...SPEAR) system. Abstract: The Signal Processing Electronic Attack RFIC (SPEAR) is a simultaneous transmit and receive (STAR) system capable of

  5. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  6. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  7. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  8. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  9. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  10. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  11. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  12. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  13. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Black holes in binary stars

    NARCIS (Netherlands)

    Wijers, R.A.M.J.

    1996-01-01

    Introduction Distinguishing neutron stars and black holes Optical companions and dynamical masses X-ray signatures of the nature of a compact object Structure and evolution of black-hole binaries High-mass black-hole binaries Low-mass black-hole binaries Low-mass black holes Formation of black holes

  17. Black hole levitron

    International Nuclear Information System (INIS)

    Arsiwalla, Xerxes D.; Verlinde, Erik P.

    2010-01-01

    We study the problem of spatially stabilizing four dimensional extremal black holes in background electric/magnetic fields. Whilst looking for stationary stable solutions describing black holes placed in external fields we find that taking a continuum limit of Denef et al.'s multicenter supersymmetric black hole solutions provides a supergravity description of such backgrounds within which a black hole can be trapped within a confined volume. This construction is realized by solving for a levitating black hole over a magnetic dipole base. We comment on how such a construction is akin to a mechanical levitron.

  18. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  19. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    OpenAIRE

    Khaled Elleithy; Drazen Blagovic; Wang Cheng; Paul Sideleau

    2005-01-01

    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack wil...

  20. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  1. Web Forms and Untraceable DDoS Attacks

    Science.gov (United States)

    Jakobsson, Markus; Menczer, Filippo

    We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.

  2. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  3. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  4. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked....... Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...... mean to focus on intended, as opposed to incidental, attacks. Finally, although "attack" often implies initiation of a conflict ("I didn't attack him! He started it!"), it does not do so here. An unjust aggressor who initiates a conflict can be, and indeed very often is, liable to attack. All...

  5. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  6. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  7. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  8. Suicide bomb attack causing penetrating craniocerebral injury

    OpenAIRE

    Hussain Manzar; Bari Muhammad Ehsan

    2013-01-01

    【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed wi...

  9. Suicide bomb attack causing penetrating craniocerebral injury.

    Science.gov (United States)

    Hussain, Manzar; Bari, Muhammad-Ehsan

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue. At 6 months'follow-up his right-sided power improved to against gravity.

  10. Close Air Support versus Close Combat Attack

    Science.gov (United States)

    2012-12-06

    consequence when discussing the two different processes of close air support and close combat attack. This section focuses on service culture. Understanding...According to a RAND study written by Carl Builder, the Air Force “could be said to worship at the altar of technology.”67 These are not what Hofstede...characteristics that are highly prized in a culture and thus serve as models for behavior,” people like Billy Mitchell, Hap Arnold, Tooey Spaatz to name a

  11. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  12. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  13. [Diagnosis, pathogenesis and treatment of panic attacks].

    Science.gov (United States)

    Turczyński, J

    Panic accompanies several diseases both psychological and somatic. It may be secondary, i.e. produced by other symptoms and morbid processes. It may also be primary--"neurotic". In such cases there are two forms of panic: generalized and paroxysmal. Attacks of panic are seen in 1.6-2.9% of women and in 0.4-1.7% of men. Main pathogenetic role is played by the psychologic factors (psychical trauma precedes the onset of diseases). The role of biological factors is also important. It is believed that disorders of the noradrenergic, serotonin-ergic, and GABA-ergic transmission may produce the attacks of panic. Psychotherapy is a treatment of choice. Pharmacotherapy plays only an adjuvant role. Antidepressants (tricyclic of II generation) are most frequently used for this purpose and--exceptionally due to possible addiction--benzodiazepines. The highest impact on the development of disease has first contact physician attitude. Patient and thoughtful listening to the patient, explanation of the complaints and their source often produce and improvement, and even complete recovery.

  14. Consciousness in Non-Epileptic Attack Disorder

    Science.gov (United States)

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the ‘level’ and ‘content’ of consciousness but also between ‘phenomenal consciousness’ (consciousness of states it somehow “feels to be like”) and ‘access consciousness’ (having certain ‘higher’ cognitive processes at one’s disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience – and, as a precondition for that experience, vigilance or wakefulness – is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of “consciousness” is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures. PMID:21447903

  15. STABILITY OF UNDERWATER STRUCTURE UNDER WAVE ATTACK

    Directory of Open Access Journals (Sweden)

    C. Paotonan

    2012-02-01

    Full Text Available Geotube is, among others, a type of coastal structure that is increasingly accepted for coastal protection especially underwater breakwater. Besides its relatively low cost, it has other advantages such as flexibility, ease of construction and the fact that it can be filled with local sand material. Similar to all other coastal structures, it should also be stable under wave attack. A simple theoretical approach based on linear wave was adopted to estimate the stability of such structure. The theoretical solution was then compared with an experimental study. The experimental study was conducted at the Hydraulics and Hydrology Laboratory of Universitas Gadjah Mada. However, instead of a real geotube, PVC pipe was used where the weight of the PVC was varied by adjusting the volume of sand in the pipe. The result indicated that the agreement between the theoretical solution and the experiment was encouraging. The analytical solution may be utilized to predict underwater pipe stability under wave attack with certain degree of accuracy.

  16. Baiting Inside Attackers Using Decoy Documents

    Science.gov (United States)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  17. Discovery of Peptide-based Inhibitors against Dendrotoxin B from Black Mamba through Phage Display Screening

    DEFF Research Database (Denmark)

    O. Cob, Saioa; Munk, Andreas; Laustsen, Andreas Hougaard

    The black mamba (Dendroaspis polylepis) is Africa’s most feared snake due to its potent, rapidacting venom and its speed of attack. The most abundant toxins in D. polylepis venom are the Kunitz-type proteinase inhibitors, dendrotoxins, which are unique for mamba. Dendrotoxinsare poorly neutralized...

  18. Interacting black holes

    International Nuclear Information System (INIS)

    Costa, Miguel S.; Perry, Malcolm J.

    2000-01-01

    We revisit the geometry representing l collinear Schwarzschild black holes. It is seen that the black holes' horizons are deformed by their mutual gravitational attraction. The geometry has a string like conical singularity that connects the holes but has nevertheless a well defined action. Using standard gravitational thermodynamics techniques we determine the free energy for two black holes at fixed temperature and distance, their entropy and mutual force. When the black holes are far apart the results agree with Newtonian gravity expectations. This analyses is generalized to the case of charged black holes. Then we consider black holes embedded in string/M-theory as bound states of branes. Using the effective string description of these bound states and for large separation we reproduce exactly the semi-classical result for the entropy, including the correction associated with the interaction between the holes

  19. Black silicon integrated aperture

    Science.gov (United States)

    Liu, Tianbo; Dickensheets, David L.

    2017-10-01

    This paper describes the incorporation of nanotextured black silicon as an optical absorbing material into silicon-based micro-optoelectromechanical systems devices to reduce stray light and increase optical contrast during imaging. Black silicon is created through a maskless dry etch process and characterized for two different etch conditions, a cold etch performed at 0°C and a cryogenic etch performed at -110°C. We measure specular reflection at visible wavelengths to be black velvet paint used to coat optical baffles and compare favorably with other methods to produce black surfaces from nanotextured silicon or using carbon nanotubes. We illustrate the use of this material by integrating a black silicon aperture around the perimeter of a deformable focus-control mirror. Imaging results show a significant improvement in contrast and image fidelity due to the effective reduction in stray light achieved with the self-aligned black aperture.

  20. Astrophysical black holes

    CERN Document Server

    Gorini, Vittorio; Moschella, Ugo; Treves, Aldo; Colpi, Monica

    2016-01-01

    Based on graduate school lectures in contemporary relativity and gravitational physics, this book gives a complete and unified picture of the present status of theoretical and observational properties of astrophysical black holes. The chapters are written by internationally recognized specialists. They cover general theoretical aspects of black hole astrophysics, the theory of accretion and ejection of gas and jets, stellar-sized black holes observed in the Milky Way, the formation and evolution of supermassive black holes in galactic centers and quasars as well as their influence on the dynamics in galactic nuclei. The final chapter addresses analytical relativity of black holes supporting theoretical understanding of the coalescence of black holes as well as being of great relevance in identifying gravitational wave signals. With its introductory chapters the book is aimed at advanced graduate and post-graduate students, but it will also be useful for specialists.

  1. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  2. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  3. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  4. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  5. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  6. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  7. Black branes as piezoelectrics.

    Science.gov (United States)

    Armas, Jay; Gath, Jakob; Obers, Niels A

    2012-12-14

    We find a realization of linear electroelasticity theory in gravitational physics by uncovering a new response coefficient of charged black branes, exhibiting their piezoelectric behavior. Taking charged dilatonic black strings as an example and using the blackfold approach we measure their elastic and piezolectric moduli. We also use our results to draw predictions about the equilibrium condition of charged dilatonic black rings in dimensions higher than six.

  8. Naked black holes

    International Nuclear Information System (INIS)

    Horowitz, G.T.; Ross, S.F.

    1997-01-01

    It is shown that there are large static black holes for which all curvature invariants are small near the event horizon, yet any object which falls in experiences enormous tidal forces outside the horizon. These black holes are charged and near extremality, and exist in a wide class of theories including string theory. The implications for cosmic censorship and the black hole information puzzle are discussed. copyright 1997 The American Physical Society

  9. Nonextremal stringy black hole

    International Nuclear Information System (INIS)

    Suzuki, K.

    1997-01-01

    We construct a four-dimensional BPS saturated heterotic string solution from the Taub-NUT solution. It is a nonextremal black hole solution since its Euler number is nonzero. We evaluate its black hole entropy semiclassically. We discuss the relation between the black hole entropy and the degeneracy of string states. The entropy of our string solution can be understood as the microscopic entropy which counts the elementary string states without any complications. copyright 1997 The American Physical Society

  10. Combating the Sigatoka disease complex on banana

    Science.gov (United States)

    Banana is the fourth most important staple food in the world behind rice, wheat and maize, with more than 100 million tons produced annually. Although the majority of bananas produced are consumed locally, banana export is a multi-billion dollar business. Bananas are grown in more than 100 countri...

  11. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  12. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  13. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  14. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  15. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  16. Spreading of localized attacks in spatial multiplex networks

    Science.gov (United States)

    Vaknin, Dana; Danziger, Michael M.; Havlin, Shlomo

    2017-07-01

    Many real-world multilayer systems such as critical infrastructure are interdependent and embedded in space with links of a characteristic length. They are also vulnerable to localized attacks or failures, such as terrorist attacks or natural catastrophes, which affect all nodes within a given radius. Here we study the effects of localized attacks on spatial multiplex networks of two layers. We find a metastable region where a localized attack larger than a critical size induces a nucleation transition as a cascade of failures spreads throughout the system, leading to its collapse. We develop a theory to predict the critical attack size and find that it exhibits novel scaling behavior. We further find that localized attacks in these multiplex systems can induce a previously unobserved combination of random and spatial cascades. Our results demonstrate important vulnerabilities in real-world interdependent networks and show new theoretical features of spatial networks.

  17. Attribution Of Cyber Attacks On Process Control Systems

    Science.gov (United States)

    Hunker, Jeffrey; Hutchinson, Robert; Margulies, Jonathan

    The attribution of cyber attacks is an important problem. Attribution gives critical infrastructure asset owners and operators legal recourse in the event of attacks and deters potential attacks. This paper discusses attribution techniques along with the associated legal and technical challenges. It presents a proposal for a voluntary network of attributable activity, an important first step towards a more complete attribution methodology for the control systems community.

  18. Attack polish for nickel-base alloys and stainless steels

    Science.gov (United States)

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  19. Different Types of Attacks on Integrated MANET-Internet Communication

    OpenAIRE

    Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay

    2010-01-01

    Security is an important issue in the integrated MANET-Internet environment because inthis environment we have to consider the attacks on Internet connectivity and also onthe ad hoc routing protocols. The focus of this work is on different types of attacks onintegrated MANET-Internet communication. We consider most common types of attackson mobile ad hoc networks and on access point through which MANET is connected tothe Internet. Specifically, we study how different attacks affect the perfor...

  20. Backside polishing detector: a new protection against backside attacks

    OpenAIRE

    Manich Bou, Salvador; Arumi Delgado, Daniel; Rodríguez Montañés, Rosa; Mujal Colell, Jordi; Hernández García, David

    2015-01-01

    Secure chips are in permanent risk of attacks. Physical attacks usually start removing part of the package and accessing the dice by different means: laser shots, electrical or electromagnetic probes, etc. Doing this from the backside of the chip gives some advantages since no metal layers interfere between the hacker and the signals of interest. The bulk silicon is thinned from hundreds to some tens of micrometers in order to improve the performance of the attack. In thi...

  1. Flow-based Brute-force Attack Detection

    OpenAIRE

    Drašar, Martin; Vykopal, Jan; Winter, Philipp

    2013-01-01

    Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a network level due to increasing volume and en-cryption of network traffic and growing ubiquity of high-speed networks.Although the research in this field advanced considerably, there still remainclasses of attacks that are undetectable. In this chapter, we present sev-eral methods for the detection of brute-force attacks based on the analysisof network flows. We discuss their strengths and shortco...

  2. TCP-SYN Flooding Attack in Wireless Networks

    OpenAIRE

    Bogdanoski, Mitko; Suminoski, Tomislav; Risteski, Aleksandar

    2012-01-01

    This paper concerns the TCP (Transmission Control Protocol) vulnerabilities which gives space for a DoS (Denial of Service) attacks called TCP-SYN flooding which is well-known to the community for several years. The paper shows this attack in wireless as well as wired networks using perl synflood script, Wireshark network analyzer server, Windows 2008 server, and OPNET simulation environment. Using these tools an effects of this attack are shown. Finally, some effective practical mitigation t...

  3. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  4. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  5. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  6. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  7. Cyber-physical attacks: A growing invisible threat

    OpenAIRE

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Pe...

  8. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  9. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  10. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  11. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  12. Cluster headache attack remission with sphenopalatine ganglion stimulation

    DEFF Research Database (Denmark)

    Barloese, Mads C J; Jürgens, Tim P; May, Arne

    2016-01-01

    attacks. Methods: We monitored self-reported attack frequency, headache disability, and medication intake in 33 patients with medically refractory, chronic CH (CCH) in an open label follow-up study of the original Pathway CH-1 study. Patients were followed for at least 24 months (average 750 ± 34 days...... disability improvements remained and patient satisfaction measures were positive in 100 % (10/10). Conclusions: In this population of 33 refractory CCH patients, in addition to providing the ability to treat acute attacks, neuromodulation of the SPG induced periods of remission from cluster attacks...

  13. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  14. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  15. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  16. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  17. RFA: R-Squared Fitting Analysis Model for Power Attack

    Directory of Open Access Journals (Sweden)

    An Wang

    2017-01-01

    Full Text Available Correlation Power Analysis (CPA introduced by Brier et al. in 2004 is an important method in the side-channel attack and it enables the attacker to use less cost to derive secret or private keys with efficiency over the last decade. In this paper, we propose R-squared fitting model analysis (RFA which is more appropriate for nonlinear correlation analysis. This model can also be applied to other side-channel methods such as second-order CPA and collision-correlation power attack. Our experiments show that the RFA-based attacks bring significant advantages in both time complexity and success rate.

  18. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  19. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  20. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  1. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  2. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  3. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  4. Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference

    Science.gov (United States)

    2011-08-30

    on target host T, the other one is a stream of gratuitous ARPs directed to S and is used to sample the status of the network. The first ARP stream is...the diversion window created by the first stream. It consists of a series of gratuitous ARP requests to another host, using the target host MAC as...Microsoft Knowledge Base article , http://support.microsoft.com/kb/188001. 12. GetVersionEx: Windows Version Info (Wrapper Routines), http

  5. Xenophobic Attacks On Black Non-South Africans In South Africa ...

    African Journals Online (AJOL)

    Although xenophobia is typically defined as a “hatred or fear of foreigners” (South African Pocket Oxford Dictionary of Current English, 1994) or a “strong fear or dislike of people from other countries” (Longman Dictionary of Contemporary English, New Edition, 2003), the concept goes beyond this. Research evidences have ...

  6. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    OpenAIRE

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various atta...

  7. Black holes are warm

    International Nuclear Information System (INIS)

    Ravndal, F.

    1978-01-01

    Applying Einstein's theory of gravitation to black holes and their interactions with their surroundings leads to the conclusion that the sum of the surface areas of several black holes can never become less. This is shown to be analogous to entropy in thermodynamics, and the term entropy is also thus applied to black holes. Continuing, expressions are found for the temperature of a black hole and its luminosity. Thermal radiation is shown to lead to explosion of the black hole. Numerical examples are discussed involving the temperature, the mass, the luminosity and the lifetime of black mini-holes. It is pointed out that no explosions corresponding to the prediction have been observed. It is also shown that the principle of conservation of leptons and baryons is broken by hot black holes, but that this need not be a problem. The related concept of instantons is cited. It is thought that understanding of thermal radiation from black holes may be important for the development of a quantified gravitation theory. (JIW)

  8. Black Craftsmen Through History.

    Science.gov (United States)

    Myers, Robin

    This report traces the evolution of the black craftsmen from ancient Egypt to the present. Special attention is given to the restricted use of black craftsmen under slavery, and the added problems they faced after being freed. Business and union discimination is described, along with recent government and private efforts to achieve equal…

  9. Black hole candidates

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Black hole candidates. In the case of X-ray sources such as Cyg X-1, the mass of the compact object inferred from combined optical and X-ray data, suggest M_compact object > 3.4 M_sun => Black Hole! A remarkable discovery!! Thus X-ray emitting binary systems ...

  10. Black hole Berry phase

    NARCIS (Netherlands)

    de Boer, J.; Papadodimas, K.; Verlinde, E.

    2009-01-01

    Supersymmetric black holes are characterized by a large number of degenerate ground states. We argue that these black holes, like other quantum mechanical systems with such a degeneracy, are subject to a phenomenon which is called the geometric or Berry’s phase: under adiabatic variations of the

  11. Black holes matter

    DEFF Research Database (Denmark)

    Kragh, Helge Stjernholm

    2016-01-01

    Review essay, Marcia Bartusiak, Black Hole: How an Idea Abandoned by Newtonians, Hated by Einstein, and Gambled On by Hawking Became Loved (New Haven: Yale University Press, 2015).......Review essay, Marcia Bartusiak, Black Hole: How an Idea Abandoned by Newtonians, Hated by Einstein, and Gambled On by Hawking Became Loved (New Haven: Yale University Press, 2015)....

  12. Black hole levitron

    NARCIS (Netherlands)

    Arsiwalla, X.D.; Verlinde, E.P.

    2010-01-01

    We study the problem of spatially stabilizing four dimensional extremal black holes in background electric/magnetic fields. Whilst looking for stationary stable solutions describing black holes placed in external fields we find that taking a continuum limit of Denef et al.’s multicenter

  13. Protecting Black Girls

    Science.gov (United States)

    Morris, Monique W.

    2016-01-01

    Statistics show that black girls in U.S. K-12 public schools are overrepresented among students who face disciplinary approaches (such as suspensions) that exclude or even criminalize them. Morris explains how black girls face conditions that make them vulnerable to a phenomenon she calls "school to confinement pathways"--conditions like…

  14. Black Hole Dynamic Potentials

    Indian Academy of Sciences (India)

    2016-01-27

    Jan 27, 2016 ... In the following paper, certain black hole dynamic potentials have been developed definitively on the lines of classical thermodynamics. These potentials have been refined in view of the small differences in the equations of the laws of black hole dynamics as given by Bekenstein and those of ...

  15. Black Boycott: Gainsville, Florida

    Science.gov (United States)

    White, Arthur O.

    1975-01-01

    A case study of the events precipitating a black student boycott in 1969 in Gainesville, Flordia, when school board manuevering to avoid school integration led to the threatened closing of Lincoln High School, a reputable black community school. Also described are the subsequent transformations of Lincoln into a vocational-technical school and…

  16. Neoliberalism and Black Education.

    Science.gov (United States)

    Rich, John Martin

    1986-01-01

    In contrast to traditional liberals, neoliberals share a commitment to greater economic risk-taking, support for entrepreneurism, a new industrial policy, and a different Federal Role. While New Deal and Great Society liberalism may have been more favorable to blacks, perhaps more balanced and equitable policies for blacks could be developed if…

  17. Lifshitz topological black holes

    International Nuclear Information System (INIS)

    Mann, R.B.

    2009-01-01

    I find a class of black hole solutions to a (3+1) dimensional theory gravity coupled to abelian gauge fields with negative cosmological constant that has been proposed as the dual theory to a Lifshitz theory describing critical phenomena in (2+1) dimensions. These black holes are all asymptotic to a Lifshitz fixed point geometry and depend on a single parameter that determines both their area (or size) and their charge. Most of the solutions are obtained numerically, but an exact solution is also obtained for a particular value of this parameter. The thermodynamic behaviour of large black holes is almost the same regardless of genus, but differs considerably for small black holes. Screening behaviour is exhibited in the dual theory for any genus, but the critical length at which it sets in is genus-dependent for small black holes.

  18. Legitimizing Blacks in Philosophy

    Directory of Open Access Journals (Sweden)

    Jameliah Shorter-Bourhanou

    2017-12-01

    Full Text Available In its efforts toward improving diversity, the discipline of philosophy has tended to focus on increasing the number of black philosophers. One crucial issue that has received less attention is the extent to which black philosophers are delegitimized in the discipline because their philosophical contributions challenge the status quo. A systematic problem that bars black philosophers from equal and full participation, this delegitimization precludes the emergence of genuine diversity and reveals the importance of interrogating broader attitudes toward black philosophical contributions. In this essay, I argue for radical systematic changes to disciplinary hallmarks of professionalization such as pedagogy, mentoring, publishing, and hiring practices with the aim of legitimizing black philosophers and their contributions.

  19. Black hole critical phenomena without black holes

    Indian Academy of Sciences (India)

    as a star or dispersing altogether. Were we engineers with advanced technology, we might attempt to find that critical amount of energy necessary to form a black hole. However, despite some fears to the contrary, such technology does not exist, so instead we investigate this critical regime numerically. The first step is to pick ...

  20. Black hole critical phenomena without black holes

    Indian Academy of Sciences (India)

    denotes the partial derivatives of . The construction of a numerical method with which ... which configurations form black holes and which disperse (the only two options in this model). The problem in picturing such a space is that it is infinite ..... 4.1 The future: Less symmetry. The work described above all assumes spherical ...

  1. Distribution of mating-type alleles and M13 PCR markers in the black leaf spot fungus Mycosphaerella fijiensis of bananas in Brazil.

    Science.gov (United States)

    Queiroz, C B; Miranda, E C; Hanada, R E; Sousa, N R; Gasparotto, L; Soares, M A; Silva, G F

    2013-02-08

    The fungus Mycosphaerella fijiensis is the causative agent of black sigatoka, which is one of the most destructive diseases of banana plants. Infection with this pathogen results in underdeveloped fruit, with no commercial value. We analyzed the distribution of the M. fijiensis mating-type system and its genetic variability using M13 phage DNA markers. We found a 1:1 distribution of mating-type alleles, indicating MAT1-1 and MAT1-2 idiomorphs. A polymorphism analysis using three different primers for M13 markers showed that only the M13 minisatellite primers generated polymorphic products. We then utilized this polymorphism to characterize 40 isolates from various Brazilian states. The largest genetic distances were found between isolates from the same location and between isolates from different parts of the country. Therefore, there was no correlation between the genetic similarity and the geographic origin of the isolates. The M13 marker was used to generate genetic fingerprints for five isolates; these fingerprints were compared with the band profiles obtained from inter-simple sequence repeat (UBC861) and inter-retrotransposon amplified polymorphism analyses. We found that the M13 marker was more effective than the other two markers for differentiating these isolates.

  2. ULTRAMASSIVE BLACK HOLE COALESCENCE

    International Nuclear Information System (INIS)

    Khan, Fazeel Mahmood; Holley-Bockelmann, Kelly; Berczik, Peter

    2015-01-01

    Although supermassive black holes (SMBHs) correlate well with their host galaxies, there is an emerging view that outliers exist. Henize 2-10, NGC 4889, and NGC 1277 are examples of SMBHs at least an order of magnitude more massive than their host galaxy suggests. The dynamical effects of such ultramassive central black holes is unclear. Here, we perform direct N-body simulations of mergers of galactic nuclei where one black hole is ultramassive to study the evolution of the remnant and the black hole dynamics in this extreme regime. We find that the merger remnant is axisymmetric near the center, while near the large SMBH influence radius, the galaxy is triaxial. The SMBH separation shrinks rapidly due to dynamical friction, and quickly forms a binary black hole; if we scale our model to the most massive estimate for the NGC 1277 black hole, for example, the timescale for the SMBH separation to shrink from nearly a kiloparsec to less than a parsec is roughly 10 Myr. By the time the SMBHs form a hard binary, gravitational wave emission dominates, and the black holes coalesce in a mere few Myr. Curiously, these extremely massive binaries appear to nearly bypass the three-body scattering evolutionary phase. Our study suggests that in this extreme case, SMBH coalescence is governed by dynamical friction followed nearly directly by gravitational wave emission, resulting in a rapid and efficient SMBH coalescence timescale. We discuss the implications for gravitational wave event rates and hypervelocity star production

  3. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  4. Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

  5. Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks

    DEFF Research Database (Denmark)

    Meng, Weizhi; Fei, Fei; Li, Wenjuan

    2017-01-01

    information and data from smartphone users. Juice filming charging (JFC) attack is a particular type of charging attacks, which is capable of stealing users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during the whole charging period...

  6. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  7. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment sequ...

  8. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  9. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  10. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  11. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    Science.gov (United States)

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  12. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  13. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    Science.gov (United States)

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  14. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, ...

  15. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  16. Rebound Attack on the Full LANE Compression Function

    DEFF Research Database (Denmark)

    Matusiewicz, Krystian; Naya-Plasencia, Maria; Nikolic, Ivica

    2009-01-01

    In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on Lane, we apply several new techniques to construct...

  17. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  18. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  19. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  20. Impacts Of Xenophobia Attacks On Tourism | Adeleke | IFE ...

    African Journals Online (AJOL)

    economic and social roles is Xenophobia. Safety has always been an important prerequisite for the altraction of international tourists. Xenophobic attacks puts tourism is a difficult trading environment as it scares tourist away. As tourism aids in building nation\\'s image, this is damaged easily by xenophobic attacks, and also ...

  1. Attacking process characterization of elite water polo female teams

    Directory of Open Access Journals (Sweden)

    Sofia Canossa

    2009-06-01

    Full Text Available The purpose of the present study was to analyze the attacking tasks and tactical organization of elite Women’s Water Polo. The sample consisted of 442 attack sequences of 8 games played by the top teams in a European Championship. Seventeen variables were analyzed according to the position and player’s participation, tactical organization and playing styles, as well as the efficacy of actions performed. The results from this study indicate that positional attack was the predominant performance factor in the attacking process. To this occurrence, the mixed floating defense was identified as the most frequent opposition. The counter-attack proved to be the most efficient strategy. The attacking process frequently started by ball recovering, in anticipation, and by the defense of the goal-keeper in the 2m zone. In central path, a first long-range pass to the right wing predominated. Teams preferred spontaneous shot on goal supported by assisted displacements, and extra player man offence situations. In general, the attacking sequences, do not take longer than 35s to be developed. Teams efficiency emerged related to the tactical means adopted, namely the spontaneous shot at goal on the front line and numerical superiority of players in attacking game situations.

  2. Attacking process characterization of elite water polo female teams

    Directory of Open Access Journals (Sweden)

    S. Canossa

    2009-01-01

    Full Text Available The purpose of the present study was to analyze the attacking tasks and tactical organization of elite Women’s Water Polo. The sample consisted of 442 attack sequences of 8 games played by the top teams in a European Championship. Seventeen variables were analyzed according to the position and player’s participation, tactical organization and playing styles, as well as the efficacy of actions performed. The results from this study indicate that positional attack was the predominant performance factor in the attacking process. To this occurrence, the mixed floating defense was identified as the most frequent opposition. The counter-attack proved to be the most efficient strategy. The attacking process frequently started by ball recovering, in anticipation, and by the defense of the goal-keeper in the 2m zone. In central path, a first long-range pass to the right wing predominated. Teams preferred spontaneous shot on goal supported by assisted displacements, and extra player man offence situations. In general, the attacking sequences, do not take longer than 35s to be developed. Teams efficiency emerged related to the tactical means adopted, namely the spontaneous shot at goal on the front line and numerical superiority of players in attacking game situations.

  3. 12 CFR 1780.16 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Rules § 1780.16 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral... subpart shall be excused based on the pendency before any court of any interlocutory appeal or collateral...

  4. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  5. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  6. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  7. Securing ARP and DHCP for mitigating link layer attacks

    Indian Academy of Sciences (India)

    Osama S Younes

    2017-11-24

    Nov 24, 2017 ... issues were not considered. Hence, the DHCP lacks some security mechanisms and is vulnerable to many attacks, such as the rogue DHCP server, DHCP starvation, and malicious DHCP client attacks [1]. The main source of. DHCP vulnerabilities is that it cannot authenticate entities. (the DHCP server and ...

  8. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  9. Are Risk Assessments of a Terrorist Attack Coherent?

    Science.gov (United States)

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  10. Information on and Comments Concerning Suicide Plane Attacks

    Science.gov (United States)

    1945-06-25

    Attacks -’Defense Against. Reference: (a) CTF 51 Despatch 060900 of LUay 1945. 1.. This vessel has ’been subjected to suicide attacks from medium and lom...reports on the folloving ships: BOIERS (DE 637), RITHEUPINE ( YPD -25), I’ILSON (DD-408), TiALUGO (AO), RiLPH T;,LBOT (DD-39O), H. Ai. WTILEY (DI,-29

  11. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  12. "Black Like Me": Reframing Blackness for Decolonial Politics

    Science.gov (United States)

    Dei, George J. Sefa

    2018-01-01

    From a particular vantage point, as an African-born scholar with a politics to affirm my Black subjectivity and Indigeneity in a diasporic context, my article engages a (re)theorization of Blackness for decolonial politics. Building on existing works of how Black scholars, themselves, have theorized Blackness, and recognizing the fluid,…

  13. Black holes new horizons

    CERN Document Server

    Hayward, Sean Alan

    2013-01-01

    Black holes, once just fascinating theoretical predictions of how gravity warps space-time according to Einstein's theory, are now generally accepted as astrophysical realities, formed by post-supernova collapse, or as supermassive black holes mysteriously found at the cores of most galaxies, powering active galactic nuclei, the most powerful objects in the universe. Theoretical understanding has progressed in recent decades with a wider realization that local concepts should characterize black holes, rather than the global concepts found in textbooks. In particular, notions such as trapping h

  14. Scalarized hairy black holes

    Energy Technology Data Exchange (ETDEWEB)

    Kleihaus, Burkhard, E-mail: b.kleihaus@uni-oldenburg.de [Institut für Physik, Universität Oldenburg, Postfach 2503, D-26111 Oldenburg (Germany); Kunz, Jutta [Institut für Physik, Universität Oldenburg, Postfach 2503, D-26111 Oldenburg (Germany); Yazadjiev, Stoytcho [Department of Theoretical Physics, Faculty of Physics, Sofia University, Sofia 1164 (Bulgaria)

    2015-05-11

    In the presence of a complex scalar field scalar–tensor theory allows for scalarized rotating hairy black holes. We exhibit the domain of existence for these scalarized black holes, which is bounded by scalarized rotating boson stars and hairy black holes of General Relativity. We discuss the global properties of these solutions. Like their counterparts in general relativity, their angular momentum may exceed the Kerr bound, and their ergosurfaces may consist of a sphere and a ring, i.e., form an ergo-Saturn.

  15. DDoS Attack Detection Algorithms Based on Entropy Computing

    Science.gov (United States)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  16. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  17. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  18. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  19. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  20. Toward Security Verification against Inference Attacks on Data Trees

    Directory of Open Access Journals (Sweden)

    Ryo Iwase

    2013-11-01

    Full Text Available This paper describes our ongoing work on security verification against inference attacks on data trees. We focus on infinite secrecy against inference attacks, which means that attackers cannot narrow down the candidates for the value of the sensitive information to finite by available information to the attackers. Our purpose is to propose a model under which infinite secrecy is decidable. To be specific, we first propose tree transducers which are expressive enough to represent practical queries. Then, in order to represent attackers' knowledge, we propose data tree types such that type inference and inverse type inference on those tree transducers are possible with respect to data tree types, and infiniteness of data tree types is decidable.