WorldWideScience

Sample records for center attack lessons

  1. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  2. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  3. Aftermath of World Trade Center Attack

    Science.gov (United States)

    2002-01-01

    This true-color image was taken by the Enhanced Thematic Mapper Plus (ETM+) aboard the Landsat 7 satellite on September 12, 2001, at roughly 11:30 a.m. Eastern Daylight Savings Time. Visit the NASA home page for photos from the space station and MODIS, and GlobalSecurity.org for images from other satellites. Image courtesy USGS Landsat 7 team, at the EROS Data Center.

  4. Air Superiority and Airfield Attack - Lessons from History.

    Science.gov (United States)

    1984-05-15

    and present, but also their essential differences.ŗ This monograph and the classified companion , which presents specific options for airbase attack...Turning Points in the German Air Force War Effort, (USAF Historical Study 189), p. 36. 5. Shakespeare , Macbeth I, vii, 1. 6. Werner Gerbig, Six Months

  5. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to

  6. Reliability centered maintenance streamlining through lessons learned

    International Nuclear Information System (INIS)

    Strong, D.K.

    1991-01-01

    In late 1986, PSE and G concluded that the Nuclear Department would develop a consistent approach to maintenance at Artificial Island (Salem and Hope Creak nuclear units). Preventive maintenance (PM) would be the heart of this approach. In the last six months of 1987 departments affected by the maintenance program participated on working groups that developed the Artificial Island maintenance philosophy. The central theme of the maintenance philosophy is the RCM (reliability centered maintenance) process. A pilot project tested the process in 1988. In 1989 the Central PM Group formed and in 1990 was given responsibility and authority to analyze, approve, implement, and control PM program changes. RCM is the central theme of the PM improvement effort but not the whole effort. Other important pieces included in this paper are: development of a common PM program, improvement of work instructions, development of predictive maintenance techniques into programs, development of a PM basis database, development of PM feedback from failure trends, root cause analysis, maintenance performance indicators, technicians, and engineers

  7. Conceptual model of acid attacks based on survivor's experiences: Lessons from a qualitative exploration.

    Science.gov (United States)

    Sabzi Khoshnami, Mohammad; Mohammadi, Elham; Addelyan Rasi, Hamideh; Khankeh, Hamid Reza; Arshi, Maliheh

    2017-05-01

    Acid attack, a worldwide phenomenon, has been increasing in recent years. In addition to severe injuries to the face and body, such violence leads to psychological and social problems that affect the survivors' quality of life. The present study provides a more in-depth understanding of this phenomenon and explores the nature and dimensions of acid attacks based on survivors' experiences. A grounded theory study using semi-structured, recorded interviews and applying purposeful theoretical sampling was conducted with 12 acid attack survivors in Iran. Data were analysed using constant comparison in open, axial and selective coding stages. A conceptual model was developed to explain the relationships among the main categories extracted through the grounded theory study. Physical and psychological wounds emerged as a core category. Traditional context and extreme beauty value in society acted as the context of the physical and psychological wounds experienced. Living with a drug abuser with behavioural disorders and lack of problem-solving skills in interpersonal conflict were found to be causal conditions. Action strategies to deal with this experience were found to be composed of individual, interpersonal and structural levels. Education, percentage and place of burning acted as intervening conditions that influenced survivors' strategies. Finally, adverse consequences of social deprivation and feeling helpless and hindered were found to have an important impact. Acid attack lead to physical and psychological wounds in survivors. This is a multi-dimensional phenomenon involving illness, disability, and victimization, and requires a wide range of strategies at different levels. The conceptual model derived through this study can serve as a good basis for intervention programs. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  8. The impact of the World Trade Center attack on FDNY firefighter retirement, disabilities, and pension benefits.

    Science.gov (United States)

    Niles, J K; Webber, M P; Gustave, J; Zeig-Owens, R; Lee, R; Glass, L; Weiden, M D; Kelly, K J; Prezant, D J

    2011-09-01

    Our goal was to examine the effect of the World Trade Center (WTC) attack and subsequent New York City Fire Department (FDNY) rescue/recovery activities on firefighter retirements. We also analyzed the financial impact associated with the increased number and proportion of service-connected "accidental" disability retirements on the FDNY pension system. A total of 7,763 firefighters retired between 9/11/1994 and 9/10/2008. We compared the total number of retirements and the number and proportion of accidental disability retirements 7 years before and 7 years after the WTC attack. We categorized WTC-related accidental disability retirements by medical cause and worked with the New York City Office of the Actuary to approximate the financial impact by cause. In the 7 years before 9/11 there were 3,261 retirements, 48% (1,571) of which were accidental disability retirements. In the 7 years after 9/11, there were 4,502 retirements, 66% (2,970) were accidental disability retirements, of which 47% (1,402) were associated with WTC-related injuries or illnesses. After 9/11, the increase in accidental disability retirements was, for the most part, due to respiratory-related illnesses. Additional increases were attributed to psychological-related illnesses and musculoskeletal injuries incurred at the WTC site. Pension benefits associated with WTC-related accidental disability retirements have produced an increased financial burden of over $826 million on the FDNY pension system. The WTC attacks affected the health of the FDNY workforce resulting in more post-9/11 retirements than expected, and a larger proportion of these retirees with accidental disability pensions. Copyright © 2011 Wiley-Liss, Inc.

  9. An academic medical center under prolonged rocket attack--organizational, medical, and financial considerations.

    Science.gov (United States)

    Bar-El, Yaron; Michaelson, Moshe; Hyames, Gila; Skorecki, Karl; Reisner, Shimon A; Beyar, Rafael

    2009-09-01

    The Rambam Medical Center, the major academic health center in northern Israel, serving a population of two million and providing specialized tertiary care, was exposed to an unprecedented experience during the Second Lebanon War in the summer of 2006. For more than one month, it was subjected to continuous rocket attacks, but it continued to provide emergency and routine medical services to the civilian population and also served the military personnel who were evacuated from the battlefront. To accomplish the goals of serving the population while itself being under fire, the Rambam Medical Center had to undertake major organizational decisions, which included maximizing safety within the hospital by shifting patients and departments, ensuring that the hospital was properly fortified, managing the health professional teams' work schedules, and providing needed services for the families of employees. The Rambam Medical Center's Level I trauma center expertise included multidisciplinary teams and extensive collaborations; modern imaging modalities usually reserved for peacetime medical practice were frequently used. The function of the hospital teams during the war was efficient and smooth, based on the long-term actions taken to prepare for disasters and wartime conditions. Routine hospital services continued, although at 60% of normal occupancy. Financial losses incurred were primarily due to the decrease in revenue-generating activity. The two most important components of managing the hospital under these conditions are (1) the ability to arrive at prompt and meaningful decisions with respect to the organizational and medical hospital operations and (2) the leadership and management of the professional staff and teams.

  10. Lessons learned from the Syrian sarin attack: evaluation of a clinical syndrome through social media.

    Science.gov (United States)

    Rosman, Yossi; Eisenkraft, Arik; Milk, Nadav; Shiyovich, Arthur; Ophir, Nimrod; Shrot, Shai; Kreiss, Yitshak; Kassirer, Michael

    2014-05-06

    On the night of 21 August 2013, sarin was dispersed in the eastern outskirts of Damascus, killing 1400 civilians and severely affecting thousands more. This article aims to delineate the clinical presentation and management of a mass casualty event caused by a nerve agent as shown in the social media. Authors searched YouTube for videos uploaded of this attack and identified 210 videos. Of these, 67 met inclusion criteria and were evaluated in the final analysis.These videos displayed 130 casualties; 119 (91.5%) of which were defined as moderately injured or worse. The most common clinical signs were dyspnea (53.0%), diaphoresis (48.5%), and loss of consciousness (40.7%). Important findings included a severe shortage of supporting measures and lack of antidotal autoinjectors. Decontamination, documented in 25% of the videos, was done in an inefficient manner. Protective gear was not noticed, except for sporadic use of latex gloves and surgical masks.This is believed to be the first time that social media was used to evaluate clinical data and management protocols to better prepare against future possible events.

  11. Lessons for the new CMS innovation center from the Medicare health support program.

    Science.gov (United States)

    Barr, Michael S; Foote, Sandra M; Krakauer, Randall; Mattingly, Patrick H

    2010-07-01

    The Patient Protection and Affordable Care Act establishes a new Center for Medicare and Medicaid Innovation in the Centers for Medicare and Medicaid Services (CMS). The center is intended to enhance the CMS's role in promoting much-needed improvements in payment and service delivery. Lessons from the Medicare Health Support Program, a chronic care pilot program that ran between 2005 and 2008, illustrate the value of drawing on experience in planning for the center and future pilot programs. The lessons include the importance of strong leadership; collaboration and flexibility to foster innovation; receptivity of beneficiaries to care management; and the need for timely data on patients' status. The lessons also highlight pitfalls to be avoided in planning future pilot programs, such as flawed strategies for selecting populations to target when testing payment and service delivery reforms.

  12. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  13. Cyber Power: Attack and Defense Lessons from Land, Sea, and Air Power

    Science.gov (United States)

    2011-06-01

    Internet War," Cyberpsychology , Behavior , and Social Networking 13, no. 4 (2010): 450. Existing evidence suggests that some of the ethnic Russians who...34Storming the Servers: A Social Psychological Analysis of the First Internet War." Cyberpsychology , Behavior , and Social Networking 13, no. 4... Network Analysis Center, who I wholeheartedly appreciate for his time, trust, and insight as an interview subject. Trent, thank you for being so open and

  14. Hospitalizations for asthma among adults exposed to the September 11, 2001 World Trade Center terrorist attack.

    Science.gov (United States)

    Miller-Archie, Sara A; Jordan, Hannah T; Alper, Howard; Wisnivesky, Juan P; Cone, James E; Friedman, Stephen M; Brackbill, Robert M

    2018-04-01

    We described the patterns of asthma hospitalization among persons exposed to the 2001 World Trade Center (WTC) attacks, and assessed whether 9/11-related exposures or comorbidities, including posttraumatic stress disorder (PTSD) and gastroesophageal reflux symptoms (GERS), were associated with an increased rate of hospitalization. Data for adult enrollees in the WTC Health Registry, a prospective cohort study, with self-reported physician-diagnosed asthma who resided in New York State on 9/11 were linked to administrative hospitalization data to identify asthma hospitalizations during September 11, 2001-December 31, 2010. Multivariable zero-inflated Poisson regression was used to examine associations among 9/11 exposures, comorbid conditions, and asthma hospitalizations. Of 11 471 enrollees with asthma, 406 (3.5%) had ≥1 asthma hospitalization during the study period (721 total hospitalizations). Among enrollees diagnosed before 9/11 (n = 6319), those with PTSD or GERS had over twice the rate of hospitalization (adjusted rate ratio (ARR) = 2.5, 95% CI = 1.4-4.1; ARR = 2.1, 95% CI = 1.3-3.2, respectively) compared to those without. This association was not statistically significant in enrollees diagnosed after 9/11. Compared to higher educational attainment, completing less than college was associated with an increased hospitalization rate among participants with both pre-9/11- and post-9/11-onset asthma (ARR = 1.9, 95% CI = 1.2-2.9; ARR = 2.6, 95% CI = 1.6-4.1, respectively). Sinus symptoms, exposure to the dust cloud, and having been a WTC responder were not associated with asthma hospitalization. Among enrollees with pre-9/11 asthma, comorbid PTSD and GERS were associated with an increase in asthma hospitalizations. Management of these comorbidities may be an important factor in preventing hospitalization.

  15. Transformation of an academic medical center: lessons learned from restructuring and downsizing.

    Science.gov (United States)

    Woodard, B; Fottler, M D; Kilpatrick, A O

    1999-01-01

    This article reviews management literature on health care transformation and describes the processes, including restructuring, job redesign, and downsizing, involved in one academic medical center's experience. The article concludes with lessons learned at each of the stages of the transformation process: planning, implementation, and process continuation. Managerial implications for similar transformation efforts in other health care organizations are suggested.

  16. Beyond the Art Lesson: Free-Choice Learning Centers

    Science.gov (United States)

    Werth, Laurie

    2010-01-01

    In this article, the author emphasizes that by providing learning centers in the art studio environment and by providing "free-choice time," art educators can encourage and reinforce the natural learning styles of students. Learning centers give elementary students the freedom to pursue individual artistic expression. They give students an…

  17. Art and community health: lessons from an urban health center.

    Science.gov (United States)

    Siegel, Wilma Bulkin; Bartley, Mary Anne

    2004-01-01

    Staff at a nurse-managed urban health center conducted a series of art sessions to benefit the community. The authors believe the program's success clearly communicated the relationship between art and community health. As a result of the success of the sessions, plans are in the works to make art a permanent part of the health center's services.

  18. Lessons learned: mobile device encryption in the academic medical center.

    Science.gov (United States)

    Kusche, Kristopher P

    2009-01-01

    The academic medical center is faced with the unique challenge of meeting the multi-faceted needs of both a modern healthcare organization and an academic institution, The need for security to protect patient information must be balanced by the academic freedoms expected in the college setting. The Albany Medical Center, consisting of the Albany Medical College and the Albany Medical Center Hospital, was challenged with implementing a solution that would preserve the availability, integrity and confidentiality of business, patient and research data stored on mobile devices. To solve this problem, Albany Medical Center implemented a mobile encryption suite across the enterprise. Such an implementation comes with complexities, from performance across multiple generations of computers and operating systems, to diversity of application use mode and end user adoption, all of which requires thoughtful policy and standards creation, understanding of regulations, and a willingness and ability to work through such diverse needs.

  19. Lessons Learned from an LGBTQ Senior Center: A Bronx Tale.

    Science.gov (United States)

    McGovern, Justine; Brown, Dwayne; Gasparro, Vita

    This article describes an interdisciplinary pilot study exploring the impact of LGBTQ senior centers on the lives of center members. Many LGBTQ adults face the future having experienced stigma and bias, restricted rights, and rejection from family of origin, and are now growing older without the support of a partner and adult children. As a result, older LGBTQ adults experience higher rates of depression, loneliness and isolation, and shortened life expectancy as compared to non-LGBTQ peers. Findings from focus group and key informant interviews highlight features of LGBTQ senior center experiences that can significantly improve members' quality of life. These include providing family, acceptance and a home, which can have an impact on outlook and outcomes. Moreover, findings suggest the need for re-thinking hetero-normative definitions of "community" in the context of LGBTQ aging. Beyond sharing findings from the study, suggesting a conceptual framework for deepening understanding about LGBTQ aging, and identifying lines of future inquiry, the article articulates implications for social work research, practice and education. Ultimately, the article argues that social work is well positioned to improve quality of life for this under-served population when it adopts a cultural humility stance in research, practice and education.

  20. Early Lessons on Bundled Payment at an Academic Medical Center.

    Science.gov (United States)

    Jubelt, Lindsay E; Goldfeld, Keith S; Blecker, Saul B; Chung, Wei-Yi; Bendo, John A; Bosco, Joseph A; Errico, Thomas J; Frempong-Boadu, Anthony K; Iorio, Richard; Slover, James D; Horwitz, Leora I

    2017-09-01

    Orthopaedic care is shifting to alternative payment models. We examined whether New York University Langone Medical Center achieved savings under the Centers for Medicare and Medicaid Services Bundled Payments for Care Improvement initiative. This study was a difference-in-differences study of Medicare fee-for-service patients hospitalized from April 2011 to June 2012 and October 2013 to December 2014 for lower extremity joint arthroplasty, cardiac valve procedures, or spine surgery (intervention groups), or for congestive heart failure, major bowel procedures, medical peripheral vascular disorders, medical noninfectious orthopaedic care, or stroke (control group). We examined total episode costs and costs by service category. We included 2,940 intervention episodes and 1,474 control episodes. Relative to the trend in the control group, lower extremity joint arthroplasty episodes achieved the greatest savings: adjusted average episode cost during the intervention period decreased by $3,017 (95% confidence interval [CI], -$6,066 to $31). For cardiac procedures, the adjusted average episode cost decreased by $2,999 (95% CI, -$8,103 to $2,105), and for spinal fusion, it increased by $8,291 (95% CI, $2,879 to $13,703). Savings were driven predominantly by shifting postdischarge care from inpatient rehabilitation facilities to home. Spinal fusion index admission costs increased because of changes in surgical technique. Under bundled payment, New York University Langone Medical Center decreased total episode costs in patients undergoing lower extremity joint arthroplasty. For patients undergoing cardiac valve procedures, evidence of savings was not as strong, and for patients undergoing spinal fusion, total episode costs increased. For all three conditions, the proportion of patients referred to inpatient rehabilitation facilities upon discharge decreased. These changes were not associated with an increase in index hospital length of stay or readmission rate

  1. Advantages and Disadvantages of the Patient-Centered Medical Home: A Critical Analysis and Lessons Learned.

    Science.gov (United States)

    Budgen, Jacqueline; Cantiello, John

    This article provides a detailed examination of the pros and cons associated with patient-centered medical homes (PCMHs). Opinions and findings from those who have studied PCMHs and those who have been directly involved with this type of health care model are outlined. Key lessons from providers are detailed, and critical success factors are highlighted. This synthesized analysis serves to lend evidence to health care managers and providers who are considering implementation of the PCMH model.

  2. Kinematic Analysis of Volleyball Attack in the Net Center with Various Types of Take-Off.

    Science.gov (United States)

    Zahálka, František; Malý, Tomáš; Malá, Lucia; Ejem, Miloslav; Zawartka, Marek

    2017-09-01

    The aim of the study was to describe and compare kinematics in two types of execution of attack hit, the goofy approach and regular approach. The research group consisted of players from the Czech Republic's top league (n = 12, age 28.0 ± 4.3 years, body height 196.6 ± 5.6 cm, body mass 89.7 ± 6.7 kg) divided into two groups according to the individual type of approach in the attack. Analysis of movement was performed by 3D kinematics video analysis, space coordinates were calculated by the DLT (Direct Linear Transformation) method together with interpretation software TEMA Bio 2.3 (Image Systems AB, Sweden). The players started their run-up from a distance of about 4 - 4.5 m from the net with similar maximal vertical velocity (2.91 - 2.96 m⋅s -1 ). The trajectory of players with goofy approach seemed to be convenient for the rotation of shoulders and hips in the moment of ball contact. Differences between both groups were observed. Players with a goofy approach had a longer flight phase compared to regularly approaching players.

  3. Lessons Learned from Implementing the Patient-Centered Medical Home

    Directory of Open Access Journals (Sweden)

    Ellen P. Green

    2012-01-01

    Full Text Available The Patient-Centered Medical Home (PCMH is a primary care model that provides coordinated and comprehensive care to patients to improve health outcomes. This paper addresses practical issues that arise when transitioning a traditional primary care practice into a PCMH recognized by the National Committee for Quality Assurance (NCQA. Individual organizations' experiences with this transition were gathered at a PCMH workshop in Alexandria, Virginia in June 2010. An analysis of their experiences has been used along with a literature review to reveal common challenges that must be addressed in ways that are responsive to the practice and patients’ needs. These are: NCQA guidance, promoting provider buy-in, leveraging electronic medical records, changing office culture, and realigning workspace in the practice to accommodate services needed to carry out the intent of PCMH. The NCQA provides a set of standards for implementing the PCMH model, but these standards lack many specifics that will be relied on in location situations. While many researchers and providers have made critiques, we see this vagueness as allowing for greater flexibility in how a practice implements PCMH.

  4. Kennedy Space Center's NASA/Contractor Team-Centered Total Quality Management Seminar: Results, methods, and lessons learned

    Science.gov (United States)

    Kinlaw, Dennis C.; Eads, Jeannette

    1992-01-01

    It is apparent to everyone associated with the Nation's aeronautics and space programs that the challenge of continuous improvement can be reasonably addressed only if NASA and its contractors act together in a fully integrated and cooperative manner that transcends the traditional boundaries of proprietary interest. It is, however, one thing to assent to the need for such integration and cooperation; it is quite another thing to undertake the hard tasks of turning such a need into action. Whatever else total quality management is, it is fundamentally a team-centered and team-driven process of continuous improvement. The introduction of total quality management at KSC, therefore, has given the Center a special opportunity to translate the need for closer integration and cooperation among all its organizations into specific initiatives. One such initiative that NASA and its contractors have undertaken at KSC is a NASA/Contractor team-centered Total Quality Management Seminar. It is this seminar which is the subject of this paper. The specific purposes of this paper are to describe the following: Background, development, and evolution of Kennedy Space Center's Total Quality Management Seminar; Special characteristics of the seminar; Content of the seminar; Meaning and utility of a team-centered design for TQM training; Results of the seminar; Use that one KSC contractor, EG&G Florida, Inc. has made of the seminar in its Total Quality Management initiative; and Lessons learned.

  5. Environmental studies of the World Trade Center area after the September 11, 2001 attack

    Science.gov (United States)

    Clark, Roger N.; Green, Robert O.; Swayze, Gregg A.; Meeker, Greg; Sutley, Steve; Hoefen, Todd M.; Livo, K. Eric; Plumlee, Geoff; Pavri, Betina; Sarture, Chuck; Wilson, Steve; Hageman, Phil; Lamothe, Paul; Vance, J. Sam; Boardman, Joe; Brownfield, Isabelle; Gent, Carol; Morath, Laurie C.; Taggart, Joseph; Theodorakos, Peter M.; Adams, Monique

    2001-01-01

    This web site describes the results of an interdisciplinary environmental characterization of the World Trade Center (WTC) area after September 11, 2001.Information presented in this site was first made available to the World Trade Center emergency response teams on September 18, 2001 (Thermal hot spot information), and September 27, 2001 (maps and compositional results).The Airborne Visible / Infrared Imaging Spectrometer (AVIRIS), a hyperspectral remote sensing instrument, was flown by JPL/NASA over the World Trade Center (WTC) area on September 16, 18, 22, and 23, 2001 ( Link to the AVIRIS JPL data facility). A 2-person USGS crew collected samples of dusts and airfall debris from more than 35 localities within a 1-km radius of the World trade Center site on the evenings of September 17 and 18, 2001. Two samples were collected of indoor locations that were presumably not affected by rainfall (there was a rainstorm on September 14). Two samples of material coating a steel beam in the WTC debris were also collected. The USGS ground crew also carried out on-the-ground reflectance spectroscopy measurements during daylight hours to field calibrate AVIRIS remote sensing data. Radiance calibration and rectification of the AVIRIS data were done at JPL/NASA. Surface reflectance calibration, spectral mapping, and interpretation were done at the USGS Imaging Spectroscopy Lab in Denver. The dust/debris and beam-insulation samples were analyzed for a variety of mineralogical and chemical parameters using Reflectance Spectroscopy (RS), Scanning Electron Microscopy (SEM), X-Ray Diffraction (XRD), chemical analysis, and chemical leach test techniques in U.S. Geological Survey laboratories in Denver, Colorado.

  6. Revised and updated recommendations for the establishment of primary stroke centers: a summary statement from the brain attack coalition.

    Science.gov (United States)

    Alberts, Mark J; Latchaw, Richard E; Jagoda, Andy; Wechsler, Lawrence R; Crocco, Todd; George, Mary G; Connolly, E S; Mancini, Barbara; Prudhomme, Stephen; Gress, Daryl; Jensen, Mary E; Bass, Robert; Ruff, Robert; Foell, Kathy; Armonda, Rocco A; Emr, Marian; Warren, Margo; Baranski, Jim; Walker, Michael D

    2011-09-01

    The formation and certification of Primary Stroke Centers has progressed rapidly since the Brain Attack Coalition's original recommendations in 2000. The purpose of this article is to revise and update our recommendations for Primary Stroke Centers to reflect the latest data and experience. We conducted a literature review using MEDLINE and PubMed from March 2000 to January 2011. The review focused on studies that were relevant for acute stroke diagnosis, treatment, and care. Original references as well as meta-analyses and other care guidelines were also reviewed and included if found to be valid and relevant. Levels of evidence were added to reflect current guideline development practices. Based on the literature review and experience at Primary Stroke Centers, the importance of some elements has been further strengthened, and several new areas have been added. These include (1) the importance of acute stroke teams; (2) the importance of Stroke Units with telemetry monitoring; (3) performance of brain imaging with MRI and diffusion-weighted sequences; (4) assessment of cerebral vasculature with MR angiography or CT angiography; (5) cardiac imaging; (6) early initiation of rehabilitation therapies; and (7) certification by an independent body, including a site visit and disease performance measures. Based on the evidence, several elements of Primary Stroke Centers are particularly important for improving the care of patients with an acute stroke. Additional elements focus on imaging of the brain, the cerebral vasculature, and the heart. These new elements may improve the care and outcomes for patients with stroke cared for at a Primary Stroke Center.

  7. The World Trade Center Attack Disaster preparedness: health care is ready, but is the bureaucracy?

    Science.gov (United States)

    Mattox, Kenneth

    2001-01-01

    When a disaster occurs, it is for governments to provide the leadership, civil defense, security, evacuation, and public welfare. The medical aspects of a disaster account for less than 10% of resource and personnel expenditure. Hospitals and health care provider teams respond to unexpected occurrences such as explosions, earthquakes, floods, fires, war, or the outbreak of an infectious epidemic. In some geographic locations where natural disasters are common, such as earthquakes in Japan, such disaster practice drills are common. In other locations, disaster drills become pro forma and have no similarity to real or even projected and predicted disasters. The World Trade Center disaster on 11 September 2001 provides new information, and points out new threats, new information systems, new communication opportunities, and new detection methodologies. It is time for leaders of medicine to re-examine their approaches to disaster preparedness. PMID:11737919

  8. Occupational Practitioner's Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack.

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  9. Occupational Practitioner’s Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up. PMID:27703965

  10. Occupational practitioner's role in the management of a crisis: lessons learned from the Paris November 2015 terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexis Descatha

    2016-09-01

    Full Text Available In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015.During and after the Paris attack, occupational practitioners in collaboration with emergency and security professionals were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans.Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events, and participate in preventing, to the extent possible, post-traumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols.In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  11. Risk factors for persistence of lower respiratory symptoms among community members exposed to the 2001 World Trade Center terrorist attacks

    Science.gov (United States)

    Jordan, Hannah T; Friedman, Stephen M; Reibman, Joan; Goldring, Roberta M; Miller Archie, Sara A; Ortega, Felix; Alper, Howard; Shao, Yongzhao; Maslow, Carey B; Cone, James E; Farfel, Mark R; Berger, Kenneth I

    2017-01-01

    Objectives We studied the course of lower respiratory symptoms (LRS; cough, wheeze or dyspnoea) among community members exposed to the 9/11/2001 World Trade Center (WTC) attacks during a period of 12–13 years following the attacks, and evaluated risk factors for LRS persistence, including peripheral airway dysfunction and post-traumatic stress disorder (PTSD). Methods Non-smoking adult participants in a case-control study of post-9/11-onset LRS (exam 1, 2008–2010) were recruited for follow-up (exam 2, 2013–2014). Peripheral airway function was assessed with impulse oscillometry measures of R5 and R5-20. Probable PTSD was a PTSD checklist score ≥44 on a 2006–2007 questionnaire. Results Of 785 exam 1 participants, 545 (69%) completed exam 2. Most (321, 59%) were asymptomatic at all assessments. Among 192 participants with initial LRS, symptoms resolved for 110 (57%) by exam 2, 55 (29%) had persistent LRS and 27 (14%) had other patterns. The proportion with normal spirometry increased from 65% at exam 1 to 85% at exam 2 in the persistent LRS group (p<0.01) and was stable among asymptomatic participants and those with resolved LRS. By exam 2, spirometry results did not differ across symptom groups; however, R5 and R5-20 abnormalities were more common among participants with persistent LRS (56% and 46%, respectively) than among participants with resolved LRS (30%, p<0.01; 27%, p=0.03) or asymptomatic participants (20%, p<0.001; 8.2%, p<0.001). PTSD, R5 at exam 1, and R5-20 at exam 1 were each independently associated with persistent LRS. Conclusions Peripheral airway dysfunction and PTSD may contribute to LRS persistence. Assessment of peripheral airway function detected pulmonary damage not evident on spirometry. Mental and physical healthcare for survivors of complex environmental disasters should be coordinated carefully. PMID:28341697

  12. Asthma and posttraumatic stress symptoms 5 to 6 years following exposure to the World Trade Center terrorist attack.

    Science.gov (United States)

    Brackbill, Robert M; Hadler, James L; DiGrande, Laura; Ekenga, Christine C; Farfel, Mark R; Friedman, Stephen; Perlman, Sharon E; Stellman, Steven D; Walker, Deborah J; Wu, David; Yu, Shengchao; Thorpe, Lorna E

    2009-08-05

    The World Trade Center Health Registry provides a unique opportunity to examine long-term health effects of a large-scale disaster. To examine risk factors for new asthma diagnoses and event-related posttraumatic stress (PTS) symptoms among exposed adults 5 to 6 years following exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack. Longitudinal cohort study with wave 1 (W1) enrollment of 71,437 adults in 2003-2004, including rescue/recovery worker, lower Manhattan resident, lower Manhattan office worker, and passersby eligibility groups; 46,322 adults (68%) completed the wave 2 (W2) survey in 2006-2007. Self-reported diagnosed asthma following September 11; event-related current PTS symptoms indicative of probable posttraumatic stress disorder (PTSD), assessed using the PTSD Checklist (cutoff score > or = 44). Of W2 participants with no stated asthma history, 10.2% (95% confidence interval [CI], 9.9%-10.5%) reported new asthma diagnoses postevent. Intense dust cloud exposure on September 11 was a major contributor to new asthma diagnoses for all eligibility groups: for example, 19.1% vs 9.6% in those without exposure among rescue/recovery workers (adjusted odds ratio, 1.5 [95% CI, 1.4-1.7]). Asthma risk was highest among rescue/recovery workers on the WTC pile on September 11 (20.5% [95% CI, 19.0%-22.0%]). Persistent risks included working longer at the WTC site, not evacuating homes, and experiencing a heavy layer of dust in home or office. Of participants with no PTSD history, 23.8% (95% CI, 23.4%-24.2%) reported PTS symptoms at either W1 (14.3%) or W2 (19.1%). Nearly 10% (9.6% [95% CI, 9.3%-9.8%]) had PTS symptoms at both surveys, 4.7% (95% CI, 4.5%-4.9%) had PTS symptoms at W1 only, and 9.5% (95% CI, 9.3%-9.8%) had PTS symptoms at W2 only. At W2, passersby had the highest rate of PTS symptoms (23.2% [95% CI, 21.4%-25.0%]). Event-related loss of spouse or job was associated with PTS symptoms at W2. Acute and prolonged exposures were both

  13. Creating a Community of Practice: Lessons Learned from the Center for Astronomy Education (Invited)

    Science.gov (United States)

    Brissenden, G.

    2009-12-01

    The Center for Astronomy Education (CAE) is devoted to improving teaching and learning in Astro 101. To accomplish this, a vital part of CAE is our broader community of practice which includes over 1000 instructors, graduate and undergraduate students, and postdocs. It is this greater community of practice that supports each other, helps, and learns from each other beyond what would be possible without it. As our community of practice has grown, we at CAE have learned many lessons about how different facets of CAE can best be used to promote and support our community both as a whole and for individual members. We will discuss the various facets of CAE, such as our online discussion group Astrolrner@CAE (http://astronomy101.jpl.nasa.gov/discussion) and its Guest Moderator program, our CAE Regional Teaching Exchange Coordinator program, our CAE Workshop Presenter Apprenticeship Training program, our online This Month’s Teaching Strategy, monthly newsletters, and various types of socializing and networking sessions we hold at national meetings. But more importantly, we will discuss the lessons we’ve learned about what does and does not work in building community within each of these facets.

  14. Marine Corps Center for Lessons Learned. Volume 8, Issue 11, November 2012

    Science.gov (United States)

    2012-11-01

    MARINE CORPS CENTER FOR LESSONS LEARNED M C C L L R E P O R T: F E AT U R E D A R T I C L E S A N D L E S S O N S : R E G U L A R F E AT U R E S...L O A D S F R O M T H E M C C L L W E B S I T E , OCTOBER 2012 R E G U L A R F E AT U R E S : Photo credit: Sgt Rachael Moore A Joint Terminal...Follower by Ira Chaleff, and ▪ Fahim Speaks by Fahim Fazli and Michael Moffett . 19 MCCLL Products "in the Pipeline" Several recent, ongoing and

  15. Lessons Learned from Engineering a Multi-Mission Satellite Operations Center

    Science.gov (United States)

    Madden, Maureen; Cary, Everett, Jr.; Esposito, Timothy; Parker, Jeffrey; Bradley, David

    2006-01-01

    NASA's Small Explorers (SMEX) satellites have surpassed their designed science-lifetimes and their flight operations teams are now facing the challenge of continuing operations with reduced funding. At present, these missions are being re-engineered into a fleet-oriented ground system at Goddard Space Flight Center (GSFC). When completed, this ground system will provide command and control of four SMEX missions and will demonstrate fleet automation and control concepts. As a path-finder for future mission consolidation efforts, this ground system will also demonstrate new ground-based technologies that show promise of supporting longer mission lifecycles and simplifying component integration. One of the core technologies being demonstrated in the SMEX Mission Operations Center is the GSFC Mission Services Evolution Center (GMSEC) architecture. The GMSEC architecture uses commercial Message Oriented Middleware with a common messaging standard to realize a higher level of component interoperability, allowing for interchangeable components in ground systems. Moreover, automation technologies utilizing the GMSEC architecture are being evaluated and implemented to provide extended lights-out operations. This mode of operation will provide routine monitoring and control of the heterogeneous spacecraft fleet. The operational concepts being developed will reduce the need for staffed contacts and is seen as a necessity for fleet management. This paper will describe the experiences of the integration team throughout the re-enginering effort of the SMEX ground system. Additionally, lessons learned will be presented based on the team's experiences with integrating multiple missions into a fleet-automated ground system.

  16. DCDM1: Lessons Learned from the World's Most Energy Efficient Data Center

    Energy Technology Data Exchange (ETDEWEB)

    Sickinger, David E [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Van Geet, Otto D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Carter, Thomas [Johnson Controls

    2018-05-03

    This presentation discusses the holistic approach to design the world's most energy-efficient data center, which is located at the U.S. Department of Energy National Renewable Energy Laboratory (NREL). This high-performance computing (HPC) data center has achieved a trailing twelve-month average power usage effectiveness (PUE) of 1.04 and features a chiller-less design, component-level warm-water liquid cooling, and waste heat capture and reuse. We provide details of the demonstrated PUE and energy reuse effectiveness (ERE) and lessons learned during four years of production operation. Recent efforts to dramatically reduce the water footprint will also be discussed. Johnson Controls partnered with NREL and Sandia National Laboratories to deploy a thermosyphon cooler (TSC) as a test bed at NREL's HPC data center that resulted in a 50% reduction in water usage during the first year of operation. The Thermosyphon Cooler Hybrid System (TCHS) integrates the control of a dry heat rejection device with an open cooling tower.

  17. The Use of DOE Technologies at The World Trade Center Incident: Lessons Learned

    International Nuclear Information System (INIS)

    McCabe, B.; Kovach, J.; Carpenter, C.; Blair, D.

    2003-01-01

    In response to the attack of the World Trade Center (WTC) on September 11, 2001, the International Union of Operating Engineers (IUOE) National Hazmat Program (OENHP) assembled and deployed a HAZMAT Emergency Management Team (Team) to the disaster site (Site). The response team consisted of a Certified Industrial Hygienist and a rotating team of industrial hygienists, safety professionals, and certified HAZMAT instructors. Through research funded by the Department of Energy (DOE) Office of Environmental Management (EM) and managed by the National Energy Technology Laboratory (NETL), the IUOE conducted human factors assessments on baseline and innovative technologies during real-world conditions and served as an advocate at the WTC disaster site to identify opportunities for the use and evaluation of DOE technologies. From this work, it is clear that opportunities exist for more DOE technologies to be made readily available for use in future emergencies

  18. The Use of DOE Technologies at The World Trade Center Incident: Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    McCabe, B.; Kovach, J.; Carpenter, C.; Blair, D.

    2003-02-25

    In response to the attack of the World Trade Center (WTC) on September 11, 2001, the International Union of Operating Engineers (IUOE) National Hazmat Program (OENHP) assembled and deployed a HAZMAT Emergency Management Team (Team) to the disaster site (Site). The response team consisted of a Certified Industrial Hygienist and a rotating team of industrial hygienists, safety professionals, and certified HAZMAT instructors. Through research funded by the Department of Energy (DOE) Office of Environmental Management (EM) and managed by the National Energy Technology Laboratory (NETL), the IUOE conducted human factors assessments on baseline and innovative technologies during real-world conditions and served as an advocate at the WTC disaster site to identify opportunities for the use and evaluation of DOE technologies. From this work, it is clear that opportunities exist for more DOE technologies to be made readily available for use in future emergencies.

  19. Lessons Learned from Creating the Public Earthquake Resource Center at CERI

    Science.gov (United States)

    Patterson, G. L.; Michelle, D.; Johnston, A.

    2004-12-01

    The Center for Earthquake Research and Information (CERI) at the University of Memphis opened the Public Earthquake Resource Center (PERC) in May 2004. The PERC is an interactive display area that was designed to increase awareness of seismology, Earth Science, earthquake hazards, and earthquake engineering among the general public and K-12 teachers and students. Funding for the PERC is provided by the US Geological Survey, The NSF-funded Mid America Earthquake Center, and the University of Memphis, with input from the Incorporated Research Institutions for Seismology. Additional space at the facility houses local offices of the US Geological Survey. PERC exhibits are housed in a remodeled residential structure at CERI that was donated by the University of Memphis and the State of Tennessee. Exhibits were designed and built by CERI and US Geological Survey staff and faculty with the help of experienced museum display subcontractors. The 600 square foot display area interactively introduces the basic concepts of seismology, real-time seismic information, seismic network operations, paleoseismology, building response, and historical earthquakes. Display components include three 22" flat screen monitors, a touch sensitive monitor, 3 helicorder elements, oscilloscope, AS-1 seismometer, life-sized liquefaction trench, liquefaction shake table, and building response shake table. All displays include custom graphics, text, and handouts. The PERC website at www.ceri.memphis.edu/perc also provides useful information such as tour scheduling, ask a geologist, links to other institutions, and will soon include a virtual tour of the facility. Special consideration was given to address State science standards for teaching and learning in the design of the displays and handouts. We feel this consideration is pivotal to the success of any grass roots Earth Science education and outreach program and represents a valuable lesson that has been learned at CERI over the last several

  20. Organizational factors and office workers' health after the World Trade Center terrorist attacks: long-term physical symptoms, psychological distress, and work productivity.

    Science.gov (United States)

    Osinubi, Omowunmi Y O; Gandhi, Sampada K; Ohman-Strickland, Pamela; Boglarsky, Cheryl; Fiedler, Nancy; Kipen, Howard; Robson, Mark

    2008-02-01

    To assess if organizational factors are predictors of workers' health and productivity after the World Trade Center attacks. We conducted a survey of 750 workers and compared those who had direct exposures to the World Trade Center attacks (south of Canal Street workers; primary victims) with those less directly exposed (north of Canal Street workers; other victims and non-victims). South of Canal Street workers reported headache more frequently than north of Canal Street workers did (P = 0.0202). Primary victims reported headache and cough more frequently than did other victims and non-victims (P = 0.0086 and 0.0043, respectively). Defensive organizational culture was an independent predictor of cough and job stress, and job stress was an independent predictor of on-the-job productivity losses. Organizational variables may modify health and productivity outcomes after a large-scale traumatic event in the workplace.

  1. Streamlining Workflow for Endovascular Mechanical Thrombectomy: Lessons Learned from a Comprehensive Stroke Center.

    Science.gov (United States)

    Wang, Hongjin; Thevathasan, Arthur; Dowling, Richard; Bush, Steven; Mitchell, Peter; Yan, Bernard

    2017-08-01

    Recently, 5 randomized controlled trials confirmed the superiority of endovascular mechanical thrombectomy (EMT) to intravenous thrombolysis in acute ischemic stroke with large-vessel occlusion. The implication is that our health systems would witness an increasing number of patients treated with EMT. However, in-hospital delays, leading to increased time to reperfusion, are associated with poor clinical outcomes. This review outlines the in-hospital workflow of the treatment of acute ischemic stroke at a comprehensive stroke center and the lessons learned in reduction of in-hospital delays. The in-hospital workflow for acute ischemic stroke was described from prehospital notification to femoral arterial puncture in preparation for EMT. Systematic review of literature was also performed with PubMed. The implementation of workflow streamlining could result in reduction of in-hospital time delays for patients who were eligible for EMT. In particular, time-critical measures, including prehospital notification, the transfer of patients from door to computed tomography (CT) room, initiation of intravenous thrombolysis in the CT room, and the mobilization of neurointervention team in parallel with thrombolysis, all contributed to reduction in time delays. We have identified issues resulting in in-hospital time delays and have reported possible solutions to improve workflow efficiencies. We believe that these measures may help stroke centers initiate an EMT service for eligible patients. Copyright © 2017 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  2. Epidemiologic methods lessons learned from environmental public health disasters: Chernobyl, the World Trade Center, Bhopal, and Graniteville, South Carolina.

    Science.gov (United States)

    Svendsen, Erik R; Runkle, Jennifer R; Dhara, Venkata Ramana; Lin, Shao; Naboka, Marina; Mousseau, Timothy A; Bennett, Charles

    2012-08-01

    Environmental public health disasters involving hazardous contaminants may have devastating effects. While much is known about their immediate devastation, far less is known about long-term impacts of these disasters. Extensive latent and chronic long-term public health effects may occur. Careful evaluation of contaminant exposures and long-term health outcomes within the constraints imposed by limited financial resources is essential. Here, we review epidemiologic methods lessons learned from conducting long-term evaluations of four environmental public health disasters involving hazardous contaminants at Chernobyl, the World Trade Center, Bhopal, and Graniteville (South Carolina, USA). We found several lessons learned which have direct implications for the on-going disaster recovery work following the Fukushima radiation disaster or for future disasters. These lessons should prove useful in understanding and mitigating latent health effects that may result from the nuclear reactor accident in Japan or future environmental public health disasters.

  3. Impact of the Implementation of Information Technology on the Center for Army Lessons Learned

    National Research Council Canada - National Science Library

    Wizner, Anthony

    2001-01-01

    .... This research evaluates the impact that the implementation of an Information Technology infrastructure has had on the efficiency of Army's Lessons Learned Process and the overall effectiveness...

  4. Lessons Learned Recruiting Minority Participants for Research in Urban Community Health Centers.

    Science.gov (United States)

    Fam, Elizabeth; Ferrante, Jeanne M

    2018-02-01

    To help understand and mitigate health disparities, it is important to conduct research with underserved and underrepresented minority populations under real world settings. There is a gap in the literature detailing real-time research staff experience, particularly in their own words, while conducting in-person patient recruitment in urban community health centers. This paper describes challenges faced at the clinic, staff, and patient levels, our lessons learned, and strategies implemented by research staff while recruiting predominantly low-income African-American women for an interviewer-administered survey study in four urban Federally Qualified Health Centers in New Jersey. Using a series of immersion-crystallization cycles, fieldnotes and research reflections written by recruiters, along with notes from team meetings during the study, were qualitatively analyzed. Clinic level barriers included: physical layout of clinic, very low or high patient census, limited private space, and long wait times for patients. Staff level barriers included: unengaged staff, overburdened staff, and provider and staff turnover. Patient level barriers included: disinterested patients, patient mistrust and concerns over confidentiality, no-shows or lack of patient time, and language barrier. We describe strategies used to overcome these barriers and provide recommendations for in-person recruitment of underserved populations into research studies. To help mitigate health disparities, disseminating recruiters' experiences, challenges, and effective strategies used will allow other researchers to build upon these experience in order to increase recruitment success of underserved and underrepresented minority populations into research studies. Copyright © 2018 National Medical Association. Published by Elsevier Inc. All rights reserved.

  5. Engaging the Deaf American Sign Language Community: Lessons From a Community-Based Participatory Research Center

    Science.gov (United States)

    McKee, Michael; Thew, Denise; Starr, Matthew; Kushalnagar, Poorna; Reid, John T.; Graybill, Patrick; Velasquez, Julia; Pearson, Thomas

    2013-01-01

    Background Numerous publications demonstrate the importance of community-based participatory research (CBPR) in community health research, but few target the Deaf community. The Deaf community is understudied and underrepresented in health research despite suspected health disparities and communication barriers. Objectives The goal of this paper is to share the lessons learned from the implementation of CBPR in an understudied community of Deaf American Sign Language (ASL) users in the greater Rochester, New York, area. Methods We review the process of CBPR in a Deaf ASL community and identify the lessons learned. Results Key CBPR lessons include the importance of engaging and educating the community about research, ensuring that research benefits the community, using peer-based recruitment strategies, and sustaining community partnerships. These lessons informed subsequent research activities. Conclusions This report focuses on the use of CBPR principles in a Deaf ASL population; lessons learned can be applied to research with other challenging-to-reach populations. PMID:22982845

  6. Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study

    Science.gov (United States)

    North, Carol S.; Pfefferbaum, Betty; Hong, Barry A.; Gordon, Mollie R.; Kim, You-Seung; Lind, Lisa; Pollio, David E.

    2014-01-01

    The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company’s workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees’ emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. PMID:23066661

  7. Transforming doctor-patient relationships to promote patient-centered care: lessons from palliative care.

    Science.gov (United States)

    Yedidia, Michael J

    2007-01-01

    Palliative care was studied for its potential to yield lessons for transforming doctor-patient relationships to promote patient-centered care. Examination of patient and provider experiences of the transition from curative to palliative care promises valuable insights about establishing and maintaining trust as the goals of care shift and about addressing a broad spectrum of patient needs. The study was guided by a conceptual framework grounded in existing models to address five dimensions of doctor-patient relationships: range of needs addressed, source of authority, maintenance of trust, emotional involvement, and expression of authenticity. Data collection included observation of the care of 40 patients in the inpatient hospice unit and at home, interviews with patients and family members, and in-depth interviews with 22 physicians and two nurses providing end-of-life care. Standard qualitative procedures were used to analyze the data, incorporating techniques for maximizing the validity of the results and broadening their relevance to other contexts. Findings provide evidence for challenging prominent assumptions about possibilities for doctor-patient relationships: questioning the merits of the prohibition on emotional involvement, dependence on protocols for handling difficult communication issues, unqualified reliance on consumer empowerment to assure that care is responsive to patients' needs, and adoption of narrowly defined boundaries between medical and social service systems in caring for patients. Medical education can play a role in preparing doctors to assume new roles by openly addressing management of emotions in routine clinical work, incorporating personal awareness training, facilitating reflection on interactions with patients through use of standardized patients and videotapes, and expanding capacity to effectively address a broad range of needs through teamwork training.

  8. Using exterior building surface films to assess human exposure and health risks from PCDD/Fs in New York City, USA, after the World Trade Center attacks.

    Science.gov (United States)

    Rayne, Sierra

    2005-12-09

    Concentrations of tetra- through octa-chlorinated dibenzo-p-dioxins and dibenzofurans (PCDD/Fs) were determined in exterior window films from Manhattan and Brooklyn in New York City (NYC), USA, 6 weeks after the World Trade Center (WTC) attacks of 11 September 2001. High concentrations of the 2,3,7,8-substituted congeners (P(2378)CDD/Fs) were observed, at levels up to 6600 pg-TEQ g(-1) nearest the WTC site. An equilibrium partitioning model was developed to reconstruct total gas + particle-phase atmospheric concentrations of P(2378)CDD/Fs at each site. The reconstructed atmospheric and window film concentrations were subsequently used in a preliminary human health risk assessment to estimate the potential cancer and non-cancer risks posed to residents of lower Manhattan from these contaminants over the 6 week exposure period between the WTC attacks and sampling dates. Residents of lower Manhattan appear to have a slightly elevated cancer risk (up to 1.6% increase over background) and increased P(2378)CDD/F body burden (up to 8.0% increase over background) because of above-background exposure to high concentrations of P(2378)CDD/Fs produced from the WTC attacks during the short period between 11 September 2001, and window film sampling 6 weeks later.

  9. Lessons Learned (3 Years of H2O2 Propulsion System Testing Efforts at NASA's John C. Stennis Space Center)

    Science.gov (United States)

    Taylor, Gary O.

    2001-01-01

    John C. Stennis Space Center continues to support the Propulsion community in an effort to validate High-Test Peroxide as an alternative to existing/future oxidizers. This continued volume of peroxide test/handling activity at Stennis Space Center (SSC) provides numerous opportunities for the SSC team to build upon previously documented 'lessons learned'. SSC shall continue to strive to document their experience and findings as H2O2 issues surface. This paper is intended to capture all significant peroxide issues that we have learned over the last three years. This data (lessons learned) has been formulated from practical handling, usage, storage, operations, and initial development/design of our systems/facility viewpoint. The paper is intended to be an information type tool and limited in technical rational; therefore, presenting the peroxide community with some issues to think about as the continued interest in peroxide evolves and more facilities/hardware are built. These lessons learned are intended to assist industry in mitigating problems and identifying potential pitfalls when dealing with the requirements for handling high-test peroxide.

  10. Remote damage control during the attacks on Paris: Lessons learned by the Paris Fire Brigade and evolutions in the rescue system.

    Science.gov (United States)

    Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain

    2017-06-01

    On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.

  11. Lessons Learnt from the Westgate Shopping Mall Terrorist Attack in Nairobi, Kenya: Involving the Meetings, Incentives, Conferences and Exhibitions Sector in Crisis Communications

    Directory of Open Access Journals (Sweden)

    Ashley Schroeder

    2014-11-01

    Full Text Available The terrorist attacks in Nairobi Kenya have been widely disseminated by the world media, thus, affecting the long-term interests of stakeholders. The tourism industry is made up of a vast number of these stakeholders, with the operating sector alone including the accommodation, tourism services, transportation, entertainment, food services, adventure and outdoor recreation, attractions, meetings, incentive, conventions, and exhibitions (MICE, and travel trade sectors. Within each operating sector, there is also a variety of different stakeholders in various segments and organisations. The purpose of this manuscript is to examine tourism crisis communications surrounding the Westgate Shopping Mall attacks in Kenya. The main research question which guided this study was: did tourism communications surrounding the Westgate Shopping Mall attacks follow best practices for tourism crisis communications? Accordingly, this paper used participant observation to highlight communications surrounding the attacks from the perspective of a conference planner and a conference attendee.

  12. Meaning reconstruction in the face of terror: An examination of recovery and posttraumatic growth among victims of the 9/11 World Trade Center attacks.

    Science.gov (United States)

    Richardson, Katherine M

    2015-01-01

    This study examines the relationship between meaning reconstruction with posttraumatic growth and depreciation in the aftermath of terrorist trauma and loss. A group of individuals (n=118) who were personally affected by the September 11, 2001 terrorist attacks were surveyed about their experiences and administered the Posttraumatic Growth Inventory and Impact of Event scales. Subjects were volunteer docents at the Tribute World Trade Center Visitor Center. Results revealed that ability to make sense of one's 9/11 experience was related to recovery but not to posttraumatic growth, whereas ability to find some benefit in the experience was related to growth. In addition, location in downtown Manhattan on September 11, 2001 was related to higher levels of posttraumatic depreciation. Findings suggest that two aspects of meaning reconstruction are differentially related to recovery and posttraumatic growth.

  13. The molecular epidemiology of respiratory viruses associated with asthma attacks: A single-center observational study in Japan.

    Science.gov (United States)

    Saraya, Takeshi; Kimura, Hirokazu; Kurai, Daisuke; Ishii, Haruyuki; Takizawa, Hajime

    2017-10-01

    Few reports have described the significance of viral respiratory infections (VRIs) in exacerbation of asthma in adult patients. The aim of this study was to elucidate the profiles of VRIs in adult patients with asthma along with their molecular epidemiology.A cross-sectional observational study was conducted at Kyorin University Hospital from August 2012 to May 2015. To identify respiratory pathogens in inpatients and outpatients suffering from asthma attacks, RT-PCR/sequencing/phylogenetic analysis methods were applied alongside conventional microbiological methods. Phylogenetic and pairwise distance analyses of 10 viruses were performed.A total of 106 asthma attack patients enrolled in this study in both inpatient (n = 49) and outpatient (n = 57) settings. The total 106 respiratory samples were obtained from nasopharyngeal swab (n = 68) or sputum (n = 38). Among these, patients with virus alone (n = 39), virus and bacterial (n = 5), and bacterial alone (n = 5) were identified. The ratio of virus-positive patients in inpatient or outpatient to the total cases were 31.1% (n = 33) and 10.4% (n = 11), respectively. The frequency of virus-positive patients was significantly higher in inpatients (75.3%, n = 33) than in outpatients (19.3%, n = 11). Major VRIs included human rhinovirus (HRV) (n = 24), human metapneumovirus (hMPV) (n = 9), influenza virus (Inf-V) (n = 8), and respiratory syncytial virus (RSV) (n = 3) infections with seasonal variations. HRV-A and HRV-C were the most commonly detected viruses, with wide genetic divergence on phylogenetic analysis.Asthmatic exacerbations in adults are highly associated with VRIs such as HRV-A or HRV-C, hMPV, RSV, and Inf-V infections with seasonal variations and genetic divergence, but similar frequencies of VRIs occurred in asthma attack patients throughout the seasons.

  14. Epidemiologic Methods Lessons Learned from Environmental Public Health Disasters: Chernobyl, the World Trade Center, Bhopal, and Graniteville, South Carolina

    Directory of Open Access Journals (Sweden)

    Timothy A. Mousseau

    2012-08-01

    Full Text Available Background: Environmental public health disasters involving hazardous contaminants may have devastating effects. While much is known about their immediate devastation, far less is known about long-term impacts of these disasters. Extensive latent and chronic long-term public health effects may occur. Careful evaluation of contaminant exposures and long-term health outcomes within the constraints imposed by limited financial resources is essential. Methods: Here, we review epidemiologic methods lessons learned from conducting long-term evaluations of four environmental public health disasters involving hazardous contaminants at Chernobyl, the World Trade Center, Bhopal, and Graniteville (South Carolina, USA. Findings: We found several lessons learned which have direct implications for the on-going disaster recovery work following the Fukushima radiation disaster or for future disasters. Interpretation: These lessons should prove useful in understanding and mitigating latent health effects that may result from the nuclear reactor accident in Japan or future environmental public health disasters.

  15. Posttraumatic Stress Disorder, Gender, and Risk Factors: World Trade Center Tower Survivors 10 to 11 Years After the September 11, 2001 Attacks.

    Science.gov (United States)

    Bowler, Rosemarie M; Adams, Shane W; Gocheva, Vihra V; Li, Jiehui; Mergler, Donna; Brackbill, Robert; Cone, James E

    2017-12-01

    Ten to eleven years after the September 11, 2001 terrorist attacks, probable posttraumatic stress disorder (PTSD) was evaluated in 1,755 World Trade Center (WTC) evacuees based on data from the WTC Health Registry. Characteristics of men and women were compared and factors associated with PTSD symptom severity were examined using the PTSD Checklist (PCL). Compared with men (n = 1,015, 57.8%), women (n = 740, 42.2%) were younger and of lower socioeconomic status. Ten to eleven years after September 11, 2001, 13.7% of men and 24.1% of women met criteria for PTSD. Results indicated that when considered with all other variables (i.e., demographic, socioeconomic and social resources, exposure to the attacks, life events), gender was not a significant predictor of PTSD symptom severity. Being younger on September 11, 2001, unemployed, less educated, and/or having higher exposure to the attacks, unmet mental health care needs, and less social support predicted higher PCL scores for both genders (βs = .077 to .239). Demographic characteristics and socioeconomic resources (ΔR 2 = .113) accounted for the largest amount of variance in PCL scores over and above exposure/evacuation, mental healthcare needs, and social support variables (ΔR 2 = .093 to .102). When trends of unmet mental healthcare needs were analyzed, the most prevalent response for men was that they preferred to manage their own symptoms (15.1%), whereas the most prevalent response for women was that they could not afford to pay for mental health care (14.7%). Although the prevalence of probable PTSD in women tower survivors was approximately twice as high as it was for men, this is attributable largely to demographic and socioeconomic resource factors and not gender alone. Implications for treatment and interventions are discussed. Copyright © 2017 International Society for Traumatic Stress Studies.

  16. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  17. Adolescent behavior and PTSD 6–7 years after the World Trade Center terrorist attacks of September 11, 2001

    Science.gov (United States)

    Mann, Mana; Li, Jiehui; Farfel, Mark R; Maslow, Carey B; Osahan, Sukhminder; Stellman, Steven D

    2014-01-01

    Behavioral problems and psychopathologies were reported in children exposed to the World Trade Center (WTC) attacks in New York City within 2–3 y post-disaster. Little is known of subsequent 9/11 related behavioral and emotional problems. We assessed risk factors for behavioral difficulties and probable posttraumatic stress disorder (PTSD) in 489 adolescent enrollees ages 11–18 y of age in the World Trade Center Health Registry cohort using the Strengths and Difficulties Questionnaire (SDQ) and DISC Predictive Scales (DPS), respectively, as reported by the adolescents. Associations between parental PTSD and adolescent PTSD and behavioral problems were studied in a subset of 166 adolescent-parent pairs in which the parent was also a Registry enrollee. Nearly one-fifth (17.4%) of the adolescents, all of whom were 5–12 y old at the time of the attacks, scored in the abnormal (5.7%) or borderline (11.7%) range of total SDQ. Problems were more frequent in minority, low-income, and single-parent adolescents. Abnormal and borderline SDQ scores were significantly associated with direct WTC exposures and with WTC-related injury or death of a family member. Adolescent PTSD was significantly associated with WTC exposure and with fear of one's own injury or death, and with PTSD in the parent (OR = 5.6; 95% CI 1.1–28.4). This adolescent population should be monitored for persistence or worsening of these problems. Co-occurrence of parent and child mental health symptoms following a disaster may have implications for healthcare practitioners and for disaster response planners. PMID:28229007

  18. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  19. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  20. PATIENT-CENTERED DECISION MAKING: LESSONS FROM MULTI-CRITERIA DECISION ANALYSIS FOR QUANTIFYING PATIENT PREFERENCES.

    Science.gov (United States)

    Marsh, Kevin; Caro, J Jaime; Zaiser, Erica; Heywood, James; Hamed, Alaa

    2018-01-01

    Patient preferences should be a central consideration in healthcare decision making. However, stories of patients challenging regulatory and reimbursement decisions has led to questions on whether patient voices are being considered sufficiently during those decision making processes. This has led some to argue that it is necessary to quantify patient preferences before they can be adequately considered. This study considers the lessons from the use of multi-criteria decision analysis (MCDA) for efforts to quantify patient preferences. It defines MCDA and summarizes the benefits it can provide to decision makers, identifies examples of MCDAs that have involved patients, and summarizes good practice guidelines as they relate to quantifying patient preferences. The guidance developed to support the use of MCDA in healthcare provide some useful considerations for the quantification of patient preferences, namely that researchers should give appropriate consideration to: the heterogeneity of patient preferences, and its relevance to decision makers; the cognitive challenges posed by different elicitation methods; and validity of the results they produce. Furthermore, it is important to consider how the relevance of these considerations varies with the decision being supported. The MCDA literature holds important lessons for how patient preferences should be quantified to support healthcare decision making.

  1. Entertainment-Retail Centers in Hong Kong and Los Angeles: Trends and Lessons

    OpenAIRE

    Clara Irazabal; Surajit Chakravarty

    2007-01-01

    This paper seeks to answer the question of why Entertainment Retail Centers (ERCs) develop as they do and what we can expect from these centers of consumption in the near future. Beginning with a "network" view of cities, where cities are nodes in an integrated economic system, the paper examines the evolution of and recent trends in the design of Entertainment Retail Centers (ERCs) in Los Angeles and Hong Kong. The analysis is organized along four related themes - land use, transportation, u...

  2. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  3. Writing Effectively as Counseling Center Directors and Administrators: Lessons Learned from a 2-Minute Speech

    Science.gov (United States)

    Sevig, Todd; Bogan, Yolanda; Dunkle, John; Gong-Guy, Elizabeth

    2015-01-01

    Administrative writing is a crucial skill needed for the counseling center professional to be able to transmit knowledge and values for the rest of the campus community. This article highlights both conceptual and technical aspects of effective writing.

  4. 10 Years Later: Lessons Learned from an Academic Multidisciplinary Cosmetic Center

    Directory of Open Access Journals (Sweden)

    Jenny T. Chen, MD

    2017-09-01

    Conclusion:. Although the creation of our academic cosmetic ambulatory surgery center has greatly increased the overall volume of cosmetic surgery performed at the University of Wisconsin, the majority of surgical volume and revenue is reconstructive. As is seen nationwide, minimally invasive cosmetic procedures represent our most rapidly expanding revenue stream.

  5. Recruitment Challenges: Lessons from Senior Centers and Older African-American Participants in a Literacy Study

    Science.gov (United States)

    Ntiri, Daphne W.; Stewart, Merry

    2010-01-01

    This article reviews the challenges encountered in the recruitment of urban older African-Americans in a study to explore the effects of interactive educational intervention on functional health literacy and diabetes knowledge. Our methods included identification of challenges related to the individual characteristics of seniors' centers that…

  6. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  7. 10 Years Later: Lessons Learned from an Academic Multidisciplinary Cosmetic Center.

    Science.gov (United States)

    Chen, Jenny T; Nayar, Harry S; Rao, Venkat K

    2017-09-01

    In 2006, a Centers for Medicare and Medicaid Services-accredited multidisciplinary academic ambulatory surgery center was established with the goal of delivering high-quality, efficient reconstructive, and cosmetic services in an academic setting. We review our decade-long experience since its establishment. Clinical and financial data from 2006 to 2016 are reviewed. All cosmetic procedures, including both minimally invasive and operative cases, are included. Data are compared to nationally published reports. Nearly 3,500 cosmetic surgeries and 10,000 minimally invasive procedures were performed. Compared with national averages, surgical volume in abdominoplasty is high, whereas rhinoplasty and breast augmentation is low. Regarding trend data, breast augmentation volume has decreased by 25%, whereas minimally invasive procedural volume continues to grow and is comparable with national reports. Similarly, where surgical revenue remains steady, minimally invasive revenue has increased significantly. The majority of surgical cases (70%) are reconstructive in nature and insurance-based. Payer mix is 71% private insurance, 18% Medicare and Medicaid, and 11% self-pay. Despite year-over-year revenue increases, net profit in 2015 was $6,120. Rent and anesthesia costs exceed national averages, and employee salary and wages are the highest expenditure. Although the creation of our academic cosmetic ambulatory surgery center has greatly increased the overall volume of cosmetic surgery performed at the University of Wisconsin, the majority of surgical volume and revenue is reconstructive. As is seen nationwide, minimally invasive cosmetic procedures represent our most rapidly expanding revenue stream.

  8. A Ticking Time Bomb: Counterterrorism Lessons From the U.S. Government’s Failure to Prevent the Fort Hood Attack

    Science.gov (United States)

    2011-02-03

    tested against the requirements imposed by the rapidly mounting complexity of national security problems." President Barack Obama himself...Committee (September 22, 2010); Michael Leiter, Director, National Counterterrorism Center, Statement before the Senate Homeland Securily and Governmental...particularly given the growing complexity and diversity of the homegrown terrorist threat. The challenges involve not just reforming or creating new

  9. Polychlorinated dioxins and furans from the World Trade Center attacks in exterior window films from lower Manhattan in New York City.

    Science.gov (United States)

    Rayne, Sierra; Ikonomou, Michael G; Butt, Craig M; Diamond, Miriam L; Truong, Jennifer

    2005-04-01

    Samples of ambient organic films deposited on exterior window surfaces from lower Manhattan and Brooklyn in New York City were collected six weeks after the terrorist attacks at the World Trade Center (WTC) on September 11, 2001 and analyzed for polychlorinated dibenzo-p-dioxins and dibenzofurans (PCDD/Fs). Total tetra- through octa-CDD/F concentrations in window films within 1 km of the WTC site in lower Manhattan ranged up to 630,000 pg/m2 (estimated as a mass concentration of ca. 1,300,000 pg/ g) and a maximum toxic equivalent (TEQ) concentration of 4700 TEQ/m2 (ca. 10 000 pg TEQ/g). Measurements at a background site 3.5 km away in Brooklyn showed lower concentrations at 130 pg TEQ/m2 (260 pg TEQ/g). Ambient gas-phase PCDD/F concentrations estimated for each site using an equilibrium partitioning model suggested concentrations ranging from ca. 2700 fg-TEQ/m3 near the WTC site to the more typical urban concentration of 20 fg-TEQ/m3 atthe Brooklyn site. Multivariate analyses of 2,3,7,8-substitued congeners and homologue group profiles suggested unique patterns in films near the WTC site compared to that observed at background sites in the study area and in other literature-derived combustion source profiles. Homologue profiles near the WTC site were dominated by tetra-, penta-, and Hexa-CDD/Fs, and 2,3,7,8-substituted profiles contained mostly octa- and hexachlorinated congeners. In comparison, profiles in Brooklyn and near mid-Manhattan exhibited congener and homologue patterns comprised mainly of hepta- and octa-CDDs, similar to that commonly reported in background air and soil.

  10. Longitudinal determinants of depression among World Trade Center Health Registry enrollees, 14-15 years after the 9/11 attacks.

    Science.gov (United States)

    Jacobson, Melanie H; Norman, Christina; Nguyen, Angela; Brackbill, Robert M

    2018-03-15

    Exposure to the September 11, 2001 (9/11) terrorist attacks has been found to be associated with posttraumatic stress disorder (PTSD) and comorbid PTSD and depression up to 10-11 years post-disaster. However, little is known about the longitudinal predictors of mental health conditions over time. We examined longitudinal determinants of depression within strata of PTSD among 21,258 enrollees of the World Trade Center Health Registry who completed four questionnaires over 14 years of follow-up (Wave 1 in 2003-04; Wave 2 in 2005-06; Wave 3 in 2011-12; and Wave 4 in 2015-16). PTSD status was measured using the PTSD checklist on all four waves and defined as a score of ≥ 44; depression was assessed using the 8-item Patient Health Questionnaire at Waves 3 and 4 and defined as a score of ≥ 10. Across Waves 3 and 4, 18.6% experienced depression, and it was more common among those who ever had PTSD (56.1%) compared with those who had not (5.6%). Across PTSD strata, predictors of depression included low income, unemployment, low social integration and support, post-9/11 traumatic life events, and chronic physical illness. These factors also decreased the likelihood of recovering from depression. Depression symptoms were not measured at Waves 1 and 2; data was self-reported. These findings highlight the substantial burden of depression in a trauma-exposed population 14-15 years post-disaster, especially among those with PTSD. Similar life stressors predicted the course of depression among those with and without PTSD which may inform public health and clinical interventions. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  11. Strategies for Addressing the Challenges of Patient-Centered Medical Home Implementation: Lessons from Oregon.

    Science.gov (United States)

    Gelmon, Sherril; Bouranis, Nicole; Sandberg, Billie; Petchel, Shauna

    2018-01-01

    Patient-centered medical homes (PCMHs) are at the forefront of the transformation of primary care as part of health systems reform. Despite robust literature describing implementation challenges, few studies describe strategies being used to overcome these challenges. This article addresses this gap through observations of exemplary PCMHs in Oregon, where the Oregon Health Authority supports and recognizes Patient-Centered Primary Care Homes (PCPCH). Twenty exemplary PCPCHs were selected using program scores, with considerations for diversity in clinic characteristics. Between 2015 and 2016, semistructured interviews and focus groups were completed with 85 key informants. Clinics reported similar challenges implementing the PCPCH model, including shifting patterns of care use, fidelity to the PCPCH model, and refining care processes. The following ten implementation strategies emerged: expanding access through care teams, preventing unnecessary emergency department visits through patient outreach, improved communication and referral tracking with outside providers, prioritization of selected program metrics, implementing patient-centered practices, developing continuous improvement capacity through committees and "champions," incorporating preventive services and chronic disease management, standardization of workflows, customizing electronic health records, and integration of mental health. Clinic leaders benefited from understanding the local context in which they were operating. Despite differences in size, ownership, geography, and population, all clinic leaders were observed to be proponents of strategies commonly associated with a "learning organization": systems thinking, personal mastery, mental models, shared vision, and team. Clinics can draw on their own characteristics, use state resources, and look to established PCMHs to build the evidence base for implementation in primary care. © Copyright 2018 by the American Board of Family Medicine.

  12. Indication and implementation of lipidapheresis, rheopheresis, or immunoadsorption (lessons learnt from Germany's largest apheresis center).

    Science.gov (United States)

    Heigl, Franz; Hettich, Reinhard; Lotz, Norbert; Reeg, Harduin; Eder, Bernadette; Steckholzer-Kroth, Karin; Browatzki, Michael; Harre, Kerstin; Arendt, Rainer

    2009-12-29

    Efficient modes of extracorporeal blood purification are available today for apheresis treatment of progressive atherosclerosis, autoimmune disease, or for improving hemorheology. Advanced technology and sophisticated care render apheresis treatment selective, safe and tolerable. Our task is to constantly update indications for apheresis based on best evidence available and good clinical practice, as well as, to determine how apheresis therapy can be made available to those in need or with otherwise refractory disease. Presenting examples of lipid apheresis, rheopheresis, or immunoadsorption for treatment of hypercholesterolemia, hyperlipoproteinemia (a), acute hearing loss, refractory or exacerbating multiple sclerosis, we highlight real world obstacles for implementation of treatment, resulting in still too many patients with proven or recommended indication left untreated. Based on the experience of the largest apheresis center in Germany, with more than 3,300 treatments per year, we depict the necessary structure for identification of patients, defining indication, referral, implementation of therapy, and reimbursement. Apheresis is unfamiliar to most patients and many practitioners or consultants. Nephrologists, performing >90% of apheresis treatments in Germany, have to form a network for referral comprising all regional care-givers, general practitioners as well as the respective specialists (mainly, cardiologists, endocrinologists, diabetologists, ORL specialists, neurologists, ophthalmologists, or rheumatologists), and insurances or other cost-bearing parties for offering a scientifically approved therapeutic regimen and comprehensive care. We have realized this concept in a high volume apheresis center acting in a closely knit network characterized by an unrelenting effort at ongoing medical education. As a consequence, we include approximately 10 times more patients with appropriate diagnoses in our apheresis program as compared to the national average

  13. The academic health center in complex humanitarian emergencies: lessons learned from the 2010 Haiti earthquake.

    Science.gov (United States)

    Babcock, Christine; Theodosis, Christian; Bills, Corey; Kim, Jimin; Kinet, Melodie; Turner, Madeleine; Millis, Michael; Olopade, Olufunmilayo; Olopade, Christopher

    2012-11-01

    On January 12, 2010, a 7.0-magnitude earthquake struck Haiti. The event disrupted infrastructure and was marked by extreme morbidity and mortality. The global response to the disaster was rapid and immense, comprising multiple actors-including academic health centers (AHCs)-that provided assistance in the field and from home. The authors retrospectively examine the multidisciplinary approach that the University of Chicago Medicine (UCM) applied to postearthquake Haiti, which included the application of institutional structure and strategy, systematic deployment of teams tailored to evolving needs, and the actual response and recovery. The university mobilized significant human and material resources for deployment within 48 hours and sustained the effort for over four months. In partnership with international and local nongovernmental organizations as well as other AHCs, the UCM operated one of the largest and more efficient acute field hospitals in the country. The UCM's efforts in postearthquake Haiti provide insight into the role AHCs can play, including their strengths and limitations, in complex disasters. AHCs can provide necessary intellectual and material resources as well as technical expertise, but the cost and speed required for responding to an emergency, and ongoing domestic responsibilities, may limit the response of a large university and hospital system. The authors describe the strong institutional backing, the detailed predeployment planning and logistical support UCM provided, the engagement of faculty and staff who had previous experience in complex humanitarian emergencies, and the help of volunteers fluent in the local language which, together, made UCM's mission in postearthquake Haiti successful.

  14. Lessons learned obtaining informed consent in research with vulnerable populations in community health center settings

    Directory of Open Access Journals (Sweden)

    Riden Heather E

    2012-11-01

    Full Text Available Abstract Background To improve equity in access to medical research, successful strategies are needed to recruit diverse populations. Here, we examine experiences of community health center (CHC staff who guided an informed consent process to overcome recruitment barriers in a medical record review study. Methods We conducted ten semi-structured interviews with CHC staff members. Interviews were audiotaped, transcribed, and structurally and thematically coded. We used NVivo, an ethnographic data management software program, to analyze themes related to recruitment challenges. Results CHC interviewees reported that a key challenge to recruitment included the difficult balance between institutional review board (IRB requirements for informed consent, and conveying an appropriate level of risk to patients. CHC staff perceived that the requirements of IRB certification itself posed a barrier to allowing diverse staff to participate in recruitment efforts. A key barrier to recruitment also included the lack of updated contact information on CHC patients. CHC interviewees reported that the successes they experienced reflected an alignment between study aims and CHC goals, and trusted relationships between CHCs and staff and the patients they recruited. Conclusions Making IRB training more accessible to CHC-based staff, improving consent form clarity for participants, and developing processes for routinely updating patient information would greatly lower recruitment barriers for diverse populations in health services research.

  15. Lessons learned from a pharmacy practice model change at an academic medical center.

    Science.gov (United States)

    Knoer, Scott J; Pastor, John D; Phelps, Pamela K

    2010-11-01

    The development and implementation of a new pharmacy practice model at an academic medical center are described. Before the model change, decentralized pharmacists responsible for order entry and verification and clinical specialists were both present on the care units. Staff pharmacists were responsible for medication distribution and sterile product preparation. The decentralized pharmacists handling orders were not able to use their clinical training, the practice model was inefficient, and few clinical services were available during evenings and weekends. A task force representing all pharmacy department roles developed a process and guiding principles for the model change, collected data, and decided on a model. Teams consisting of decentralized pharmacists, decentralized pharmacy technicians, and team leaders now work together to meet patients' pharmacy needs and further departmental safety, quality, and cost-saving goals. Decentralized service hours have been expanded through operational efficiencies, including use of automation (e.g., computerized provider order entry, wireless computers on wheels used during rounds with physician teams). Nine clinical specialist positions were replaced by five team leader positions and four pharmacists functioning in decentralized roles. Additional staff pharmacist positions were shifted into decentralized roles, and the hospital was divided into areas served by teams including five to eight pharmacists. Technicians are directly responsible for medication distribution. No individual's job was eliminated. The new practice model allowed better alignment of staff with departmental goals, expanded pharmacy hours and services, more efficient medication distribution, improved employee engagement, and a staff succession plan.

  16. Reductions in Circulating Endocannabinoid Levels in Individuals with Post-Traumatic Stress Disorder Following Exposure to the World Trade Center Attacks

    Science.gov (United States)

    Hill, Matthew N.; Bierer, Linda M.; Makotkine, Iouri; Golier, Julia A.; Galea, Sandro; McEwen, Bruce S.; Hillard, Cecilia J.; Yehuda, Rachel

    2013-01-01

    Endocannabinoid (eCB) signaling has been identified as a modulator of adaptation to stress, and is integral to basal and stress-induced glucocorticoid regulation. Furthermore, interactions between eCBs and glucocorticoids have been shown to be necessary for the regulation of emotional memories, suggesting that eCB function may relate to the development of post-traumatic stress disorder (PTSD). To examine this, plasma eCBs were measured in a sample (n=46) drawn from a population-based cohort selected for physical proximity to the World Trade Center (WTC) at the time of the 9/11 attacks. Participants received a structured diagnostic interview and were grouped according to whether they met diagnostic criteria for PTSD (no PTSD, n=22; lifetime diagnosis of PTSD = 24). eCB content (2-arachidonoylglycerol (2-AG) and anandamide (AEA)) and cortisol were measured from 8 a.m. plasma samples. Circulating 2-AG content was significantly reduced among individuals meeting diagnostic criteria for PTSD. The effect of reduced 2-AG content in PTSD remained significant after controlling for the stress of exposure to the WTC collapse, gender, depression and alcohol abuse. There were no significant group differences for AEA or cortisol levels; however, across the whole sample AEA levels positively correlated with circulating cortisol, and AEA levels exhibited a negative relationship with the degree of intrusive symptoms within the PTSD sample. This report shows that PTSD is associated with a reduction in circulating levels of the eCB 2-AG. Given the role of 2-AG in the regulation of the stress response, these data support the hypothesis that deficient eCB signaling may be a component of the glucocorticoid dysregulation associated with PTSD. The negative association between AEA levels and intrusive symptoms is consistent with animal data indicating that reductions in AEA promote retention of aversive emotional memories. Future work will aim to replicate these findings and extend their

  17. Integrating Patient-Reported Outcomes into Spine Surgical Care through Visual Dashboards: Lessons Learned from Human-Centered Design.

    Science.gov (United States)

    Hartzler, Andrea L; Chaudhuri, Shomir; Fey, Brett C; Flum, David R; Lavallee, Danielle

    2015-01-01

    The collection of patient-reported outcomes (PROs) draws attention to issues of importance to patients-physical function and quality of life. The integration of PRO data into clinical decisions and discussions with patients requires thoughtful design of user-friendly interfaces that consider user experience and present data in personalized ways to enhance patient care. Whereas most prior work on PROs focuses on capturing data from patients, little research details how to design effective user interfaces that facilitate use of this data in clinical practice. We share lessons learned from engaging health care professionals to inform design of visual dashboards, an emerging type of health information technology (HIT). We employed human-centered design (HCD) methods to create visual displays of PROs to support patient care and quality improvement. HCD aims to optimize the design of interactive systems through iterative input from representative users who are likely to use the system in the future. Through three major steps, we engaged health care professionals in targeted, iterative design activities to inform the development of a PRO Dashboard that visually displays patient-reported pain and disability outcomes following spine surgery. Design activities to engage health care administrators, providers, and staff guided our work from design concept to specifications for dashboard implementation. Stakeholder feedback from these health care professionals shaped user interface design features, including predefined overviews that illustrate at-a-glance trends and quarterly snapshots, granular data filters that enable users to dive into detailed PRO analytics, and user-defined views to share and reuse. Feedback also revealed important considerations for quality indicators and privacy-preserving sharing and use of PROs. Our work illustrates a range of engagement methods guided by human-centered principles and design recommendations for optimizing PRO Dashboards for patient

  18. Integrating Patient-Reported Outcomes into Spine Surgical Care through Visual Dashboards: Lessons Learned from Human-Centered Design

    Science.gov (United States)

    Hartzler, Andrea L.; Chaudhuri, Shomir; Fey, Brett C.; Flum, David R.; Lavallee, Danielle

    2015-01-01

    Introduction: The collection of patient-reported outcomes (PROs) draws attention to issues of importance to patients—physical function and quality of life. The integration of PRO data into clinical decisions and discussions with patients requires thoughtful design of user-friendly interfaces that consider user experience and present data in personalized ways to enhance patient care. Whereas most prior work on PROs focuses on capturing data from patients, little research details how to design effective user interfaces that facilitate use of this data in clinical practice. We share lessons learned from engaging health care professionals to inform design of visual dashboards, an emerging type of health information technology (HIT). Methods: We employed human-centered design (HCD) methods to create visual displays of PROs to support patient care and quality improvement. HCD aims to optimize the design of interactive systems through iterative input from representative users who are likely to use the system in the future. Through three major steps, we engaged health care professionals in targeted, iterative design activities to inform the development of a PRO Dashboard that visually displays patient-reported pain and disability outcomes following spine surgery. Findings: Design activities to engage health care administrators, providers, and staff guided our work from design concept to specifications for dashboard implementation. Stakeholder feedback from these health care professionals shaped user interface design features, including predefined overviews that illustrate at-a-glance trends and quarterly snapshots, granular data filters that enable users to dive into detailed PRO analytics, and user-defined views to share and reuse. Feedback also revealed important considerations for quality indicators and privacy-preserving sharing and use of PROs. Conclusion: Our work illustrates a range of engagement methods guided by human-centered principles and design

  19. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  20. Not so close but still extremely loud: recollection of the World Trade Center terror attack and previous hurricanes moderates the association between exposure to hurricane Sandy and posttraumatic stress symptoms.

    Science.gov (United States)

    Palgi, Yuval; Shrira, Amit; Hamama-Raz, Yaira; Palgi, Sharon; Goodwin, Robin; Ben-Ezra, Menachem

    2014-05-01

    The present study examined whether recollections of the World Trade Center (WTC) terror attack and previous hurricanes moderated the relationship between exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1000 participants from affected areas completed self-report questionnaires a month after Hurricane Sandy hit the East Coast of the United States. Participants reported their exposure to Hurricane Sandy, their PTSD symptoms, and recollections of the WTC terror attack and previous hurricanes elicited due to Hurricane Sandy. Exposure to Hurricane Sandy was related to PTSD symptoms among those with high level of recollections of the WTC terror attack and past hurricanes, but not among those with low level of recollections. The aftermath of exposure to Hurricane Sandy is related not only to exposure, but also to its interaction with recollections of past traumas. These findings have theoretical and practical implications for practitioners and health policy makers in evaluating and interpreting the impact of past memories on future natural disasters. This may help in intervention plans of social and psychological services. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Terrorist attacks in the largest metropolitan city of Pakistan: Profile of soft tissue and skeletal injuries from a single trauma center.

    Science.gov (United States)

    Khan, Muhammad Shahid; Waheed, Shahan; Ali, Arif; Mumtaz, Narjis; Feroze, Asher; Noordin, Shahryar

    2015-01-01

    Pakistan has been hugely struck with massive bomb explosions (car and suicide bombs) resulting in multiple casualties in the past few years. The aim of this study is to present the patterns of skeletal and soft tissue injuries and to review the outcome of the victims who presented to our hospital. This is a retrospective chart review from January 2008 to December 2012. The medical record numbers of patients were obtained from the hospital Health Information and Management Sciences (HIMS) as per the ICD-9 coding. During the study period, more than 100 suicide and implanted bomb blast attacks took place in the public proceedings, government offices, residential areas and other places of the city. Altogether 262 patients were enrolled in the study. The mean age of the patients was 31±14 years. The shrapnel inflicted wounds were present on to the upper limb in 24 patients and the lower limb in 50. Long bone fractures were the most common skeletal injuries. The fractures were complicated by penetrating fragments and nails which result in post operative infections and prolonged hospital stay.

  2. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    Science.gov (United States)

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  3. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  4. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  5. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  6. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Innovation in patient-centered care: lessons from a qualitative study of innovative health care organizations in Washington State

    Directory of Open Access Journals (Sweden)

    Reed Peter

    2012-12-01

    Full Text Available Abstract Background Growing interest in the promise of patient-centered care has led to numerous health care innovations, including the patient-centered medical home, shared decision-making, and payment reforms. How best to vet and adopt innovations is an open question. Washington State has been a leader in health care reform and is a rich laboratory for patient-centered innovations. We sought to understand the process of patient-centered care innovation undertaken by innovative health care organizations – from strategic planning to goal selection to implementation to maintenance. Methods We conducted key-informant interviews with executives at five health plans, five provider organizations, and ten primary care clinics in Washington State. At least two readers of each interview transcript identified themes inductively; final themes were determined by consensus. Results Innovation in patient-centered care was a strategic objective chosen by nearly every organization in this study. However, other goals were paramount: cost containment, quality improvement, and organization survival. Organizations commonly perceived effective chronic disease management and integrated health information technology as key elements for successful patient-centered care innovation. Inertia, resource deficits, fee-for-service payment, and regulatory limits on scope of practice were cited as barriers to innovation, while organization leadership, human capital, and adaptive culture facilitated innovation. Conclusions Patient-centered care innovations reflected organizational perspectives: health plans emphasized cost-effectiveness while providers emphasized health care delivery processes. Health plans and providers shared many objectives, yet the two rarely collaborated to achieve them. The process of innovation is heavily dependent on organizational culture and leadership. Policymakers can improve the pace and quality of patient-centered innovation by setting targets

  9. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  10. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  12. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  13. Lessons Learned from the Creation of a Center of Excellence in Low Vision and Vision Rehabilitation in Wenzhou, China

    Science.gov (United States)

    Marinoff, Rebecca; Heilberger, Michael H.

    2017-01-01

    A model Center of Excellence in Low Vision and Vision Rehabilitation was created in a health care setting in China utilizing an inter-institutional relationship with a United States optometric institution. Accomplishments of, limitations to, and stimuli to the provision of low vision and vision rehabilitation services are shared.

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  16. Using Medicaid and CHIP claims data to support pediatric quality measurement: lessons from 3 centers of excellence in measure development.

    Science.gov (United States)

    Gidengil, Courtney; Mangione-Smith, Rita; Bailey, L Charles; Cawthon, Mary Lawrence; McGlynn, Elizabeth A; Nakamura, Mari M; Schiff, Jeffrey; Schuster, Mark A; Schneider, Eric C

    2014-01-01

    We sought to explore the claims data-related issues relevant to quality measure development for Medicaid and the Children's Health Insurance Program (CHIP), illustrating the challenges encountered and solutions developed around 3 distinct performance measure topics: care coordination for children with complex needs, quality of care for high-prevalence conditions, and hospital readmissions. Each of 3 centers of excellence presents an example that illustrates the challenges of using claims data for quality measurement. Our Centers of Excellence in pediatric quality measurement used innovative methods to develop algorithms that use Medicaid claims data to identify children with complex needs; overcome some shortcomings of existing data for measuring quality of care for common conditions such as otitis media; and identify readmissions after hospitalizations for lower respiratory infections. Our experience constructing quality measure specifications using claims data suggests that it will be challenging to measure key quality of care constructs for Medicaid-insured children at a national level in a timely and consistent way. Without better data to underpin pediatric quality measurement, Medicaid and CHIP will have difficulty using some existing measures for accountability, value-based purchasing, and quality improvement both across states and within states. Copyright © 2014 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  17. Engaging partners to initiate evaluation efforts: tactics used and lessons learned from the prevention research centers program.

    Science.gov (United States)

    Wright, Demia Sundra; Anderson, Lynda A; Brownson, Ross C; Gwaltney, Margaret K; Scherer, Jennifer; Cross, Alan W; Goodman, Robert M; Schwartz, Randy; Sims, Tom; White, Carol R

    2008-01-01

    The Centers for Disease Control and Prevention's (CDC's) Prevention Research Centers (PRC) Program underwent a 2-year evaluation planning project using a participatory process that allowed perspectives from the national community of PRC partners to be expressed and reflected in a national logic model. The PRC Program recognized the challenge in developing a feasible, useable, and relevant evaluation process for a large, diverse program. To address the challenge, participatory and utilization-focused evaluation models were used. Four tactics guided the evaluation planning process: 1) assessing stakeholders' communication needs and existing communication mechanisms and infrastructure; 2) using existing mechanisms and establishing others as needed to inform, educate, and request feedback; 3) listening to and using feedback received; and 4) obtaining adequate resources and building flexibility into the project plan to support multifaceted mechanisms for data collection. Participatory methods resulted in buy-in from stakeholders and the development of a national logic model. Benefits included CDC's use of the logic model for program planning and development of a national evaluation protocol and increased expectations among PRC partners for involvement. Challenges included the time, effort, and investment of program resources required for the participatory approach and the identification of whom to engage and when to engage them for feedback on project decisions. By using a participatory and utilization-focused model, program partners positively influenced how CDC developed an evaluation plan. The tactics we used can guide the involvement of program stakeholders and help with decisions on appropriate methods and approaches for engaging partners.

  18. Ensuring the success of women faculty at AMCs: lessons learned from the National Centers of Excellence in Women's Health.

    Science.gov (United States)

    Morahan, P S; Voytko, M L; Abbuhl, S; Means, L J; Wara, D W; Thorson, J; Cotsonas, C E

    2001-01-01

    Since the early 1970s, the numbers of women entering medical school and, subsequently, academic medicine have increased substantially. However, women faculty have not advanced at the expected rate to senior academic ranks or positions of leadership. In 1996, to counter this trend, the U.S. Department of Health and Human Services (DHHS) Office on Women's Health included women's leadership as a required component of the nationally funded Centers of Excellence in Women's Health to identify effective strategies and initiate model programs to advance women faculty in academic medicine. The authors describe the experience of Centers at seven U.S. medical schools in initiating and sustaining leadership programs for women. The processes used for program formation, the current programmatic content, and program evaluation approaches are explained. Areas of success (e.g., obtaining support from the institution's leaders) and difficulties faced in maintaining an established program (such as institutional fiscal constraints and the diminishing time available to women to participate in mentoring and leadership activities) are reviewed. Strategies to overcome these and other difficulties (e.g., prioritize and tightly focus the program with the help of an advisory group) are proposed. The authors conclude by reviewing issues that programs for women in academic medicine will increasingly need to focus on (e.g., development of new kinds of skills; issues of recruitment and retention of faculty; and increasing faculty diversity).

  19. The ConocoPhillips Center for a Sustainable WE2ST (Water-Energy Education, Science, and Technology): Lessons Learned from an Innovative Research-Education-Outreach Center at Colorado School of Mines

    Science.gov (United States)

    Hogue, T. S.; Blaine, A. C.; Martin, A. C.

    2016-12-01

    , engaging in K-12 classroom activities and events, and by using websites and social media to share information. This presentation will highlight the successes and lessons learned as we enter the third year of this innovative model for a University Center.

  20. Electronic health records and technical assistance to improve quality of primary care: Lessons for regional extension centers.

    Science.gov (United States)

    Boas, Samuel J; Bishop, Tara F; Ryan, Andrew M; Shih, Sarah C; Casalino, Lawrence P

    2014-07-01

    In 2009, the American Recovery and Reinvestment Act apportioned $643 million for a Health Information Technology Extension Program, which established Regional Extension Centers (RECs) to support the implementation and use of electronic health records (EHRs). Little is known, however, about how RECs should assist in EHR implementation and how they should structure ongoing support. The purpose of this paper is to describe physicians' experiences with the Primary Care Information Project (PCIP), an REC run by the New York City Department of Health and Mental Hygiene. We interviewed 17 physicians enrolled in PCIP to understand the role of the EHRon quality of care and their experience with technical assistance from PCIP. All physicians stated that they felt that the EHR improved the quality of care they delivered to their patients particularly because it helped them track patients. All the physicians found technical assistance helpful but most wanted ongoing assistance months or years after they adopted the EHR. © 2013 Published by Elsevier Inc.

  1. Improving Mathematics Teaching as Deliberate Practice through Chinese Lesson Study

    Science.gov (United States)

    Huang, Rongjin; Prince, Kyle M.; Barlow, Angela T.

    2017-01-01

    This study examined how a ninth grade teacher improved an Algebra I lesson through a lesson study approach. We used multiple data sources to investigate the improvement of the lesson towards student-centered mathematics instruction, perceived benefits of the teacher, and factors associated with the improvement of teaching. The lesson group…

  2. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  3. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  4. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  5. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  6. Lessons from a large trauma center: impact of blunt chest trauma in polytrauma patients-still a relevant problem?

    Science.gov (United States)

    Chrysou, Konstantina; Halat, Gabriel; Hoksch, Beatrix; Schmid, Ralph A; Kocher, Gregor J

    2017-04-20

    Thoracic trauma is the third most common cause of death after abdominal injury and head trauma in polytrauma patients. The purpose of this study was to investigate epidemiological data, treatment and outcome of polytrauma patients with blunt chest trauma in order to help improve management, prevent complications and decrease polytrauma patients' mortality. In this retrospective study we included all polytrauma patients with blunt chest trauma admitted to our tertiary care center emergency department for a 2-year period, from June 2012 until May 2014. Data collection included details of treatment and outcome. Patients with chest trauma and Injury Severity Score (ISS) ≥18 and Abbreviated Injury Scale (AIS) >2 in more than one body region were included. A total of 110 polytrauma patients with blunt chest injury were evaluated. 82 of them were males and median age was 48.5 years. Car accidents, falls from a height and motorbike accidents were the most common causes (>75%) for blunt chest trauma. Rib fractures, pneumothorax and pulmonary contusion were the most common chest injuries. Most patients (64.5%) sustained a serious chest injury (AIS thorax 3), 19.1% a severe chest injury (AIS thorax 4) and 15.5% a moderate chest injury (AIS thorax 2). 90% of patients with blunt chest trauma were treated conservatively. Chest tube insertion was indicated in 54.5% of patients. The need for chest tube was significantly higher among the AIS thorax 4 group in comparison to the AIS groups 3 and 2 (p < 0.001). Also, admission to the ICU was directly related to the severity of the AIS thorax (p < 0.001). The severity of chest trauma did not correlate with ICU length of stay, intubation days, complications or mortality. Although 84.5% of patients suffered from serious or even severe chest injury, neither in the conservative nor in the surgically treated group a significant impact of injury severity on ICU stay, intubation days, complications or mortality was observed. AIS

  7. A personalized mobile patient guide system for a patient-centered smart hospital: Lessons learned from a usability test and satisfaction survey in a tertiary university hospital.

    Science.gov (United States)

    Yoo, Sooyoung; Jung, Se Young; Kim, Seok; Kim, Eunhye; Lee, Kee-Hyuck; Chung, Eunja; Hwang, Hee

    2016-07-01

    The present study focused on the design, implementation, and evaluation of a personalized mobile patient guide system that utilizes smart phones, indoor navigation technology and a hospital information system (HIS) to address the difficulties that outpatients face in finding hospital facilities, recognizing their daily treatment schedule, and accessing personalized medical and administrative information. The present study was conducted in a fully digitized tertiary university hospital in South Korea. We developed a real-time location-based outpatient guide system that consists of Bluetooth access points (APs) for indoor navigation, an Android-based guide application, a guide server, and interfaces with the HIS. A total of 33 subjects and 43 outpatients participated in the usability test (UT) and the satisfaction survey, respectively. We confirmed that the indoor navigation feature can be applied to outpatient departments with precision using a position error test. The participants in the UT completed each scenario with an average success rate of 67.4%. According to the results, we addressed the problems and made improvements to the user interface by providing users with context-based guidance information. The satisfaction rating of the system was high, with an average score of 4.0 out of 5.0, showing its utility as a patient-centered hospital service. The innovative mobile patient guide system for outpatients is feasible and can be successfully implemented to provide personalized information with high satisfaction. Additionally, the issues identified and lessons learned from our experiences regarding task scheduling, indoor navigation, and usability should be considered when developing the system. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  8. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  9. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  10. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  11. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  12. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  13. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  14. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  15. Risk Communication Strategies: Lessons Learned from Previous Disasters with a Focus on the Fukushima Radiation Accident.

    Science.gov (United States)

    Svendsen, Erik R; Yamaguchi, Ichiro; Tsuda, Toshihide; Guimaraes, Jean Remy Davee; Tondel, Martin

    2016-12-01

    It has been difficult to both mitigate the health consequences and effectively provide health risk information to the public affected by the Fukushima radiological disaster. Often, there are contrasting public health ethics within these activities which complicate risk communication. Although no risk communication strategy is perfect in such disasters, the ethical principles of risk communication provide good practical guidance. These discussions will be made in the context of similar lessons learned after radiation exposures in Goiania, Brazil, in 1987; the Chernobyl nuclear power plant accident, Ukraine, in 1986; and the attack at the World Trade Center, New York, USA, in 2001. Neither of the two strategies is perfect nor fatally flawed. Yet, this discussion and lessons from prior events should assist decision makers with navigating difficult risk communication strategies in similar environmental health disasters.

  16. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  17. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  18. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  19. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  20. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  1. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  2. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  4. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  5. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  6. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  7. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  8. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  9. Laser Tracker Utilization Methodology in Measuring Truth Trajectories for INS Testing on 6 Degree of Freedom Table at the Marshall Space Flight Center's Contact Dynamics Simulation Laboratory with Lessons Learned

    Science.gov (United States)

    Leggett, Jared O.; Bryant, Thomas C.; Cowen, Charles T.; Clifton, Billy W.

    2018-01-01

    When performing Inertial Navigation System (INS) testing at the Marshall Space Flight Center's (MSFC) Contact Dynamics Simulation Laboratory (CDSL) early in 2017, a Leica Geosystems AT901 Laser Tracker system (LLT) measured the twist & sway trajectories as generated by the 6 Degree Of Freedom (6DOF) Table in the CDSL. These LLT measured trajectories were used in the INS software model validation effort. Several challenges were identified and overcome during the preparation for the INS testing, as well as numerous lessons learned. These challenges included determining the position and attitude of the LLT with respect to an INS-shared coordinate frame using surveyed monument locations in the CDSL and the accompanying mathematical transformation, accurately measuring the spatial relationship between the INS and a 6DOF tracking probe due to lack of INS visibility from the LLT location, obtaining the data from the LLT during a test, determining how to process the results for comparison with INS data in time and frequency domains, and using a sensitivity analysis of the results to verify the quality of the results. While many of these challenges were identified and overcome before or during testing, a significant lesson on test set-up was not learned until later in the data analysis process. It was found that a combination of trajectory-dependent gimbal locking and environmental noise introduced non-negligible noise in the angular measurements of the LLT that spanned the evaluated frequency spectrum. The lessons learned in this experiment may be useful for others performing INS testing in similar testing facilities.

  10. The lessons drawn from accident simulation, consequences for the operation of the Crisis Technical Center of the Nuclear Safety and Protection Institut

    International Nuclear Information System (INIS)

    Manesse, D.; Ney, J.; Crabol, B.; Ginot, P.

    1989-07-01

    The aim of the work is to summarize the lessons drawn from planning and performing the nuclear accident simulation exercises. The analysis is focused on the simulation and foresight of the radiation effects. The simulation exercises allowed a progressive improvement of the technical survey organization, leading to an improvement of its availability to the authorities. The subjects which need to be taken into account are those related to the intervention actions, in order to obtain realistic situations, the actions related to public organizations, people and communication networks [fr

  11. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  12. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  13. Placing Human Behavior at the Center of the Fight to Eradicate Polio: Lessons Learned and Their Application to Other Life-Saving Interventions.

    Science.gov (United States)

    Guirguis, Sherine; Obregon, Rafael; Coleman, Michael; Hickler, Benjamin; SteelFisher, Gillian

    2017-07-01

    Today, acceptance of oral polio vaccine is the highest ever. Reaching this level of acceptance has depended on decades of engaging with communities, building trust amid extraordinary social contexts, and responding to the complex variables that trigger behavioral and social change. Drawing on both the successes and setbacks in the 28 years of the Global Polio Eradication Initiative (GPEI), this article articulates what happened when the GPEI began to pay more attention to the dynamics of human and social behavior change. Three particular lessons for other health and immunization programs can be drawn from the experience of GPEI: change begins from within (ie, success needs institutional recognition of the importance of human behavior), good data are not enough for good decision-making, and health workers are important agents of behavior change. These lessons should be harnessed and put into practice to build demand and trust for the last stages of polio eradication, as well as for other life-saving health interventions. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  14. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  15. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  16. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  17. Evolving progress in oncologic and operative outcomes for esophageal and junctional cancer: lessons from the experience of a high-volume center.

    LENUS (Irish Health Repository)

    Reynolds, John V

    2012-05-01

    Modern series from high-volume esophageal centers report an approximate 40% 5-year survival in patients treated with curative intent and postoperative mortality rates of less than 4%. An objective analysis of factors that underpin current benchmarks within high-volume centers has not been performed.

  18. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. USA under attack?!?

    DEFF Research Database (Denmark)

    Hansen, Tia

    2005-01-01

    Argumenterer for, at blitzerindringer for offentlige begivenheder bør forstås som en særlig variant af kollektiv hukommelse. Med udgangspunkt i spørgeskemadata indsamlet fra 129 danskere dagen efter angrebet på World Trade Center d. 11. september 2001 diskuteres dels det indtryk, denne begivenhed...

  20. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  1. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  2. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  3. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  4. A retrospective analysis of practice patterns in the management of acute asthma attack across Turkey.

    Science.gov (United States)

    Türktaş, Haluk; Bavbek, Sevim; Misirligil, Zeynep; Gemicioğlu, Bilun; Mungan, Dilşad

    2010-12-01

    To evaluate patient characteristics and practice patterns in the management of acute asthma attack at tertiary care centers across Turkey. A total of 294 patients (mean age: 50.4 ± 15.1 years; females: 80.3%) diagnosed with persistent asthma were included in this retrospective study upon their admission to the hospital with an acute asthma attack. Patient demographics, asthma control level, asthma attack severity and the management of the attack were evaluated. There was no influence of gender on asthma control and attack severity. In 57.5% of the patients, asthma attack was moderate. Most patients (78.9%) were hospitalized with longer duration evident in the severe attack. Spirometry and chest X-Ray were the most frequent tests (85.4%), while steroids (72.0% parenteral; 29.0% oral) and short-acting beta-agonists (SABA) + anticholinergics (45.5%) were the main drugs of choice in the attack management. Attack severity and pre-attack asthma control level was significantly correlated (p attack asthma was uncontrolled in 42.6% of the patients with severe attack. Most of the patients were on combination of more than one (two in 38.7% and 3-4 in 31.2%) controller drugs before the attack. Providing country specific data on practice patterns in the management of acute asthma attack in a representative cohort in Turkey, prescription of steroids and SABA + anticholinergics as the main drugs of choice was in line with guidelines while the significant relation of pre-attack asthma control to risk/severity of asthma attack and rate/duration of hospitalization seem to be the leading results of the present study. Copyright © 2010 Elsevier Ltd. All rights reserved.

  5. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  7. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  8. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  9. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  10. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  11. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  12. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  13. Forensic Archaeological Recovery of a Large-Scale Mass Disaster Scene: Lessons Learned from Two Complex Recovery Operations at the World Trade Center Site.

    Science.gov (United States)

    Warnasch, Scott C

    2016-05-01

    In 2006, unexpected discoveries of buried World Trade Center (WTC) debris and human remains were made at the World Trade Center mass disaster site. New York City's Office of Chief Medical Examiner (OCME) was given the task of systematically searching the site for any remaining victims' remains. The subsequent OCME assessment and archaeological excavation conducted from 2006 until 2013, resulted in the recovery of over 1,900 victims' remains. In addition, this operation demonstrated the essential skills archaeologists can provide in a mass disaster recovery operation. The OCME excavation data illustrates some of the challenges encountered during the original recovery effort of 2001/2002. It suggests that when understood within the larger site recovery context, certain fundamental components of the original recovery effort, such as operational priorities and activities in effect during the original recovery, directly or indirectly resulted in unsearched deposits that contained human remains. © 2016 American Academy of Forensic Sciences.

  14. The Date That Lives in Infamy: Pearl Harbor Lesson Plans.

    Science.gov (United States)

    Department of the Navy, Washington, DC.

    This lesson plan can help teachers and students understand what happened on December 7, 1941, beginning with the first U.S. treaty with Japan in 1854 through the attacks in 1941. Students use primary sources to synthesize information and draw conclusions about the role of the U.S. Navy in foreign policy and to understand how people in 1941 reacted…

  15. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  16. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  17. Flight and full-scale wind-tunnel comparison of pressure distributions from an F-18 aircraft at high angles of attack. [Conducted in NASA Ames Research Center's 80 by 120 ft wind tunnel

    Science.gov (United States)

    Fisher, David F.; Lanser, Wendy R.

    1994-01-01

    Pressure distributions were obtained at nearly identical fuselage stations and wing chord butt lines in flight on the F-18 HARV at NASA Dryden Flight Research Center and in the NASA Ames Research Center's 80 by 120 ft wind tunnel on a full-scale F/A-18 aircraft. The static pressures were measured at the identical five stations on the forebody, three stations on the left and right leading-edge extensions, and three spanwise stations on the wing. Comparisons of the flight and wind-tunnel pressure distributions were made at alpha = 30 deg, 45 deg, and 60 deg/59 deg. In general, very good agreement was found. Minor differences were noted at the forebody at alpha = 45 deg and 60 deg in the magnitude of the vortex footprints and a Mach number effect was noted at the leading-edge extension at alpha = 30 deg. The inboard leading edge flap data from the wind tunnel at alpha = 59 deg showed a suction peak that did not appear in the flight data. This was the result of a vortex from the corner of the leading edge flap whose path was altered by the lack of an engine simulation in the wind tunnel.

  18. Lessons Learned from Delayed Versus Immediate Microsurgical Reconstruction of Complex Maxillectomy and Midfacial Defects: Experience in a Tertiary Center in Mexico.

    Science.gov (United States)

    Santamaria, Eric; de la Concha, Erika

    2016-10-01

    Microsurgical reconstruction of complex midfacial and maxillectomy defects is among the most challenging procedures in plastic surgery, and it often requires composite flaps to improve functional and aesthetic results. Various factors have been identified as having influence in the outcome of microsurgical reconstruction. In this article, the authors present their experience with immediate and delayed reconstruction of complex maxillectomy defects in a tertiary center in Mexico. The authors present a total of 37 patients with microsurgical reconstruction of a complex maxillectomy defect; 13 patients had immediate and 24 had delayed reconstructions. The authors recommend doing immediate reconstruction when feasible. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Studying Acute Coronary Syndrome Through the World Wide Web: Experiences and Lessons.

    Science.gov (United States)

    Alonzo, Angelo A

    2017-10-13

    This study details my viewpoint on the experiences, lessons, and assessments of conducting a national study on care-seeking behavior for heart attack in the United States utilizing the World Wide Web. The Yale Heart Study (YHS) was funded by the National Heart, Lung, and Blood Institute (NHLBI) of the National Institutes of Health (NIH). Grounded on two prior studies, the YHS combined a Web-based interview survey instrument; ads placed on the Internet; flyers and posters in public libraries, senior centers, and rehabilitation centers; information on chat rooms; a viral marketing strategy; and print ads to attract potential participants to share their heart attack experiences. Along the way, the grant was transferred from Ohio State University (OSU) to Yale University, and significant administrative, information technology, and personnel challenges ensued that materially delayed the study's execution. Overall, the use of the Internet to collect data on care-seeking behavior is very time consuming and emergent. The cost of using the Web was approximately 31% less expensive than that of face-to-face interviews. However, the quality of the data may have suffered because of the absence of some data compared with interviewing participants. Yet the representativeness of the 1154 usable surveys appears good, with the exception of a dearth of African American participants. ©Angelo A Alonzo. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 13.10.2017.

  20. Blueprint for Sustainable Change in Diversity Management and Cultural Competence: Lessons From the National Center for Healthcare Leadership Diversity Demonstration Project.

    Science.gov (United States)

    Dreachslin, Janice L; Weech-Maldonado, Robert; Gail, Judith; Epané, Josué Patien; Wainio, Joyce Anne

    How can healthcare leaders build a sustainable infrastructure to leverage workforce diversity and deliver culturally and linguistically appropriate care to patients? To answer that question, two health systems participated in the National Center for Healthcare Leadership's diversity leadership demonstration project, November 2008 to December 2013. Each system provided one intervention hospital and one control hospital.The control hospital in each system participated in pre- and postassessments but received no preassessment feedback and no intervention support. Each intervention hospital's C-suite leadership and demonstration project manager worked with a diversity coach provided by the National Center for Healthcare Leadership to design and implement an action plan to improve diversity and cultural competence practices and build a sustainable infrastructure. Plans explored areas of strength and areas for improvement that were identified through preintervention assessments. The assessments focused on five competencies of strategic diversity management and culturally and linguistically appropriate care: diversity leadership, strategic human resource management, organizational climate, diversity climate, and patient cultural competence.This article describes each intervention hospital's success in action plan implementation and reports results of postintervention interviews with leadership to provide a blueprint for sustainable change.

  1. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  2. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  3. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  4. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  5. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  6. Crisis communication. Lessons from 9/11.

    Science.gov (United States)

    Argenti, Paul

    2002-12-01

    The sheer enormity of last year's terrorist attacks on the World Trade Center and the Pentagon gave new meaning to the term "crisis management." Suddenly, companies near Ground Zero, as well as those more than a thousand miles away, needed a plan. Because the disasters disrupted established channels not only between businesses and customers but between businesses and employees, internal crisis-communications strategies that could be quickly implemented became a key responsibility of top management. Without these strategies, employees' trauma and confusion might have immobilized their firms and set their customers adrift. In this article, executives from a range of industries talk about how their companies, including Morgan Stanley, Oppenheimer Funds, American Airlines, Verizon, the New York Times, Dell, and Starbucks, went about restoring operations and morale. From his interviews with these individuals, author and management professor Paul Argenti was able to distill a number of lessons, each of which, he says, may "serve as guideposts for any company facing a crisis that undermines its employees' composure, confidence, or concentration." His advice to senior executives includes: Maintain high levels of visibility, so that employees are certain of top management's command of the situation and concern; establish contingency communication channels and work sites; strive to keep employees focused on the business itself, because a sense of usefulness enhances morale and good morale enhances usefulness; and ensure that employees have absorbed the firm's values, which will guide them as they cope with the unpredictable. The most forward-thinking leaders realize that managing a crisis-communications program requires the same dedication and resources they give to other dimensions of their business. More important, they realize that their employees always come first.

  7. Integrating community health workers into a patient-centered medical home to support disease self-management among Vietnamese Americans: lessons learned.

    Science.gov (United States)

    Wennerstrom, Ashley; Bui, Tap; Harden-Barrios, Jewel; Price-Haywood, Eboni G

    2015-01-01

    There is evidence that patient-centered medical homes (PCMHs) and community health workers (CHWs) improve chronic disease management. There are few models for integrating CHWs into PCMHs in order to enhance disease self-management support among diverse populations. In this article, we describe how a community-based nonprofit agency, a PCMH, and academic partners collaborated to develop and implement the Patient Resource and Education Program (PREP). We employed CHWs as PCMH care team members to provide health education and support to Vietnamese American patients with uncontrolled diabetes and/or hypertension. We began by conducting focus groups to assess patient knowledge, desire for support, and availability of community resources. Based on findings, we developed PREP with CHW guidance on cultural tailoring of educational materials and methods. CHWs received training in core competencies related to self-management support principles and conducted the 4-month intervention for PCMH patients. Throughout the program, we conducted process evaluation through structured team meetings and patient satisfaction surveys. We describe successes and challenges associated with PREP delivery including patient recruitment, structuring/documenting visits, and establishing effective care team integration, work flow, and communication. Strategies for mitigating these issues are presented, and we make recommendations for other PCMHs seeking to integrate CHWs into care teams. © 2014 Society for Public Health Education.

  8. Using an evidence-based approach for system selection at a large academic medical center: lessons learned in selecting an ambulatory EMR at Mount Sinai Hospital.

    Science.gov (United States)

    Kannry, Joseph; Mukani, Sonia; Myers, Kristin

    2006-01-01

    The experience of Mount Sinai Hospital is representative of the challenges and problems facing large academic medical centers in selecting an ambulatory EMR. The facility successfully revived a stalled process in a challenging financial climate, using a framework of science and rigorous investigation. The process incorporated several innovations: 1) There was a thorough review of medical informatics literature to develop a mission statement, determine practical objectives and guide the demonstration process; 2) The process involved rigorous investigation of vendor statements, industry statements and other institution's views of vendors; 3) The initiative focused on user-centric selection, and the survey instrument was scientifically and specifically designed to assess user feedback; 4) There was scientific analysis of validated findings and survey results at all steering meetings; 5) The process included an assessment of vendors' ability to support research by identifying funded and published research; 6) Selection involved meticulous total cost of ownership analysis to assess and compare real costs of implementing a vendor solution; and finally, 7) There were iterative meetings with stakeholders, executives and users to understand needs, address concerns and communicate the vision.

  9. Colloborative International Resesarch on the Water Energy Nexus: Lessons Learned from the Clean Energy Research Center - Water Energy Technologies (CERC-WET)

    Science.gov (United States)

    Remick, C.

    2017-12-01

    The U.S.-China Clean Energy Research Center - Water and Energy Technologies (CERC-WET) is a global research partnership focused on developing and deploying technologies that to allow the U.S. and China to thrive in a future with constrained energy and water resources in a changing global climate. This presentation outlines and addresses the opportunities and challenges for international research collaboration on the so called "water-energy nexus", with a focus on industrial partnership, market readiness, and intellectual property. The U.S. Department of Energy created the CERC program as a research and development partnership between the United States and China to accelerate the development and deployment of advanced clean energy technologies. The United States and China are not only the world's largest economies; they are also the world's largest energy producers and energy consumers. Together, they account for about 40% of annual global greenhouse gas emissions. The bilateral investment in CERC-WET will total $50 million over five years and will target on the emerging issues and cut-edge research on the topics of (1) water use reduction at thermoelectric plants; (2) treatment and management of non-traditional waters; (3) improvements in sustainable hydropower design and operation; (4) climate impact modeling, methods, and scenarios to support improved understanding of energy and water systems; and (5) data and analysis to inform planning and policy.

  10. National Training Center Research Issues

    Science.gov (United States)

    1987-01-01

    Arms Training Activity, NTC’s parent organization. The program supports the Training Activity’ mission of developing lessons learned from past ...the accomplishment of that mission. ARI has awarded the BOM Corporation a three year contract to assist in the utilization of the NTC data for the...Alarm and the M8 or M9 Chemical detection papaer following suspected attacks? o How long from detection to unit assuming the proper MOPP4 level? 44. ?I

  11. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  12. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  13. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  14. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  15. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  16. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  17. Exploiting Seams and Closing Gaps: Lessons from Mumbai and Beyond

    Directory of Open Access Journals (Sweden)

    Dr. Andrea J. Dew

    2012-01-01

    Full Text Available This article analyzes a single event—the 2008 Mumbai attacks—in order to consider the strategic and operational lessons for dealing with other armed groups. How and why was Lashkar-e-Tayyiba (LeT able to carry out such a sophisticated attack in the heart of Mumbai? And what lessons does Mumbai hold for strategists seeking to counter other armed groups around the world? While tactical level lessons from Mumbai have been well documented, it is important to also consider what the Mumbai attacks tell us at the strategic and operational levels. Specifically, the Mumbai attacks provide valuable insight into how armed groups use the maritime environment, and how they use surprise, denial, and deception to mask intention and invite over-reaction by states. In addition, studying the Mumbai attacks provides insight into some of the strategic and operational seams and gaps that armed groups seek to exploit. These include environmental and geographical factors; institutional, bureaucratic, and jurisdictional seams and gaps between agencies; cognitive seams and gaps that made the use of the sea by LeT so difficult to conceptualize; and the diplomatic seams and gaps that led to heightened tensions among states— in this case, India, Pakistan, and the United States. This article discusses how to categorize these seams and gaps in order to better address the problems they create, and how states might best direct and focus their limited resources when faced with similar challenges.

  18. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  19. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  20. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  1. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  2. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  3. Lessons Learned

    Directory of Open Access Journals (Sweden)

    Amanda Phelan BNS, MSc, PhD

    2015-03-01

    Full Text Available The public health nurses’ scope of practice explicitly includes child protection within their role, which places them in a prime position to identify child protection concerns. This role compliments that of other professions and voluntary agenices who work with children. Public health nurses are in a privileged position as they form a relationship with the child’s parent(s/guardian(s and are able to see the child in its own environment, which many professionals cannot. Child protection in Ireland, while influenced by other countries, has progressed through a distinct pathway that streamlined protocols and procedures. However, despite the above serious failures have occurred in the Irish system, and inquiries over the past 20 years persistently present similar contributing factors, namely, the lack of standardized and comprehensive service responses. Moreover, poor practice is compounded by the lack of recognition of the various interactional processes taking place within and between the different agencies of child protection, leading to psychological barriers in communication. This article will explore the lessons learned for public health nurses practice in safeguarding children in the Republic of Ireland.

  4. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  5. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  6. The Knitting Lesson.

    Science.gov (United States)

    Smith, Pamela

    1987-01-01

    Based on Jean-Francois Millet's 1869 painting, "The Knitting Lesson," this lesson's goal is to introduce students in grades seven through nine to genre (everyday life) painting the nineteenth century. The lesson is also designed to show that some aspects of genre may be timeless. (BSR)

  7. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  8. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  9. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  12. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  13. Attacking al Qaeda’s Operational Centers of Gravity

    Science.gov (United States)

    2008-01-01

    have allied themselves with al Qaeda.7 The Taliban in Afghanistan have a close relationship with al Qaeda. In Iraq, there are two major insurgent... consanguinity , the ideological affinity between al Qaeda and local insurgents and populations. By designating consanguinity as a decisive point at the...people, materiel, or facilities. Links connect nodes and are behavioral or functional; they could be a command relationship or an ideology. A deci

  14. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  15. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  16. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  17. Lessons learned bulletin

    International Nuclear Information System (INIS)

    1994-05-01

    During the past four years, the Department of Energy -- Savannah River Operations Office and the Westinghouse Savannah River Company (WSRC) Environmental Restoration (ER) Program completed various activities ranging from waste site investigations to closure and post closure projects. Critiques for lessons learned regarding project activities are performed at the completion of each project milestone, and this critique interval allows for frequent recognition of lessons learned. In addition to project related lessons learned, ER also performs lessons learned critiques. T'he Savannah River Site (SRS) also obtains lessons learned information from general industry, commercial nuclear industry, naval nuclear programs, and other DOE sites within the complex. Procedures are approved to administer the lessons learned program, and a database is available to catalog applicable lessons learned regarding environmental remediation, restoration, and administrative activities. ER will continue to use this database as a source of information available to SRS personnel

  18. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  19. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  20. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  1. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  2. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  3. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  4. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  5. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  7. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  8. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  9. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  10. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  11. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  12. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  13. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  14. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  15. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  16. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  17. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  20. Lessons in the Teaching of Vocabulary from September 11 and Harry Potter.

    Science.gov (United States)

    Nilsen, Alleen Pace; Nilsen, Don L. F.

    2002-01-01

    Considers that the comparison between children's success in learning new names in the Harry Potter books versus the relative failure of adults to learn new names connected to the September 11th attacks provides a real-world situation from which principles can be deduced to help educators succeed in teaching vocabulary lessons. Offers classroom…

  1. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    Science.gov (United States)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  2. Lesson study i Danmark?

    DEFF Research Database (Denmark)

    Mogensen, Arne

    2009-01-01

    Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning.......Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning....

  3. "Frankenstein." [Lesson Plan].

    Science.gov (United States)

    Simon, Melanie

    Based on Mary Shelley's novel "Frankenstein," this lesson plan presents activities designed to help students understand that active readers interpret a novel (its characters, plot, setting, and theme) in different ways; and the great literature can be and has been adapted in many ways over time. The main activity of the lesson involves students…

  4. Integrating UNESCO ICT-Based Instructional Materials in Chemistry Lessons

    Directory of Open Access Journals (Sweden)

    CHARLIE P. NACARIO

    2014-08-01

    Full Text Available This study determined the effectiveness of the lessons in Chemistry integrating UNESCO ICT-based instructional material on the achievement of Chemistry students at Central Bicol State University of Agriculture. It aimed to identify lessons that may be developed integrating UNESCO ICT-based instructional materials, determine the effect of the developed lessons using the material on: conceptual understanding; science process skills; and attitude towards chemistry and gather insights from the experiences of the students and teacher. The study used the single group pretest and posttest experimental design. Descriptive, quantitative and qualitative techniques were also utilized. Quantitative data were taken from the pretest-posttest results on the Test on Conceptual Understanding, Science Process Skills and Chemistry Attitudinaire. Qualitative data were drawn from the experts’ assessment of the developed lessons and research instruments, and the insights of students and teacher. The developed lessons integrating UNESCO ICT-based instructional materials were Atomic Model and Structure, Periodic Table of Elements, Chemical Bonding, and Balancing Chemical Equation. These lessons increased the conceptual understanding of the students by topic and skill from very low mastery to average mastery level. The students have slightly improved along the different science process skills. After teaching the lessons, the students’ attitude also improved. The students became more motivated and interested in Chemistry and the lessons were student centered and entailed teacher’s competence and flexibility in computer use.

  5. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  6. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  7. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  8. About a hypothetical terrorist attack on a nuclear power plant

    International Nuclear Information System (INIS)

    2001-10-01

    After the terrorism attack on the World Trade Center, a record number ( two thirds) of US citizens favour the use of nuclear energy and consider nuclear plants to be safe. At the same time 59% definitely support building more nuclear plants, less than in March during the Californian crisis, but more than earlier., Most american citizens ( 84%) continue to support licence renewal for nuclear plants and 72 % agree with keeping the option open to build new nuclear plants in the future. The strongest supporters are those who have visited a nuclear plant or information centre. (N.C.)

  9. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  10. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  11. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    Science.gov (United States)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  12. Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Cezar Vasilescu

    2012-06-01

    Full Text Available The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estonia (2007 and Georgia (2008, with a focus on two main lessons learned: how complicated is to define a cyber war and how difficult to defend against it. Crucial implications for world’s countries and the role of NATO in assuring an effective collective cyber defense are analyzed in the third part. The need for the development of strategic cyber defense documents (e.g. NATO Cyber Defense Policy, NATO Strategic Concept is further examined. It is suggested that particular attention should be paid to the development of a procedure for clearly discriminating between events (cyber attacks, cyber war, cyber crime, or cyber terrorism, and to a procedure for the conduct of nation’s legitimate military/civil cyber response operations.

  13. The history of a lesson

    DEFF Research Database (Denmark)

    Rasmussen, Mikkel Vedby

    2003-01-01

    and emphasises the need to study the history of lessons rather than the lessons of history. This approach shows that Munich is the end point of a constitutive history that begins in the failure of the Versailles treaty to create a durable European order following the First World War. The Munich lesson is thus......The article investigates the concept of lessons in IR. By means of a constructivist critique of the 'lessons literature', the article analyses one of the most important of IR lessons: that of Munich. Examining how the Munich lesson came about, the article shows the praxeological nature of lessons...... one element of the lesson of Versailles, which is a praxeology that defines how the West is to make peace, and against whom peace must be defended. The lesson of Versailles has been, at least in part, constitutive of the outbreak of the Cold War, and it continues to define the Western conception...

  14. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  15. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  16. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  17. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  18. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  19. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  20. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  1. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  2. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  3. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  4. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  5. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  6. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  7. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  8. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  9. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  10. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  12. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  13. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  14. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  15. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  16. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  17. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  18. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  19. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  20. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  2. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  3. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  4. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  5. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  6. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  7. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  8. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  9. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  10. Level I center triage and mass casualties.

    Science.gov (United States)

    Hoey, Brian A; Schwab, C William

    2004-05-01

    The world has been marked by a recent series of high-profile terrorist attacks, including the attack of September 11, 2001, in New York City. Similar to natural disasters, these attacks often result in a large number of casualties necessitating triage strategies. The end of the twentieth century was marked by the development of trauma systems in the United States and abroad. By their very nature, trauma centers are best equipped to handle mass casualties resulting from natural and manmade disasters. Triage assessment tools and scoring systems have evolved to facilitate this triage process and to potentially reduce the morbidity and mortality associated with these events.

  11. Breathing Life into Engineering: A Lesson Study Life Science Lesson

    Science.gov (United States)

    Lawrence, Maria; Yang, Li-Ling; Briggs, May; Hession, Alicia; Koussa, Anita; Wagoner, Lisa

    2016-01-01

    A fifth grade life science lesson was implemented through a lesson study approach in two fifth grade classrooms. The research lesson was designed by a team of four elementary school teachers with the goal of emphasizing engineering practices consistent with the "Next Generation Science Standards" (NGSS) (Achieve Inc. 2013). The fifth…

  12. An Assessment of Need for Instructional Professional Development for Middle School Science Teachers Using Interactive Lessons

    Science.gov (United States)

    Burton, Amanda

    Numerous studies on the impact of interactive lessons on student learning have been conducted, but there has been a lack of professional development (PD) programs at a middle school focusing on ways to incorporate interactive lessons into the science classroom setting. The purpose of this case study was to examine the instructional practices of science teachers to determine whether the need for an interactive lessons approach to teaching students exists. This qualitative case study focused on teachers' perceptions and pedagogy to determine whether the need to use interactive lessons to meet the needs of all students is present. The research question focused on identifying current practices and determining whether a need for interactive lessons is present. Qualitative data were gathered from science teachers at the school through interviews, lesson plans, and observations, all of which were subsequently coded using an interpretative analysis. The results indicated the need for a professional development (PD) program centered on interactive science lessons. Upon completion of the qualitative study, a detailed PD program has been proposed to increase the instructional practices of science teachers to incorporate interactive lessons within the science classroom. Implications for positive social change include improved teaching strategies and lessons that are more student-centered resulting in better understanding and comprehension, as well as performance on state-mandated tests.

  13. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  14. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  15. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  16. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  17. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  18. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  19. Lessons for Teaching Art Criticism.

    Science.gov (United States)

    Barrett, Terry, Ed.; Clark, Gilbert, Ed.

    This collection of lessons is meant to be a practical guide to help teachers engage children in art criticism. The lessons generally follow a similar format. Most suggest an age group but may be modified for use with younger or older students. Several authors suggest variations and extensions for lessons that include studio activities. A broad…

  20. Lesson Planning the Kodaly Way.

    Science.gov (United States)

    Boshkoff, Ruth

    1991-01-01

    Discusses the contribution of Zoltan Kodaly to music lesson planning. Emphasizes preparation, presentation, and practice as the three important strategies in teaching concepts and skills to be included in a lesson plan. Includes a sample lesson plan covering a semester and advice on choosing song material. (DK)

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. EMU Lessons Learned Database

    Science.gov (United States)

    Matthews, Kevin M., Jr.; Crocker, Lori; Cupples, J. Scott

    2011-01-01

    As manned space exploration takes on the task of traveling beyond low Earth orbit, many problems arise that must be solved in order to make the journey possible. One major task is protecting humans from the harsh space environment. The current method of protecting astronauts during Extravehicular Activity (EVA) is through use of the specially designed Extravehicular Mobility Unit (EMU). As more rigorous EVA conditions need to be endured at new destinations, the suit will need to be tailored and improved in order to accommodate the astronaut. The Objective behind the EMU Lessons Learned Database(LLD) is to be able to create a tool which will assist in the development of next-generation EMUs, along with maintenance and improvement of the current EMU, by compiling data from Failure Investigation and Analysis Reports (FIARs) which have information on past suit failures. FIARs use a system of codes that give more information on the aspects of the failure, but if one is unfamiliar with the EMU they will be unable to decipher the information. A goal of the EMU LLD is to not only compile the information, but to present it in a user-friendly, organized, searchable database accessible to all familiarity levels with the EMU; both newcomers and veterans alike. The EMU LLD originally started as an Excel database, which allowed easy navigation and analysis of the data through pivot charts. Creating an entry requires access to the Problem Reporting And Corrective Action database (PRACA), which contains the original FIAR data for all hardware. FIAR data are then transferred to, defined, and formatted in the LLD. Work is being done to create a web-based version of the LLD in order to increase accessibility to all of Johnson Space Center (JSC), which includes converting entries from Excel to the HTML format. FIARs related to the EMU have been completed in the Excel version, and now focus has shifted to expanding FIAR data in the LLD to include EVA tools and support hardware such as

  3. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  4. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  5. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  6. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  8. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  9. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  10. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  11. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  12. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  14. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  15. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  17. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  18. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  19. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  20. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  1. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  2. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  3. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  4. Holistic Approach to Data Center Energy Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, Steven W [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-09-18

    This presentation discusses NREL's Energy System Integrations Facility and NREL's holistic design approach to sustainable data centers that led to the world's most energy-efficient data center. It describes Peregrine, a warm water liquid cooled supercomputer, waste heat reuse in the data center, demonstrated PUE and ERE, and lessons learned during four years of operation.

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  6. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  7. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  8. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  9. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.

    Science.gov (United States)

    Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li

    2018-06-01

    State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.

  10. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  11. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  12. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  13. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  14. Health communication: lessons from research.

    Science.gov (United States)

    Shanmugam, A V

    1981-01-01

    In discussing the lessons learned from research in the area of health communication, focus is on basic strategic issues; the scope of health communications in terms of audience, information, education and motivation approaces and India's satellite Instructional Television Experiment (SITE). Health communication is the process by which a health idea is transferred from a source, such as a primary health center, to a receiver, community, with the intention of changing the community's behavior. This involves the formulation of specific strategies for the conduct of health and family welfare communication. In the processs of health communication, it has been a common practice in India as well as in other developing countries to depend upon a plethora of communication media. Yet, despite maximum utilization of the mass media and interpersonal channels of communication, questions remain about the efficacy of the system in bringing about change. Thus, the need to draw upon lessons from research becomes obvious. Communication effectiveness researches have concentrated on 3 basic strategic issues: the question of physical reception of messages by the audience; interpretation or understanding of messages on the part of the audience in accordance with the intention of the communicator; and effectiveness of communication on the cognitive, affective and behavioral dimensions of the audience. Innumberable researches in communication have provided several lessons which have expanded the scope of health communication. This expansion can be observed in terms of audiences reached, information disseminated, education undertaken, and motivation provided. Research has identified several distinct groups to whom specific health messages have to be addressed. These include government and political elites, health and family welfare program administrators, and the medical profession and clinical staff. Information on health needs to include both the concept of health and the pertinent ideas

  15. Brothers Grimm. [Lesson Plan].

    Science.gov (United States)

    Discovery Communications, Inc., Bethesda, MD.

    Based on Grimm's fairy tales, this lesson plan presents activities designed to help students understand that fairy tales connect them to earlier generations, help them think about present situations, that magic figures prominently in fairy tales, and that fairy tales can inspire readers to create original works of art. The main activity in the…

  16. DSCOVR Contamination Lessons Learned

    Science.gov (United States)

    Graziani, Larissa

    2015-01-01

    The Triana observatory was built at NASA GSFC in the late 1990's, then placed into storage. After approximately ten years it was removed from storage and repurposed as the Deep Space Climate Observatory (DSCOVR). This presentation outlines the contamination control program lessons learned during the integration, test and launch of DSCOVR.

  17. Phagocytosis: history's lessons.

    Science.gov (United States)

    Garg, Manish; Chandawarkar, Rajiv Y

    2013-01-01

    The assimilation of lessons from the past is an essential component of education for scientists of tomorrow. These lessons are not easy to find. History books on science are few and usually highly dramatized and biographies of scientists tend to exaggerate the pomp of scientific discovery. Both underplay the hard and laborious work that is integral to any scientific pursuit. Here we illustrate one such example. A century ago, the Nobel Prize in Medicine was awarded to two scientists: Ilya Metchnikoff, a Russian zoologist, for the discovery ofphagocytosis-a cell-mediated ingestion ofmicrobes; and Paul Ehrlich, a distinguished physician-scientist, for discovering a highly antigen-specific serum-derived antibody-based immune defense. These two diametrically opposing views of the host-pathogen interaction set the stage for a strife that led to seminal advancements in immunology. Mirrored in this journey are important lessons for scientists today--ubiquitously as applicable to modern scientific life as they were a century ago. This commentaryhighlights these lessons--a fitting centenary to a well-deserved recognition.

  18. Recycling Lesson Plan

    Science.gov (United States)

    Okaz, Abeer Ali

    2013-01-01

    This lesson plan designed for grade 2 students has the goal of teaching students about the environmental practice of recycling. Children will learn language words related to recycling such as: "we can recycle"/"we can't recycle" and how to avoid littering with such words as: "recycle paper" and/or "don't throw…

  19. Smart Consumer Lesson Plans.

    Science.gov (United States)

    New Jersey Consortium for Consumer Education, Newark.

    Lesson plans are provided for use with different populations of pre-K through senior high school students in four different areas of consumer education. Eight units in advertising are included: A First Look at Ads (pre-K-Grade 3), Don't Judge a Book by Its Cover (Grades 1-3), Fatal Distraction (Junior High), Package Labeling (Junior High), Product…

  20. Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball

    Science.gov (United States)

    Giannopoulos, Nikiforos; Vagenas, George; Noutsos, Konstantinos; Barzouka, Karolina; Bergeles, Nikolaos

    2017-01-01

    Abstract This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2) and playing position (hitters vs. centers vs. opposites) considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs. PMID:28828084

  1. Somatotype, Level of Competition, and Performance in Attack in Elite Male Volleyball

    Directory of Open Access Journals (Sweden)

    Giannopoulos Nikiforos

    2017-08-01

    Full Text Available This study investigated the relationship between somatotype, level of competition, and performance in attack in elite level male volleyball players. The objective was to test for the potential covariation of competition level (Division A1 vs. A2 and playing position (hitters vs. centers vs. opposites considering performance in attack. Anthropometric, body composition and somatotype variables were measured according to the Heath-Carter method. The attack actions of 144 players from 48 volleyball matches were analyzed and their performance was rated using a 5-point numerical scale. Results showed that players of Division A1 were taller, heavier, more muscular, and less endomorphic compared to those of Division A2. MANOVA and follow-up discriminant function analysis revealed somatotype differences among playing positions with centers and opposites being endomorph-ectomorph and hitters being central. Centers performed constantly better than hitters and opposites regardless of the division and somatotype. Multiple linear regression analysis showed that variables defining ectomorph and endomorph players, centers, and players of Division A1 significantly determined the relative performance superiority and were able to explain the variation in performance by almost 25%. These results could be taken into account by coaches when assigning players to particular playing positions or when designing individualized position-specific training programs.

  2. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  3. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  4. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  5. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  7. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  8. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  9. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  10. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  11. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  12. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  13. The Lessons of Mumbai

    Science.gov (United States)

    2009-01-01

    Airport attack in which three members of the Japanese Red Army opened fire and threw hand grenades at arriving passengers. Barricade and hostage...Albless Hospital, near the CST. 22:50 Gunfire at the Metro Theatre (Metro Cinema Junction). 23:00 Explosion in a taxi in Vile Parle in north

  14. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  15. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  16. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  17. The use of high impact practices (HIPs) on chemistry lesson design and implementation by pre-service teachers

    Science.gov (United States)

    Chamrat, Suthida; Apichatyotin, Nattaya; Puakanokhirun, Kittaporn

    2018-01-01

    The quality of lesson design is essential to learning effectiveness. Research shows some characteristics of lessons have strong effect on learning which were grouped into "High Impact Practices or HIPs. This research aims to examine the use of HIPs on chemistry lesson design as a part of Teaching Science Strand in Chemistry Concepts course. At the first round of lesson design and implementing in classroom, 14 chemistry pre-services teachers freely selected topics, designed and implemented on their own ideas. The lessons have been reflected by instructors and their peers. High Impact Practices were overtly used as the conceptual framework along with the After-Action Review and Reflection (AARR). The selected High Impact practice in this study consisted of 6 elements: well-designed lesson, vary cognitive demand/academic challenge, students center approach, opportunity of students to reflect by discussion or writing, the assignment of project based learning or task, and the lesson reflects pre-service teachers' Technological Pedagogical Content Knowledge (TPACK). The second round, pre-service teachers were encouraged to explicitly used 6 High Impact Practices in cooperated with literature review specified on focused concepts for bettering designed and implemented lessons. The data were collected from 28 lesson plans and 28 classroom observations to compare and discuss between the first and second lesson and implementation. The results indicated that High Impact Practices effect on the quality of delivered lesson. However, there are some elements that vary on changes which were detailed and discussed in this research article.

  18. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  19. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  20. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  1. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  2. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  3. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  4. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  5. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  6. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  7. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  8. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  9. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  10. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  12. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  13. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  14. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  15. Lessons, open questions, and future prospects

    Directory of Open Access Journals (Sweden)

    Grupe D.

    2012-12-01

    Full Text Available We summarize some of the highlights of this workshop, the first of its kind dedicated to observing and modeling the tidal disruption of stars by black holes in the centers of galaxies (or star clusters. We review the lessons learned from recent observations and from theory and identify outstanding questions and areas where more theoretical and observational work is needed. We also consider upcoming observing facilities that can be used to study tidal disruption events and speculate what these new facilities may contribute to the field.

  16. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  17. Air Base Attacks and Defensive Counters: Historical Lessons and Future Challenges

    Science.gov (United States)

    2015-01-01

    memorandum of agreement, Army Chief of Staff GEN John A. Wickham and USAF Chief of Staff Gen Charles A. Gabriel specified several areas in which the...Bagram AB and other MOBs in that country. 80 Milner, 2014, Figure 5.4. 81 Jim Michaels and Charles Crain, “Insurgents Showing No Sign of Letting Up...Takes Part in Joint Training at RAAF Darwin ,” press release 010514, May 15, 2014; referenced June 10, 2014. 163 See Benson, 1981, pp. 100–101, for

  18. Pitch control margin at high angle of attack - Quantitative requirements (flight test correlation with simulation predictions)

    Science.gov (United States)

    Lackey, J.; Hadfield, C.

    1992-01-01

    Recent mishaps and incidents on Class IV aircraft have shown a need for establishing quantitative longitudinal high angle of attack (AOA) pitch control margin design guidelines for future aircraft. NASA Langley Research Center has conducted a series of simulation tests to define these design guidelines. Flight test results have confirmed the simulation studies in that pilot rating of high AOA nose-down recoveries were based on the short-term response interval in the forms of pitch acceleration and rate.

  19. Experimental Flight Characterization of Spin Stabilized Projectiles at High Angle of Attack

    Science.gov (United States)

    2017-08-07

    impact point prediction for applications such as high-arcing, spin-stabilized munitions. 15. SUBJECT TERMS aerodynamics, spark range, spin...angles of attack increase the delivery error due to poor fire-control solutions (i.e., understanding the relationship between the gun pointing angle and...of downrange travel ) is also evident in the horizontal data. Fig. 3 Center-of-gravity motion The rolling motion is captured in Fig. 4. These

  20. Plasma Control of Separated Flows on Delta Wings at High Angles of Attack

    Science.gov (United States)

    2009-03-18

    of Attack 5a. CONTRACT NUMBER ISTC Registration No: 3646 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Dr. Anatoly Alexandrovich...NUMBER(S) ISTC 06-7002 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY...This work is supported financially by EOARD and performed under the agreement with the International Science and Technology Center ( ISTC ), Moscow

  1. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  2. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  3. Lessons from Goiania

    International Nuclear Information System (INIS)

    Nazari Alves, R.

    2000-01-01

    The lessons learned from the radiological accident of Goiania in 1987 derived from the observations from the Regulatory Agency which was in charge of the decontamination tasks may be consolidated into four classes: Preventive Actions, characterised as those that aim to minimise the probability of occurrence of a radiological accident; Minimisation of time between the moment of the accident occurrence and the beginning of intervention, in case a radiological accident does occur, despite all preventive measures; Intervention, which is correlated to the type of installation, its geographical location, the social classes involved and their contamination vectors; and Follow up, for which well established rules to allow continuing monitoring of the victims and rebuilding of homes are necessary. The greatest lesson of all was the need for integration of the professionals involved, from all organizations. (author)

  4. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  5. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  6. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  7. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  8. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  9. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  10. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  11. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  12. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  13. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  15. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  16. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  17. Scalable DDoS Mitigation System for Data Centers

    Directory of Open Access Journals (Sweden)

    Zdenek Martinasek

    2015-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet. In recent years, the intensity of DDoS attacks has been rapidly increasing and the attackers combine more often different techniques of DDoS to bypass the protection. Therefore, the main goal of our research is to propose a DDoS solution that allows to increase the filtering capacity linearly and allows to protect against the combination of attacks. The main idea is to develop the DDoS defense system in the form of a portable software image that can be installed on the reserve hardware capacities. During a DDoS attack, these servers will be used as filters of this DDoS attack. Our solution is suitable for data centers and eliminates some lacks of commercial solutions. The system employs modular DDoS filters in the form of special grids containing specific protocol parameters and conditions.

  18. Achievements and Lessons from Tevatron

    International Nuclear Information System (INIS)

    Shiltsev, V.

    2011-01-01

    For almost a quarter of a century, the Tevatron proton-antiproton collider was the centerpiece of the world's high energy physics program - beginning operation in December of 1985 until it was overtaken by LHC in 2011. The aim of the this unique scientific instrument was to explore the elementary particle physics reactions with center of mass collision energies of up to 1.96 TeV. The initial design luminosity of the Tevatron was 10 30 cm -2 s -1 , however as a result of two decades of upgrades, the accelerator has been able to deliver 430 times higher luminosities to each of two high luminosity experiments, CDF and D0. Tevatron will be shut off September 30, 2011. The collider was arguably one of the most complex research instruments ever to reach the operation stage and is widely recognized for many technological breakthroughs and numerous physics discoveries. Below we briefly present the history of the Tevatron, major advances in accelerator physics, and technology implemented during the long quest for better and better performance. We also discuss some lessons learned from our experience.

  19. FRMAC-93 lessons learned report

    International Nuclear Information System (INIS)

    Kerns, K.C.

    1994-03-01

    FRMAC-93 simulated a radiological accident at the Fort Calhoun nuclear power plant, 25 miles north of Omaha, Nebraska. The exercise involved the state Iowa and Nebraska, NRC as the lead Federal agency, FRMAC (Federal Radiological Monitoring and Assessment Center), and several federal agencies with statutory emergency responsibility. FRMAC-93 was a major 2-day field exercise designed to determine the effectiveness, coordination, and operations of a DOE-managed FRMAC. Other objectives were to ensure that appropriate priorities were established and assistance was provided to the states and the lead Federal agency by FRMAC. Day 1 involved the Fort Calhoun evaluated plume phase exercise. On Day 2, the flow of data, which was slow initially, improved so that confidence of states and other federal responders in FRMAC support capabilities was high. The impact and lessons learned from FRMAC-93 provided the necessary impetus to make organizational and operational changes to the FRMAC program, which were put into effect in the DOE exercise FREMONT at Hanford 3 months later

  20. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  1. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  2. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  3. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ first responders group. 2017.

  4. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  5. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  6. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  7. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  8. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  9. Masterwork Art Lesson: Kandinsky Watercolors.

    Science.gov (United States)

    LiPira, Michael

    2003-01-01

    Presents an art lesson used with sixth-grade students which also can be used with other grade levels. Explains that the artwork of Wassily Kandinsky served as inspiration for this lesson. Explains that the students learned about abstract art and used watercolors to create their own paintings in the style of Kandinsky. (CMK)

  10. Bead Game Simulation. Lesson Plan.

    Science.gov (United States)

    Ripp, Ken

    This lesson plan offers students the opportunity to participate in the three basic economic systems (market, command, and tradition). By working in each of the systems, students will internalize the fundamental values present in each system and will gain insights into the basic advantages and disadvantages of each system. The lesson plan provides…

  11. Simple and Practical Efficiency Lessons

    Science.gov (United States)

    Kolpin, Van

    2018-01-01

    The derivation of conditions necessary for Pareto efficient production and exchange is a lesson frequently showcased in microeconomic theory textbooks. Traditional delivery of this lesson is, however, limited in its scope of application and can be unnecessarily convoluted. The author shows that the universe of application is greatly expanded and a…

  12. Keiko, Killer Whale. [Lesson Plan].

    Science.gov (United States)

    Discovery Communications, Inc., Bethesda, MD.

    This lesson plan presents activities designed to help students understand that Keiko, the killer whale, lived for a long time in an aquarium and had to be taught to live independently; and that computer users can get updates on how Keiko is doing. The main activity of the lesson involves middle school students working in small groups to produce a…

  13. Lesson Study and History Education

    Science.gov (United States)

    Halvorsen, Anne-Lise; Kesler Lund, Alisa

    2013-01-01

    This article examines the experiences of a group of fifth-grade teachers who used lesson study, a teacher-driven form of professional development, to teach history in a project supported by a Teaching American History Grant. The project addressed the following questions: What does a lesson study cycle for history education look like? What…

  14. Oral glucose tolerance test significantly impacts the prevalence of abnormal glucose tolerance among Indian women with polycystic ovary syndrome: lessons from a large database of two tertiary care centers on the Indian subcontinent.

    Science.gov (United States)

    Ganie, Mohd Ashraf; Dhingra, Atul; Nisar, Sobia; Sreenivas, Vishnubhatla; Shah, Zaffar Amin; Rashid, Aafia; Masoodi, Shariq; Gupta, Nandita

    2016-01-01

    To estimate the prevalence of abnormal glucose tolerance (AGT) among Indian women with polycystic ovary syndrome (PCOS) and analyze the role of oral glucose tolerance (OGTT) test on its estimation. Cross-sectional clinical study. Tertiary care center. A total of 2,014 women with PCOS diagnosed on the basis of the Rotterdam 2003 criteria were enrolled, and the data of 1,746 subjects were analyzed. In addition to recording clinical, biochemical, and hormone parameters, a 75 g OGTT was administered. Prevalence of AGT and impact of age, body mass index (BMI), family history, and OGTT on its prevalence. The mean age of subjects was 23.8 ± 5.3 years, with a mean BMI of 24.9 ± 4.4 kg/m(2). The overall prevalence of AGT was 36.3% (6.3% diabetes and 30% impaired fasting plasma glucose/impaired glucose tolerance) using American Diabetes Association criteria. The glucose intolerance showed a rising trend with advancing age (30.3%, 35.4%, 51%, and 58.8% in the second, third, fourth, and fifth decades, respectively) and increasing BMI. Family history of diabetes mellitus was present in 54.6% (953/1,746) subjects, and it did not correlate with any of the studied parameters except waist circumference and BMI. Sensitivity was better with 2-hour post-OGTT glucose values as compared with fasting plasma glucose, since using fasting plasma glucose alone would have missed the diagnosis in 107 (6.1%) subjects. We conclude that AGT is high among young Indian women with PCOS and that it is not predicted by family history of type 2 DM. OGTT significantly improves the detection rate of AGT among Indian women with PCOS. Copyright © 2016. Published by Elsevier Inc.

  15. Classroom Management and Lesson Planning(4)

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Lesson PlanningTask 1As teachers,we all need to plan our lessons before we teach.Make a list of things that you think need tobe included in a lesson plan.Then compare and discuss your list with another teacher.Also think about reasonswhy we need to plan our lessons.

  16. Classroom Management and Lesson Planning(4)

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Lesson Planning Task 1 As teachers,we all need to plan our lessons before we teach.Make a list of things that you think need to be included in a lesson plan.Then compare and discuss your list with another teacher.Also think about reasons why we need to plan our lessons.

  17. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  18. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  19. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  20. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  1. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  2. Shuttle Lesson Learned - Toxicology

    Science.gov (United States)

    James, John T.

    2010-01-01

    This is a script for a video about toxicology and the space shuttle. The first segment is deals with dust in the space vehicle. The next segment will be about archival samples. Then we'll look at real time on-board analyzers that give us a lot of capability in terms of monitoring for combustion products and the ability to monitor volatile organics on the station. Finally we will look at other issues that are about setting limits and dealing with ground based lessons that pertain to toxicology.

  3. Epidemiological findings of major chemical attacks in the Syrian war are consistent with civilian targeting: a short report.

    Science.gov (United States)

    Rodriguez-Llanes, Jose M; Guha-Sapir, Debarati; Schlüter, Benjamin-Samuel; Hicks, Madelyn Hsiao-Rei

    2018-01-01

    Evidence of use of toxic gas chemical weapons in the Syrian war has been reported by governmental and non-governmental international organizations since the war started in March 2011. To date, the profiles of victims of the largest chemical attacks in Syria remain unknown. In this study, we used descriptive epidemiological analysis to describe demographic characteristics of victims of the largest chemical weapons attacks in the Syrian war. We analysed conflict-related, direct deaths from chemical weapons recorded in non-government-controlled areas by the Violation Documentation Center, occurring from March 18, 2011 to April 10, 2017, with complete information on the victim's date and place of death, cause and demographic group. 'Major' chemical weapons events were defined as events causing ten or more direct deaths. As of April 10, 2017, a total of 1206 direct deaths meeting inclusion criteria were recorded in the dataset from all chemical weapons attacks regardless of size. Five major chemical weapons attacks caused 1084 of these documented deaths. Civilians comprised the majority ( n  = 1058, 97.6%) of direct deaths from major chemical weapons attacks in Syria and combatants comprised a minority of 2.4% ( n  = 26). In the first three major chemical weapons attacks, which occurred in 2013, children comprised 13%-14% of direct deaths, ranging in numbers from 2 deaths among 14 to 117 deaths among 923. Children comprised higher proportions of direct deaths in later major chemical weapons attacks, forming 21% ( n  = 7) of 33 deaths in the 2016 major attack and 34.8% ( n  = 32) of 92 deaths in the 2017 major attack. Our finding of an extreme disparity in direct deaths from major chemical weapons attacks in Syria, with 97.6% of victims being civilians and only 2.4% being combatants provides evidence that major chemical weapons attacks were indiscriminate or targeted civilians directly; both violations of International Humanitarian Law (IHL). Identifying and

  4. Science Centers in the Electronic Age: Are We Doomed?

    Science.gov (United States)

    Russell, Robert L., Ed.; West, Robert M., Ed.

    1996-01-01

    This issue is a debate-discussion concerning science centers in the electronic age. The articles are based on presentations made at the Science Center World Congress (1st, Heureka, Finland, June 13-17, 1996). The four articles are: (1) "Lessons from Laboratorio dell'Immaginario Scientifico" (Andrea Bandelli); (2) "The Doom-Shaped Thing in the…

  5. A control center design revisited: learning from users’ appropriation

    DEFF Research Database (Denmark)

    Souza da Conceição, Carolina; Cordeiro, Cláudia

    2014-01-01

    This paper aims to present the lessons learned during a control center design project by revisiting another control center from the same company designed two and a half years before by the same project team. In light of the experience with the first project and its analysis, the designers and res...

  6. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  7. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  8. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  9. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  10. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  11. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  12. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  13. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  14. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  15. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  16. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  17. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  18. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  19. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  20. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  1. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  2. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  3. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  4. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  5. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  6. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  7. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  8. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  9. Evolution of Swarming Behavior Is Shaped by How Predators Attack.

    Science.gov (United States)

    Olson, Randal S; Knoester, David B; Adami, Christoph

    2016-01-01

    Animal grouping behaviors have been widely studied due to their implications for understanding social intelligence, collective cognition, and potential applications in engineering, artificial intelligence, and robotics. An important biological aspect of these studies is discerning which selection pressures favor the evolution of grouping behavior. In the past decade, researchers have begun using evolutionary computation to study the evolutionary effects of these selection pressures in predator-prey models. The selfish herd hypothesis states that concentrated groups arise because prey selfishly attempt to place their conspecifics between themselves and the predator, thus causing an endless cycle of movement toward the center of the group. Using an evolutionary model of a predator-prey system, we show that how predators attack is critical to the evolution of the selfish herd. Following this discovery, we show that density-dependent predation provides an abstraction of Hamilton's original formulation of domains of danger. Finally, we verify that density-dependent predation provides a sufficient selective advantage for prey to evolve the selfish herd in response to predation by coevolving predators. Thus, our work corroborates Hamilton's selfish herd hypothesis in a digital evolutionary model, refines the assumptions of the selfish herd hypothesis, and generalizes the domain of danger concept to density-dependent predation.

  10. St. Louis FUSRAP Lessons Learned

    International Nuclear Information System (INIS)

    Eberlin, J.; Williams, D.; Mueller, D.

    2003-01-01

    The purpose of this paper is to present lessons learned from fours years' experience conducting Remedial Investigation and Remedial Action activities at the St. Louis Downtown Site (SLDS) under the Formerly Utilized Sites Remedial Action Program (FUSRAP). Many FUSRAP sites are experiencing challenges conducting Remedial Actions within forecasted volume and budget estimates. The St. Louis FUSRAP lessons learned provide insight to options for cost effective remediation at FUSRAP sites. The lessons learned are focused on project planning (budget and schedule), investigation, design, and construction

  11. HYPNOTEACHING IN HISTORY LESSON

    Directory of Open Access Journals (Sweden)

    Agus Budianto

    2017-07-01

    Full Text Available Abstract: Hypnoteaching in History Lesson. Historical learning is a science that can’t be separated in educating the younger generation. Through this lesson, teachers in secondary schools can provide the foundation of nationality through important events in the study of the social sciences. Many of the problems that occur in learning history, such as the boring and make sleepy. Everyone must have heard the term hypnosis, hypnotism, or hypnotherapy. Each person must also have a different view or understanding when hearing these terms. Hypnoteaching is one of the learning methods by using the art of communicating to influence learners. Hypnoteaching is a combination of five teaching-learning methods such as quantum learning, accelerate learning, power teaching, neuro-linguistic programming (NLP and hypnosis. Hypnoteaching can be done using informal hypnosis as well as formal hypnosis. Informal hypnosis is also called indirect hypnosis ie teachers can naturally make the Critical Area learners become no longer critical, through a very persuasive communication pattern. Here's what the teacher can do in Informal hypnosis: (1 get attention; (2 establishing Themes; (3 presenting the structure and regulations; (4 building relationships. If the learners are already comfortable and interested, the next step is to do a formal hypnosis before the lesson begins. Here are the steps that must be done: (1 Induction; (2 Deepening; (3 Deep level test; (4 Suggestion, and; (5 Termination.   Keywords: Historical learning, hypnoteaching, hypnosis, hypnotism, hypnotherapy, history Abstrak: Hipnoteaching dalam Pembelajaran Sejarah. Pelajaran sejarah tidak bisa dihilangkan dalam mendidik para generasi muda. Melalui pembelajaran ini, guru pada sekolah menengah pertama dapat memberikan pondasi rasa nasionalisme melalui peristiwa peristiwa penting dalam pelajaran ilmu pengetahuan social. Masalah yang sering muncul pada pembelajaran ini adalah kebosanan siswa dan

  12. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  13. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  14. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  15. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  16. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  17. 12 CFR 1780.16 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Rules § 1780.16 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral... subpart shall be excused based on the pendency before any court of any interlocutory appeal or collateral...

  18. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  19. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  20. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  1. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  2. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  3. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  4. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    Science.gov (United States)

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  5. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  6. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based...

  7. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  8. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  9. Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

  10. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    The paper assumes that some people, at least, are liable to attack in war. In a number of ways, this is an ambiguous statement, so before proceeding, I need to clarify the specific senses in which I shall generally be using the terms "liable" and "attack." When I write that "S is liable to milita...

  11. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  12. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  13. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  14. [Warning symptoms of asthma attack and asthma self-management: a national asthma control survey from China].

    Science.gov (United States)

    Lin, J T; Wang, W Q; Zhou, X; Wang, C Z; Huang, M; Cai, S X; Chen, P; Lin, Q C; Zhou, J Y; Gu, Y H; Yuan, Y D; Sun, D J; Yang, X H; Yang, L; Huo, J M; Chen, Z C; Jiang, P; Zhang, J; Ye, X W; Liu, H G; Tang, H P; Liu, R Y; Liu, C T; Zhang, W; Hu, C P; Chen, Y Q; Liu, X J; Dai, L M; Zhou, W; Huang, Y J; Xu, J Y

    2017-08-08

    Objective: To investigate warning symptoms of asthma attack and evaluate asthma self-management status of asthma patients in urban China. Methods: A multi-center, cross-sectional, questionnaire-based survey was carried out from 30 general hospitals dispersed in 30 provinces of mainland China (except for Tibet) during Oct 2015 to May 2016. Information of frequency and warning symptoms of asthma attack, the time from warning symptoms to asthma attack, the impact of asthma attack and asthma self-management were collected from asthma patients of outpatient department. Results: Altogether 3 875 asthmatic outpatients were recruited. 78.1% (3 026/3 875) of the patients reported restriction of exercise and daily activities during asthma exacerbation. 82.5% (3 160/3 829) of the patients had warning symptoms before asthma attack, the most common warning symptoms were cough, chest tightness and shortness of breath. The median time from warning symptoms to asthma attack was 2 h, the mean time was 90 h. Only 4.4% (167/3 829) of the patients had definite confidence to control asthma when symptoms deteriorated. 76.7% (2 937/3 828) of the patients used medications to control asthma when asthma symptoms deteriorated. Medication choice: inhaled corticosteroid (ICS) + formoterol 45.8% (1 776/3 875), short-acting beta-agonist (SABA) 23.9% (927/3 875). Conclusions: Most asthma patients have warning symptoms before asthma attack, the most common symptoms are cough, chest tightness and shortness of breath. The proportion of patients conducting effective asthma self-management remains low.

  15. Higher Education ERP: Lessons Learned.

    Science.gov (United States)

    Swartz, Dave; Orgill, Ken

    2001-01-01

    Shares experiences and lessons learned by chief information officers of large universities about enterprise resource planning (ERP). Specifically, provides a framework for approaching an ERP that could save universities millions of dollars. (EV)

  16. lessons from tuberous sclerosis complex

    African Journals Online (AJOL)

    intellectual disability, autism, specific learning disorders) and mental health disorders (e.g. depression, psychosis and anxiety disorders). The first lesson, therefore, is ... of an adolescent with TSC, facial angiofibromas and a presumed fat-poor ...

  17. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  18. Lessons of nuclear power

    International Nuclear Information System (INIS)

    Collingridge, D.

    1984-01-01

    In an earlier article the author has argued that the turbulent history of nuclear power in Britain and the USA stems from the technology itself, and has little to do with the very different institutional arrangements made for the new technology in the two countries. Nuclear plant has various features which make its planning extraordinarily difficult. Its long lead time, large unit size, capital intensity and dependence on complex infrastructure combine to ensure that mistakes are likely to be made in planning the technology and that what mistakes do occur are expensive. This article aims to expand on the earlier one in two ways; by looking at the apparent success of the French nuclear programme which seems to run counter to the thesis of the earlier article, and by trying to draw lessons from the earlier analysis for the breeder reactor. (author)

  19. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  20. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  1. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  2. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  3. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  4. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  5. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  6. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  7. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  8. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  9. Lesson "Balance in Nature

    Science.gov (United States)

    Chapanova, V.

    2012-04-01

    Lesson "Balance in Nature" This simulation game-lesson (Balance in Nature) gives an opportunity for the students to show creativity, work independently, and to create models and ideas. It creates future-oriented thought connected to their experience, allowing them to propose solutions for global problems and personal responsibility for their activities. The class is divided in two teams. Each team chooses questions. 1. Question: Pollution in the environment. 2. Question: Care for nature and climate. The teams work on the chosen tasks. They make drafts, notes and formulate their solutions on small pieces of paper, explaining the impact on nature and society. They express their points of view using many different opinions. This generates alternative thoughts and results in creative solutions. With the new knowledge and positive behaviour defined, everybody realizes that they can do something positive towards nature and climate problems and the importance of individuals for solving global problems is evident. Our main goal is to recover the ecological balance, and everybody explains his or her own well-grounded opinions. In this work process the students obtain knowledge, skills and more responsible behaviour. This process, based on his or her own experience, dialogue and teamwork, helps the participant's self-development. Making the model "human↔ nature" expresses how human activities impact the natural Earth and how these impacts in turn affect society. Taking personal responsibility, we can reduce global warming and help the Earth. By helping nature we help ourselves. Teacher: Veselina Boycheva-Chapanova " Saint Patriarch Evtimii" Scholl Str. "Ivan Vazov"-19 Plovdiv Bulgaria

  10. Lessons learned in radiology

    International Nuclear Information System (INIS)

    Goodenough, D.J.

    2001-01-01

    The paper reviews aspects of the history of radiology with the goal of identifying lessons learned, particularly in the area of radiological protection of the patient in diagnostic and interventional radiology, nuclear medicine and radiotherapy. It is pointed out that since the days of Roentgen there has been a need not only to control and quantify the amount of radiation reaching the patient but also to optimize the imaging process to offer the greatest diagnostic benefit within allowable levels of patient dose. To this end, in diagnostic radiology, one finds the development of better films, X rays tubes, grids, screens and processing techniques, while in fluoroscopy, one sees the increased luminance of calcium tungstate. In interventional radiology, one finds an improvement in catheterization techniques and contrast agents. In nuclear medicine, the development of tracer techniques into modern cameras and isotopes such as technetium can be followed. In radiotherapy, one sees the early superficial X rays and radium sources gradually replaced with radon seeds, supervoltage, 60 Co and today's linear accelerators. Along with the incredible advances in imaging and therapeutic technologies comes the growing realization of the potential danger of radiation and the need to protect the patient (as well as physicians, ancillary personnel and the general population) from unnecessary radiation. The important lesson learned is that we must walk a tightrope, balancing the benefits and risks of any technology utilizing radiation to produce the greatest benefits at the lowest acceptable risk. The alternative techniques using non-ionizing radiation will have to be considered as part of the general armamentarium for medical imaging whenever radiation consequences are unacceptable. (author)

  11. Lessons Learned from FUSRAP

    Energy Technology Data Exchange (ETDEWEB)

    Castillo, Darina [U.S. Department of Energy, Office of Legacy Management; Carpenter, Cliff [U.S. Department of Energy, Office of Legacy Management; Miller, Michele [Navarro Research and Engineering

    2016-03-06

    The US DOE Office of Legacy Management (LM) is the long-term steward for 90 sites remediated under numerous regulatory regimes including the Formerly Utilized Sites Remedial Action Program (FUSRAP) sites. In addition, LM holds considerable historical information, gathered in the 1970s, to determine site eligibility for remediation under FUSRAP. To date, 29 FUSRAP sites are in LM’s inventory of sites for long-term surveillance and maintenance (LTS&M), and 25 are with the US Army Corps of Engineers (USACE) for remediation or in the process of being transitioned to LM. It is forecasted that 13 FUSRAP sites will transfer from the USACE to LM over the next 10 years; however, the timing of the transfers is strongly dependent upon federal funding of the ongoing remedial actions. Historically, FUSRAP sites were generally cleaned up for “unrestricted” industrial use or remediated to the “cleanup standards” at that time, and their use remained unchanged. Today, these sites as well as the adjacent properties are now changing or envisioned to have changes in land use, typically from industrial to commercial or residential uses. The implication of land-use change affects DOE’s LTS&M responsibility for the sites under LM stewardship as well as the planning for the additional sites scheduled to transition in time. Coinciding with land-use changes at or near FUSRAP sites is an increased community awareness of these sites. As property development increases near FUSRAP sites, the general public and interested stakeholders regularly inquire about the sufficiency of cleanups that impact their neighborhoods and communities. LM has used this experience to address a series of lessons learned to improve our program management in light of the changing conditions of our sites. We describe these lessons learned as (1) improved stakeholder relations, (2) enhanced LTS&M requirements for the sites, and (3) greater involvement in the transition process.

  12. Lessons learned from women in leadership positions.

    Science.gov (United States)

    Elias, Eileen

    2018-01-01

    Eileen Elias has decades of experience in leadership positions within government and nongovernmental organizations. As the first female Commissioner for Mental Health in the Commonwealth of Massachusetts and the US in the early 1990s, Elias gained experience on navigating gender-based challenges to attain recognized performance outcomes. From lessons learned from women leaders, educate young women entering their careers on attaining leadership positions. Comprehensive research of literature from 2012 through 2017 and interviews with women leaders representing non-Fortune 500 companies including academia, research, non-profit, for-profit, and primary and secondary education. Interviewees included:1.Gail Bassin, Co-Chief Executive Officer and Treasurer, JBS International Inc.2.Jeri Epstein, Executive Director, The Ambit Foundation3.Valerie Fletcher, Executive Director, Institute for Human Centered Design4.Christine James-Brown, President and CEO, Child Welfare League of America5.Daria Mochly-Rosen, PhD, Professor and Fellow, Chemical and Systems Biology, Stanford University School of Medicine6.Eileen O'Keefe, MD, MPH, Clinical Associate Professor and Director, Boston University Health Sciences7.Jeri Shaw, President and Co-Chief Executive Officer, JBS International Inc. A comprehensive understanding of key women leaders' lessons learned and recommendations targeting young women as they assess leadership opportunities in the public or private sectors.

  13. Lessons learned from accidents investigations

    Energy Technology Data Exchange (ETDEWEB)

    Zuniga-Bello, P. [Consejo Nacional de Ciencia y Tecnologia (CONACYT), Mexico City (Mexico); Croft, J. [National Radiological Protection Board (United Kingdom); Glenn, J

    1997-12-31

    Accidents from three main practices: medical applications, industrial radiography and industrial irradiators are used to illustrate some common causes of accidents and the main lessons to be learned. A brief description of some of these accidents is given. Lessons learned from the described accidents are approached by subjects covering: safety culture, quality assurance, human factors, good engineering practice, defence in depth, security of sources, safety assessment and monitoring and verification compliance. (author)

  14. Lessons learned from accident investigations

    International Nuclear Information System (INIS)

    Zuniga-Bello, P.; Croft, J.R.; Glenn, J.

    1998-01-01

    Accidents in three main practices - medical applications, industrial radiography and industrial irradiators - are used to illustrate some common causes of accidents and the main lessons to be learned from them. A brief description of some of these accidents is given. Lessons learned from the accidents described are approached bearing in mind: safety culture, quality assurance, human factors, good engineering practice, defence in depth, security of sources, safety assessment and monitoring and verification compliance. (author)

  15. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  16. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  17. Clinical study on transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    The purpose of this study was to neuroradiologically elucidate the mechanism by which transient ischemic attack (TIA) occurs. A total of 65 patients with TIA, including 52 with TIA in the internal carotid artery (Group I) and 13 with TIA in the vertebrobasilar artery (Group II), underwent computed tomography (CT) and cerebral angiography (CAG). In Group I, CAG revealed normal findings in 25 patients, extracranial lesions in 14, intracranial lesions in 11, and mixed extra- and intra-cranial lesions in 2; and the corresponding figures for Group II were 8, 4, 1 and 0, respectively. CT findings in Groups I and II included: normal findings in 27 and 9 patients, atrophied cerebrum and dilated cerebral ventricle in 7 and 2, TIA-unrelated infarction in 5 and one, and TIA-related infarction in 15 and one, respectively. In the 15 patients with TIA-related infarction in Group I, 10 had infarction in the basal cell nucleolus and the other 5 had widespread infarction extending to the area under the cortex. The latter 5 patients had cerebral infarction, and showed recanalization of the vessels. This finding may support the theory of ''microembolus'' as a possible cause of TIA. (Namekawa, K.)

  18. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  19. Intergranular attack evaluation from hideout return

    International Nuclear Information System (INIS)

    Nordmann, F.; Dupin, M.; Menet, O.; Fiquet, J.-M.

    1989-01-01

    Intergranular Attack (IGA) is the secondary side corrosion mechanism on PWR steam generator tubing, which can occur most frequently even with a good waterchemistry. It has moderately developed in a few French units. Consequently, several remedies have been implemented, such as sodium content decrease in makeup water and application of more stringent chemistry specifications. In order to evaluate the local chemistry in restricted areas where IGA may occur, a large hideout return programme has been carried out on many units. It shows that free alkalinity returning during shutdown is usually ranging from 0.5 to 5 g of sodium per steam generator, and that the required time to let it return is about 40 hours. However, high temperature pH calculations indicate that such an amount of alkalinity can correspond to a potentially corrosive solution in restricted areas, where a concentration factor of 10 5 to 10 7 can be reached, inducing a pH of 10 at 300 o C. Studies are still in progress in order to define when a shutdown should be required to allow hideout return and help to prevent IGA. (author)

  20. Coordinate an Attack Using the Calculator

    Science.gov (United States)

    Kranz, Sharie R.; Amato, Carlo A.; Freudenthal, Eric A.

    2013-01-01

    In this culture of instantaneous technology, students are familiar with immediate feedback. To maintain student engagement, it is vital for teachers to create similarly interactive experiences. Student-centered instruction is important in connecting students to key mathematical concepts. If the connection is not obvious, they may be unaware of…

  1. Usage Center

    DEFF Research Database (Denmark)

    Kleinaltenkamp, Michael; Plewa, Carolin; Gudergan, Siegfried

    2017-01-01

    Purpose: The purpose of this paper is to advance extant theorizing around resourceintegration by conceptualizing and delineating the notion of a usage center. Ausage center consists of a combination of interdependent actors that draw onresources across their individual usage processes to create v...

  2. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  3. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  4. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  5. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  6. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  7. What's Next in Complex Networks? Capturing the Concept of Attacking Play in Invasive Team Sports.

    Science.gov (United States)

    Ramos, João; Lopes, Rui J; Araújo, Duarte

    2018-01-01

    The evolution of performance analysis within sports sciences is tied to technology development and practitioner demands. However, how individual and collective patterns self-organize and interact in invasive team sports remains elusive. Social network analysis has been recently proposed to resolve some aspects of this problem, and has proven successful in capturing collective features resulting from the interactions between team members as well as a powerful communication tool. Despite these advances, some fundamental team sports concepts such as an attacking play have not been properly captured by the more common applications of social network analysis to team sports performance. In this article, we propose a novel approach to team sports performance centered on sport concepts, namely that of an attacking play. Network theory and tools including temporal and bipartite or multilayered networks were used to capture this concept. We put forward eight questions directly related to team performance to discuss how common pitfalls in the use of network tools for capturing sports concepts can be avoided. Some answers are advanced in an attempt to be more precise in the description of team dynamics and to uncover other metrics directly applied to sport concepts, such as the structure and dynamics of attacking plays. Finally, we propose that, at this stage of knowledge, it may be advantageous to build up from fundamental sport concepts toward complex network theory and tools, and not the other way around.

  8. Robotic exoskeleton assessment of transient ischemic attack.

    Directory of Open Access Journals (Sweden)

    Leif Simmatis

    Full Text Available We used a robotic exoskeleton to quantify specific patterns of abnormal upper limb motor behaviour in people who have had transient ischemic attack (TIA. A cohort of people with TIA was recruited within two weeks of symptom onset. All individuals completed a robotic-based assessment of 8 behavioural tasks related to upper limb motor and proprioceptive function, as well as cognitive function. Robotic task performance was compared to a large cohort of controls without neurological impairments corrected for the influence of age. Impairment in people with TIA was defined as performance below the 5th percentile of controls. Participants with TIA were also assessed with the National Institutes of Health Stroke Scale (NIHSS score, Chedoke-McMaster Stroke Assessment (CMSA of the arm, the Behavioural Inattention Test (BIT, the Purdue pegboard test (PPB, and the Montreal Cognitive Assessment (MoCA. Age-related white matter change (ARWMC, prior infarction and cella-media index (CMI were assessed from baseline CT scan that was performed within 24 hours of TIA. Acute infarction was assessed from diffusion-weighted imaging in a subset of people with TIA. Twenty-two people with TIA were assessed. Robotic assessment showed impaired upper limb motor function in 7/22 people with TIA patients and upper limb sensory impairment in 4/22 individuals. Cognitive tasks involving robotic assessment of the upper limb were completed in 13 participants, of whom 8 (61.5% showed significant impairment. Abnormal performance in the CMSA arm inventory was present in 12/22 (54.5% participants. ARWMC was 11.8 ± 6.4 and CMI was 5.4 ± 1.5. DWI was positive in 0 participants. Quantitative robotic assessment showed that people who have had a TIA display a spectrum of upper limb motor and sensory performance deficits as well as cognitive function deficits despite resolution of symptoms and no evidence of tissue infarction.

  9. Robotic exoskeleton assessment of transient ischemic attack.

    Science.gov (United States)

    Simmatis, Leif; Krett, Jonathan; Scott, Stephen H; Jin, Albert Y

    2017-01-01

    We used a robotic exoskeleton to quantify specific patterns of abnormal upper limb motor behaviour in people who have had transient ischemic attack (TIA). A cohort of people with TIA was recruited within two weeks of symptom onset. All individuals completed a robotic-based assessment of 8 behavioural tasks related to upper limb motor and proprioceptive function, as well as cognitive function. Robotic task performance was compared to a large cohort of controls without neurological impairments corrected for the influence of age. Impairment in people with TIA was defined as performance below the 5th percentile of controls. Participants with TIA were also assessed with the National Institutes of Health Stroke Scale (NIHSS) score, Chedoke-McMaster Stroke Assessment (CMSA) of the arm, the Behavioural Inattention Test (BIT), the Purdue pegboard test (PPB), and the Montreal Cognitive Assessment (MoCA). Age-related white matter change (ARWMC), prior infarction and cella-media index (CMI) were assessed from baseline CT scan that was performed within 24 hours of TIA. Acute infarction was assessed from diffusion-weighted imaging in a subset of people with TIA. Twenty-two people with TIA were assessed. Robotic assessment showed impaired upper limb motor function in 7/22 people with TIA patients and upper limb sensory impairment in 4/22 individuals. Cognitive tasks involving robotic assessment of the upper limb were completed in 13 participants, of whom 8 (61.5%) showed significant impairment. Abnormal performance in the CMSA arm inventory was present in 12/22 (54.5%) participants. ARWMC was 11.8 ± 6.4 and CMI was 5.4 ± 1.5. DWI was positive in 0 participants. Quantitative robotic assessment showed that people who have had a TIA display a spectrum of upper limb motor and sensory performance deficits as well as cognitive function deficits despite resolution of symptoms and no evidence of tissue infarction.

  10. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  11. How to learn and develop from both good and bad lessons- the 2011Tohoku tsunami case -

    Science.gov (United States)

    Sugimoto, Megumi; Okazumi, Toshio

    2013-04-01

    The 2011 Tohoku tsunami revealed Japan has repeated same mistakes in a long tsunami disaster history. After the disaster Japanese remember many old lessons and materials: an oral traditional evacuation method 'Tsunami TENDENKO' which is individual independent quick evacuation, a tsunami historical memorial stone "Don't construct houses below this stone to seaside" in Aneyoshi town Iwate prefecture, Namiwake-shrine naming from the story of protect people from tsunami in Sendai city, and so on. Tohoku area has created various tsunami historical cultures to descendent. Tohoku area had not had a tsunami disaster for 50 years after the 1960 Chilean tsunami. The 2010 Chilean tsunami damaged little fish industry. People gradually lost tsunami disaster awareness. At just the bad time the magnitude (M) 9 scale earthquake attacked Tohoku. It was for our generations an inexperienced scale disaster. People did not make use of the ancestor's lessons to survive. The 2004 Sumatra tsunami attacked just before 7 years ago. The magnitude scale is almost same as M 9 scale. Why didn't Tohoku people and Japanese tsunami experts make use of the lessons? Japanese has a character outside Japan. This lesson shows it is difficult for human being to learn from other countries. As for Three mile island accident case in US, it was same for Japan. To addition to this, there are similar types of living lessons among different hazards. For examples, nuclear power plantations problem occurred both the 2012 Hurricane Sandy in US and the 2011 Tohoku tsunami. Both local people were not informed about the troubles though Oyster creek nuclear power station case in US did not proceed seriously all. Tsunami and Hurricane are different hazard. Each exparts stick to their last. 1. It is difficult for human being to transfer living lessons through next generation over decades. 2. It is difficult for human being to forecast inexperienced events. 3. It is usually underestimated the danger because human being

  12. A Cyber-Attack Detection Model Based on Multivariate Analyses

    Science.gov (United States)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  13. Improving Wojcik's eavesdropping attack on the ping-pong protocol

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao; Li Yong

    2004-01-01

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency η, i.e., [0,75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack

  14. Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

    OpenAIRE

    Vivian Ogochukwu Nwaocha; Inyiama H.C.

    2011-01-01

    As organisations continue to incorporate the Internet as a key component of their operations, the global cyber-threat level is increasing. One of the most common types of cyber-threats is known as the Distributed Denial of Service (DDoS) attack – an attack preventing users from accessing a system for a period of time. Recent DDoS attacks have left large corporate and government networks inaccessible to customers, partners and users for hours or days, resulting in significant financial, reputa...

  15. Securing SQL server protecting your database from attackers

    CERN Document Server

    Cherry, Denny

    2015-01-01

    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic

  16. A Color Image Watermarking Scheme Resistant against Geometrical Attacks

    Directory of Open Access Journals (Sweden)

    Y. Xing

    2010-04-01

    Full Text Available The geometrical attacks are still a problem for many digital watermarking algorithms at present. In this paper, we propose a watermarking algorithm for color images resistant to geometrical distortions (rotation and scaling. The singular value decomposition is used for watermark embedding and extraction. The log-polar map- ping (LPM and phase correlation method are used to register the position of geometrical distortion suffered by the watermarked image. Experiments with different kinds of color images and watermarks demonstrate that the watermarking algorithm is robust to common image processing attacks, especially geometrical attacks.

  17. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  18. Supporting teachers' technology integration in lesson plans

    NARCIS (Netherlands)

    Janssen, Noortje

    2017-01-01

    Lesson planning offers rich opportunities for teachers to consider and implement technology in the classroom. This dissertation investigated the design and effectiveness of supplementary information to assist pre-service teachers during the lesson planning process. Based on the Technological,

  19. Value pricing pilot program : lessons learned

    Science.gov (United States)

    2008-08-01

    This "Lessons Learned Report" provides a summary of projects sponsored by the Federal Highway Administration's (FHWA's) Congestion and Value Pricing Pilot Programs from 1991 through 2006 and draws lessons from a sample of projects with the richest an...

  20. Lessons from Japan: Resilience after Tokyo and Fukushima

    Directory of Open Access Journals (Sweden)

    Michelle L. Spencer

    2013-01-01

    Full Text Available In the spring of 1995 Japan experienced the world’s first major terrorist attack using chemical weapons by a little-known religious cult called Aum Shinrikyo. The attack on the Tokyo subway, which killed 13 people, was the first lethal case of a non-state actor using a chemical agent against a civilian population. In March 2011, following a 9.0 magnitude earthquake in Japan, the Fukushima Daiichi nuclear reactor experienced a full meltdown releasing radiation into the surrounding area. The seemingly unhurried government reaction provided conflicting information to Japanese citizens, slowing evacuation and protective actions. Government failure is cited as a significant factor in the severity of the nuclear disaster in three investigations conducted after the incident. This article defines resilience and raises the question of whether the U.S. government has the ability to address the issues raised by the two case studies. There are four primary lessons of these two case studies from Japan: Trust is essential; two-way communications are vital; someone or something will always unexpectedly fail to act appropriately, while others will provide surprising support and; finally, recovery is long-term.